ISO 27001-02

International Standards Organization (ISO) 27001 and 27002 Compliance

Developed by the International Standards Organization, these standards provide guidance to organizations seeking to manage security of data assets (such as intellectual property), employee, customer, or other sensitive data, and implement security best practices. 

How EiQ Helps

EiQ’s SOCVue Security Monitoring service helps organizations address ISO 27001/2 by providing 24/7/365 security monitoring and audit log analysis as required in ISO 27002 Section A.12.

EiQ’s SOCVue Vulnerability Management service provides vulnerability detection and remediation guidance designed to address ISO 27002 Sections A.12 and A.14.

With the Security Monitoring on-premise deployment option, EiQ’s SOC team can also proactively assess several additional security controls, which are based on the SANS/CIS Critical Security Controls, in order to reduce your compliance risk. The security controls are directly mapped to relevant sections of ISO 27002.

Our SOC team will work with your organization to enable the reporting you need to help meet your compliance objectives with ease.

Critical Security Control

ISO 27002:2013

How SOCVue Security Monitoring Addresses

How SOCVue Vulnerability Management Addresses

Critical Security Control #1: Inventory of Authorized and Unauthorized Devices

A.8.1.1

A.9.1.2

A.13.1.1

SOCVue security analysts can monitor DHCP event logs to track the identity of devices connecting to the network and help detect unauthorized devices.

SOCVue security analysts will conduct Qualys discovery scans in order to build an inventory of authorized and unauthorized devices.

Critical Security Control #4: Continuous Vulnerability Assessment and Remediation

A.12.6.1

A.14.2.8

SOCVue security analysts can help you correlate data from a wide variety of commercial vulnerability scanners with real-time security event data for enhanced alerting and reporting.

SOCVue Vulnerability Management includes Qualys vulnerability scanning along with our SOCVue security analysts to manage the tool and guide you with recommended action. New vulnerabilities can be quickly detected and appropriate staff notified.

Critical Security Control #6: Maintenance, Monitoring, and Analysis of Audit Logs

A.12.4.1

A.12.4.2 

A.12.4.3

A.12.4.4

A.12.7.1

SOCVue Security Monitoring provides the people, process, and technology needed to collect, monitor, and analyze audit logs. Monitoring audit logs can provide valuable security insight and help detect advanced threats.

Critical Security Control #9: Limitation and Control of Network Ports

A.9.1.2

A.13.1.1

A.13.1.2

A.14.1.2

SOCVue security analysts will help you establish a whitelist/blacklist of ports and protocols and assess whether any unauthorized ports, protocols, and services are running on a network.

SOCVue Vulnerability Management provides vulnerability scanning technology from Qualys to help detect vulnerable port and protocol usage on your IT assets.

*Additional controls auditing available with on-premise Security Monitoring deployments

Learn More About SOCVue Security as a Service

Let's Talk
Most IT departments are only reactive to issues that arise. I believe with EiQ’s help, you can take a proactive approach to solving issues before they cause any problems. That’s what we’re doing, so I know you can too.
Mark Camacho IT Manager, Arizona Canning Company