Visual Guard is a modular solution and a robust framework designed to ensure the security of your business applications.
| Issued by | Standard | Relevance | Alignment with Visual Guard |
|---|---|---|---|
| ISO/IEC | 27001 | Info. Security Management System (ISMS) | Access control, centralized governance, audit logs. Learn more |
| ISO/IEC | 27002 | Security measures and guidelines | RBAC, access review, SoD enforcement, logging. Learn more |
| ISO/IEC | 27017 | Security in cloud environments | Cloud access control and governance. Learn more |
| ISO/IEC | 27018 | Personal data protection in the cloud | Restricted access, traceability. Learn more |
| EU | eIDAS | Electronic identification and trust services | MFA support, secure identity management. Learn more |
| EU / CNIL | GDPR | EU privacy regulation | Least privilege, access audit, personal data control. Learn more |
| DINUM | RGI | Public sector interoperability framework | Standards-compliant REST/JSON APIs. Learn more |
| ANSSI | RGS | Security of digital exchanges | MFA, logs, access lifecycle, integration. Learn more |
| ANSSI | IAM | Best practices on identity and access | MFA, RBAC, SoD, lifecycle and audit logging. Learn more |
| ANSSI | CSPN | Security product certification | Secure practices followed, but depends on compliant client architecture or integration. Learn more |
| SecNum | SecNum Cloud |
Secured cloud hosting (OIV/public sector) | Deployable on compliant infrastructure - depends on client architecture. Learn more |
| NIST | SP 800-53 | Security & privacy controls for federal systems | IAM, logging, access review and policies. Learn more |
| NIST | SP 800-63 | Digital identity guidelines | MFA, session and identity assurance. Learn more |
| NIST | SP 800-171 | Protection of Controlled Unclassified Info. | Identity-based access restriction. Learn more |
| CIS | Control 4 | Secure configuration | Secure IAM implementation in configured environments. Learn more |
| CIS | Control 6 | Access control management | RBAC, audit trail, account provisioning. Learn more |
| CIS | Control 16 | Application software security | Application-level access governance. Learn more |
| SEC | SOX | Financial compliance and auditability | SoD, access logging, periodic reviews. Learn more |
| HHS | HIPAA | Healthcare data protection | Restricted access, logging, and account lifecycle. Learn more |
| PCI | DSS | Payment card industry data security | Controlled access, audit, rights review. Learn more |
| SWIFT | CSCF | Secure access for financial networks | MFA, access separation, trace logging. Learn more |
| CSA CCM | IAM-01 to 11 | Cloud identity & access control | Provisioning, de-provisioning, RBAC, MFA. Learn more |
| CSA CCM | SEF-01 | Secure engineering principles | Enforced access policies for secure applications. Learn more |
| COBIT | DSS05 | Manage security services | Structured access and permission control processes. Learn more |
| COBIT | DSS06 | Manage business process controls | Governance and oversight of access control. Learn more |
| COBIT | MEA02 | Monitor internal control system | Audit, role tracking, and security supervision. Learn more |
Native coverage or coverage that can be implemented with Visual Guard
Possible with Visual Guard, but depends on compliant client architecture or integration
These standards are addressed in the 2026 guide to securing PowerBuilder applications, with technical controls, checklists, and audit evidence mapped to each requirement.
A single solution to meet the requirements of multiple security standards.
Continuous evolution to efficiently adapt to changing regulatory landscape.
Complete protection with role-based access controls and separation of duties.
Early detection of risks thanks to our advanced audit and traceability tools.