{"id":12537,"date":"2023-03-29T00:15:34","date_gmt":"2023-03-29T07:15:34","guid":{"rendered":"https:\/\/www.syteca.com\/?page_id=12537"},"modified":"2025-03-25T11:08:05","modified_gmt":"2025-03-25T18:08:05","slug":"iso-compliance-solution","status":"publish","type":"page","link":"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/iso-compliance-solution","title":{"rendered":"ISO\/IEC 27001 Compliance Solutions"},"content":{"rendered":"\n\t\t<div  class=\"block-b232ebad-8396-44b9-9e64-6cc7aad92bb1 areoi-element\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(16, 206, 158,0.1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-4b77a202-c49e-4352-b82b-16e172bca43a areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-17e4920e-f15d-45b5-85a7-eaa078e2f2b5 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-63048d21-cd78-4043-bca0-a01159e731b2 col areoi-element d-flex flex-column align-items-center d-md-block align-self-center\">\n\t\t\t\n\t\t\t\n\n<h1 class=\"wp-block-heading has-text-align-center mb-4\">ISO\/IEC 27001 Compliance Solutions<\/h1>\n\n\n\n<p class=\"has-text-align-center p-poppins mb-4 main-screen-description\">Monitor insider activity. Detect anomalies. Respond to incidents. <strong>ALL-IN-ONE<\/strong><\/p>\n\n\n\n\t\t<div  class=\"block-23be4ec4-62d7-4cba-814c-6fa3242f5916 areoi-element  d-flex flex-column flex-md-row align-items-center justify-content-center mt-lg-4\">\n\t\t\t\n\t\t\t\n\n\t\t\t\t\n\t\t<a data-bs-target=\"#hsModal-demo\" data-bs-toggle=\"modal\" \n\t\t\t\n\t\t\tclass=\"block-5938745a-69fa-4a93-9f58-7b9ca258cce2 btn areoi-has-url position-relative me-md-4 mb-3 hsBtn-demo btn-secondary\"\n\t >\n\t\t\t\t\t\n\t\t\t\t\tAccess the Demo Portal \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/a>\n\t\t\t\n\n\n\t\t\t\t\n\t\t<a \n\t\t\t\n\t\t\tclass=\"block-2e52021c-f034-47a2-8a50-fef179b2561e btn areoi-has-url position-relative  mb-3 btn-outline-secondary\"\n\t href=\"\/en\/get-in-touch\" rel=\"noreferrer noopener\" target=\"_blank\" >\n\t\t\t\t\t\n\t\t\t\t\tGet in Touch \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/a>\n\t\t\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-f55964f7-0e6b-4993-a660-1d61eeefccdc areoi-element\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-512aea2b-0a9a-4969-8fbb-a460b542506a areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-b467aa21-dee4-4ca9-85a3-bb828015e548 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-c8a8b168-77dc-4f2f-9ef6-54afacc304db col areoi-element with-link align-self-center align-self-xl-start\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins lh-base\" style=\"font-size:1.13rem;font-style:normal;font-weight:500\">The ISO 27001 standard specifies requirements for information security management systems (ISMSs) and aims to help organizations achieve full-scale data security. It belongs to the <a href=\"https:\/\/www.iso.org\/standard\/iso-iec-27000-family\" target=\"_blank\" rel=\"noreferrer noopener\">ISO\/IEC 27000<\/a> family of standards, developed by the <a href=\"https:\/\/www.iso.org\/home.html\" target=\"_blank\" rel=\"noreferrer noopener\">International Organization for Standardization<\/a> (ISO) and the <a href=\"https:\/\/www.iec.ch\/homepage\" target=\"_blank\" rel=\"noreferrer noopener\">International Electrotechnical Commission<\/a> (IEC), which are world-renowned for issuing industry-specific standards.<\/p>\n\n\n\n<p class=\"p-poppins lh-base\" style=\"font-size:1.13rem;font-style:normal;font-weight:500\">Complying with the updated <a href=\"https:\/\/www.iso.org\/standard\/27001\" target=\"_blank\" rel=\"noreferrer noopener\">ISO 27001:2022<\/a> standard can help you enhance your organization&#8217;s cybersecurity, enhance your risk management efforts, and comply with other laws and regulations, such as the GDPR, NIS2 Directive, and PCI DSS.<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-7834783e-c09a-4211-a2b2-a72d78751618 col areoi-element align-self-lg-center d-none d-sm-none d-md-none d-lg-block\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-full text-xxl-end\"><img decoding=\"async\" width=\"857\" height=\"501\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/24030249\/Img-ISO.png\" alt=\"\" class=\"wp-image-37910\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/24030249\/Img-ISO.png 857w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/24030249\/Img-ISO-300x175.png 300w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/24030249\/Img-ISO-768x449.png 768w\" sizes=\"(max-width: 857px) 100vw, 857px\" \/><\/figure>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-2628701d-faf8-41d7-8310-f6376888561f areoi-element\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(26, 59, 78,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-0148e9dc-e577-46be-9c45-d3f61f338c18 areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-7369c9bd-9ffe-45fa-a381-4097c76f2ff3 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-28f0b66f-954f-4d4b-af94-74d1fee8da8d col areoi-element pe-xl-4 align-self-lg-center d-none d-sm-none d-md-none d-lg-block\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-full text-xxl-end\"><img decoding=\"async\" width=\"857\" height=\"710\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/24030043\/Img-Certifications.png\" alt=\"\" class=\"wp-image-37903\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/24030043\/Img-Certifications.png 857w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/24030043\/Img-Certifications-300x249.png 300w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/24030043\/Img-Certifications-768x636.png 768w\" sizes=\"(max-width: 857px) 100vw, 857px\" \/><\/figure>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-cf33cf33-9673-4724-9c4f-eb4fef85759c col areoi-element with-link ps-xl-4 align-self-center align-self-md-center\">\n\t\t\t\n\t\t\t\n\n<h2  class=\"wp-block-heading has-white-color has-text-color\" style=\"font-size:1.63rem\">Syteca has obtained <mark style=\"background-color:rgba(0, 0, 0, 0);color:#10CE9E\" class=\"has-inline-color\">ISO 9001<\/mark> and <mark style=\"background-color:rgba(0, 0, 0, 0);color:#10CE9E\" class=\"has-inline-color\">ISO 27001<\/mark> certifications for its Quality Management System and Information Security Management System<\/h2>\n\n\n\n\t\t<div  class=\"block-e8a06db4-74b0-4756-bcc8-7da2db9ead4e areoi-element text-center d-md-flex text-lg-start\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-full pb-3 pb-md-0  pe-md-3\"><img decoding=\"async\" width=\"400\" height=\"313\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/03\/Img-ISO27001.png\" alt=\"\" class=\"wp-image-12464\" srcset=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/03\/Img-ISO27001.png 400w, https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/03\/Img-ISO27001-300x235.png 300w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full pt-3  pt-md-0 ps-md-3\"><img decoding=\"async\" width=\"406\" height=\"312\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/03\/Img-ISO9001.png\" alt=\"\" class=\"wp-image-12457\" srcset=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/03\/Img-ISO9001.png 406w, https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/03\/Img-ISO9001-300x231.png 300w\" sizes=\"(max-width: 406px) 100vw, 406px\" \/><\/figure>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-380ad545-1751-47a1-a7d3-44d39375c367 areoi-element container marked-container marked-container-green\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-ccf29b56-6104-4e6d-b0f0-b392d63f6f2b row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-c260ea45-a163-408a-901b-99f19fa850ca col areoi-element\">\n\t\t\t\n\t\t\t\n\n<h2  class=\"wp-block-heading mb-3 mb-md-4\">Who needs to comply with ISO 27001?<\/h2>\n\n\n\n<p class=\"with-link\">ISO 27001 certification is entirely voluntary, and any company aiming to establish an information security management system can obtain it. Despite being optional, implementing ISO 27001 requirements is popular among organizations worldwide.<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-033ddeb4-f79d-417a-9c0d-9484ecb0e622 areoi-element container marked-container marked-container-green\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-c13e2d41-40fa-4124-9e85-fd927f58e861 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-c260ea45-a163-408a-901b-99f19fa850ca col areoi-element\">\n\t\t\t\n\t\t\t\n\n<h2  class=\"wp-block-heading mb-3 mb-md-4\">Understanding ISO 27001 \u0441ompliance requirements<\/h2>\n\n\n\n<p class=\"with-link\">The ISO\/IEC 27001:2022 standard&#8217;s security controls are divided into four groups:<\/p>\n\n\n\n\t\t<div  class=\"block-dd35f579-7f02-4fd2-80f1-76653a15dc0f row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-494b6bba-ec55-404a-a2a3-0d066c02441f col areoi-element col-12 col-xl-6\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-793df50a-9043-4267-8001-57b523c1f778 areoi-element protect-card d-md-flex align-items-center h-100\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-5bb2ed6a-853c-4c32-bf00-d06e9b068773 areoi-element me-md-3 mb-4 mb-md-0\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins has-text-color has-link-color wp-elements-bcfc480af1c0604ea5151f41602e368a\" style=\"color:#10ce9e;font-size:3.5rem;font-style:normal;font-weight:600\">01<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-e8b948fd-1039-4198-8a10-4a15ad5336f3 areoi-element\">\n\t\t\t\n\t\t\t\n\n<p class=\"ps-md-3\" style=\"font-size:1.25rem\"><strong>Organizational controls<\/strong><\/p>\n\n\n\n<p class=\"ps-md-3 mb-0\">Clause 5 of the ISO\/IEC 27001:2022 standard includes 37 security controls outlining key security processes and essential documentation for addressing a range of organizational issues.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-db423018-8259-4a34-a199-22f8d2e2717e col areoi-element col-12 col-xl-6\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-7d985b0b-b74b-4fef-96c5-a76f3f819e14 areoi-element protect-card d-md-flex align-items-center h-100\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-5bb2ed6a-853c-4c32-bf00-d06e9b068773 areoi-element me-md-3 mb-4 mb-md-0\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins has-text-color has-link-color wp-elements-c8fc7b7c1f41bbbc3d1a26defc15cbe3\" style=\"color:#10ce9e;font-size:3.5rem;font-style:normal;font-weight:600\">02<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-e4377828-0cc9-4449-b699-14ae1d56ad67 areoi-element\">\n\t\t\t\n\t\t\t\n\n<p class=\"ps-md-3\" style=\"font-size:1.25rem\"><strong>People controls<\/strong><\/p>\n\n\n\n<p class=\"ps-md-3 mb-0\">Clause 6 consists of 8 security controls describing policies required to securely manage human resources within an organization.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-1dbd12ef-cc7d-4c0d-814a-681cc2602148 col areoi-element col-12 col-xl-6\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-714acec1-13fb-4c92-bead-c90c7dc91fbb areoi-element protect-card d-md-flex align-items-center h-100\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-5bb2ed6a-853c-4c32-bf00-d06e9b068773 areoi-element me-md-3 mb-4 mb-md-0\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins has-text-color has-link-color wp-elements-42fc856aa07c954250411843d115dbe0\" style=\"color:#10ce9e;font-size:3.5rem;font-style:normal;font-weight:600\">03<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-a36c2d3e-40a6-4c45-91d5-cc6055b054c8 areoi-element\">\n\t\t\t\n\t\t\t\n\n<p class=\"ps-md-3\" style=\"font-size:1.25rem\"><strong>Physical controls<\/strong><\/p>\n\n\n\n<p class=\"ps-md-3 mb-0\">Clause 7 encompasses 14 security controls necessary to safeguard sensitive data from physical threats.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-eedf3a84-4056-4d48-ae85-c9e204911b58 col areoi-element col-12 col-lg-12 col-xl-6\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-b5287800-97e7-4b8b-a955-1a2bc649f142 areoi-element protect-card d-md-flex align-items-center h-100\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-5bb2ed6a-853c-4c32-bf00-d06e9b068773 areoi-element me-md-3 mb-4 mb-md-0\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins has-text-color has-link-color wp-elements-8a02a13f265bcefbd79c7db28cb5c23d\" style=\"color:#10ce9e;font-size:3.5rem;font-style:normal;font-weight:600\">04<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-5cecf1b4-3025-441d-8a23-5e1387236716 areoi-element\">\n\t\t\t\n\t\t\t\n\n<p class=\"ps-md-3\" style=\"font-size:1.25rem\"><strong>Technological controls<\/strong><\/p>\n\n\n\n<p class=\"ps-md-3 mb-0 with-link\">Clause 8 covers 34 security controls organizations need to implement for establishing and maintaining secure technological systems.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-bb408927-0484-4462-86c0-6bbf8250e2d8 areoi-element container user-activity\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(71, 144, 234,0.15)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-f4640269-7a21-4c12-afc1-0c79ea4a7dad row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-8cf5fcfd-cbc9-400e-a136-2469241b0cff col areoi-element\">\n\t\t\t\n\t\t\t\n\n<h2  class=\"wp-block-heading has-text-align-center\">Implement ISO 27001 security controls with Syteca<\/h2>\n\n\n\n\t\t<div  class=\"block-e58b73a8-bef8-4b90-be11-e0bfc22b2866 areoi-element d-flex flex-column align-items-center d-md-block text-center\">\n\t\t\t\n\t\t\t\n\n\t\t\t\t\n\t\t<a \n\t\t\t\n\t\t\tclass=\"block-4c78558a-6545-4bce-900a-a77bba5d683d btn areoi-has-url position-relative mb-4 mb-md-0 btn-outline-secondary\"\n\t href=\"\/en\/pricing\" rel=\"noreferrer noopener\" target=\"_blank\" >\n\t\t\t\t\t\n\t\t\t\t\tRequest Pricing \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/a>\n\t\t\t\n\n\n\t\t\t\t\n\t\t<a data-bs-target=\"#hsModal-demo\" data-bs-toggle=\"modal\" \n\t\t\t\n\t\t\tclass=\"block-a078d8dd-5154-4728-856b-ae04c188c41a btn areoi-has-url position-relative hsBtn-demo mb-4 mb-md-0 mx-md-4 btn-secondary\"\n\t >\n\t\t\t\t\t\n\t\t\t\t\tAccess the Demo Portal \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/a>\n\t\t\t\n\n\n\t\t\t\t\n\t\t<a data-bs-target=\"#hsModal-trial\" data-bs-toggle=\"modal\" \n\t\t\t\n\t\t\tclass=\"block-32019190-4d5c-4345-a02b-e9b8c5954a6f btn areoi-has-url position-relative hsBtn-trial btn-outline-secondary\"\n\t >\n\t\t\t\t\t\n\t\t\t\t\tRequest a Free Trial \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/a>\n\t\t\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-49e21088-e0af-4509-ae9b-3985a7be9c4c areoi-element container marked-container marked-container-green\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-5eb47ad9-e49c-467c-bdb0-a662e2103d32 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-00dd3765-cc16-4f4d-82c6-818eeda881f5 col areoi-element\">\n\t\t\t\n\t\t\t\n\n<h2  class=\"wp-block-heading mb-3 mb-md-4\">Steps to become ISO 27001 certified<\/h2>\n\n\n\n<p class=\"mb-0\">To receive ISO 27001 certification, you need to complete a series of steps:<\/p>\n\n\n\n\t\t<div  class=\"block-ce46ff63-4e28-41f0-96b6-fc21b61c1ee4 areoi-element rounded-bg-13px d-flex p-3 mb-2 align-items-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(26, 59, 78,0.05)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"p-poppins px-2 mb-0\" style=\"font-size:1.63rem;font-style:normal;font-weight:600\">01<\/p>\n\n\n\n<p class=\"p-poppins ps-4 mb-0\" style=\"font-style:normal;font-weight:500\"><strong>Conduct a risk assessment.<\/strong> Evaluate the effectiveness of the current security controls in your organization.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-6e2de5e0-9cbd-481d-80cb-aa0d8d7a783c areoi-element d-flex p-3 mb-2 align-items-center\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins px-2 mb-0\" style=\"font-size:1.63rem;font-style:normal;font-weight:600\">02<\/p>\n\n\n\n<p class=\"p-poppins ps-4 mb-0\" style=\"font-style:normal;font-weight:500\"><strong>Establish the scope of work.<\/strong> Compare your existing security controls with those required by the ISO\/IEC 27001:2022 standard to find out what you\u2019re lacking.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-5e628c90-0165-4be2-9378-98bb067b6669 areoi-element rounded-bg-13px d-flex p-3 mb-2 align-items-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(26, 59, 78,0.05)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"p-poppins px-2 mb-0\" style=\"font-size:1.63rem;font-style:normal;font-weight:600\">03<\/p>\n\n\n\n<p class=\"p-poppins ps-4 mb-0\" style=\"font-style:normal;font-weight:500\"><strong>Eliminate the gaps.<\/strong> Implement any lacking security controls per the ISO\/IEC 27001:2022 standard\u2019s requirements.