The Alyne Library includes more than 960 defined Control Statements. Since technology is constantly evolving and we are as well constantly reflecting best practices, Alyne updated 27 existing Control Statements. The update has been provided, as with all previous library updates, to existing and new Alyne customers alike.
This update will not have any influence on already performed Assessments. Newly created Assessments will include the updated version of the 27 existing Control Statements. No action is required and all existing and new Alyne customers will benefit from this update.
The following 27 Control Statements have been updated:
Topic |
Subtopic |
Title |
||
Business Continuity Management | Testing & Training | Desktop Exercises | ||
Business Continuity Management | Testing & Training | Limited Exercises | ||
Business Continuity Management | Testing & Training | Full Scale Exercises | ||
Cryptography | General Principles | Redundant Storage | ||
Data Protection and Privacy | Data Breaches | Definition of Data Breaches | ||
Data Protection and Privacy | Data Breaches | Serious Data Breaches | ||
Data Protection and Privacy | Data Breaches | Breach Sources | ||
Identity and Access Management | Authentication | Authentication Requirements | ||
Identity and Access Management | Authentication | Multi Factor Authentication | ||
Identity and Access Management | Role Management | Role Ownership | ||
Identity and Access Management | User Access Review | Regular Reviews | ||
Network Management | General Principles | Intrusion Detection | ||
Network Management | General Principles | Blacklisting | ||
Network Management | General Principles | Logical Segregation | ||
Network Management | General Principles | Rule Reviews | ||
Operations and Organisation | Policy Management | Review and Control Statements | ||
Physical Security | IT Protection | IT Asset Protection | ||
Security Management | Roles and Responsibilities | Security Awareness and Culture | ||
Security Monitoring | Configuration Management | Scope | ||
Security Monitoring | Logging | SIEM Integration | ||
Security Monitoring | Security Information and Event Management | SIEM Solution | ||
Security Monitoring | Security Information and Event Management | Incident Response | ||
Security Monitoring | Vulnerability Management | Penetration Testing | ||
Security Monitoring | Denial of Service Attacks | Detection Capability | ||
Security Monitoring | Denial of Service Attacks | Internet Service Providers | ||
Workstations and Servers | Hardening | Firewalls | ||
Workstations and Servers | Network Security | Network Authentication |
Contact our sales team at support@alyne.com to learn how Alyne can help your organisation and how you can experience Alyne’s capabilities in a Proof of Concept.