Visual Guard Compatibility with Security Standards

This document outlines Visual Guard's compatibility with major cybersecurity standards, regulatory compliance frameworks, and national or international best practice guidelines.

The table below provides an overview of the standards and regulatory frameworks that Visual Guard aligns with. For each standard, you will find its relevance and the specific Visual Guard features that ensure compliance. Detailed information on selected standards is available in dedicated sections

Issued by Standard Relevance Alignment with Visual Guard
ISO/IEC 27001 Info. Security Management System (ISMS) Access control, centralized governance, audit logs. Learn more
ISO/IEC 27002 Security measures and guidelines RBAC, access review, SoD enforcement, logging
ISO/IEC 27017 Security in cloud environments Cloud access control and governance
ISO/IEC 27018 Personal data protection in the cloud Restricted access, traceability
EU eIDAS  Electronic identification and trust services MFA support, secure identity management. Learn more
EU / CNIL GDPR  EU privacy regulation  Least privilege, access audit, personal data control. Learn more
DINUM RGI Public sector interoperability framework Standards-compliant REST/JSON APIs. Learn more
ANSSI RGS Security of digital exchanges MFA, logs, access lifecycle, integration
ANSSI IAM  Best practices on identity and access MFA, RBAC, SoD, lifecycle and audit logging
ANSSI CSPN  Security product certification Secure practices followed, but depends on compliant client architecture or integration
SecNum SecNum
Cloud 
Secured cloud hosting (OIV/public sector) Deployable on compliant infrastructure - depends on client architecture.
NIST SP 800-53 Security & privacy controls for federal systems IAM, logging, access review and policies. Learn more
NIST SP 800-63 Digital identity guidelines MFA, session and identity assurance
NIST SP 800-171 Protection of Controlled Unclassified Info. Identity-based access restriction
CIS Control 4 Secure configuration Secure IAM implementation in configured environments
CIS Control 6 Access control management RBAC, audit trail, account provisioning
CIS Control 16 Application software security Application-level access governance
SEC SOX Financial compliance and auditability SoD, access logging, periodic reviews
HHS HIPAA Healthcare data protection Restricted access, logging, and account lifecycle
PCI  DSS Payment card industry data security Controlled access, audit, rights review
SWIFT  CSCF Secure access for financial networks MFA, access separation, trace logging
CSA CCM IAM-01 to 11 Cloud identity & access control Provisioning, de-provisioning, RBAC, MFA
CSA CCM SEF-01 Secure engineering principles Enforced access policies for secure applications
COBIT  DSS05 Manage security services Structured access and permission control processes
COBIT  DSS06 Manage business process controls Governance and oversight of access control
COBIT  MEA02 Monitor internal control system Audit, role tracking, and security supervision

Native coverage or coverage that can be implemented with Visual Guard
Possible with Visual Guard, but depends on compliant client architecture or integration

 

 

Implementing Single Sign-On with Visual Guard

Authentication with a Windows Account

  • Account creation: Windows administrators set up user accounts in Active Directory.
  • Import into Visual Guard: Accounts are synchronized in Visual Guard.
  • Role configuration: Developers or security managers create roles in Visual Guard and define associated permissions.
  • Role assignment: User accounts are assigned to roles corresponding to their permissions.
  • User logon: Users log on to Windows with their usual credentials.
  • Authorization validation: When an application is launched, Visual Guard retrieves the Windows account ID and checks the configured permissions.
  • Apply permissions: If the account is authorized, Visual Guard applies the defined permissions.

Benefit:

Users only need to log in once when they open their Windows session to access all their authorized applications.

Windows group management

  • Creating accounts and groups: Windows administrators create user accounts in Active Directory and attach them to Windows groups.
  • Import into Visual Guard: Windows groups are synchronized in Visual Guard.
  • Role configuration: Developers or security managers create roles in Visual Guard and define permissions for each group.
  • User login: Users log in to Windows with their usual credentials.
  • Authorization validation: When an application is launched, Visual Guard queries Active Directory to identify the groups associated with the user account. Visual Guard checks whether a group to which the user belongs has the rights required for the application.
  • Apply permissions: If allowed, Visual Guard loads and applies the granted permissions.

Benefits :

  • Seamless user experience thanks to SSO
  • Developers or security managers manage permissions via groups in Visual Guard, simplifying access maintenance.
  • Daily user account provisioning and maintenance is only done in Active Directory.

Key Compliance Benefits of Visual Guard

Unified Compliance
 

A single solution to meet the requirements of multiple security standards.

Regulatory Adaptability
 

Continuous evolution to efficiently adapt to changing regulatory landscape.

Robust Access Governance

Complete protection with role-based access controls and separation of duties.

Proactive Security
 

Early detection of risks thanks to our advanced audit and traceability tools.