Make your applications compliant with security standards

This document lists the main cybersecurity standards, regulatory compliance frameworks, and national or international best practice guidelines that your applications can become compliant with by integrating Visual Guard.

Visual Guard is a modular solution and a robust framework designed to ensure the security of your business applications.

Issued by Standard Relevance Alignment with Visual Guard
ISO/IEC 27001 Info. Security Management System (ISMS) Access control, centralized governance, audit logs. Learn more
ISO/IEC 27002 Security measures and guidelines RBAC, access review, SoD enforcement, logging
ISO/IEC 27017 Security in cloud environments Cloud access control and governance
ISO/IEC 27018 Personal data protection in the cloud Restricted access, traceability
EU eIDAS  Electronic identification and trust services MFA support, secure identity management. Learn more
EU / CNIL GDPR  EU privacy regulation  Least privilege, access audit, personal data control. Learn more
DINUM RGI Public sector interoperability framework Standards-compliant REST/JSON APIs. Learn more
ANSSI RGS Security of digital exchanges MFA, logs, access lifecycle, integration
ANSSI IAM  Best practices on identity and access MFA, RBAC, SoD, lifecycle and audit logging
ANSSI CSPN  Security product certification Secure practices followed, but depends on compliant client architecture or integration
SecNum SecNum
Cloud 
Secured cloud hosting (OIV/public sector) Deployable on compliant infrastructure - depends on client architecture.
NIST SP 800-53 Security & privacy controls for federal systems IAM, logging, access review and policies. Learn more
NIST SP 800-63 Digital identity guidelines MFA, session and identity assurance
NIST SP 800-171 Protection of Controlled Unclassified Info. Identity-based access restriction
CIS Control 4 Secure configuration Secure IAM implementation in configured environments
CIS Control 6 Access control management RBAC, audit trail, account provisioning
CIS Control 16 Application software security Application-level access governance
SEC SOX Financial compliance and auditability SoD, access logging, periodic reviews
HHS HIPAA Healthcare data protection Restricted access, logging, and account lifecycle
PCI  DSS Payment card industry data security Controlled access, audit, rights review
SWIFT  CSCF Secure access for financial networks MFA, access separation, trace logging
CSA CCM IAM-01 to 11 Cloud identity & access control Provisioning, de-provisioning, RBAC, MFA
CSA CCM SEF-01 Secure engineering principles Enforced access policies for secure applications
COBIT  DSS05 Manage security services Structured access and permission control processes
COBIT  DSS06 Manage business process controls Governance and oversight of access control
COBIT  MEA02 Monitor internal control system Audit, role tracking, and security supervision

Native coverage or coverage that can be implemented with Visual Guard
Possible with Visual Guard, but depends on compliant client architecture or integration

 

 

Key Compliance Benefits of Visual Guard

Unified Compliance
 

A single solution to meet the requirements of multiple security standards.

Regulatory Adaptability
 

Continuous evolution to efficiently adapt to changing regulatory landscape.

Robust Access Governance

Complete protection with role-based access controls and separation of duties.

Proactive Security
 

Early detection of risks thanks to our advanced audit and traceability tools.