ISO/IEC 27002 is an international standard used as a reference for controls when implementing an Information Security Management System, incorporating data access controls, cryptographic control of sensitive data and key management.
Thales provides many of the solutions required to comply with this ISO, including:
Among the best practices called for in ISO/IEC 27002 are:
1ISO/IEC 27002, Second edition 2013-10-01: Information technology — Security techniques — Code of practice for information security controls. https://www.iso.org/standard/54533.html
Thales can help you meet the standards in ISO/IEC 27002:2013 through:
The CipherTrust Data Security Platform provides state of the art user access control.
Thales protects the data itself through CipherTrust Transparent Encryption with integrated Key Management for data at rest, CipherTrust Application Data Protection, CipherTrust Tokenization, and more. These techniques make the data meaningless and worthless without the tools to decrypt it.
Unified Key Management
CipherTrust Enterprise Key Management from Thales provides a robust, standards-based platform for managing encryption keys from disparate sources across the enterprise. It simplifies the management and administrative challenges around encryption key management to ensure that keys are secure and always provisioned to authorized encryption services.
Security Intelligence Logs
Thales lets the enterprise monitor and identify extraordinary data access. CipherTrust Security Intelligence logs are detailed management logs that specify which processes and users have accessed protected data. They specify when users and processes:
Sharing these logs with a security information and event management (SIEM) platform helps uncover anomalous patterns in processes and user access, which can prompt further investigation.
Perhaps the most comprehensive data privacy standard to date, GDPR affects any organization that processes the personal data of EU citizens - regardless of where the organization is headquartered.
Any organization that plays a role in processing credit and debit card payments must comply with the strict PCI DSS compliance requirements for the processing, storage and transmission of account data.
Data breach notification requirements following loss of personal information have been enacted by nations around the globe. They vary by jurisdiction but almost universally include a “safe harbor” clause.