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-6e2de5e0-9cbd-481d-80cb-aa0d8d7a783c areoi-element d-flex p-3 mb-2 align-items-center\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins px-2 mb-0\" style=\"font-size:1.63rem;font-style:normal;font-weight:600\">04<\/p>\n\n\n\n<p class=\"p-poppins ps-4 mb-0\" style=\"font-style:normal;font-weight:500\"><strong>Conduct employee training.<\/strong> Raise the staff\u2019s cybersecurity awareness with regular training.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-4d0b833a-66cb-443d-b894-450df5ed6c20 areoi-element rounded-bg-13px d-flex p-3 mb-2 align-items-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(26, 59, 78,0.05)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"p-poppins px-2 mb-0\" style=\"font-size:1.63rem;font-style:normal;font-weight:600\">05<\/p>\n\n\n\n<p class=\"p-poppins ps-4 mb-0\" style=\"font-style:normal;font-weight:500\"><strong>Update security policies.<\/strong> Regularly review your policies and procedures and keep them up-to-date.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-6e2de5e0-9cbd-481d-80cb-aa0d8d7a783c areoi-element d-flex p-3 mb-2 align-items-center\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins px-2 mb-0\" style=\"font-size:1.63rem;font-style:normal;font-weight:600\">06<\/p>\n\n\n\n<p class=\"p-poppins ps-4 mb-0\" style=\"font-style:normal;font-weight:500\"><strong>Contact your local ISO 27001 certification body.<\/strong> Reach out to one of the ISO 27001 accredited certification bodies and let them know about your intentions of getting certified.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-187c8337-6f6a-4b5b-9a87-d47cc0e2678d areoi-element rounded-bg-13px d-flex p-3 mb-2 align-items-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(26, 59, 78,0.05)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"p-poppins px-2 mb-0\" style=\"font-size:1.63rem;font-style:normal;font-weight:600\">07<\/p>\n\n\n\n<p class=\"p-poppins ps-4 mb-0\" style=\"font-style:normal;font-weight:500\"><strong>Pass a certification audit.<\/strong> Let an auditor evaluate your organization&#8217;s compliance with the ISO 27001:2022 standard.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-6e2de5e0-9cbd-481d-80cb-aa0d8d7a783c areoi-element d-flex p-3 mb-2 align-items-center\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins px-2 mb-0\" style=\"font-size:1.63rem;font-style:normal;font-weight:600\">08<\/p>\n\n\n\n<p class=\"p-poppins ps-4 mb-0\" style=\"font-style:normal;font-weight:500\"><strong>Prove your compliance.<\/strong> Maintain ISO 27001 compliance and pass yearly surveillance audits.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-c010a430-048c-4812-a081-7ac6e91da1be areoi-element rounded-bg-13px d-flex p-4 mb-2 align-items-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(16, 206, 158,0.1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<div class=\"wp-block-areoi-icon areoi-icon  px-2 mb-0\"><i class=\"text-dark bi-shield-fill-check \" style=\"font-size:36px\"><\/i><\/div>\n\n\n\n<p class=\"p-poppins ps-3 mb-0\" style=\"font-size:1.3rem;font-style:normal;font-weight:500\">Deploying an ISO 27001 compliance solution, such as Syteca will make the audit process easier and help you pass it successfully.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-db11473f-8212-432d-9a26-699ca87df8f4 areoi-element\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(26, 59, 78,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-b06094e4-5e6b-4239-9473-af51a63e8fb1 areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-79c09325-27d5-4686-9b6e-51761b79cb68 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-74f8d027-907c-4014-b90c-6fb49eb16afe col areoi-element align-self-lg-center col-lg-4 col-xxl-3 d-none d-sm-none d-md-none d-lg-block\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-full text-xxl-end\"><img decoding=\"async\" width=\"473\" height=\"648\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/03\/25110732\/Whitepaper-ISO27001-prev-1.png\" alt=\"\" class=\"wp-image-54716\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/03\/25110732\/Whitepaper-ISO27001-prev-1.png 473w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2025\/03\/25110732\/Whitepaper-ISO27001-prev-1-219x300.png 219w\" sizes=\"(max-width: 473px) 100vw, 473px\" \/><\/figure>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-0f8f3cf5-72ec-4468-928c-987ff4bb8fbe col areoi-element align-self-center align-self-md-center col-lg-8 col-xxl-9\">\n\t\t\t\n\t\t\t\n\n<h2  class=\"wp-block-heading mb-4 has-white-color has-text-color\" style=\"font-size:1.75rem;font-style:normal;font-weight:600\">Discover a complete mapping of ISO\/IEC 27001:2022 security controls to Syteca&#8217;s functionality<\/h2>\n\n\n\n<p class=\"opacity-75 pb-3 has-white-color has-text-color\">Learn how Syteca can help you meet the requirements of ISO 27001 to<br>receive a compliance certification.<\/p>\n\n\n\n\t\t\t\t\n\t\t<a \n\t\t\t\n\t\t\tclass=\"block-e9b3f244-57bd-4edf-a867-0b41ae3c3d29 btn areoi-has-url position-relative btn-info\"\n\t href=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/pdf\/iso-compliance-syteca.pdf\" rel=\"noreferrer noopener\" target=\"_blank\" >\n\t\t\t\t\t\n\t\t\t\t\tDownload White Paper \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/a>\n\t\t\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-73604c08-c68c-4d85-b703-d2a364c95f34 areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-3e9f05c8-53c2-4be3-8262-251f9fb05728 areoi-element container rounded-bg-13px\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(16, 206, 158,0.1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-528d5488-0692-4b46-9511-30b1e05423d6 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-c12185e5-9a7b-464e-8fd7-6bb7ad4d0aae col areoi-element col-12 col-xl-4\">\n\t\t\t\n\t\t\t\n\n<h2  class=\"wp-block-heading text-center text-xl-start mb-5 mb-xl-0\">Benefits of using Syteca for ISO 27001 compliance<\/h2>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-4ccb3351-28d2-47d5-86f8-f8a4ef551bfd col areoi-element d-flex flex-wrap col-12 col-md-6 col-xl-4\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-bf2d269d-fd0e-4107-a451-2a0541a483e7 areoi-element d-flex align-items-center pb-4 pb-xl-0\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large\" style=\"min-width:32px\"><img decoding=\"async\" width=\"32\" height=\"32\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/10\/03003946\/checkbox.svg\" alt=\"\" class=\"wp-image-33454\"\/><\/figure>\n\n\n\n<p class=\"mb-0 p-poppins ps-3\" style=\"font-size:1.13rem;font-style:normal;font-weight:600\">Enhance corporate security<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-d0c96961-4794-4587-8e06-d1f7abf207ff areoi-element d-flex align-items-center pb-4 pb-xl-0\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large\" style=\"min-width:32px\"><img decoding=\"async\" width=\"32\" height=\"32\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/10\/03003946\/checkbox.svg\" alt=\"\" class=\"wp-image-33454\"\/><\/figure>\n\n\n\n<p class=\"mb-0 p-poppins ps-3\" style=\"font-size:1.13rem;font-style:normal;font-weight:600\">Detect insider threats<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-d8b09e86-fa2e-48f8-b795-df3db13ac973 areoi-element d-flex align-items-center pb-4 pb-xl-0\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large\" style=\"min-width:32px\"><img decoding=\"async\" width=\"32\" height=\"32\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/10\/03003946\/checkbox.svg\" alt=\"\" class=\"wp-image-33454\"\/><\/figure>\n\n\n\n<p class=\"mb-0 p-poppins ps-3\" style=\"font-size:1.13rem;font-style:normal;font-weight:600\">Secure access to sensitive assets<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-40018c16-879d-4abc-87c7-64e5f49e290f col areoi-element d-flex flex-wrap col-12 col-md-6 col-xl-4\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-bf2d269d-fd0e-4107-a451-2a0541a483e7 areoi-element d-flex align-items-center pb-4 pb-xl-0\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large\" style=\"min-width:32px\"><img decoding=\"async\" width=\"32\" height=\"32\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/10\/03003946\/checkbox.svg\" alt=\"\" class=\"wp-image-33454\"\/><\/figure>\n\n\n\n<p class=\"mb-0 p-poppins ps-3\" style=\"font-size:1.13rem;font-style:normal;font-weight:600\">Gain visibility into user activity<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-d0c96961-4794-4587-8e06-d1f7abf207ff areoi-element d-flex align-items-center pb-4 pb-xl-0\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large\" style=\"min-width:32px\"><img decoding=\"async\" width=\"32\" height=\"32\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/10\/03003946\/checkbox.svg\" alt=\"\" class=\"wp-image-33454\"\/><\/figure>\n\n\n\n<p class=\"mb-0 p-poppins ps-3\" style=\"font-size:1.13rem;font-style:normal;font-weight:600\">Prevent data breaches<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-d8b09e86-fa2e-48f8-b795-df3db13ac973 areoi-element d-flex align-items-center pb-4 pb-xl-0\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large\" style=\"min-width:32px\"><img decoding=\"async\" width=\"32\" height=\"32\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/10\/03003946\/checkbox.svg\" alt=\"\" class=\"wp-image-33454\"\/><\/figure>\n\n\n\n<p class=\"mb-0 p-poppins ps-3\" style=\"font-size:1.13rem;font-style:normal;font-weight:600\">Promptly respond to security events<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-21338989-959a-4c56-b8f7-806f5afd5e73 areoi-element\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(242, 250, 254,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-47d75ce5-bdca-4ec5-afa1-a0d7e142239b areoi-element container\">\n\t\t\t\n\t\t\t\n\n<h2  class=\"wp-block-heading has-text-align-center mb-4\">How to implement ISO 27001 controls with Syteca<\/h2>\n\n\n\n<p class=\"has-text-align-center p-poppins text-18-15 mb-4 pb-3\">Syteca is an insider risk management platform and ISO 27001 compliance software that can<br> help you successfully obtain the ISO 27001 certification. Here&#8217;s how:<\/p>\n\n\n\n\t\t<div id=\"iso-tabs\" class=\"block-39f7a67f-3dac-450d-a92a-d8798e433371 areoi-tabs\">\n\t\t\t\n\n\t\t<nav role=\"tablist\" id=\"nav-tab\" class=\"block-91bb0fda-3cc2-4630-b58c-5d491ce3c236 nav d-none d-md-flex flex-column flex-md-row nav-tabs\">\n\t\t\t\n\n\t\t<a aria-controls=\"nav-1\" aria-selected=\"true\" data-bs-target=\"#nav-1\" data-bs-toggle=\"tab\" id=\"nav-tab-1\" class=\"block-7ef8df5f-7d59-4767-a83f-f12b7a4d6498 nav-link nav-link active p-poppins active\" href=\"#tab-1742926042686-0\">\n\t\t\tOrganizational controls\n\t\t<\/a>\n\t\n\n\n\t\t<a aria-controls=\"nav-2\" aria-selected=\"false\" data-bs-target=\"#nav-2\" data-bs-toggle=\"tab\" id=\"nav-tab-2\" class=\"block-744ceb98-2493-48e7-9f60-c9d58d2562ef nav-link nav-link p-poppins\" href=\"#tab-1742926042692-1\">\n\t\t\tPeople controls\n\t\t<\/a>\n\t\n\n\n\t\t<a aria-controls=\"nav-3\" aria-selected=\"false\" data-bs-target=\"#nav-3\" data-bs-toggle=\"tab\" id=\"nav-tab-3\" class=\"block-26df6350-bc54-41d6-b070-7049418d231a nav-link nav-link p-poppins\" href=\"#tab-1742926042696-2\">\n\t\t\tPhysical controls\n\t\t<\/a>\n\t\n\n\n\t\t<a aria-controls=\"nav-4\" aria-selected=\"false\" data-bs-target=\"#nav-4\" data-bs-toggle=\"tab\" id=\"nav-tab-4\" class=\"block-d527c9ae-dd6f-43b7-8940-3df14bef22d9 nav-link nav-link p-poppins\" href=\"#tab-1742926042700-3\">\n\t\t\tTechnological controls\n\t\t<\/a>\n\t\n \n\t\t<\/nav>\n\t\n\n\n\t\t<div id=\"nav-tabContent\" class=\"block-7269bd6d-b05d-44aa-b349-d6dce6a4bc7a areoi-element tab-content  mt-md-4 pt-md-3 px-0\">\n\t\t\t\n\t\t\t\n\n\t\t<div id=\"accordionSwift\" class=\"block-c6b2dd08-8de6-41e8-859b-ebd186cbae89 areoi-element accordion\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-ff5f31e8-6c62-47cf-b887-328de6ec5055 areoi-element accordion-item d-flex flex-wrap justify-content-center\">\n\t\t\t\n\t\t\t\n\n<p class=\"d-md-none rounded-0 accordion-button min-vw-100 nav-link-mobile p-poppins mb-0 has-text-color has-background has-link-color wp-elements-b627589c782adc9566523ebb2b256b40\" id=\"headingOne\" style=\"color:#ffffff;background-color:#4790ea;font-size:1.25rem\" aria-controls=\"collapseOne\" aria-expanded=\"true\" data-bs-target=\"#collapseOne\" data-bs-toggle=\"collapse\">Organizational controls<\/p>\n\n\n\n\t\t<div aria-labelledby=\"headingOne\" data-bs-parent=\"#accordionSwift\" id=\"collapseOne\" class=\"block-e86ab46d-8942-40e4-829c-23acdd73fdde areoi-element accordion-collapse collapse show\">\n\t\t\t\n\t\t\t\n\n\t\t<div aria-labelledby=\"nav-tab-1\" role=\"tabpanel\" id=\"nav-1\" class=\"block-488ad73a-43e1-4ac2-8da8-bf42793d8e14 areoi-element tab-pane fade show active accordion-body px-0\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f2f26b48-ae81-42d3-af51-fb8c946853f1 areoi-element table-block-3 px-0\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-0eba2475-4e8f-452d-bf68-302be348dfa1 areoi-element d-none d-md-flex header-cells flex-column flex-md-row justify-content-between\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-0830f57d-4dfc-484f-afe0-1365e1c3862c areoi-element d-inline col-left\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center p-3 p-poppins text-20-16 d-flex align-items-center h-100 justify-content-center has-text-color has-background\" style=\"color:#fbfbfb;background-color:#1a3b4e;font-style:normal;font-weight:600\">Security control required by ISO 27001<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-b9538d78-91a7-4761-9728-10fec4078e1e areoi-element d-inline col-right\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center p-3 p-poppins text-20-16 d-flex align-items-center h-100 justify-content-center has-text-color has-background\" style=\"color:#fbfbfb;background-color:#5059ab;font-style:normal;font-weight:600\">Corresponding Syteca\u2019s functionality<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3116e5c4-31f4-47d1-84d4-ba3978f693ef areoi-element d-flex flex-column flex-md-row\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6d50e20c-1081-41e7-8ac8-afdccde972e6 areoi-element col-12 d-inline py-md-4 col-left\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-1 py-3 mt-md-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#1a3b4e;font-size:1.13rem;font-style:normal;font-weight:600\">Security control required by ISO 27001<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3387b868-e55c-4582-8a84-18101090c388 areoi-element d-flex justify-content-lg-between flex-column-reverse flex-lg-row px-3 px-lg-4 pt-4 pt-md-0\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-18-15\" style=\"font-style:normal;font-weight:600\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#86898b\" class=\"has-inline-color\">5.3&nbsp;<\/mark>   Segregation of duties<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"px-3 px-lg-4 mb-0\">Conflicting duties and areas of responsibility shall be segregated to reduce opportunities for unauthorized or unintentional modification or misuse of the organization\u2019s assets.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-46d6e6bf-da64-4982-bc6f-717dcf001157 areoi-element col-12 d-inline py-md-4 col-right\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-1 py-3 mt-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#5059ab;font-size:1.13rem;font-style:normal;font-weight:600\">Corresponding Syteca\u2019s functionality<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<ul class=\"wp-block-list mb-0 ms-3 ms-lg-4 py-4 py-md-0 pe-3 px-lg-4\">\n<li class=\"with-link mb-3\">Segregate permissions for managing secrets with the help of <a href=\"https:\/\/docs.syteca.com\/view\/permissions-for-secrets\" target=\"_blank\" rel=\"noreferrer noopener\">role-based access management<\/a>.<\/li>\n\n\n\n<li class=\"with-link mb-3\">Identify users of shared accounts by leveraging <a href=\"https:\/\/docs.syteca.com\/view\/secondary-user-authentication-on-windows-clients\" target=\"_blank\" rel=\"noreferrer noopener\">secondary user authentication<\/a>.<\/li>\n\n\n\n<li>Monitor conflicting roles by analyzing recorded user activity.<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-32495769-9952-4e14-9e47-07cbcf924e98 areoi-element d-flex flex-column flex-md-row\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6b2dad63-5761-4e45-9c2f-bd01dbd2137e areoi-element col-12 d-inline py-md-4 col-left cell-bg d-md-flex flex-column justify-content-center\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-1 py-3 mt-md-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#1a3b4e;font-size:1.13rem;font-style:normal;font-weight:600\">Security control required by ISO 27001<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3387b868-e55c-4582-8a84-18101090c388 areoi-element d-flex justify-content-lg-between flex-column-reverse flex-lg-row px-3 px-lg-4 pt-4 pt-md-0\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-18-15\" style=\"font-style:normal;font-weight:600\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#86898b\" class=\"has-inline-color\">5.7&nbsp;<\/mark>   Threat intelligence<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"px-3 px-lg-4 mb-0\">Data related to information security threats shall be collected and analyzed to produce threat intelligence.