atrc_website:security_compliance_services
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionLast revisionBoth sides next revision | ||
atrc_website:security_compliance_services [2023/01/20 18:05] – wikiadmin | atrc_website:security_compliance_services [2023/09/21 11:07] – wikiadmin | ||
---|---|---|---|
Line 3: | Line 3: | ||
**Review, Consultancy and Compliance services for the following standards.** | **Review, Consultancy and Compliance services for the following standards.** | ||
+ | |||
+ | Compliance to : PCI DSS | ||
+ | |||
+ | Compliance to : UL 2900 | ||
Compliance to : NIST | Compliance to : NIST | ||
Line 9: | Line 13: | ||
Compliance to : ISO 17799 | Compliance to : ISO 17799 | ||
+ | |||
+ | Compliance to : FIPS 140 | ||
Compliance to : ISO 27002 | Compliance to : ISO 27002 | ||
Line 15: | Line 21: | ||
ISO/IEC 15408 Common Criteria | ISO/IEC 15408 Common Criteria | ||
+ | |||
+ | Compliance to : BSI Standard 100-4 covers Business Continuity Management (BCM). | ||
+ | |||
+ | Compliance to : {{ : | ||
+ | |||
+ | Compliance to : {{ : | ||
+ | |||
+ | Compliance to : {{ : | ||
IEC 62443 : This cybersecurity standard defines processes, techniques and requirements for Industrial Automation and Control Systems (IACS) | IEC 62443 : This cybersecurity standard defines processes, techniques and requirements for Industrial Automation and Control Systems (IACS) | ||
Line 29: | Line 43: | ||
Compliance to : NERC. The most common is NERC 1300, which is a modification/ | Compliance to : NERC. The most common is NERC 1300, which is a modification/ | ||
+ | |||
+ | **Compliance to national standards :** | ||
+ | |||
+ | Malaysia | ||
+ | |||
+ | [[countries: | ||
+ | |||
+ | |||
+ | Singapore | ||
+ | |||
+ | [[countries: | ||
+ | |||
+ | Australia | ||
+ | |||
+ | Essential Eight | ||
+ | |||
+ | The Australian Cyber Security Centre has developed prioritised mitigation strategies, in the form of the Strategies to Mitigate Cyber Security Incidents, to help organisations protect themselves against various cyber threats. The most effective of these mitigation strategies are called the Essential Eight. | ||
+ | |||
+ | Germany | ||
+ | |||
+ | The Federal Office for Information Security (German: Bundesamt für Sicherheit in der Informationstechnik, | ||
+ | |||
+ | |||
+ | |||
+ | |||
+ | |||
+ | |||
+ | United Kingdom | ||
+ | |||
+ | UK Cyber Essentials | ||
+ | |||
+ | Cyber Essentials is a United Kingdom government information assurance scheme that is operated by the National Cyber Security Centre (NCSC). It encourages organizations to adopt good practice in information security. Cyber Essentials also includes an assurance framework and a simple set of security controls to protect information from threats coming from the internet. | ||
Certifications of our consultants : | Certifications of our consultants : |
atrc_website/security_compliance_services.txt · Last modified: 2023/09/21 11:09 by wikiadmin