Make your applications compliant with security standards

This document lists the main cybersecurity standards, regulatory compliance frameworks, and national or international best practice guidelines that your applications can become compliant with by integrating Visual Guard.

Visual Guard is a modular solution and a robust framework designed to ensure the security of your business applications.

Issued by Standard Relevance Alignment with Visual Guard
ISO/IEC 27001 Info. Security Management System (ISMS) Access control, centralized governance, audit logs. Learn more
ISO/IEC 27002 Security measures and guidelines RBAC, access review, SoD enforcement, logging. Learn more
ISO/IEC 27017 Security in cloud environments Cloud access control and governance. Learn more
ISO/IEC 27018 Personal data protection in the cloud Restricted access, traceability. Learn more
EU eIDAS  Electronic identification and trust services MFA support, secure identity management. Learn more
EU / CNIL GDPR  EU privacy regulation  Least privilege, access audit, personal data control. Learn more
DINUM RGI Public sector interoperability framework Standards-compliant REST/JSON APIs. Learn more
ANSSI RGS Security of digital exchanges MFA, logs, access lifecycle, integration. Learn more
ANSSI IAM  Best practices on identity and access MFA, RBAC, SoD, lifecycle and audit logging. Learn more
ANSSI CSPN  Security product certification Secure practices followed, but depends on compliant client architecture or integration. Learn more
SecNum SecNum
Cloud
 
Secured cloud hosting (OIV/public sector) Deployable on compliant infrastructure - depends on client architecture. Learn more
NIST SP 800-53 Security & privacy controls for federal systems IAM, logging, access review and policies. Learn more
NIST SP 800-63 Digital identity guidelines MFA, session and identity assurance. Learn more
NIST SP 800-171 Protection of Controlled Unclassified Info. Identity-based access restriction. Learn more
CIS Control 4 Secure configuration Secure IAM implementation in configured environments. Learn more
CIS Control 6 Access control management RBAC, audit trail, account provisioning. Learn more
CIS Control 16 Application software security Application-level access governance. Learn more
SEC SOX Financial compliance and auditability SoD, access logging, periodic reviews. Learn more
HHS HIPAA Healthcare data protection Restricted access, logging, and account lifecycle. Learn more
PCI  DSS Payment card industry data security Controlled access, audit, rights review. Learn more
SWIFT  CSCF Secure access for financial networks MFA, access separation, trace logging. Learn more
CSA CCM IAM-01 to 11 Cloud identity & access control Provisioning, de-provisioning, RBAC, MFA. Learn more
CSA CCM SEF-01 Secure engineering principles Enforced access policies for secure applications. Learn more
COBIT  DSS05 Manage security services Structured access and permission control processes. Learn more
COBIT  DSS06 Manage business process controls Governance and oversight of access control. Learn more
COBIT  MEA02 Monitor internal control system Audit, role tracking, and security supervision. Learn more

Native coverage or coverage that can be implemented with Visual Guard
Possible with Visual Guard, but depends on compliant client architecture or integration

These standards are addressed in the 2026 guide to securing PowerBuilder applications, with technical controls, checklists, and audit evidence mapped to each requirement.

Key Compliance Benefits of Visual Guard

Unified Compliance
 

A single solution to meet the requirements of multiple security standards.

Regulatory Adaptability
 

Continuous evolution to efficiently adapt to changing regulatory landscape.

Robust Access Governance

Complete protection with role-based access controls and separation of duties.

Proactive Security
 

Early detection of risks thanks to our advanced audit and traceability tools.