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-7ef02b9a-1dbc-49be-853e-f8a5310798ed areoi-element col-12 d-inline d-md-flex align-items-center py-md-4 col-right cell-bg\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-1 py-3 mt-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#5059ab;font-size:1.13rem;font-style:normal;font-weight:600\">Corresponding Syteca\u2019s functionality<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<ul class=\"wp-block-list mb-0 ms-3 ms-lg-4 py-4 py-md-0 pe-3 px-lg-4\">\n<li class=\"with-link mb-3\">Capture <a href=\"\/en\/product\/session-recording\" target=\"_blank\" rel=\"noreferrer noopener\">screen records of user activity along with relevant metadata<\/a> to document security threats.<\/li>\n\n\n\n<li class=\"with-link mb-3\">Collect information on <a href=\"https:\/\/docs.syteca.com\/view\/alerts\" target=\"_blank\" rel=\"noreferrer noopener\">security alerts<\/a> to detect changes in your organization\u2019s threat landscape.<\/li>\n\n\n\n<li class=\"with-link mb-3\">Notice early signs of potentially malicious activity with Syteca\u2019s <a href=\"https:\/\/docs.syteca.com\/view\/user-behavior-analysis\" target=\"_blank\" rel=\"noreferrer noopener\">user and entity behavior analytics<\/a> (UEBA) module.<\/li>\n\n\n\n<li class=\"with-link mb-3\">Generate informative <a href=\"\/en\/product\/reports-and-statistics\" target=\"_blank\" rel=\"noreferrer noopener\">user activity reports<\/a> to audit user activity and evaluate current risks.<\/li>\n\n\n\n<li class=\"with-link\">Get a holistic view of your organization&#8217;s security events by <a href=\"https:\/\/docs.syteca.com\/view\/defining-siem-integration\" target=\"_blank\" rel=\"noreferrer noopener\">integrating Syteca with SIEM systems<\/a>.<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3116e5c4-31f4-47d1-84d4-ba3978f693ef areoi-element d-flex flex-column flex-md-row\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6d50e20c-1081-41e7-8ac8-afdccde972e6 areoi-element col-12 d-inline py-md-4 col-left d-md-flex flex-column justify-content-center\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-1 py-3 mt-md-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#1a3b4e;font-size:1.13rem;font-style:normal;font-weight:600\">Security control required by ISO 27001<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3387b868-e55c-4582-8a84-18101090c388 areoi-element d-flex justify-content-lg-between flex-column-reverse flex-lg-row px-3 px-lg-4 pt-4 pt-md-0\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-18-15\" style=\"font-style:normal;font-weight:600\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#86898b\" class=\"has-inline-color\">5.15&nbsp;<\/mark>   Access control<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"px-3 px-lg-4 mb-0\">Policies controlling access to information and other organizational assets shall be established.&nbsp;<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-46d6e6bf-da64-4982-bc6f-717dcf001157 areoi-element col-12 d-inline d-md-flex align-items-center py-md-4 col-right\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-1 py-3 mt-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#5059ab;font-size:1.13rem;font-style:normal;font-weight:600\">Corresponding Syteca\u2019s functionality<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<ul class=\"wp-block-list mb-0 ms-3 ms-lg-4 py-4 py-md-0 pe-3 px-lg-4\">\n<li class=\"with-link mb-3\">Grant access to critical endpoints by manually approving <a href=\"https:\/\/docs.syteca.com\/view\/access-requests\" target=\"_blank\" rel=\"noreferrer noopener\">access requests<\/a>.<\/li>\n\n\n\n<li class=\"with-link\">Leverage <a href=\"https:\/\/docs.syteca.com\/view\/granting-access-without-approval-only-at-specific-\" target=\"_blank\" rel=\"noreferrer noopener\">time-based restrictions for user access<\/a> and <a href=\"https:\/\/docs.syteca.com\/view\/the-one-time-password-parameter\" target=\"_blank\" rel=\"noreferrer noopener\">one-time passwords<\/a> to secure access to the organization\u2019s resources.<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-32495769-9952-4e14-9e47-07cbcf924e98 areoi-element d-flex flex-column flex-md-row\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6b2dad63-5761-4e45-9c2f-bd01dbd2137e areoi-element col-12 d-inline py-md-4 col-left cell-bg d-md-flex flex-column justify-content-center\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-1 py-3 mt-md-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#1a3b4e;font-size:1.13rem;font-style:normal;font-weight:600\">Security control required by ISO 27001<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3387b868-e55c-4582-8a84-18101090c388 areoi-element d-flex justify-content-lg-between flex-column-reverse flex-lg-row px-3 px-lg-4 pt-4 pt-md-0\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-18-15\" style=\"font-style:normal;font-weight:600\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#86898b\" class=\"has-inline-color\">5.17&nbsp;<\/mark>   Authentication information<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"px-3 px-lg-4 mb-0\">The allocation of secret authentication information shall be controlled through a formal management process, including advising personnel on how to handle authentication information appropriately.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-7ef02b9a-1dbc-49be-853e-f8a5310798ed areoi-element col-12 d-inline d-md-flex align-items-center py-md-4 col-right cell-bg\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-1 py-3 mt-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#5059ab;font-size:1.13rem;font-style:normal;font-weight:600\">Corresponding Syteca\u2019s functionality<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<ul class=\"wp-block-list mb-0 ms-3 ms-lg-4 py-4 py-md-0 pe-3 px-lg-4\">\n<li class=\"with-link mb-3\">Ensure secure creation, storage, rotation, and termination of <a href=\"\/en\/product\/features#password-management\" target=\"_blank\" rel=\"noreferrer noopener\">authentication secrets<\/a> and regulate their use with access requests.<\/li>\n\n\n\n<li class=\"with-link\">Safely allocate <a href=\"\/en\/product\/features#password-management\" target=\"_blank\" rel=\"noreferrer noopener\">secrets<\/a> by authenticating users by request.<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3116e5c4-31f4-47d1-84d4-ba3978f693ef areoi-element d-flex flex-column flex-md-row\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6d50e20c-1081-41e7-8ac8-afdccde972e6 areoi-element col-12 d-inline py-md-4 col-left d-md-flex flex-column justify-content-center\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-1 py-3 mt-md-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#1a3b4e;font-size:1.13rem;font-style:normal;font-weight:600\">Security control required by ISO 27001<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3387b868-e55c-4582-8a84-18101090c388 areoi-element d-flex justify-content-lg-between flex-column-reverse flex-lg-row px-3 px-lg-4 pt-4 pt-md-0\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-18-15\" style=\"font-style:normal;font-weight:600\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#86898b\" class=\"has-inline-color\">5.18&nbsp;<\/mark>   Access rights<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"px-3 px-lg-4 mb-0\">Access rights of all users shall be provided, reviewed, modified, and revoked per the organization\u2019s access control policy.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-46d6e6bf-da64-4982-bc6f-717dcf001157 areoi-element col-12 d-inline d-md-flex align-items-center py-md-4 col-right\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-1 py-3 mt-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#5059ab;font-size:1.13rem;font-style:normal;font-weight:600\">Corresponding Syteca\u2019s functionality<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<ul class=\"wp-block-list mb-0 ms-3 ms-lg-4 py-4 py-md-0 pe-3 px-lg-4\">\n<li class=\"with-link mb-3\">Granularly control access privileges of regular and privileged users with Syteca\u2019s <a href=\"\/en\/product\/privileged-access-management\" target=\"_blank\" rel=\"noreferrer noopener\">privileged access management (PAM)<\/a> functionality.<\/li>\n\n\n\n<li class=\"with-link mb-3\">Implement a just-in-time approach to access management by utilizing <a href=\"https:\/\/docs.syteca.com\/view\/access-requests\" target=\"_blank\" rel=\"noreferrer noopener\">manual access approval<\/a>, <a href=\"https:\/\/docs.syteca.com\/view\/the-one-time-password-parameter\" target=\"_blank\" rel=\"noreferrer noopener\">one-time passwords<\/a>, and <a href=\"https:\/\/docs.syteca.com\/view\/granting-access-without-approval-only-at-specific-\" target=\"_blank\" rel=\"noreferrer noopener\">time-based access restrictions<\/a>.<\/li>\n\n\n\n<li class=\"with-link\">Provide an additional layer of authentication by <a href=\"https:\/\/docs.syteca.com\/view\/defining-ticketing-system-integration-settings\" target=\"_blank\" rel=\"noreferrer noopener\">integrating Syteca with your ticketing systems<\/a>.<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-32495769-9952-4e14-9e47-07cbcf924e98 areoi-element d-flex flex-column flex-md-row\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6b2dad63-5761-4e45-9c2f-bd01dbd2137e areoi-element col-12 d-inline py-md-4 col-left cell-bg d-md-flex flex-column justify-content-center\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-1 py-3 mt-md-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#1a3b4e;font-size:1.13rem;font-style:normal;font-weight:600\">Security control required by ISO 27001<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3387b868-e55c-4582-8a84-18101090c388 areoi-element d-flex justify-content-lg-between flex-column-reverse flex-lg-row px-3 px-lg-4 pt-4 pt-md-0\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-18-15\" style=\"font-style:normal;font-weight:600\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#86898b\" class=\"has-inline-color\">5.25&nbsp;<\/mark>   Assessment and decision on information security events<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"px-3 px-lg-4 mb-0\">Information security events shall be assessed and it shall be decided if they are to be classified as information security incidents.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-7ef02b9a-1dbc-49be-853e-f8a5310798ed areoi-element col-12 d-inline d-md-flex align-items-center py-md-4 col-right cell-bg\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-1 py-3 mt-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#5059ab;font-size:1.13rem;font-style:normal;font-weight:600\">Corresponding Syteca\u2019s functionality<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<ul class=\"wp-block-list mb-0 ms-3 ms-lg-4 py-4 py-md-0 pe-3 px-lg-4\">\n<li class=\"with-link mb-3\"><a href=\"\/en\/product\/user-activity-monitoring\" target=\"_blank\" rel=\"noreferrer noopener\">Monitor user activity<\/a> in real time, <a href=\"\/en\/product\/session-recording\" target=\"_blank\" rel=\"noreferrer noopener\">record user sessions<\/a>, and export them in a tamper-proof format for further external assessment of users&#8217; actions.<\/li>\n\n\n\n<li class=\"with-link mb-3\">Analyze user activity and establish context by reviewing screen capture recordings along with detailed metadata on user activity.<\/li>\n\n\n\n<li class=\"with-link mb-3\">Quickly grasp current security risks when viewing <a href=\"\/en\/product\/alerts-and-notifications\" target=\"_blank\" rel=\"noreferrer noopener\">predefined and custom alerts<\/a> that prioritize events according to their risk level.<\/li>\n\n\n\n<li class=\"with-link\">Aggregate all information about security events <a href=\"https:\/\/docs.syteca.com\/view\/defining-siem-integration\" target=\"_blank\" rel=\"noreferrer noopener\">in SIEM systems<\/a> to enable a thorough and full-spectrum analysis.&nbsp;<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3116e5c4-31f4-47d1-84d4-ba3978f693ef areoi-element d-flex flex-column flex-md-row\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6d50e20c-1081-41e7-8ac8-afdccde972e6 areoi-element col-12 d-inline py-md-4 col-left d-md-flex flex-column justify-content-center\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-1 py-3 mt-md-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#1a3b4e;font-size:1.13rem;font-style:normal;font-weight:600\">Security control required by ISO 27001<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3387b868-e55c-4582-8a84-18101090c388 areoi-element d-flex justify-content-lg-between flex-column-reverse flex-lg-row px-3 px-lg-4 pt-4 pt-md-0\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-18-15\" style=\"font-style:normal;font-weight:600\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#86898b\" class=\"has-inline-color\">5.26&nbsp;<\/mark>   Response to information security incidents<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"px-3 px-lg-4 mb-0\">Information security incidents shall be responded to in accordance with the documented procedures.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-46d6e6bf-da64-4982-bc6f-717dcf001157 areoi-element col-12 d-inline d-md-flex align-items-center py-md-4 col-right\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-1 py-3 mt-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#5059ab;font-size:1.13rem;font-style:normal;font-weight:600\">Corresponding Syteca\u2019s functionality<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<ul class=\"wp-block-list mb-0 ms-3 ms-lg-4 py-4 py-md-0 pe-3 px-lg-4\">\n<li class=\"with-link mb-3\">Spot dangerous security events by analyzing user sessions in real time.<\/li>\n\n\n\n<li class=\"with-link mb-3\">Receive <a href=\"\/en\/product\/alerts-and-notifications\" target=\"_blank\" rel=\"noreferrer noopener\">live notifications<\/a> on suspicious user behavior and security violations.<\/li>\n\n\n\n<li class=\"with-link mb-3\">Detect potential threats by analyzing user behavior patterns with Syteca\u2019s AI-based <a href=\"https:\/\/docs.syteca.com\/view\/user-behavior-analysis\" target=\"_blank\" rel=\"noreferrer noopener\">UEBA module<\/a>.<\/li>\n\n\n\n<li class=\"with-link\">Block users performing potentially malicious actions manually or configure rules for <a href=\"\/en\/product\/alerts-and-notifications\" target=\"_blank\" rel=\"noreferrer noopener\">automatic incident response<\/a>.&nbsp;<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-32495769-9952-4e14-9e47-07cbcf924e98 areoi-element d-flex flex-column flex-md-row\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6b2dad63-5761-4e45-9c2f-bd01dbd2137e areoi-element col-12 d-inline py-md-4 col-left cell-bg d-md-flex flex-column justify-content-center\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-1 py-3 mt-md-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#1a3b4e;font-size:1.13rem;font-style:normal;font-weight:600\">Security control required by ISO 27001<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3387b868-e55c-4582-8a84-18101090c388 areoi-element d-flex justify-content-lg-between flex-column-reverse flex-lg-row px-3 px-lg-4 pt-4 pt-md-0\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-18-15\" style=\"font-style:normal;font-weight:600\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#86898b\" class=\"has-inline-color\">5.28&nbsp;<\/mark>   Collection of evidence<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"px-3 px-lg-4 mb-0\">The organization shall define and apply procedures for the identification, collection, acquisition, and preservation of information which can serve as evidence.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-7ef02b9a-1dbc-49be-853e-f8a5310798ed areoi-element col-12 d-inline d-md-flex align-items-center py-md-4 col-right cell-bg\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-1 py-3 mt-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#5059ab;font-size:1.13rem;font-style:normal;font-weight:600\">Corresponding Syteca\u2019s functionality<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<ul class=\"wp-block-list mb-0 ms-3 ms-lg-4 py-4 py-md-0 pe-3 px-lg-4\">\n<li class=\"with-link mb-3\">Collect and store screen records of user activity using Syteca\u2019s <a href=\"\/en\/product\/session-recording\" target=\"_blank\" rel=\"noreferrer noopener\">session recording<\/a> functionality.