SIEM Platform

The Security Information and Event Management Platform collects, correlates, reports, on multiple sources of security information for the purposes of maintaining situational awareness.

Cloud Controls Matrix (CCM) Data

Array

SA-14 | Security Architecture | Audit Logging / Intrusion Detection

Control Specification +-

Audit logs recording privileged user access activities, authorized and unauthorized access attempts, system exceptions, and information security events shall be retained, complying with applicable policies and regulations. Audit logs shall be reviewed at least daily and file integrity (host) and network intrusion detection (IDS) tools implemented to help facilitate timely detection, investigation by root cause analysis and response to incidents. Physical and logical user access to audit logs shall be restricted to authorized personnel.

Architectural Relevance +-

PhysicalNetworkComputeAppData
True True True True True

Corp Gov Relevance +-

Corp Gov Relevance
True

Cloud Service Delivery Model Applicability +-

SaaSPaaSIaaS
True True True

Supplier Relationship +-

Service ProviderTenant / Consumer
True False

Scope Applicability +-

COBIT 4.1HIPAA / HITECH ActISO/IEC 27001-2005

DS5.5
DS5.6
DS9.2

45 CFR 164.308 (a)(1)(ii)(D)
45 CFR 164.312 (b)
45 CFR 164.308(a)(5)(ii)?

A.10.10.1
A.10.10.2
A.10.10.3
A.10.10.4
A.10.10.5
A.11.2.2
A.11.5.4
A.11.6.1
A.13.1.1
A.13.2.3
A.15.2.2
A.15.1.3

NIST SP800-53 R3FedRAMP (Final 2012) Low ImpactFedRAMP (Final 2012) Moderate ImpactPCI DSS v2.0

AU-1
AU-2
AU-3
AU-4
AU-5
AU-6
AU-7
AU-9
AU-11
AU-12
AU-14
SI-4

NIST SP 800-53 R3 AU-1
NIST SP 800-53 R3 AU-2
NIST SP 800-53 R3 AU-3
NIST SP 800-53 R3 AU-4
NIST SP 800-53 R3 AU-5
NIST SP 800-53 R3 AU-6
NIST SP 800-53 R3 AU-9
NIST SP 800-53 R3 AU-11
NIST SP 800-53 R3 AU-12
NIST SP 800-53 R3 PE-2
NIST SP 800-53 R3 PE-3

NIST SP 800-53 R3 AU-1
NIST SP 800-53 R3 AU-2
NIST SP 800-53 R3 AU-2 (3)
NIST SP 800-53 R3 AU-2 (4)
NIST SP 800-53 R3 AU-3
NIST SP 800-53 R3 AU-3 (1)
NIST SP 800-53 R3 AU-4
NIST SP 800-53 R3 AU-5
NIST SP 800-53 R3 AU-6
NIST SP 800-53 R3 AU-6 (1)
NIST SP 800-53 R3 AU-6 (3)
NIST SP 800-53 R3 AU-7
NIST SP 800-53 R3 AU-7 (1)
NIST SP 800-53 R3 AU-9
NIST SP 800-53 R3 AU-11
NIST SP 800-53 R3 AU-12
NIST SP 800-53 R3 PE-2
NIST SP 800-53 R3 PE-3
NIST SP 800-53 R3 SI-4
NIST SP 800-53 R3 SI-4 (2)
NIST SP 800-53 R3 SI-4 (4)
NIST SP 800-53 R3 SI-4 (5)
NIST SP 800-53 R3 SI-4 (6)
NIST SP 800-53 R3 SC-18

10.1
10.2
10.3
10.5
10.6
10.7
11.4
12.5.2
12.9.5

BITS Shared Assessments SIG v6.0BITS Shared Assessments SIG v5.0GAPP (Aug 2009)

G.14.7, G.14.8, G.14.9, G.14.10,G.14.11, G.14.12, G.15.5, G.15.7, G.15.8, G.16.8, G.16.9, G.16.10, G.15.9, G.17.5, G.17.7, G.17.8, G.17.6, G.17.9, G.18.2, G.18.3, G.18.5, G.18.6, G.19.2.6, G.19.3.1, G.9.6.2, G.9.6.3, G.9.6.4, G.9.19, H.2.16, H.3.3, J.1, J.2, L.5, L.9, L.10

G.7
G.8
G.9
J.1
L.2

8.2.1
8.2.2

Jericho ForumNERC CIP

Commandment #6
Commandment #7
Commandment #11

CIP-007-3 - R6.5

Array

Consensus Assessments Initiative Questionnaire (CAIQ) Data

Security Architecture (SA) | ID #SA-14.1

Are file integrity (host) and network intrusion detection (IDS) tools implemented to help facilitate timely detection, investigation by root cause analysis and response to incidents?

