Ensuring Compliance with IT Governance

Requires the Log Management and Compliance service in ArcSight SIEM as a Service or the ArcSight Recon capability.

In the Reports Portal, select Repository > Standard Content > IT GOV > ISO-27002.

To comply with the information security management controls as part of ISO 27002 guidelines, your enterprise needs to establish and follow information security standards and policies. The guidelines help you identify and implement the controls needed to secure data. You can check the security controls in your enterprise against one or more specific ISO 27002 control set, such as Information Security Policies or Asset Management.

We provide the Compliance Pack for IT Governance to help you comply with Controls 6, 8, 9, 10, 12, 13, 14, 16, and 17. For more information about adding the pack to the Reports repository, see the Solutions Guide for ArcSight Compliance Pack for IT Governance.

This package includes dashboards and reports organized by the ISO-27002 requirements:

Category Dashboards Reports

IT Governance – Executive Overview

Overall Risk Management

n/a

6 – Organization of Information Security

n/a

Suspicious Activity in Wireless Network

8 – Asset Management

n/a

Network Active Assets

New Hosts

New Services

9 – Access Control

User Account Management

Account Lockouts by User

All Login Activity

Authentication with Null Sessions

Authorization Changes

Privileged Account Changes

Removal of Access Rights

Successful Brute Force Logins

Unauthorized User Access to Network Domain

User Account Creation

User Account Deletion

10 – Cryptography

n/a

Insecure Cryptographic Storage

Invalid Certificates

Systems Providing Unencrypted Services

12 – Operations Security

Authentication Errors

Database Events

Events and Incidents that have Occurred

Malware Activity

Scans Overview

Vulnerabilities Management

Vulnerability Scans and Unauthorized Access

Account Activity Summary

Administrative Actions Events

Administrative Logins and Logouts

Application Configuration Modification

Audit Log Cleared

Authentication Logins with Insecure Ports

Blocked Firewall Traffic

Changes to Operating System

Covert Channel Activity

Device Configuration Changes

Device Logging Review

Exploit of Vulnerabilities

Failed Administrative User Logins

Failed Antivirus Updates

Failed File Access

Failed File Deletions

Failed User Logins

Fault Logs

File Changes in Production

Firewall Configuration Changes

Logins to Database Machines

Machines Conducting Policy Breaches

Malicious Code Sources

Network Device Configuration Changes

Policy Violations

Resource Exhaustion

Software Changes in Production

Successful Administrative User Logins

Successful File Deletions

Successful User Logins

Suspicious Activity

Trojan Code Activity

User Actions All Events

User Logins and Logouts

Virus Infected Machines

Vulnerabilities Scanner Results

13 – Communications Security

Email Activities

Peer to Peer Activity

Phishing Activities

Accessed Ports through Firewall

Firewall Open Port Review

Information Interception Events

Insecure Services

Interzone Traffic

Organizational Information Leaks

Personal Information Leaks

Processes by Asset

14 – System Acquisition, Development, and Maintenance

n/a

Invalid Data Input

16 – Information Security Incident Management

Internal Reconnaissance

Confidential Breach Sources

Denial of Service

File Integrity Changes

Information Systems Failures

Integrity Breach Sources

Internal Reconnaissance by Event

Internal Reconnaissance by Source Address

Internal Reconnaissance by Target Address

17 – Information Security Aspects of Business Continuity Management

n/a

Availability Attacks