<\/li>\n\n\n\n<li class=\"with-link mb-3\">Record multilayer metadata on users\u2019 actions, including applications opened, URLs visited, keystrokes typed, USB devices connected, etc., and easily <a href=\"https:\/\/docs.syteca.com\/view\/searching-filtering-and-sorting-the-metadata\" target=\"_blank\" rel=\"noreferrer noopener\">search and filter these records<\/a>.<\/li>\n\n\n\n<li class=\"with-link\"><a href=\"\/en\/product\/reports-and-statistics\" target=\"_blank\" rel=\"noreferrer noopener\">Export user activity records<\/a> in a protected format and use them as evidence for forensic investigation activities.<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-c1d49766-8c58-401f-bd20-7d5d00947619 areoi-element accordion-item d-flex flex-wrap justify-content-center\">\n\t\t\t\n\t\t\t\n\n<p class=\"d-md-none rounded-0 accordion-button min-vw-100 nav-link-mobile p-poppins mb-0 has-text-color has-background\" id=\"headingTwo\" style=\"color:#ffffff;background-color:#4790ea;font-size:1.25rem\" aria-controls=\"collapseTwo\" aria-expanded=\"true\" data-bs-target=\"#collapseTwo\" data-bs-toggle=\"collapse\">People controls<\/p>\n\n\n\n\t\t<div aria-labelledby=\"headingTwo\" data-bs-parent=\"#accordionSwift\" id=\"collapseTwo\" class=\"block-320f73ef-6ec4-42e1-ab59-da458afc19cc areoi-element accordion-collapse collapse\">\n\t\t\t\n\t\t\t\n\n\t\t<div aria-labelledby=\"nav-tab-2\" role=\"tabpanel\" id=\"nav-2\" class=\"block-267e7042-5b86-4665-b772-3a2018c82475 areoi-element tab-pane accordion-body px-0 fade\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-76b6a30e-21b8-4989-9c1d-8f12ea2c1e81 areoi-element table-block-3 px-0\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-8d2ab510-a1bd-49ad-91a7-96eb05f7e646 areoi-element d-none d-md-flex header-cells flex-column flex-md-row justify-content-between\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-0830f57d-4dfc-484f-afe0-1365e1c3862c areoi-element d-inline col-left\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center p-3 p-poppins text-20-16 d-flex align-items-center h-100 justify-content-center has-text-color has-background\" style=\"color:#fbfbfb;background-color:#1a3b4e;font-style:normal;font-weight:600\">Security control required by ISO\/IEC 27001:2022<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-b9538d78-91a7-4761-9728-10fec4078e1e areoi-element d-inline col-right\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center p-3 p-poppins text-20-16 d-flex align-items-center h-100 justify-content-center has-text-color has-background\" style=\"color:#fbfbfb;background-color:#5059ab;font-style:normal;font-weight:600\">How you can cover it with Syteca\u2019s functionality<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-bb03fb23-0a4a-4bfb-8f29-8d78aee0af80 areoi-element d-flex flex-column flex-md-row\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6d50e20c-1081-41e7-8ac8-afdccde972e6 areoi-element col-12 d-inline py-md-4 col-left d-md-flex flex-column justify-content-center\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-1 py-3 mt-md-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#1a3b4e;font-size:1.13rem;font-style:normal;font-weight:600\">Security control required by ISO\/IEC 27001:2022<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3387b868-e55c-4582-8a84-18101090c388 areoi-element d-flex justify-content-lg-between flex-column-reverse flex-lg-row px-3 px-lg-4 pt-4 pt-md-0\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-18-15\" style=\"font-style:normal;font-weight:600\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#86898b\" class=\"has-inline-color\">6.7&nbsp;<\/mark>   Remote working<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"px-3 px-lg-4 mb-0\">A policy and supporting security measures shall be implemented to protect information accessed, processed, or stored at teleworking sites.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-46d6e6bf-da64-4982-bc6f-717dcf001157 areoi-element col-12 d-inline py-md-4 col-right\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-1 py-3 mt-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#5059ab;font-size:1.13rem;font-style:normal;font-weight:600\">How you can cover it with Syteca\u2019s functionality<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<ul class=\"wp-block-list mb-0 ms-3 ms-lg-4 py-4 py-md-0 pe-3 px-lg-4\">\n<li class=\"with-link mb-3\">Provide remote users with access to a particular computer or computer group <a href=\"https:\/\/docs.syteca.com\/view\/the-jump-server-parameter\" target=\"_blank\" rel=\"noreferrer noopener\">via a jump server<\/a> without revealing the access credentials.<\/li>\n\n\n\n<li class=\"with-link mb-3\">Secure and monitor <a href=\"\/en\/product\/supported-platforms\/windows-monitoring\" target=\"_blank\" rel=\"noreferrer noopener\">RDP connections<\/a> to your organization&#8217;s infrastructure.<\/li>\n\n\n\n<li class=\"with-link mb-3\">Ensure visibility into the actions of remote administrators on critical endpoints by leveraging <a href=\"\/en\/solutions\/privileged-user-monitoring\" target=\"_blank\" rel=\"noreferrer noopener\">privileged user management and monitoring<\/a>.<\/li>\n\n\n\n<li class=\"with-link \">Limit remote user access to your sensitive data and systems by implementing <a href=\"\/en\/product\/privileged-access-management\" target=\"_blank\" rel=\"noreferrer noopener\">just-in-time PAM<\/a>.<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-809a765f-5640-4ddf-91c9-bd83dfd81adb areoi-element d-flex flex-column flex-md-row\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6b2dad63-5761-4e45-9c2f-bd01dbd2137e areoi-element col-12 d-inline py-md-4 col-left cell-bg d-md-flex flex-column justify-content-center\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-1 py-3 mt-md-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#1a3b4e;font-size:1.13rem;font-style:normal;font-weight:600\">Security control required by ISO\/IEC 27001:2022<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3387b868-e55c-4582-8a84-18101090c388 areoi-element d-flex justify-content-lg-between flex-column-reverse flex-lg-row px-3 px-lg-4 pt-4 pt-md-0\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-18-15\" style=\"font-style:normal;font-weight:600\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#86898b\" class=\"has-inline-color\">6.8&nbsp;<\/mark>   Information security event reporting<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"px-3 px-lg-4 mb-0\">Information security events shall be reported through appropriate management channels as quickly as possible.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-7ef02b9a-1dbc-49be-853e-f8a5310798ed areoi-element col-12 d-inline d-md-flex align-items-center py-md-4 col-right cell-bg\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-1 py-3 mt-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#5059ab;font-size:1.13rem;font-style:normal;font-weight:600\">How you can cover it with Syteca\u2019s functionality<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<ul class=\"wp-block-list mb-0 ms-3 ms-lg-4 py-4 py-md-0 pe-3 px-lg-4\">\n<li class=\"with-link mb-3\"><a href=\"https:\/\/www.syteca.com\/en\/product\/reports-and-statistics\" target=\"_blank\" rel=\"noreferrer noopener\">Generate reports<\/a> on user activity and triggered alerts ad hoc or on a schedule.<\/li>\n\n\n\n<li class=\"with-link mb-3\">Gather all security-related information and create comprehensive reports in one place by <a href=\"https:\/\/docs.syteca.com\/view\/defining-siem-integration\" target=\"_blank\" rel=\"noreferrer noopener\">integrating Syteca with your SIEM system<\/a>.<\/li>\n\n\n\n<li class=\"with-link\">Leverage Syteca\u2019s smooth <a href=\"\/en\/product\/supported-platforms\/auditing-and-reporting\/power-bi\" target=\"_blank\" rel=\"noreferrer noopener\">integration with Microsoft Power BI<\/a> to create easy-to-grasp interactive reports on security events.<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-ff5f31e8-6c62-47cf-b887-328de6ec5055 areoi-element accordion-item d-flex flex-wrap justify-content-center\">\n\t\t\t\n\t\t\t\n\n<p class=\"rounded-0 d-md-none accordion-button min-vw-100 nav-link-mobile p-poppins mb-0 has-text-color has-background\" id=\"headingThree\" style=\"color:#ffffff;background-color:#4790ea;font-size:1.25rem\" aria-controls=\"collapseThree\" aria-expanded=\"true\" data-bs-target=\"#collapseThree\" data-bs-toggle=\"collapse\">Physical controls<\/p>\n\n\n\n\t\t<div aria-labelledby=\"headingThree\" data-bs-parent=\"#accordionSwift\" id=\"collapseThree\" class=\"block-e86ab46d-8942-40e4-829c-23acdd73fdde areoi-element accordion-collapse collapse\">\n\t\t\t\n\t\t\t\n\n\t\t<div aria-labelledby=\"nav-tab-3\" role=\"tabpanel\" id=\"nav-3\" class=\"block-6bcbfd6f-7f04-42f0-9fcc-1a55a35dbd16 areoi-element tab-pane accordion-body px-0 fade\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-353efe94-2fec-4c89-a2e7-2e441c54870c areoi-element table-block-3 px-0\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-29861797-8b9c-4623-baa0-e7ac489511bb areoi-element d-none d-md-flex header-cells flex-column flex-md-row justify-content-between\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-0830f57d-4dfc-484f-afe0-1365e1c3862c areoi-element d-inline col-left\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center p-3 p-poppins text-20-16 d-flex align-items-center h-100 justify-content-center has-text-color has-background\" style=\"color:#fbfbfb;background-color:#1a3b4e;font-style:normal;font-weight:600\">Security control required by ISO\/IEC 27001:2022<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-b9538d78-91a7-4761-9728-10fec4078e1e areoi-element d-inline col-right\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center p-3 p-poppins text-20-16 d-flex align-items-center h-100 justify-content-center has-text-color has-background\" style=\"color:#fbfbfb;background-color:#5059ab;font-style:normal;font-weight:600\">How you can cover it with Syteca\u2019s functionality<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-0b10a16f-88db-4f22-ae66-d8fd91430c3f areoi-element d-flex flex-column flex-md-row\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6d50e20c-1081-41e7-8ac8-afdccde972e6 areoi-element col-12 d-inline py-md-4 col-left d-md-flex flex-column justify-content-center\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-1 py-3 mt-md-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#1a3b4e;font-size:1.13rem;font-style:normal;font-weight:600\">Security control required by ISO\/IEC 27001:2022<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3387b868-e55c-4582-8a84-18101090c388 areoi-element d-flex justify-content-lg-between flex-column-reverse flex-lg-row px-3 px-lg-4 pt-4 pt-md-0\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-18-15\" style=\"font-style:normal;font-weight:600\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#86898b\" class=\"has-inline-color\">7.10&nbsp;<\/mark>   Storage media<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"px-3 px-lg-4 mb-0\">Storage media shall be managed through their acquisition, use, transportation, and disposal in accordance with the established classification and handling requirements.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-46d6e6bf-da64-4982-bc6f-717dcf001157 areoi-element col-12 d-inline py-md-4 col-right\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-1 py-3 mt-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#5059ab;font-size:1.13rem;font-style:normal;font-weight:600\">How you can cover it with Syteca\u2019s functionality<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<ul class=\"wp-block-list mb-0 ms-3 ms-lg-4 py-4 py-md-0 pe-3 px-lg-4\">\n<li class=\"mb-3\">Allow the use of specific USB devices on selected endpoints.<\/li>\n\n\n\n<li class=\"with-link mb-3\">Receive alerts on <a href=\"\/en\/product\/usb-blocking\" target=\"_blank\" rel=\"noreferrer noopener\">connected USB devices<\/a>.<\/li>\n\n\n\n<li>Block USB devices permanently or until manual admin approval is granted.<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-24914073-ba58-4e77-83e8-fbe5239ec73f areoi-element accordion-item d-flex flex-wrap justify-content-center\">\n\t\t\t\n\t\t\t\n\n<p class=\"rounded-0 d-md-none accordion-button min-vw-100 nav-link-mobile p-poppins mb-0 has-text-color has-background\" id=\"headingFour\" style=\"color:#ffffff;background-color:#4790ea;font-size:1.25rem\" aria-controls=\"collapseFour\" aria-expanded=\"true\" data-bs-target=\"#collapseFour\" data-bs-toggle=\"collapse\">Technological controls<\/p>\n\n\n\n\t\t<div aria-labelledby=\"headingFour\" data-bs-parent=\"#accordionSwift\" id=\"collapseFour\" class=\"block-0589ded1-fe50-44b6-ac33-7cf3c5265f54 areoi-element accordion-collapse collapse\">\n\t\t\t\n\t\t\t\n\n\t\t<div aria-labelledby=\"nav-tab-4\" role=\"tabpanel\" id=\"nav-4\" class=\"block-6bcbfd6f-7f04-42f0-9fcc-1a55a35dbd16 areoi-element tab-pane accordion-body px-0 fade\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-37a41b0a-57de-4f5b-8f2b-3e25f732a342 areoi-element table-block-3 px-0\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-b77112cf-4d00-4044-b2c1-c4bd2561fcba areoi-element d-none d-md-flex header-cells flex-column flex-md-row justify-content-between\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-0830f57d-4dfc-484f-afe0-1365e1c3862c areoi-element d-inline col-left\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center p-3 p-poppins text-20-16 d-flex align-items-center h-100 justify-content-center has-text-color has-background\" style=\"color:#fbfbfb;background-color:#1a3b4e;font-style:normal;font-weight:600\">Security control required by ISO\/IEC 27001:2022<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-b9538d78-91a7-4761-9728-10fec4078e1e areoi-element d-inline col-right\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center p-3 p-poppins text-20-16 d-flex align-items-center h-100 justify-content-center has-text-color has-background\" style=\"color:#fbfbfb;background-color:#5059ab;font-style:normal;font-weight:600\">How you can cover it with Syteca\u2019s functionality<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-f03b59b0-6d00-4cff-b32b-007cb571c5da areoi-element d-flex flex-column flex-md-row\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6d50e20c-1081-41e7-8ac8-afdccde972e6 areoi-element col-12 d-inline py-md-4 col-left d-md-flex flex-column justify-content-center\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-1 py-3 mt-md-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#1a3b4e;font-size:1.13rem;font-style:normal;font-weight:600\">Security control required by ISO\/IEC 27001:2022<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3387b868-e55c-4582-8a84-18101090c388 areoi-element d-flex justify-content-lg-between flex-column-reverse flex-lg-row px-3 px-lg-4 pt-4 pt-md-0\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-18-15\" style=\"font-style:normal;font-weight:600\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#86898b\" class=\"has-inline-color\">8.2&nbsp;<\/mark>   Privileged access rights<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"px-3 px-lg-4 mb-0\">The allocation and use of privileged access rights shall be restricted and controlled.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-46d6e6bf-da64-4982-bc6f-717dcf001157 areoi-element col-12 d-inline py-md-4 col-right\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-1 py-3 mt-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#5059ab;font-size:1.13rem;font-style:normal;font-weight:600\">How you can cover it with Syteca\u2019s functionality<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<ul class=\"wp-block-list mb-0 ms-3 ms-lg-4 py-4 py-md-0 pe-3 px-lg-4\">\n<li class=\"with-link mb-3\">Perform discovery, onboarding, management, and offboarding of privileged accounts with Syteca&#8217;s <a href=\"\/en\/product\/privileged-access-management\" target=\"_blank\" rel=\"noreferrer noopener\">PAM functionality<\/a>.<\/li>\n\n\n\n<li class=\"with-link mb-3\"><a href=\"\/en\/product\/user-activity-monitoring\" target=\"_blank\" rel=\"noreferrer noopener\">Monitor<\/a> and <a href=\"\/en\/product\/session-recording\" target=\"_blank\" rel=\"noreferrer noopener\">record<\/a> the actions of users with privileged access to your organization&#8217;s critical assets.<\/li>\n\n\n\n<li class=\"with-link mb-3\">Implement <a href=\"https:\/\/docs.syteca.com\/view\/permissions-for-secrets\" target=\"_blank\" rel=\"noreferrer noopener\">role-based access control<\/a> over stored privileged account credentials.<\/li>\n\n\n\n<li class=\"with-link mb-3\">Ensure <a href=\"\/en\/product\/supported-platforms\/windows-monitoring\" target=\"_blank\" rel=\"noreferrer noopener\">secure remote access of privileged users<\/a> to the organization\u2019s critical endpoints.