Iso 27002
Iso 27002
Iso 27002
COMPLIANCE GUIDE
How Rapid7 Can Help You Achieve Compliance
with ISO 27002
A
CONTENTS
Introduction 2
Detailed Controls Mapping 3
About Rapid7 8
5.1.1 Policies for Define, approve, and • Security • Rapid7 can help organizations build an effective
information policy communicate a set of Program Devel- security program taking into account their busi-
policies for information opment ness strategy, compliance requirements, and the
security. threat landscape.
5.1.2 Review of the Review policies at • Cyber • Rapid7 can perform an assessment of an organiza-
policies for informa- planned intervals or if Security tion’s current state of controls, policies, and proce-
tion security significant changes occur. Maturity dures, and identify tactical and strategic initiatives
Assessment for improving security.
8. ASSET MANAGEMENT
8.1 Responsibility for assets
8.1.1 Inventory of Identify organizational • InsightVM • InsightVM enables assets to be tagged with con-
assets assets and maintain an textual information, including assigning an asset
• InsightIDR
inventory of these assets. owner.
• InsightIDR automatically detects the primary user
of each asset.
8.1.2 Ownership of Assign an asset owner • InsightVM • InsightVM enables assets to be tagged with con-
assets for assets maintained in textual information, including assigning an asset
• InsightIDR
the inventory. owner.
• InsightIDR automatically detects the primary user
of each asset.
8.2 Information classification
8.2.1 Classification of Classify information and • InsightVM • InsightVM enables assets to be tagged with con-
information assets in terms of value, textual information, including classifying an asset’s
• InsightIDR
criticality and sensitivity. criticality.
• InsightIDR enables assets to be tagged as critical.
8.3 Media handling
8.3.1 Management of Implement procedures • InsightVM • InsightVM can measure part of this control by
removable media to manage the use of providing the ability to audit whether autoplay is
removable media. allowed on devices.
9.1.2 Access to Limit user access to the • InsightIDR • InsightIDR provides ability to monitor configurable
networks and network and monitor use network zones and access policies, and alerts on
network services of network services. violation of these policies.
9.2 User access management
9.2.3 Management Restrict and control • InsightIDR • InsightIDR monitors use of administrative
of privileged access allocation and use of accounts, and alerts on new admin accounts and
rights privileged access rights. account privilege escalation.
9.2.4 Management of Control allocation • InsightVM • InsightVM automatically scans the entire network
secret authentication of passwords and to identify systems that are configured with
• InsightIDR
information change default vendor default credentials.
passwords.
• InsightIDR automatically detects accounts that are
shared between multiple users.
9.2.5 Review of user Review user access rights • InsightIDR • InsightIDR provides visibility of all user accounts,
access rights at regular intervals and including local, domain, and cloud services
after any changes. accounts.
9.3 User responsibilities
9.3.1 Use of secret Ensure users are • InsightVM • InsightVM provides fully customizable policy scan-
authentication following the ning to audit passwords for minimum complexity
• InsightIDR
information organization’s password and length.
policies.
• InsightIDR automatically detects user credentials
that may have been compromised in third-party
breaches.
9.4 System and application access control
9.4.1 Information Restrict access to • InsightIDR • InsightIDR can partially help with this control by
access restriction information and monitoring access to key applications, and alerting
applications based on on unauthorized or suspicious usage.
access control policy.
9.4.2 Secure log-on Control access to • InsightVM • InsightVM can measure part of this control by
procedures systems and applications providing the ability to audit account lockout
• InsightIDR
by a secure log-on configurations, including maximum failed log-on
procedure. attempts.
• InsightIDR automatically detects unauthorized
access, and alerts on brute force attempts and
unusual authentication activity.
9.4.3 Password Password management • InsightVM • InsightVM provides ability to audit password
management system systems should ensure policy configurations, including complexity, expiry,
• Metasploit
quality passwords. re-use and encryption.
• Metasploit tests password quality with online
brute-force attacks, offline password cracking, and
credentials re-use.
12.2.1 Controls against Implement detection and • InsightVM • InsightVM scans every Windows workstation to
malware prevention controls to check that:
• InsightIDR
protect against malware.
• URL filtering and website reputation scanning
are enabled;
• E-mail clients are configured to block certain
attachments;
• Anti-malware software is installed, enabled and
up-to-date.
• InsightIDR detects known malicious processes on
endpoints, and identifies unauthorized software
that is rare or unique.
