ISO 27799:2016 Compliance

Thales e-Security can help your organization comply with ISO 27799:2016

ISO 27799:2016:

Provides guidance to healthcare organizations and other custodians of personal health information on how best to protect the confidentiality, integrity and availability of such information. It is based upon and extends the general guidance provided by ISO/IEC 27002:2013 and addresses the special information security management needs of the health sector and its unique operating environments.1

Thales e-Security provides many of the solutions you need to comply with this ISO.

Regulation Summary

Among the best practices called for in ISO 27799 are:

  • Data access controls, including management of privileged access
  • Cryptographic control of sensitive data
  • Management and protection of encryption keys
  • Recording and archiving “all significant events concerning the use and management of user identities and secret authentication information” and protecting those records from “tampering and unauthorized access.”2
Compliance Summary

Thales e-Security can help you meet the standards in ISO 27799:2016 through:

  • Access controls that let only credentialed users retrieve data
  • Encrypting or tokenizing data so that if it is stolen, it is meaningless and therefore useless to cybercriminals
  • Centrally managing and securely storing encryption keys from across your organization
  • Protected security intelligence logs to identify irregular access patterns and breaches in progress
  • Hardware security modules to provide a hardened, tamper-resistant environment for secure cryptographic processing, key generation and protection, encryption and more
Access Control

Vormetric’s Data Security Platform provides state of the art user access control.

  • Separation of privileged access users and sensitive user data. With the Vormetric Data Security Platform, organizations can create a strong separation of duties between privileged administrators and data owners. Vormetric Transparent Encryption encrypts files while leaving their metadata in the clear. In this way, IT administrators—including hypervisor, cloud, storage, and server administrators—can perform their system administration tasks, without being able to gain privileged access to the sensitive data residing on the systems they manage.
  • Separation of administrative duties. Strong separation-of-duties policies can be enforced to ensure one administrator does not have complete control over data security activities, encryption keys, or administration. In addition, the Vormetric Data Security Manager supports two-factor authentication for administrative access.
  • Granular privileged access controls. Thales e-Security’s solution can enforce very granular, least-privileged-user access management policies, enabling protection of data from misuse by privileged users and APT attacks. Granular privileged-user-access management policies can be applied by user, process, file type, time of day, and other parameters. Enforcement options can control not only permission to access clear-text data, but what file-system commands are available to a user.
Data-Centric Protection

Vormetric protects the data itself through Vormetric Transparent Encryption with integrated Key Management for data at rest, Application Encryption, Tokenization with Dynamic Masking and more. These techniques make the data meaningless and worthless without the tools to decrypt it.

Unified Key Management

Integrated Key Management from Thales e-Security provides a robust, standards-based platform for managing encryption keys from disparate sources across the enterprise. It simplifies the management and administrative challenges around encryption key management to ensure that keys are secure and always provisioned to authorized encryption services.

Security Intelligence Logs

Thales e-Security lets the enterprise monitor and identify extraordinary data access. Vormetric Security Intelligence Logs are detailed management logs that specify which processes and users have accessed protected data. They specify when users and processes accessed which data, under which policies, and if access requests were allowed or denied. The management logs will even expose when a privileged user submits a command like 'switch users' in order to attempt to imitate, and potentially exploit, the credentials of another user. Sharing these logs with a security information and event management (SIEM) platform helps uncover anomalous patterns in processes and user access, which can prompt further investigation. For example, an administrator or process may suddenly access much larger volumes of data than normal, or attempt to do an unauthorized download of files. These events could point to an APT attack or malicious insider activities.

Hardware Security Modules (HSMs)

nShield HSMs from Thales e-Security provide a hardened, tamper-resistant environment for secure cryptographic processing, key generation and protection, encryption and more. Available in three FIPS 140-2 certified form factors, nShield HSMs can be deployed in many ways. nShield Connect and Solo HSMs also provide a secure environment for running sensitive applications. The CodeSafe option lets you execute code within nShield boundaries, protecting your applications and the data they process.

In addition nShield HSMs:

  • Generate and protect root and certificate authority (CA) keys, providing support for PKIs across a variety of use cases
  • Sign your application code so you can ensure that your software remains secure, unaltered and authentic
  • Create digital certificates for credentialing and authenticating proprietary electronic devices for IoT applications and other network deployments.

ISO/IEC 27002:2013 Compliance

Thales e-Security can help your organization comply with ISO/IEC 27002:2013

Download

2017 Thales DTR Healthcare Report

The 2017 Data Threat Report is based on a survey of over 1,100 senior security executives around the world.

Download

Research Reports White Papers : IANS: Encryption as an Enterprise Strategy

This report is a survey and offers analysts on creating an enterprise-wide encryption strategy and explores the growing “encrypt everything” philosophy.

Download

Research Reports White Papers : Platform Architecture

As security teams struggle to contend with more frequent, costly, and sophisticated attacks, data-at-rest encryption becomes an increasingly critical safeguard. This white paper offers an overview of the different encryption approaches available today.

Download

1ISO 27799, Second edition 2016-07-01, Health informatics — Information security management in health using ISO/IEC 27002. https://www.iso.org/standard/62777.html

2ISO/IEC 27002, Second edition 2013-10-01: Information technology — Security techniques — Code of practice for information security controls. https://www.iso.org/standard/54533.html

Mire nuestra demostración interactiva Explorar
Programe una demostración en vivo Programar
Comuníquese con un especialista Contacto