&nbsp;<\/li>\n\n\n\n<li>Leverage <a href=\"\/en\/product\/reports-and-statistics\" target=\"_blank\" rel=\"noreferrer noopener\">user activity reports<\/a> to audit privileged user activity.<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-65f52cef-a0dc-48dc-af3b-c21eeb0ad0ba areoi-element d-flex flex-column flex-md-row\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6b2dad63-5761-4e45-9c2f-bd01dbd2137e areoi-element col-12 d-inline py-md-4 col-left cell-bg d-md-flex flex-column justify-content-center\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-1 py-3 mt-md-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#1a3b4e;font-size:1.13rem;font-style:normal;font-weight:600\">Security control required by ISO\/IEC 27001:2022<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3387b868-e55c-4582-8a84-18101090c388 areoi-element d-flex justify-content-lg-between flex-column-reverse flex-lg-row px-3 px-lg-4 pt-4 pt-md-0\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-18-15\" style=\"font-style:normal;font-weight:600\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#86898b\" class=\"has-inline-color\">8.3&nbsp;<\/mark>   Information access restriction<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"px-3 px-lg-4 mb-0\">Access to information and application system functions shall be restricted in accordance with the access control policy.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-7ef02b9a-1dbc-49be-853e-f8a5310798ed areoi-element col-12 d-inline d-md-flex align-items-center py-md-4 col-right cell-bg\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-1 py-3 mt-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#5059ab;font-size:1.13rem;font-style:normal;font-weight:600\">How you can cover it with Syteca\u2019s functionality<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<ul class=\"wp-block-list mb-0 ms-3 ms-lg-4 py-4 py-md-0 pe-3 px-lg-4\">\n<li class=\"with-link mb-3\">Grant <a href=\"\/en\/product\/privileged-access-management\" target=\"_blank\" rel=\"noreferrer noopener\">just-in-time access<\/a> to the organization\u2019s resources and systems by providing users with one-time passwords and restricting the time for which access is given.<\/li>\n\n\n\n<li class=\"with-link mb-3\">Restrict access according to the principle of least privilege by manually approving user access requests.&nbsp;<\/li>\n\n\n\n<li class=\"with-link\">Limit <a href=\"https:\/\/docs.syteca.com\/view\/permissions-for-secrets\" target=\"_blank\" rel=\"noreferrer noopener\">the use and management of stored credentials<\/a> according to user roles.<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-334a86ba-bf75-4337-b150-842e7f597aa7 areoi-element d-flex flex-column flex-md-row\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6d50e20c-1081-41e7-8ac8-afdccde972e6 areoi-element col-12 d-inline py-md-4 col-left d-md-flex flex-column justify-content-center\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-1 py-3 mt-md-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#1a3b4e;font-size:1.13rem;font-style:normal;font-weight:600\">Security control required by ISO\/IEC 27001:2022<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3387b868-e55c-4582-8a84-18101090c388 areoi-element d-flex justify-content-lg-between flex-column-reverse flex-lg-row px-3 px-lg-4 pt-4 pt-md-0\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-18-15\" style=\"font-style:normal;font-weight:600\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#86898b\" class=\"has-inline-color\">8.5&nbsp;<\/mark>   Secure authentication<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"px-3 px-lg-4 mb-0\">Where required by the access control policy, access to systems and applications shall be controlled by a secure log-on procedure.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-46d6e6bf-da64-4982-bc6f-717dcf001157 areoi-element col-12 d-inline d-md-flex align-items-center py-md-4 col-right\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-1 py-3 mt-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#5059ab;font-size:1.13rem;font-style:normal;font-weight:600\">How you can cover it with Syteca\u2019s functionality<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<ul class=\"wp-block-list mb-0 ms-3 ms-lg-4 py-4 py-md-0 pe-3 px-lg-4\">\n<li class=\"with-link mb-3\">Securely authenticate users <a href=\"https:\/\/docs.syteca.com\/view\/the-jump-server-parameter\" target=\"_blank\" rel=\"noreferrer noopener\">without revealing passwords<\/a>.<\/li>\n\n\n\n<li class=\"with-link mb-3\">Reduce the risk of unauthorized access with the help of <a href=\"\/en\/two-factor-authentication-tool\" target=\"_blank\" rel=\"noreferrer noopener\">two-factor authentication<\/a> and <a href=\"https:\/\/docs.syteca.com\/view\/the-one-time-password-parameter\" target=\"_blank\" rel=\"noreferrer noopener\">one-time passwords<\/a>.<\/li>\n\n\n\n<li class=\"with-link mb-3\">Require <a href=\"\/en\/product\/identity-management\" target=\"_blank\" rel=\"noreferrer noopener\">secondary authentication<\/a> for users accessing shared admin accounts.<\/li>\n\n\n\n<li class=\"with-link\">Authenticate additional users accessing Windows computers by <a href=\"https:\/\/docs.syteca.com\/view\/defining-ticketing-system-integration-settings\" target=\"_blank\" rel=\"noreferrer noopener\">requiring them to enter a ticket number<\/a>.<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-cf824ab7-326b-4eb4-af55-7db2138db861 areoi-element d-flex flex-column flex-md-row\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6b2dad63-5761-4e45-9c2f-bd01dbd2137e areoi-element col-12 d-inline py-md-4 col-left cell-bg d-md-flex flex-column justify-content-center\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-1 py-3 mt-md-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#1a3b4e;font-size:1.13rem;font-style:normal;font-weight:600\">Security control required by ISO\/IEC 27001:2022<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3387b868-e55c-4582-8a84-18101090c388 areoi-element d-flex justify-content-lg-between flex-column-reverse flex-lg-row px-3 px-lg-4 pt-4 pt-md-0\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-18-15\" style=\"font-style:normal;font-weight:600\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#86898b\" class=\"has-inline-color\">8.11&nbsp;<\/mark>   Data masking<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"px-3 px-lg-4 mb-0\">Data masking shall be used in accordance with the organization\u2019s security policies, business requirements, and applicable legislation.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-7ef02b9a-1dbc-49be-853e-f8a5310798ed areoi-element col-12 d-inline d-md-flex align-items-center py-md-4 col-right cell-bg\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-1 py-3 mt-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#5059ab;font-size:1.13rem;font-style:normal;font-weight:600\">How you can cover it with Syteca\u2019s functionality<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<ul class=\"wp-block-list mb-0 ms-3 ms-lg-4 py-4 py-md-0 pe-3 px-lg-4\">\n<li class=\"with-link mb-3\">Ensure the confidentiality of personally identifiable information by <a href=\"\/en\/user-privacy\" target=\"_blank\" rel=\"noreferrer noopener\">anonymizing monitored data<\/a>.<\/li>\n\n\n\n<li class=\"mb-3\">Establish a workflow to deanonymize and access user data for investigation purposes.<\/li>\n\n\n\n<li>Define a pool of users whose data should not be anonymized.<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-1ff4d408-27fd-4489-b89e-3028a376e8e6 areoi-element d-flex flex-column flex-md-row\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6d50e20c-1081-41e7-8ac8-afdccde972e6 areoi-element col-12 d-inline py-md-4 col-left d-md-flex flex-column justify-content-center\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-1 py-3 mt-md-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#1a3b4e;font-size:1.13rem;font-style:normal;font-weight:600\">Security control required by ISO\/IEC 27001:2022<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3387b868-e55c-4582-8a84-18101090c388 areoi-element d-flex justify-content-lg-between flex-column-reverse flex-lg-row px-3 px-lg-4 pt-4 pt-md-0\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-18-15\" style=\"font-style:normal;font-weight:600\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#86898b\" class=\"has-inline-color\">8.12&nbsp;<\/mark>   Data leakage prevention<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"px-3 px-lg-4 mb-0\">Data leakage prevention measures shall be applied to systems, networks, and devices.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-46d6e6bf-da64-4982-bc6f-717dcf001157 areoi-element col-12 d-inline d-md-flex align-items-center py-md-4 col-right\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-1 py-3 mt-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#5059ab;font-size:1.13rem;font-style:normal;font-weight:600\">How you can cover it with Syteca\u2019s functionality<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<ul class=\"wp-block-list mb-0 ms-3 ms-lg-4 py-4 py-md-0 pe-3 px-lg-4\">\n<li class=\"with-link mb-3\">Observe how users handle sensitive data by <a href=\"\/en\/product\/user-activity-monitoring\" target=\"_blank\" rel=\"noreferrer noopener\">tracking all of their actions<\/a> in a screen capture format.&nbsp;<\/li>\n\n\n\n<li class=\"with-link mb-3\"><a href=\"\/en\/product\/usb-blocking\" target=\"_blank\" rel=\"noreferrer noopener\">Monitor USB connections<\/a> and block specific USB devices.<\/li>\n\n\n\n<li class=\"mb-3\">Track file upload, download, and clipboard operations.&nbsp;<\/li>\n\n\n\n<li>Use predefined rules or create custom ones to be notified about the use of data transfer apps or automatically restrict their usage.<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-7464fe19-1d2a-4532-abbe-c977de038459 areoi-element d-flex flex-column flex-md-row\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6b2dad63-5761-4e45-9c2f-bd01dbd2137e areoi-element col-12 d-inline py-md-4 col-left cell-bg d-md-flex flex-column justify-content-center\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-1 py-3 mt-md-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#1a3b4e;font-size:1.13rem;font-style:normal;font-weight:600\">Security control required by ISO\/IEC 27001:2022<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3387b868-e55c-4582-8a84-18101090c388 areoi-element d-flex justify-content-lg-between flex-column-reverse flex-lg-row px-3 px-lg-4 pt-4 pt-md-0\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-18-15\" style=\"font-style:normal;font-weight:600\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#86898b\" class=\"has-inline-color\">8.15&nbsp;<\/mark>   Logging<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"px-3 px-lg-4 mb-0\">Event logs recording user activities, exceptions, faults, and information security events shall be produced, kept, and regularly reviewed.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-7ef02b9a-1dbc-49be-853e-f8a5310798ed areoi-element col-12 d-inline d-md-flex align-items-center py-md-4 col-right cell-bg\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-1 py-3 mt-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#5059ab;font-size:1.13rem;font-style:normal;font-weight:600\">How you can cover it with Syteca\u2019s functionality<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<ul class=\"wp-block-list mb-0 ms-3 ms-lg-4 py-4 py-md-0 pe-3 px-lg-4\">\n<li class=\"with-link mb-3\"><a href=\"\/en\/product\/session-recording\" target=\"_blank\" rel=\"noreferrer noopener\">Log user activity<\/a> in a searchable screen capture format with multilayer metadata.<\/li>\n\n\n\n<li class=\"with-link mb-3\">Keep <a href=\"https:\/\/docs.syteca.com\/view\/the-audit-log\" target=\"_blank\" rel=\"noreferrer noopener\">records of all changes in Syteca configurations<\/a> performed by system administrators.<\/li>\n\n\n\n<li class=\"with-link\">Review all <a href=\"\/en\/product\/alerts-and-notifications\" target=\"_blank\" rel=\"noreferrer noopener\">alerts on suspicious user activity and security events<\/a> happening within your organization\u2019s network.<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-6a06b600-96bb-44ca-91ee-ea7620f1d9f9 areoi-element d-flex flex-column flex-md-row\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6d50e20c-1081-41e7-8ac8-afdccde972e6 areoi-element col-12 d-inline py-md-4 col-left d-md-flex flex-column justify-content-center\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-1 py-3 mt-md-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#1a3b4e;font-size:1.13rem;font-style:normal;font-weight:600\">Security control required by ISO\/IEC 27001:2022<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3387b868-e55c-4582-8a84-18101090c388 areoi-element d-flex justify-content-lg-between flex-column-reverse flex-lg-row px-3 px-lg-4 pt-4 pt-md-0\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-18-15\" style=\"font-style:normal;font-weight:600\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#86898b\" class=\"has-inline-color\">8.16&nbsp;<\/mark>   Monitoring activities<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"px-3 px-lg-4 mb-0\">Monitoring activities shall be conducted as per regulatory requirements and legislation to detect anomalous behavior and potential information security incidents.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-46d6e6bf-da64-4982-bc6f-717dcf001157 areoi-element col-12 d-inline d-md-flex align-items-center py-md-4 col-right\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-1 py-3 mt-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#5059ab;font-size:1.13rem;font-style:normal;font-weight:600\">How you can cover it with Syteca\u2019s functionality<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<ul class=\"wp-block-list mb-0 ms-3 ms-lg-4 py-4 py-md-0 pe-3 px-lg-4\">\n<li class=\"with-link mb-3\"><a href=\"https:\/\/www.syteca.com\/en\/product\/user-activity-monitoring\" target=\"_blank\" rel=\"noreferrer noopener\">Continuously monitor all user activity<\/a> and watch user sessions live or in a recorded format.<\/li>\n\n\n\n<li class=\"with-link mb-3\">Detect anomalous user behavior with Syteca\u2019s <a href=\"https:\/\/docs.syteca.com\/view\/user-behavior-analysis\" target=\"_blank\" rel=\"noreferrer noopener\">AI-powered UEBA module<\/a>.<\/li>\n\n\n\n<li class=\"with-link mb-3\">Receive <a href=\"\/en\/product\/alerts-and-notifications\" target=\"_blank\" rel=\"noreferrer noopener\">real-time notifications<\/a> on security events by using predefined alert rules or adding custom ones.<\/li>\n\n\n\n<li class=\"with-link\">Configure <a href=\"\/en\/product\/alerts-and-notifications\" target=\"_blank\" rel=\"noreferrer noopener\">automatic incident response actions<\/a>, such as blocking users and killing suspicious processes.<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-eeb0424b-54b5-425e-b443-041eb14c4033 areoi-element d-flex flex-column flex-md-row\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6b2dad63-5761-4e45-9c2f-bd01dbd2137e areoi-element col-12 d-inline py-md-4 col-left cell-bg d-md-flex flex-column justify-content-center\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-1 py-3 mt-md-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#1a3b4e;font-size:1.13rem;font-style:normal;font-weight:600\">Security control required by ISO\/IEC 27001:2022<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3387b868-e55c-4582-8a84-18101090c388 areoi-element d-flex justify-content-lg-between flex-column-reverse flex-lg-row px-3 px-lg-4 pt-4 pt-md-0\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-18-15\" style=\"font-style:normal;font-weight:600\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#86898b\" class=\"has-inline-color\">8.23&nbsp;<\/mark>   Web filtering<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"px-3 px-lg-4 mb-0\">Appropriate measures shall be taken to prevent access to malicious content on external websites.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-7ef02b9a-1dbc-49be-853e-f8a5310798ed areoi-element col-12 d-inline d-md-flex align-items-center py-md-4 col-right cell-bg\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-1 py-3 mt-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#5059ab;font-size:1.13rem;font-style:normal;font-weight:600\">How you can cover it with Syteca\u2019s functionality<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<ul class=\"wp-block-list mb-0 ms-3 ms-lg-4 py-4 py-md-0 pe-3 px-lg-4\">\n<li class=\"with-link mb-3\">Get <a href=\"\/en\/product\/alerts-and-notifications\" target=\"_blank\" rel=\"noreferrer noopener\">notifications<\/a> upon users&#8217; visits to specific websites.