Compliance Mapping +-

COBITHIPAAISO27001SP800_53

COBIT 4.1 DS5.5
COBIT 4.1 DS5.6
COBIT 4.1 DS9.2

45 CFR 164.308 (a)(1)(ii)(D)
45 CFR 164.312 (b)
45 CFR 164.308(a)(5)(ii)(c) (New)

A.10.10.1
A.10.10.2
A.10.10.3
A.10.10.4
A.10.10.5
A.11.2.2
A.11.5.4
A.11.6.1
A.13.1.1
A.13.2.3
A.15.2.2
A.15.1.3

FedRAMPPCI_DSSBITSGAPP

PCI DSS v2.0 10.1 PCI DSS v2.0 10.2
PCI DSS v2.010.3
PCI DSS v2.0 10.5
PCI DSS v2.010.6
PCI DSS v2.0 10.7
PCI DSS v2.0 11.4
PCI DSS v2.0 12.5.2 PCI DSS v2.0 12.9.5

GAPP Ref 8.2.1
GAPP Ref 8.2.2

Model Applicability +-

SaaSPaaSIaaS
True True True

Scope Applicability +-

SPCUST
True True

Consensus Assessments Initiative Questionnaire (CAIQ) Data

Security Architecture (SA) | ID #SA-14.2

Is Physical and logical user access to audit logs restricted to authorized personnel?

Compliance Mapping +-

COBITHIPAAISO27001SP800_53

COBIT 4.1 DS5.5
COBIT 4.1 DS5.6
COBIT 4.1 DS9.2

45 CFR 164.308 (a)(1)(ii)(D)
45 CFR 164.312 (b)
45 CFR 164.308(a)(5)(ii)(c) (New)

A.10.10.1
A.10.10.2
A.10.10.3
A.10.10.4
A.10.10.5
A.11.2.2
A.11.5.4
A.11.6.1
A.13.1.1
A.13.2.3
A.15.2.2
A.15.1.3

FedRAMPPCI_DSSBITSGAPP

PCI DSS v2.0 10.1 PCI DSS v2.0 10.2
PCI DSS v2.010.3
PCI DSS v2.0 10.5
PCI DSS v2.010.6
PCI DSS v2.0 10.7
PCI DSS v2.0 11.4
PCI DSS v2.0 12.5.2 PCI DSS v2.0 12.9.5

GAPP Ref 8.2.1
GAPP Ref 8.2.2

Model Applicability +-

SaaSPaaSIaaS
True True True

Scope Applicability +-

SPCUST
True True

Consensus Assessments Initiative Questionnaire (CAIQ) Data

Security Architecture (SA) | ID #SA-14.3

Can you provide evidence that due diligence mapping of regulations and standards to your controls/architecture/processes has been done?

Compliance Mapping +-

COBITHIPAAISO27001SP800_53

COBIT 4.1 DS5.5
COBIT 4.1 DS5.6
COBIT 4.1 DS9.2

45 CFR 164.308 (a)(1)(ii)(D)
45 CFR 164.312 (b)
45 CFR 164.308(a)(5)(ii)(c) (New)

A.10.10.1
A.10.10.2
A.10.10.3
A.10.10.4
A.10.10.5
A.11.2.2
A.11.5.4
A.11.6.1
A.13.1.1
A.13.2.3
A.15.2.2
A.15.1.3

FedRAMPPCI_DSSBITSGAPP

PCI DSS v2.0 10.1 PCI DSS v2.0 10.2
PCI DSS v2.010.3
PCI DSS v2.0 10.5
PCI DSS v2.010.6
PCI DSS v2.0 10.7
PCI DSS v2.0 11.4
PCI DSS v2.0 12.5.2 PCI DSS v2.0 12.9.5

GAPP Ref 8.2.1
GAPP Ref 8.2.2

Model Applicability +-

SaaSPaaSIaaS
True True True

Scope Applicability +-

SPCUST
True True