bg-intro-1-banner

ISO 27799:2016

Thales can help your organization comply with ISO 27799:2016

ISO 27799:2016:

map
Regulation |  Active Now

ISO 27799 is an international standard providing guidance on how best to protect the confidentiality, integrity and availability of personal health data for anyone working in the health sector or its unique operating environments.

Thales provides many of the solutions required to comply with this ISO, including:

  • Data access controls and managing privileged access;
  • Encryption key management and protection;
  • Monitoring and protecting records to prevent compromise.

1ISO 27799, Second edition 2016-07-01, Health informatics — Information security management in health using ISO/IEC 27002. https://www.iso.org/standard/62777.html

2ISO/IEC 27002, Second edition 2013-10-01: Information technology — Security techniques — Code of practice for information security controls. https://www.iso.org/standard/54533.html

  • Regulation
  • Compliance

Regulation Summary

Among the best practices called for in ISO 27799 are:

  • Data access controls, including management of privileged access
  • Cryptographic control of sensitive data
  • Management and protection of encryption keys
  • Recording and archiving “all significant events concerning the use and management of user identities and secret authentication information” and protecting those records from “tampering and unauthorized access.”2

Compliance Summary

Thales can help you meet the standards in ISO 27799:2016 through:

  • Access controls that let only credentialed users retrieve data
  • Encrypting or tokenizing data so that if it is stolen, it is meaningless and therefore useless to cybercriminals
  • Centrally managing and securely storing encryption keys from across your organization
  • Protected security intelligence logs to identify irregular access patterns and breaches in progress

Access Control

The CipherTrust Data Security Platform provides state of the art user access control.

  • Separation of privileged access users and sensitive user data. With the CipherTrust Data Security Platform, organizations can create a strong separation of duties between privileged administrators and data owners. CipherTrust Transparent Encryption encrypts files while leaving their metadata in the clear. In this way, IT administrators—including hypervisor, cloud, storage, and server administrators—can perform their system administration tasks, without being able to gain privileged access to the sensitive data residing on the systems they manage.
  • Separation of administrative duties. Strong separation-of-duties policies can be enforced to ensure one administrator does not have complete control over data security activities, encryption keys, or administration. In addition, CipherTrust Manager supports two-factor authentication for administrative access.
  • Granular privileged access controls. Thales’ solution can enforce very granular, least-privileged-user access management policies, enabling protection of data from misuse by privileged users and APT attacks. Granular privileged-user-access management policies can be applied by user, process, file type, time of day, and other parameters. Enforcement options can control not only permission to access clear-text data, but what file-system commands are available to a user.

Data-Centric Protection

Thales protects the data itself through CipherTrust Transparent Encryption with integrated Key Management for data at rest, CipherTrust Application Data Protection, CipherTrust Tokenization, and more. These techniques make the data meaningless and worthless without the tools to decrypt it.

Unified Key Management

CipherTrust Enterprise Key Management from Thales provides a robust, standards-based platform for managing encryption keys from disparate sources across the enterprise. It simplifies the management and administrative challenges around encryption key management to ensure that keys are secure and always provisioned to authorized encryption services.

Security Intelligence Logs

Thales lets the enterprise monitor and identify extraordinary data access. CipherTrust Security Intelligence logs are detailed management logs that specify which processes and users have accessed protected data. They specify when users and processes:

  • Accessed which data, under which policies
  • If access requests were allowed or denied
  • Expose when a privileged user submits a command like 'switch users' in order to attempt to imitate the credentials of another user

Sharing these logs with a security information and event management (SIEM) platform helps uncover anomalous patterns in processes and user access, which can prompt further investigation.

  • Related Resources
  • Other key data protection and security regulations

    GDPR

    Regulation
    Active Now

    Perhaps the most comprehensive data privacy standard to date, GDPR affects any organization that processes the personal data of EU citizens - regardless of where the organization is headquartered.

    PCI DSS

    Mandate
    Active Now

    Any organization that plays a role in processing credit and debit card payments must comply with the strict PCI DSS compliance requirements for the processing, storage and transmission of account data.

    Data Breach Notification Laws

    Regulation
    Active Now

    Data breach notification requirements following loss of personal information have been enacted by nations around the globe. They vary by jurisdiction but almost universally include a “safe harbor” clause.