<\/li>\n\n\n\n<li class=\"with-link mb-3\">Display <a href=\"\/en\/product\/alerts-and-notifications\" target=\"_blank\" rel=\"noreferrer noopener\">warning messages<\/a> to users or block them whenever they visit websites forbidden by the organization\u2019s policies.&nbsp;<\/li>\n\n\n\n<li class=\"with-link\">Apply <a href=\"https:\/\/docs.syteca.com\/view\/the-application-filtering-parameters\" target=\"_blank\" rel=\"noreferrer noopener\">application filtering<\/a> to monitor user activity only on designated websites.<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-6a06b600-96bb-44ca-91ee-ea7620f1d9f9 areoi-element d-flex flex-column flex-md-row\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6d50e20c-1081-41e7-8ac8-afdccde972e6 areoi-element col-12 d-inline py-md-4 col-left d-md-flex flex-column justify-content-center\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-1 py-3 mt-md-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#1a3b4e;font-size:1.13rem;font-style:normal;font-weight:600\">Security control required by ISO\/IEC 27001:2022<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3387b868-e55c-4582-8a84-18101090c388 areoi-element d-flex justify-content-lg-between flex-column-reverse flex-lg-row px-3 px-lg-4 pt-4 pt-md-0\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-18-15\" style=\"font-style:normal;font-weight:600\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#86898b\" class=\"has-inline-color\">8.28&nbsp;<\/mark>   Secure coding<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"px-3 px-lg-4 mb-0\">Secure coding principles shall be applied to software development.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-46d6e6bf-da64-4982-bc6f-717dcf001157 areoi-element col-12 d-inline d-md-flex align-items-center py-md-4 col-right\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-1 py-3 mt-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#5059ab;font-size:1.13rem;font-style:normal;font-weight:600\">How you can cover it with Syteca\u2019s functionality<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<ul class=\"wp-block-list mb-0 ms-3 ms-lg-4 py-4 py-md-0 pe-3 px-lg-4\">\n<li class=\"with-link mb-3\"><a href=\"\/en\/product\/privileged-access-management\" target=\"_blank\" rel=\"noreferrer noopener\">Grant and limit access<\/a> to critical development infrastructure.<\/li>\n\n\n\n<li class=\"with-link mb-3\"><a href=\"\/en\/product\/user-activity-monitoring\" target=\"_blank\" rel=\"noreferrer noopener\">Monitor and record user activity<\/a> within the development environment to check if users adhere to the established security policies.&nbsp;<\/li>\n\n\n\n<li class=\"with-link mb-3\"><a href=\"\/en\/product\/alerts-and-notifications\" target=\"_blank\" rel=\"noreferrer noopener\">Configure rules<\/a> to receive alerts about the use of suspicious apps in the development environment or automatically shut suspicious apps down.<\/li>\n\n\n\n<li class=\"with-link\">Enable secure distribution of access credentials within the development environment with Syteca\u2019s <a href=\"https:\/\/docs.syteca.com\/view\/ekran-system-application-credentials-broker-acb\" target=\"_blank\" rel=\"noreferrer noopener\">Application Credentials Broker<\/a>.<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<h2  class=\"wp-block-heading has-text-align-center\">Case studies<\/h2>\n\n\n\n<div class=\"container posts-slider\">\n\t\t<div class=\"row blog-slider\">\n\t\n<article id=\"post-27438\" class=\"col col-12 col-md-6 col-lg-4 p-poppins d-flex post-card\">\n\t<div class=\"mb-4 px-3 d-flex flex-column w-100\">\n\t\t<div class=\"card-img entry-content\">\n\t\t\t<a href=\"https:\/\/www.syteca.com\/en\/resources\/case-studies\/an-outsourcing-software-development-company-streamlines-access-management-with-ekran-system\" target=\"_blank\">\n\t\t\t\t<div class=\"post-thumbnail hoverable\"><img decoding=\"async\" width=\"624\" height=\"324\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/07\/04082842\/pic-An-Outsourcing-Software-Development-Company-Streamlines-Access-Management-with-Ekran-System-small.png\" class=\"attachment-large size-large wp-post-image\" alt=\"An Outsourcing Software Development Company Streamlines Access Management with Syteca\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/07\/04082842\/pic-An-Outsourcing-Software-Development-Company-Streamlines-Access-Management-with-Ekran-System-small.png 624w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/07\/04082842\/pic-An-Outsourcing-Software-Development-Company-Streamlines-Access-Management-with-Ekran-System-small-300x156.png 300w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/><\/div>\t\t\t<\/a>\n\t\t<\/div><!-- \/.card-img -->\n\t\t<div class=\"d-flex flex-column flex-grow-1 card-info px-2\">\n\t\t\t<a href=\"\" class=\"industry-label mb-3 pe-none\" style=\"width: max-content;\">Software development<\/a>\n\t\t\t<h3 class=\"card-title\">\n\t\t\t\t<a href=\"https:\/\/www.syteca.com\/en\/resources\/case-studies\/an-outsourcing-software-development-company-streamlines-access-management-with-ekran-system\" class=\"d-block p-poppins hoverable\" title=\"Permalink to An Outsourcing Software Development Company Streamlines Access Management with Syteca\" target=\"_blank\">An Outsourcing Software Development Company Streamlines Access Management with Syteca <\/a>\n\t\t\t<\/h3><!-- \/.entry-meta -->\n\t\t<\/div>\t\t\t\t\t\n\t<\/div>\n<\/article><!-- \/#post-27438 -->\n\n<article id=\"post-25022\" class=\"col col-12 col-md-6 col-lg-4 p-poppins d-flex post-card\">\n\t<div class=\"mb-4 px-3 d-flex flex-column w-100\">\n\t\t<div class=\"card-img entry-content\">\n\t\t\t<a href=\"https:\/\/www.syteca.com\/en\/resources\/case-studies\/hvac-service-provider-case-study\" target=\"_blank\">\n\t\t\t\t<div class=\"post-thumbnail hoverable\"><img decoding=\"async\" width=\"624\" height=\"324\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/06\/15063638\/pic-An-HVAC-service-provider-secures-data.png\" class=\"attachment-large size-large wp-post-image\" alt=\"\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/06\/15063638\/pic-An-HVAC-service-provider-secures-data.png 624w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/06\/15063638\/pic-An-HVAC-service-provider-secures-data-300x156.png 300w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/><\/div>\t\t\t<\/a>\n\t\t<\/div><!-- \/.card-img -->\n\t\t<div class=\"d-flex flex-column flex-grow-1 card-info px-2\">\n\t\t\t<a href=\"\" class=\"industry-label mb-3 pe-none\" style=\"width: max-content;\">Construction<\/a>\n\t\t\t<h3 class=\"card-title\">\n\t\t\t\t<a href=\"https:\/\/www.syteca.com\/en\/resources\/case-studies\/hvac-service-provider-case-study\" class=\"d-block p-poppins hoverable\" title=\"Permalink to An HVAC Service Provider Secures Data and Maintains Employee Productivity after Switching to Remote Work\" target=\"_blank\">An HVAC Service Provider Secures Data and Maintains Employee Productivity after Switching to Remote Work <\/a>\n\t\t\t<\/h3><!-- \/.entry-meta -->\n\t\t<\/div>\t\t\t\t\t\n\t<\/div>\n<\/article><!-- \/#post-25022 -->\n\n<article id=\"post-25019\" class=\"col col-12 col-md-6 col-lg-4 p-poppins d-flex post-card\">\n\t<div class=\"mb-4 px-3 d-flex flex-column w-100\">\n\t\t<div class=\"card-img entry-content\">\n\t\t\t<a href=\"https:\/\/www.syteca.com\/en\/resources\/case-studies\/us-based-financial-services-company\" target=\"_blank\">\n\t\t\t\t<div class=\"post-thumbnail hoverable\"><img decoding=\"async\" width=\"800\" height=\"484\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/18064726\/pic-A-US-based-financial-services-1024x619.png\" class=\"attachment-large size-large wp-post-image\" alt=\"\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/18064726\/pic-A-US-based-financial-services-1024x619.png 1024w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/18064726\/pic-A-US-based-financial-services-300x181.png 300w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/18064726\/pic-A-US-based-financial-services-768x464.png 768w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/10\/18064726\/pic-A-US-based-financial-services.png 1330w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/div>\t\t\t<\/a>\n\t\t<\/div><!-- \/.card-img -->\n\t\t<div class=\"d-flex flex-column flex-grow-1 card-info px-2\">\n\t\t\t<a href=\"\" class=\"industry-label mb-3 pe-none\" style=\"width: max-content;\">Financial services<\/a>\n\t\t\t<h3 class=\"card-title\">\n\t\t\t\t<a href=\"https:\/\/www.syteca.com\/en\/resources\/case-studies\/us-based-financial-services-company\" class=\"d-block p-poppins hoverable\" title=\"Permalink to A US-based Financial Services Company Effectively Monitors and Audits Privileged Users with Syteca\" target=\"_blank\">A US-based Financial Services Company Effectively Monitors and Audits Privileged Users with Syteca <\/a>\n\t\t\t<\/h3><!-- \/.entry-meta -->\n\t\t<\/div>\t\t\t\t\t\n\t<\/div>\n<\/article><!-- \/#post-25019 -->\n\t<\/div>\n\n\t<div class=\"d-flex justify-content-center pt-5 mt-md-5 mt-lg-0 pt-lg-0\">\t\n    <a class=\"btn areoi-has-url position-relative btn-outline-secondary\" href=\"\/en\/resources\/case-studies\" rel=\"noreferrer noopener\" target=\"_blank\">All case studies<\/a>\n\t<\/div>\n<\/div>\n<script type=\"text\/javascript\">\n\tjQuery(document).ready(function($) {\n    if ($('.case-studies-slider').closest('.new-design').length) {\n\t\tconst $div = $('.case-studies-slider.new-design .pt-5');\n\t\t$div.removeClass('pt-5 mt-md-5').addClass('pt-3 mt-xl-3');\n        const $button = $('.case-studies-slider.new-design .btn.areoi-has-url');\n        $button.removeClass('btn-outline-secondary').addClass('btn-primary');\n        $button.text('More Success Stories');\n    }\n});\n<\/script>\n\n\n\n\n\t\t<div  class=\"block-7fbf50f4-e1bc-493e-a217-c2372a3375f2 areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-9566efb6-78dc-493a-813f-125179d5ac40 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-9f6c2f8a-0f3b-4f68-b76a-c8230e238439 col areoi-element\">\n\t\t\t\n\t\t\t\n\n<h2  class=\"wp-block-heading has-text-align-center\">Meet other IT security requirements with Syteca<\/h2>\n\n\n\n\t\t<div  class=\"block-ce59ecde-e09c-4dc0-8772-a2845b211ce1 row areoi-element standard-set\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-b5b19f3a-8089-430d-b8df-57779e2561cb col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-b76cc725-7c87-49f5-8142-351b878979d7 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100 \"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/iso-compliance-solution\" target=\"_blank\" rel=\"noreferrer noopener\">ISO 27001<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-a6bed40c-b544-464a-a83b-b3204282f7cf col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-a124878b-4ffa-4003-b4cc-a0b614be59c9 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/pci-dss-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">PCI DSS<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-33613801-d2d1-48a5-a170-d3cd136178ca col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-8add58f2-3e03-40bd-825b-92e94567f5f8 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/swift-customer-security-program-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">SWIFT CSP<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-e43326f9-047f-494e-af2d-695055055472 col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-e7b7441d-517e-4d22-8c31-5939b6b7cf14 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/sox-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">SOX<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-9ed3edea-864d-4cd9-8204-0f39f65ea416 col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-2c0dd273-60c2-48b0-a1d1-0d5bf595e4f0 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/fisma-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">FISMA<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-f5c71927-e795-4fc7-b5d8-1336d19fefb0 col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-71978f43-04dc-4ab3-83ed-a8c22cca778e areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/gdpr-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">GDPR<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-f3b08ab4-5a59-4633-af80-1f6ede1c1bf6 col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-c6aee13f-6acd-496a-b450-3c7793846e59 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/nist-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">NIST 800-53<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-af56e4f7-5aa8-4e97-9e7f-1110ff8c81d6 col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-d277acf6-c0e8-4906-b4b8-9eeb22640812 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/nist-800-171-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">NIST 800-171<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-6c49f66f-789d-4a8e-a47d-f2eef32621f7 col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-988ff469-99a6-48bb-a06c-749de2e59159 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/nerc-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">NERC<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-9977c2a2-163d-48ca-ba4f-9b6132704998 col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-e40e22a8-388b-4aa8-bd14-36c9f33c479b areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/glba-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">GLBA<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-38bc542e-0b69-47f3-89c2-01acc885743b col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-7da2f8b4-83f4-4b04-94ca-8093fb5d0020 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/nispom-change-2-and-h-r-act-666\" target=\"_blank\" rel=\"noreferrer noopener\">NISPOM Change 2 and H.R. 666<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-954a3a8e-95fa-406a-a329-4ce26852cb6a col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-0820a35f-52fd-4605-bd29-8f6f7d0e2431 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/soc-2-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">SOC 2<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-9977c2a2-163d-48ca-ba4f-9b6132704998 col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-e40e22a8-388b-4aa8-bd14-36c9f33c479b areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/hipaa-compliance-solutions\" target=\"_blank\" rel=\"noreferrer noopener\">HIPAA<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-38bc542e-0b69-47f3-89c2-01acc885743b col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-7da2f8b4-83f4-4b04-94ca-8093fb5d0020 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/dora-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">DORA<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-954a3a8e-95fa-406a-a329-4ce26852cb6a col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-0820a35f-52fd-4605-bd29-8f6f7d0e2431 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/nis2-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">NIS2<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n<h2  class=\"wp-block-heading has-text-align-center\">Blog spotlight<\/h2>\n\n\n\n<div class=\"container posts-slider\">\n\t\t\t<div class=\"row blog-slider\">\n\t\t\t\n\n<article id=\"post-36452\" class=\"col col-12 col-md-6 col-lg-4 p-poppins d-flex post-card\">\n\t<div class=\"mb-4 px-3 d-flex flex-column w-100\">\n\t\t<div class=\"card-img entry-content\">\n\t\t\t<a href=\"https:\/\/www.syteca.com\/en\/blog\/best-practices-for-nis2-compliance\" target=\"_blank\">\n\t\t\t\t<div class=\"post-thumbnail hoverable\"><img decoding=\"async\" width=\"800\" height=\"250\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/12\/22010628\/article-banner-best-practices-for-nis2-compliance-1024x320.jpg\" class=\"attachment-large size-large wp-post-image\" alt=\"\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/12\/22010628\/article-banner-best-practices-for-nis2-compliance-1024x320.jpg 1024w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/12\/22010628\/article-banner-best-practices-for-nis2-compliance-300x94.jpg 300w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/12\/22010628\/article-banner-best-practices-for-nis2-compliance-768x240.jpg 768w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/12\/22010628\/article-banner-best-practices-for-nis2-compliance-1536x480.jpg 1536w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/12\/22010628\/article-banner-best-practices-for-nis2-compliance.jpg 1920w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/div>\t\t\t<\/a>\n\t\t<\/div><!