The table below provides an overview of the standards and regulatory frameworks that Visual Guard aligns with. For each standard, you will find its relevance and the specific Visual Guard features that ensure compliance. Detailed information on selected standards is available in dedicated sections
Issued by | Standard | Relevance | Alignment with Visual Guard |
---|---|---|---|
ISO/IEC | 27001 | Info. Security Management System (ISMS) | Access control, centralized governance, audit logs. Learn more |
ISO/IEC | 27002 | Security measures and guidelines | RBAC, access review, SoD enforcement, logging |
ISO/IEC | 27017 | Security in cloud environments | Cloud access control and governance |
ISO/IEC | 27018 | Personal data protection in the cloud | Restricted access, traceability |
EU | eIDAS | Electronic identification and trust services | MFA support, secure identity management. Learn more |
EU / CNIL | GDPR | EU privacy regulation | Least privilege, access audit, personal data control. Learn more |
DINUM | RGI | Public sector interoperability framework | Standards-compliant REST/JSON APIs. Learn more |
ANSSI | RGS | Security of digital exchanges | MFA, logs, access lifecycle, integration |
ANSSI | IAM | Best practices on identity and access | MFA, RBAC, SoD, lifecycle and audit logging |
ANSSI | CSPN | Security product certification | Secure practices followed, but depends on compliant client architecture or integration |
SecNum | SecNum Cloud |
Secured cloud hosting (OIV/public sector) | Deployable on compliant infrastructure - depends on client architecture. |
NIST | SP 800-53 | Security & privacy controls for federal systems | IAM, logging, access review and policies. Learn more |
NIST | SP 800-63 | Digital identity guidelines | MFA, session and identity assurance |
NIST | SP 800-171 | Protection of Controlled Unclassified Info. | Identity-based access restriction |
CIS | Control 4 | Secure configuration | Secure IAM implementation in configured environments |
CIS | Control 6 | Access control management | RBAC, audit trail, account provisioning |
CIS | Control 16 | Application software security | Application-level access governance |
SEC | SOX | Financial compliance and auditability | SoD, access logging, periodic reviews |
HHS | HIPAA | Healthcare data protection | Restricted access, logging, and account lifecycle |
PCI | DSS | Payment card industry data security | Controlled access, audit, rights review |
SWIFT | CSCF | Secure access for financial networks | MFA, access separation, trace logging |
CSA CCM | IAM-01 to 11 | Cloud identity & access control | Provisioning, de-provisioning, RBAC, MFA |
CSA CCM | SEF-01 | Secure engineering principles | Enforced access policies for secure applications |
COBIT | DSS05 | Manage security services | Structured access and permission control processes |
COBIT | DSS06 | Manage business process controls | Governance and oversight of access control |
COBIT | MEA02 | Monitor internal control system | Audit, role tracking, and security supervision |
Native coverage or coverage that can be implemented with Visual Guard
Possible with Visual Guard, but depends on compliant client architecture or integration
Benefit:
Users only need to log in once when they open their Windows session to access all their authorized applications.
Benefits :
A single solution to meet the requirements of multiple security standards.
Continuous evolution to efficiently adapt to changing regulatory landscape.
Complete protection with role-based access controls and separation of duties.
Early detection of risks thanks to our advanced audit and traceability tools.