12.4 Logging and monitoring
12.4.1 Event logging Record user activities, • InsightIDR • InsightIDR collects logs, correlates events by user,
exceptions, faults, and machine and IP, and analyzes for anomalies and
information security suspicious activities.
events.
12.4.2 Protection of Protect log information • InsightIDR • InsightIDR saves logs from various sources in a
log information against tampering and secure, offsite location, and alerts on event log
unauthorized access. files being deleted.
12.4.3 Administrator Log and review system • InsightIDR • InsightIDR provides visibility of all administra-
and operator logs administrator and tor activities, including local, domain and cloud
operator activities service admin accounts.
regularly.
12.6 Technical vulnerability management
12.6.1 Management Evaluate the • InsightVM • InsightVM automatically scans the entire network
of technical organization’s exposure for vulnerabilities and prioritizes for remediation
• Metasploit
vulnerabilities to vulnerabilities and based on risk.
address associated risks. • InsightIDR
• Metasploit automatically tests the exploitability
• Managed of vulnerabilities to demonstrate exposure for
Services prioritization.
• InsightIDR correlates vulnerability data with event
logs to provide additional user context to inci-
dents.
• Rapid7 can provide a fully-managed, cloud-based
vulnerability management service operated on a
monthly or quarterly basis.
13. COMMUNICATIONS SECURITY
13.1 Network security management
13.1.3 Segregation in Segregate groups of • Metasploit • Metasploit automates the task of testing whether
networks information services, network segmentation is operational and effec-
• InsightIDR
users and systems on tive.
networks.
• InsightIDR provides ability to monitor configurable
network zones and access policies, and alerts on
violation of these policies.
13.2.1 Information Protect the transfer of • InsightIDR • InsightIDR can partially help with this control by
transfer policies and information through all providing visibility into usage of cloud-based com-
procedures types of communication munications or storage services.
facilities.
14. SYSTEM ACQUISITION, DEVELOPMENT AND MAINTENANCE
14.2 Security in development and support process
14.2.3 Technical Review and test business • InsightAppSec • InsightAppSec can be used to dynamically scan
review of critical applications when applications when operating platforms change to
applications after operating platforms identify vulnerabilities.
operating platform change.
changes
14.2.8 System security Conduct testing of • InsightAppSec • InsightAppSec integrates with continuous integra-
testing security functionality tion tools to identify vulnerabilities within the
• Penetration
during development. development lifecycle.
Testing Services
• Rapid7 can perform manual penetration testing on
web and mobile applications to identify security
weaknesses.
14.2.9 System Conduct acceptance • InsightAppSec • InsightAppSec can be used to dynamically scan
acceptance testing testing for new new applications, upgrades and new versions to
• Penetration
information systems, identify vulnerabilities.
upgrades and new Testing Services
versions. • Rapid7 can perform manual penetration testing on
web and mobile applications to identify security
weaknesses.
16. INFORMATION SECURITY INCIDENT MANAGEMENT
16.1 Management of information security incidents and improvements
16.1.1 Responsibilities Establish responsibilities • Incident • Rapid7 can perform an assessment of the organi-
and procedures and procedures for Response zation’s current preparedness and help develop an
response to security Program Devel- incident response plan.
incidents. opment
16.1.4 Assessment Assess events to decide • InsightIDR • InsightIDR uses behavioral analytics to detect
of and decision on if they are to be classified security incidents and speeds up assessment of
information security as security incidents. security events by providing instant user context
events and incident investigation tools.
16.1.5 Response to Respond to security • Incident • Rapid7 can help organizations with all stages of
information security incidents according to Response incident response from analysis and detection to
incidents documented procedures. Services containment and remediation.
16.1.7 Collection of Define and apply • InsightIDR • InsightIDR provides ability to map findings to an
evidence procedures for interactive timeline and produce a final report for
• Incident
identification and communication.
collection of evidence. Response
Services • Rapid7 can help organizations develop an incident
response plan and define evidence collection and
documentation processes.
18.2.1 Independent Review approach to • Cyber Secu- • Rapid7 can perform an assessment of an organiza-
review of information managing information rity Maturity tion’s current state of controls, policies and proce-
security security at planned Assessment dures, and identify tactical and strategic initiatives
intervals. for improving security.
18.2.3 Technical Review compliance with • InsightVM • InsightVM provides auditing and reporting
compliance review policies and standards capabilities for assessing compliance with security
• Metasploit
regularly. policies and standards.
• Penetration
testing services • Metasploit allows organizations to simulate real-
world attacks and test effectiveness of security
controls.
• Rapid7 can perform penetration tests on network
infrastructure and applications to test the security
of information systems.