-- \/.card-img -->\n\t\t<div class=\"d-flex flex-column flex-grow-1 card-info px-2\">\n\t\t\t<div class=\"d-flex justify-content-between align-items-center mb-3\"><span class=\"date\">March 05, 2025<\/span><a href=\"https:\/\/www.syteca.com\/en\/blog\/category\/industry-compliance\" target=\"_blank\" class=\"category-label\">Industry Compliance<\/a><\/div>\t\t\t<h3 class=\"card-title\">\n\t\t\t\t<a href=\"https:\/\/www.syteca.com\/en\/blog\/best-practices-for-nis2-compliance\" class=\"d-block p-poppins hoverable\" title=\"Permalink to 5 Best Practices to Prepare for NIS2 Compliance\" target=\"_blank\">5 Best Practices to Prepare for NIS2 Compliance <\/a>\n\t\t\t<\/h3>\t\t\t\n\t\t\t<div class=\"post-excerpt mt-auto pt-4\">Organizations must always be aware of the constantly changing compliance landscape to protect their sensitive assets and avoid paying millions in fines. The rapid development<\/div>\t\t<!-- \/.entry-meta -->\n\t\t<\/div>\t\t\t\t\t\n\t<\/div>\n<\/article><!-- \/#post-36452 -->\n\n\n<article id=\"post-30280\" class=\"col col-12 col-md-6 col-lg-4 p-poppins d-flex post-card\">\n\t<div class=\"mb-4 px-3 d-flex flex-column w-100\">\n\t\t<div class=\"card-img entry-content\">\n\t\t\t<a href=\"https:\/\/www.syteca.com\/en\/blog\/how-to-prepare-for-a-pci-dss-audit\" target=\"_blank\">\n\t\t\t\t<div class=\"post-thumbnail hoverable\"><img decoding=\"async\" width=\"638\" height=\"218\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/09\/01023928\/OG-article-1-How-to-Prepare-for-a-PCI-DSS-Audit.png\" class=\"attachment-large size-large wp-post-image\" alt=\"\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/09\/01023928\/OG-article-1-How-to-Prepare-for-a-PCI-DSS-Audit.png 638w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/09\/01023928\/OG-article-1-How-to-Prepare-for-a-PCI-DSS-Audit-300x103.png 300w\" sizes=\"(max-width: 638px) 100vw, 638px\" \/><\/div>\t\t\t<\/a>\n\t\t<\/div><!-- \/.card-img -->\n\t\t<div class=\"d-flex flex-column flex-grow-1 card-info px-2\">\n\t\t\t<div class=\"d-flex justify-content-between align-items-center mb-3\"><span class=\"date\">September 01, 2023<\/span><a href=\"https:\/\/www.syteca.com\/en\/blog\/category\/industry-compliance\" target=\"_blank\" class=\"category-label\">Industry Compliance<\/a><\/div>\t\t\t<h3 class=\"card-title\">\n\t\t\t\t<a href=\"https:\/\/www.syteca.com\/en\/blog\/how-to-prepare-for-a-pci-dss-audit\" class=\"d-block p-poppins hoverable\" title=\"Permalink to How to Prepare for a PCI DSS Audit: 7 Key Steps You Should Follow\" target=\"_blank\">How to Prepare for a PCI DSS Audit: 7 Key Steps You Should Follow <\/a>\n\t\t\t<\/h3>\t\t\t\n\t\t\t<div class=\"post-excerpt mt-auto pt-4\">In the modern world, where financial transactions are increasingly conducted online, ensuring the security of sensitive financial information has become paramount. The Payment Card Industry<\/div>\t\t<!-- \/.entry-meta -->\n\t\t<\/div>\t\t\t\t\t\n\t<\/div>\n<\/article><!-- \/#post-30280 -->\n\n\n<article id=\"post-14100\" class=\"col col-12 col-md-6 col-lg-4 p-poppins d-flex post-card\">\n\t<div class=\"mb-4 px-3 d-flex flex-column w-100\">\n\t\t<div class=\"card-img entry-content\">\n\t\t\t<a href=\"https:\/\/www.syteca.com\/en\/blog\/how-to-prepare-for-gdpr\" target=\"_blank\">\n\t\t\t\t<div class=\"post-thumbnail hoverable\"><img decoding=\"async\" width=\"638\" height=\"218\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/04\/article-gdpr-checklist_0.jpg\" class=\"attachment-large size-large wp-post-image\" alt=\"\" srcset=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/04\/article-gdpr-checklist_0.jpg 638w, https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/04\/article-gdpr-checklist_0-300x103.jpg 300w\" sizes=\"(max-width: 638px) 100vw, 638px\" \/><\/div>\t\t\t<\/a>\n\t\t<\/div><!-- \/.card-img -->\n\t\t<div class=\"d-flex flex-column flex-grow-1 card-info px-2\">\n\t\t\t<div class=\"d-flex justify-content-between align-items-center mb-3\"><span class=\"date\">April 14, 2023<\/span><a href=\"https:\/\/www.syteca.com\/en\/blog\/category\/industry-compliance\" target=\"_blank\" class=\"category-label\">Industry Compliance<\/a><\/div>\t\t\t<h3 class=\"card-title\">\n\t\t\t\t<a href=\"https:\/\/www.syteca.com\/en\/blog\/how-to-prepare-for-gdpr\" class=\"d-block p-poppins hoverable\" title=\"Permalink to 10 Steps to Pain-Free GDPR Compliance\" target=\"_blank\">10 Steps to Pain-Free GDPR Compliance <\/a>\n\t\t\t<\/h3>\t\t\t\n\t\t\t<div class=\"post-excerpt mt-auto pt-4\">The General Data Protection Regulation (GDPR) is often considered the strictest regulation in the world for securing users\u2019 personal data, with fines for non-compliance reaching<\/div>\t\t<!-- \/.entry-meta -->\n\t\t<\/div>\t\t\t\t\t\n\t<\/div>\n<\/article><!-- \/#post-14100 -->\n\n\n<article id=\"post-14225\" class=\"col col-12 col-md-6 col-lg-4 p-poppins d-flex post-card\">\n\t<div class=\"mb-4 px-3 d-flex flex-column w-100\">\n\t\t<div class=\"card-img entry-content\">\n\t\t\t<a href=\"https:\/\/www.syteca.com\/en\/blog\/how-to-pass-it-compliance-audit\" target=\"_blank\">\n\t\t\t\t<div class=\"post-thumbnail hoverable\"><img decoding=\"async\" width=\"800\" height=\"272\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/04\/article_How-to-Pass-IT-Compliance-Audit.jpg\" class=\"attachment-large size-large wp-post-image\" alt=\"\" srcset=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/04\/article_How-to-Pass-IT-Compliance-Audit.jpg 825w, https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/04\/article_How-to-Pass-IT-Compliance-Audit-300x102.jpg 300w, https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/04\/article_How-to-Pass-IT-Compliance-Audit-768x261.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/div>\t\t\t<\/a>\n\t\t<\/div><!-- \/.card-img -->\n\t\t<div class=\"d-flex flex-column flex-grow-1 card-info px-2\">\n\t\t\t<div class=\"d-flex justify-content-between align-items-center mb-3\"><span class=\"date\">August 26, 2020<\/span><a href=\"https:\/\/www.syteca.com\/en\/blog\/category\/industry-compliance\" target=\"_blank\" class=\"category-label\">Industry Compliance<\/a><\/div>\t\t\t<h3 class=\"card-title\">\n\t\t\t\t<a href=\"https:\/\/www.syteca.com\/en\/blog\/how-to-pass-it-compliance-audit\" class=\"d-block p-poppins hoverable\" title=\"Permalink to How to Pass an IT Compliance Audit\" target=\"_blank\">How to Pass an IT Compliance Audit <\/a>\n\t\t\t<\/h3>\t\t\t\n\t\t\t<div class=\"post-excerpt mt-auto pt-4\">IT compliance requirements are designed to help companies enhance their cybersecurity and integrate top-level protection into their workflows. But passing an IT security audit can<\/div>\t\t<!-- \/.entry-meta -->\n\t\t<\/div>\t\t\t\t\t\n\t<\/div>\n<\/article><!-- \/#post-14225 -->\n\t\t<\/div>\n\t<\/div>\n\n\n\n\n\t\t<div  class=\"block-d5bca69d-998c-4d69-822d-1ab54814d510 areoi-element container\">\n\t\t\t\n\t\t\t\n\n<h2  class=\"wp-block-heading has-text-align-center mb-5\">FAQ<\/h2>\n\n\n\n\t\t<div  class=\"block-5d43915f-bd7e-4412-94a2-0587b296fd0c row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-ab61b939-df46-4405-807a-8a0a34b54b19 col areoi-element\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f0162fcd-1e8d-463f-923f-a311180256ee accordion\">\n\t\t\t\n\n\t\t<div  class=\"block-fc931ad0-9a98-4e77-a2ed-4060f4b81c9c accordion-item\">\n\n\t\t\t<h2 \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-fc931ad0-9a98-4e77-a2ed-4060f4b81c9c-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-fc931ad0-9a98-4e77-a2ed-4060f4b81c9c-collapse\" \n\t\t\t\t\taria-expanded=\"true\" \n\t\t\t\t\taria-controls=\"block-fc931ad0-9a98-4e77-a2ed-4060f4b81c9c-collapse\"\n\t\t\t\t>\n\t\t\t\t\tWhat is the ISO 27001 standard?\n\t\t\t\t<\/button>\n\t\t\t<\/h2>\n\n\t\t\t<div \n\t\t\t\tid=\"block-fc931ad0-9a98-4e77-a2ed-4060f4b81c9c-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse show\" \n\t\t\t\taria-labelledby=\"block-fc931ad0-9a98-4e77-a2ed-4060f4b81c9c-header\"\n\t\t\t\tdata-bs-parent=\".block-f0162fcd-1e8d-463f-923f-a311180256ee\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n\t\t<div  class=\"block-fc9ecaa4-c53a-4c01-ab82-878bb8e98ba4 areoi-element\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(248, 251, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p>The ISO 27001 standard is an internationally recognized framework for information security management systems (ISMS). It outlines how organizations should build ISMSs to achieve full-scale data security.&nbsp;<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-f40c8174-5b70-4409-a2fd-0e2839c1c019 accordion-item\">\n\n\t\t\t<h2 \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-f40c8174-5b70-4409-a2fd-0e2839c1c019-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button collapsed\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-f40c8174-5b70-4409-a2fd-0e2839c1c019-collapse\" \n\t\t\t\t\taria-expanded=\"false\" \n\t\t\t\t\taria-controls=\"block-f40c8174-5b70-4409-a2fd-0e2839c1c019-collapse\"\n\t\t\t\t>\n\t\t\t\t\tWho oversees ISO 27001?\n\t\t\t\t<\/button>\n\t\t\t<\/h2>\n\n\t\t\t<div \n\t\t\t\tid=\"block-f40c8174-5b70-4409-a2fd-0e2839c1c019-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse\" \n\t\t\t\taria-labelledby=\"block-f40c8174-5b70-4409-a2fd-0e2839c1c019-header\"\n\t\t\t\tdata-bs-parent=\".block-f0162fcd-1e8d-463f-923f-a311180256ee\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n\t\t<div  class=\"block-29a487f9-8ce1-43d4-9fe8-36f50f76cbcc areoi-element\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(248, 251, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p>ISO\/IEC 27001 is an international standard for information security management developed by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC).<\/p>\n\n\n\n<p>An ISMS can be certified compliant with the ISO\/IEC 27001 standard by an accredited registrar or an accredited certification body (CB).<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-0a0ec48a-69d1-44f0-b184-31de8d011440 accordion-item\">\n\n\t\t\t<h2 \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-0a0ec48a-69d1-44f0-b184-31de8d011440-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button collapsed\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-0a0ec48a-69d1-44f0-b184-31de8d011440-collapse\" \n\t\t\t\t\taria-expanded=\"false\" \n\t\t\t\t\taria-controls=\"block-0a0ec48a-69d1-44f0-b184-31de8d011440-collapse\"\n\t\t\t\t>\n\t\t\t\t\tHow many controls does ISO 27001:2022 include?\n\t\t\t\t<\/button>\n\t\t\t<\/h2>\n\n\t\t\t<div \n\t\t\t\tid=\"block-0a0ec48a-69d1-44f0-b184-31de8d011440-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse\" \n\t\t\t\taria-labelledby=\"block-0a0ec48a-69d1-44f0-b184-31de8d011440-header\"\n\t\t\t\tdata-bs-parent=\".block-f0162fcd-1e8d-463f-923f-a311180256ee\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n\t\t<div  class=\"block-db0816f5-a231-47f6-b0d0-bbdb2f99f747 areoi-element\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(248, 251, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p>The ISO\/IEC 27001:2022 standard contains 93 security controls to help organizations establish, implement, and maintain an information security management system.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-f84bcbdc-7fb8-4a68-98bb-3a52e36945f5 accordion-item\">\n\n\t\t\t<h2 \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-f84bcbdc-7fb8-4a68-98bb-3a52e36945f5-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button collapsed\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-f84bcbdc-7fb8-4a68-98bb-3a52e36945f5-collapse\" \n\t\t\t\t\taria-expanded=\"false\" \n\t\t\t\t\taria-controls=\"block-f84bcbdc-7fb8-4a68-98bb-3a52e36945f5-collapse\"\n\t\t\t\t>\n\t\t\t\t\tWhat is an ISO 27001 certified information security management system?\n\t\t\t\t<\/button>\n\t\t\t<\/h2>\n\n\t\t\t<div \n\t\t\t\tid=\"block-f84bcbdc-7fb8-4a68-98bb-3a52e36945f5-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse\" \n\t\t\t\taria-labelledby=\"block-f84bcbdc-7fb8-4a68-98bb-3a52e36945f5-header\"\n\t\t\t\tdata-bs-parent=\".block-f0162fcd-1e8d-463f-923f-a311180256ee\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n\t\t<div  class=\"block-4168ed8d-5059-48ff-93cd-bc0794174a63 areoi-element\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(248, 251, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p>An ISO 27001 certified information security management system (ISMS) is a framework and set of processes an organization must implement to effectively manage and protect its information assets. An ISO 27001 certified ISMS corresponds to the requirements outlined in the ISO\/IEC 27001 standard.&nbsp;<\/p>\n\n\n\n<p>An ISO 27001 certification indicates that the organization passed a thorough evaluation and validation of its ISMS\u2019s effectiveness in safeguarding sensitive information against security threats.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-ac323aab-1154-4c3a-bb7e-855dde8b2a41 accordion-item\">\n\n\t\t\t<h2 \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-ac323aab-1154-4c3a-bb7e-855dde8b2a41-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button collapsed\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-ac323aab-1154-4c3a-bb7e-855dde8b2a41-collapse\" \n\t\t\t\t\taria-expanded=\"false\" \n\t\t\t\t\taria-controls=\"block-ac323aab-1154-4c3a-bb7e-855dde8b2a41-collapse\"\n\t\t\t\t>\n\t\t\t\t\tDoes ISO 27001 include risk management?\n\t\t\t\t<\/button>\n\t\t\t<\/h2>\n\n\t\t\t<div \n\t\t\t\tid=\"block-ac323aab-1154-4c3a-bb7e-855dde8b2a41-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse\" \n\t\t\t\taria-labelledby=\"block-ac323aab-1154-4c3a-bb7e-855dde8b2a41-header\"\n\t\t\t\tdata-bs-parent=\".block-f0162fcd-1e8d-463f-923f-a311180256ee\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n\t\t<div  class=\"block-999e6e81-184d-4cf6-80f0-024a2e80e2fe areoi-element\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(248, 251, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p>Yes, according to the ISO\/IEC 27001:2022 standard, risk management is key for building an effective information security management system (ISMS).&nbsp;<\/p>\n\n\n\n<p>Syteca is ISO 27001 risk management software that helps you mitigate security risks in your organization and comply with the requirements of ISO 27001.&nbsp;<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-1619b993-3dad-4884-8857-69e91ed63219 accordion-item\">\n\n\t\t\t<h2 \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-1619b993-3dad-4884-8857-69e91ed63219-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button collapsed\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-1619b993-3dad-4884-8857-69e91ed63219-collapse\" \n\t\t\t\t\taria-expanded=\"false\" \n\t\t\t\t\taria-controls=\"block-1619b993-3dad-4884-8857-69e91ed63219-collapse\"\n\t\t\t\t>\n\t\t\t\t\tHow do I implement ISO 27001 controls?\n\t\t\t\t<\/button>\n\t\t\t<\/h2>\n\n\t\t\t<div \n\t\t\t\tid=\"block-1619b993-3dad-4884-8857-69e91ed63219-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse\" \n\t\t\t\taria-labelledby=\"block-1619b993-3dad-4884-8857-69e91ed63219-header\"\n\t\t\t\tdata-bs-parent=\".block-f0162fcd-1e8d-463f-923f-a311180256ee\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n\t\t<div  class=\"block-fc9ecaa4-c53a-4c01-ab82-878bb8e98ba4 areoi-element\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(248, 251, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p>Implementing ISO 27001 controls involves establishing, monitoring, and continually improving an information security management system (ISMS). To do it, use this step-by-step guide:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Develop an ISMS policy that aligns with your organization&#8217;s objectives and the requirements of the ISO 27001 standard.<\/li>\n\n\n\n<li>Identify, assess, and prioritize information security risks, taking into account their likelihood and impact on your organization.<\/li>\n\n\n\n<li>Based on the risk assessment results, identify the ISO 27001 controls your organization is currently lacking.<\/li>\n\n\n\n<li>Create security procedures for implementing each required security control.<\/li>\n\n\n\n<li>Implement security controls by using dedicated IT solutions, such as compliance management software for ISO 27001.&nbsp;<\/li>\n\n\n\n<li>Conduct regular audits to evaluate the effectiveness of the ISMS and make amendments.<\/li>\n\n\n\n<li>If certification is required, pass an external audit with an accredited certification body.&nbsp;<\/li>\n<\/ol>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-16ba611a-5dc4-4c5c-bb78-2645e4b9942b accordion-item\">\n\n\t\t\t<h3 \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-16ba611a-5dc4-4c5c-bb78-2645e4b9942b-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button collapsed\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-16ba611a-5dc4-4c5c-bb78-2645e4b9942b-collapse\" \n\t\t\t\t\taria-expanded=\"false\" \n\t\t\t\t\taria-controls=\"block-16ba611a-5dc4-4c5c-bb78-2645e4b9942b-collapse\"\n\t\t\t\t>\n\t\t\t\t\tHow do I conduct an ISO 27001 risk assessment?\n\t\t\t\t<\/button>\n\t\t\t<\/h3>\n\n\t\t\t<div \n\t\t\t\tid=\"block-16ba611a-5dc4-4c5c-bb78-2645e4b9942b-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse\" \n\t\t\t\taria-labelledby=\"block-16ba611a-5dc4-4c5c-bb78-2645e4b9942b-header\"\n\t\t\t\tdata-bs-parent=\".block-f0162fcd-1e8d-463f-923f-a311180256ee\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n\t\t<div  class=\"block-29a487f9-8ce1-43d4-9fe8-36f50f76cbcc areoi-element\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(248, 251, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p>Conducting a risk assessment is one of the steps to prepare for a ISO 27001 audit. You can assess risk in your organization by following the next steps:&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Choose an approach to risk management.<\/strong> In general, you can choose between qualitative and quantitative approaches. With the qualitative approach, you need to explore various scenarios and answer &#8220;what if&#8221; questions to identify risks. With the quantitative approach, you use data and numbers to define risk levels.<\/li>\n\n\n\n<li><strong>Identify risks.<\/strong> List your most sensitive information assets and specify the risks that could potentially affect the confidentiality, integrity, and availability of those assets.<\/li>\n\n\n\n<li><strong>Analyze risks.<\/strong> Assess the likelihood of each identified risk and how they could impact your business. Take into consideration such impacts as financial and reputational losses, fines and lawsuits, etc.&nbsp;<\/li>\n\n\n\n<li><strong>Prioritize risks.<\/strong> Based on the likelihood and potential impact of those risks, prioritize them from the highest to lowest acceptable level of risk.<\/li>\n\n\n\n<li><strong>Build a risk treatment plan.<\/strong> Think of how to reduce the likelihood of risks and prevent triggering circumstances. As well, decide on what risks can be managed by third parties and what risks are acceptable.<\/li>\n\n\n\n<li><strong>Write a risk report.<\/strong> Summarize and document each step of your risk evaluation process.&nbsp;<\/li>\n<\/ol>\n\n\n\n<p>Conduct a risk assessment regularly to improve your information security management system.&nbsp;<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-99545cb3-65e6-4cd9-bf6a-b1467afbeda1 accordion-item\">\n\n\t\t\t<h3 \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-99545cb3-65e6-4cd9-bf6a-b1467afbeda1-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button collapsed\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-99545cb3-65e6-4cd9-bf6a-b1467afbeda1-collapse\" \n\t\t\t\t\taria-expanded=\"false\" \n\t\t\t\t\taria-controls=\"block-99545cb3-65e6-4cd9-bf6a-b1467afbeda1-collapse\"\n\t\t\t\t>\n\t\t\t\t\tHow do I get ISO 27001 certified?\n\t\t\t\t<\/button>\n\t\t\t<\/h3>\n\n\t\t\t<div \n\t\t\t\tid=\"block-99545cb3-65e6-4cd9-bf6a-b1467afbeda1-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse\" \n\t\t\t\taria-labelledby=\"block-99545cb3-65e6-4cd9-bf6a-b1467afbeda1-header\"\n\t\t\t\tdata-bs-parent=\".block-f0162fcd-1e8d-463f-923f-a311180256ee\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n\t\t<div  class=\"block-db0816f5-a231-47f6-b0d0-bbdb2f99f747 areoi-element\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(248, 251, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p>To get certified with ISO\/IEC 27001, you need to complete a series of steps:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Study the ISO\/IEC 27001:2022 standard and its requirements.&nbsp;<\/li>\n\n\n\n<li>Assess your organization&#8217;s current information security practices against the requirements of the standard to identify gaps.&nbsp;<\/li>\n\n\n\n<li>Implement necessary security controls and develop security policies and procedures to eliminate all the gaps. You can leverage ISO 27001 management software, such as Syteca to facilitate the process of compliance.<\/li>\n\n\n\n<li>Conduct internal audits to assess the effectiveness of your organization\u2019s ISMS and make improvements.<\/li>\n\n\n\n<li>Contact an accredited certification body to pass Stage 1 and Stage 2 audits and get certified.&nbsp;<\/li>\n<\/ol>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-7098299d-9024-47c8-a36b-dfba1d59dae1 accordion-item\">\n\n\t\t\t<h3 \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-7098299d-9024-47c8-a36b-dfba1d59dae1-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button collapsed\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-7098299d-9024-47c8-a36b-dfba1d59dae1-collapse\" \n\t\t\t\t\taria-expanded=\"false\" \n\t\t\t\t\taria-controls=\"block-7098299d-9024-47c8-a36b-dfba1d59dae1-collapse\"\n\t\t\t\t>\n\t\t\t\t\tHow long is an ISO 27001 certificate valid?\n\t\t\t\t<\/button>\n\t\t\t<\/h3>\n\n\t\t\t<div \n\t\t\t\tid=\"block-7098299d-9024-47c8-a36b-dfba1d59dae1-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse\" \n\t\t\t\taria-labelledby=\"block-7098299d-9024-47c8-a36b-dfba1d59dae1-header\"\n\t\t\t\tdata-bs-parent=\".block-f0162fcd-1e8d-463f-923f-a311180256ee\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n\t\t<div  class=\"block-4168ed8d-5059-48ff-93cd-bc0794174a63 areoi-element\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(248, 251, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p>Once your organization gets an ISO 27001 certification, it&#8217;s valid for three years. However, you still need to manage and maintain your ISMS during this period. Make sure to review and update your security policies and procedures and use dedicated ISO 27001 software to implement all the requirements of the standard. This will show that your organization still complies with the standard during auditors\u2019 annual surveillance visits.&nbsp;<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-10b28d9c-567b-4916-8f99-61b431f8c907 accordion-item\">\n\n\t\t\t<h3 \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-10b28d9c-567b-4916-8f99-61b431f8c907-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button collapsed\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-10b28d9c-567b-4916-8f99-61b431f8c907-collapse\" \n\t\t\t\t\taria-expanded=\"false\" \n\t\t\t\t\taria-controls=\"block-10b28d9c-567b-4916-8f99-61b431f8c907-collapse\"\n\t\t\t\t>\n\t\t\t\t\tHow do I maintain ISO 27001 certification?\n\t\t\t\t<\/button>\n\t\t\t<\/h3>\n\n\t\t\t<div \n\t\t\t\tid=\"block-10b28d9c-567b-4916-8f99-61b431f8c907-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse\" \n\t\t\t\taria-labelledby=\"block-10b28d9c-567b-4916-8f99-61b431f8c907-header\"\n\t\t\t\tdata-bs-parent=\".block-f0162fcd-1e8d-463f-923f-a311180256ee\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n\t\t<div  class=\"block-999e6e81-184d-4cf6-80f0-024a2e80e2fe areoi-element\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(248, 251, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p>Even after receiving the ISO 27001 certification, you need to make ongoing efforts to maintain compliance with the ISO 27001 standards. Therefore, make sure to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Conduct regular risk assessments to identify new threats, vulnerabilities, and changes in the risk landscape.&nbsp;<\/li>\n\n\n\n<li>Monitor and review the effectiveness of implemented controls and update them when needed.<\/li>\n\n\n\n<li>Conduct regular internal audits to assess the effectiveness of the ISMS and make corrections to address any identified issues.<\/li>\n\n\n\n<li>Stay tuned for updates in the ISO 27001 standard and adapt your ISMS accordingly.<\/li>\n\n\n\n<li>Pass annual surveillance audits to demonstrate compliance.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>A dedicated ISO 27001 software solution like Syteca can help you get certified with ISO\/IEC 27001:2022 as well as maintain compliance with the standard.&nbsp;<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-45b57971-717c-443c-922f-f0df5b8248ea areoi-element d-flex justify-content-center\">\n\t\t\t\n\t\t\t\n\n\t\t\t\t\n\t\t<a \n\t\t\t\n\t\t\tclass=\"block-78c79352-3373-4cf5-96b7-d8110802c031 btn areoi-has-url position-relative btn-outline-secondary\"\n\t href=\"https:\/\/docs.syteca.com\/view\/faq-troubleshooting\" rel=\"noreferrer noopener\" target=\"_blank\" >\n\t\t\t\t\t\n\t\t\t\t\tMore FAQ \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/a>\n\t\t\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-8c89124e-253f-4805-9f93-347c86377a5b areoi-element lets-talk overflow-hidden\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(71, 144, 234,0.2)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-72b6197e-3dfe-4ec1-89f6-e5d6a1394c3a areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-03ae15ca-7610-4452-ac69-d7f00edd880d row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-0e8081c0-dbaf-469c-bf7f-523ca6f7694a col areoi-element align-self-md-center col-xxl-5\">\n\t\t\t\n\t\t\t\n\n<h2  class=\"wp-block-heading text-center text-md-start\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#4790ea\" class=\"has-inline-color\">Let\u2019s <\/mark>get the conversation started<\/h2>\n\n\n\n<div style=\"height:16px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"text-center text-md-start opacity-75 pe-xxl-5\">Contact our team to learn how our insider risk management software can safeguard your organization&#8217;s data from any risks caused by human factors. Book a call with us at a time that suits you best, and let&#8217;s explore how we can help you achieve your security goals.<\/p>\n\n\n\n<div style=\"height:24px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n\t\t<div  class=\"block-cf14a16c-6c30-4ce2-96c4-909d173f9c7b areoi-element d-flex justify-content-center justify-content-md-start\">\n\t\t\t\n\t\t\t\n\n\t\t\t\t\n\t\t<a \n\t\t\t\n\t\t\tclass=\"block-5446f9ca-cbaa-42df-8020-fec51b20785e btn areoi-has-url position-relative btn-secondary\"\n\t href=\"\/en\/get-in-touch\" rel=\"noreferrer noopener\" target=\"_blank\" >\n\t\t\t\t\t\n\t\t\t\t\tGet in Touch \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/a>\n\t\t\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3a7702ac-7e87-4702-abff-88e557a0d73c col areoi-element align-self-md-center col-xxl-7 d-none d-sm-none d-md-block\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2022\/12\/Rectangle-205.png\" alt=\"\"\/><\/figure>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t","protected":false},"excerpt":{"rendered":"<p>Case studies Blog spotlight<\/p>\n","protected":false},"author":16,"featured_media":0,"parent":12284,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-full.php","meta":{"footnotes":""},"class_list":["post-12537","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ISO 27001 Compliance Software from Syteca<\/title>\n<meta name=\"description\" content=\"Leverage Syteca as an ISO 27001 compliance software solution to pass the ISO\/IEC 27001 certification audit and enhance your insider risk management.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/iso-compliance-solution\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ISO 27001 Compliance Software from Syteca\" \/>\n<meta property=\"og:description\" content=\"Leverage Syteca as an ISO 27001 compliance software solution to pass the ISO\/IEC 27001 certification audit and enhance your insider risk management.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/iso-compliance-solution\" \/>\n<meta property=\"og:site_name\" content=\"Syteca\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-25T18:08:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2024\/01\/Img-ISO.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"17 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/iso-compliance-solution\",\"url\":\"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/iso-compliance-solution\",\"name\":\"ISO 27001 Compliance Software from Syteca\",\"isPartOf\":{\"@id\":\"https:\/\/www.syteca.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/iso-compliance-solution#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/iso-compliance-solution#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.syteca.com\/wp-content\/uploads\/2024\/01\/Img-ISO.png\",\"datePublished\":\"2023-03-29T07:15:34+00:00\",\"dateModified\":\"2025-03-25T18:08:05+00:00\",\"description\":\"Leverage Syteca as an ISO 27001 compliance software solution to pass the ISO\/IEC 27001 certification audit and enhance your insider risk management.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/iso-compliance-solution#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/iso-compliance-solution\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/iso-compliance-solution#primaryimage\",\"url\":\"https:\/\/www.syteca.com\/wp-content\/uploads\/2024\/01\/Img-ISO.png\",\"contentUrl\":\"https:\/\/www.syteca.com\/wp-content\/uploads\/2024\/01\/Img-ISO.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/iso-compliance-solution#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Solutions\",\"item\":\"https:\/\/www.syteca.com\/en\/solutions\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT Compliance Solution\",\"item\":\"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"ISO\/IEC 27001 Compliance Solutions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.syteca.com\/en\/#website\",\"url\":\"https:\/\/www.syteca.com\/en\/\",\"name\":\"Syteca\",\"description\":\"Syteca | software to monitor privileged users and audit employee activity, detect insider threats, and protect servers in real time. Try a free demo now!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.syteca.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ISO 27001 Compliance Software from Syteca","description":"Leverage Syteca as an ISO 27001 compliance software solution to pass the ISO\/IEC 27001 certification audit and enhance your insider risk management.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/iso-compliance-solution","og_locale":"en_US","og_type":"article","og_title":"ISO 27001 Compliance Software from Syteca","og_description":"Leverage Syteca as an ISO 27001 compliance software solution to pass the ISO\/IEC 27001 certification audit and enhance your insider risk management.","og_url":"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/iso-compliance-solution","og_site_name":"Syteca","article_modified_time":"2025-03-25T18:08:05+00:00","og_image":[{"url":"https:\/\/www.syteca.com\/wp-content\/uploads\/2024\/01\/Img-ISO.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"17 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/iso-compliance-solution","url":"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/iso-compliance-solution","name":"ISO 27001 Compliance Software from Syteca","isPartOf":{"@id":"https:\/\/www.syteca.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/iso-compliance-solution#primaryimage"},"image":{"@id":"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/iso-compliance-solution#primaryimage"},"thumbnailUrl":"https:\/\/www.syteca.com\/wp-content\/uploads\/2024\/01\/Img-ISO.png","datePublished":"2023-03-29T07:15:34+00:00","dateModified":"2025-03-25T18:08:05+00:00","description":"Leverage Syteca as an ISO 27001 compliance software solution to pass the ISO\/IEC 27001 certification audit and enhance your insider risk management.","breadcrumb":{"@id":"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/iso-compliance-solution#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/iso-compliance-solution"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/iso-compliance-solution#primaryimage","url":"https:\/\/www.syteca.com\/wp-content\/uploads\/2024\/01\/Img-ISO.png","contentUrl":"https:\/\/www.syteca.com\/wp-content\/uploads\/2024\/01\/Img-ISO.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/iso-compliance-solution#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Solutions","item":"https:\/\/www.syteca.com\/en\/solutions"},{"@type":"ListItem","position":2,"name":"IT Compliance Solution","item":"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements"},{"@type":"ListItem","position":3,"name":"ISO\/IEC 27001 Compliance Solutions"}]},{"@type":"WebSite","@id":"https:\/\/www.syteca.com\/en\/#website","url":"https:\/\/www.syteca.com\/en\/","name":"Syteca","description":"Syteca | software to monitor privileged users and audit employee activity, detect insider threats, and protect servers in real time. Try a free demo now!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.syteca.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/pages\/12537","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/comments?post=12537"}],"version-history":[{"count":0,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/pages\/12537\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/pages\/12284"}],"wp:attachment":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/media?parent=12537"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}