Major Non-Conformity

Minor Non-Conformity

Conform

Major Non-Compliance

Minor Non-Compliance

Comply

BASIC

1. Inventory and Control of Hardware Assets

FOUNDATIONAL

7. Email and Web Browser Protections

12. Boundary Defence

ORGANISATIONAL

17. Implement a Security Awareness and Training Program

2. Inventory and Control of Software Assets

8. Malware Defences

13. Data Protection

18. Application Software Security

3. Continuous Vulnerability Management

9. Limitation and Control of Network Ports, Protocols and Services

14. Controlled Access Based on the Need to Know

19. Incident Response and Management

4. Controlled Use of Administrative Privileges

10. Data Recovery Capabilities

15. Wireless Access Control

20. Penetration Tests and Red Team Exercises

5. Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations and Servers

11. Secure Configuration for Network Devices, such as Firewalls, Routers and Switches

16. Account Monitoring and Control

6. Maintenance, Monitoring and Analysis of Audit Logs

FORTE CYBER RESILIENCE

 

One assessment multiple outcomes

 

ISO 27001 Audit | CPS 234 | Essential 8

Safeguard your business with

Automated, Compliant, and Pro-active

Cyber Security.

Secure Forte

Advancement Through Cyber Resilience

ABOUT

The Zenith, 821 Pacific Highway,
Chatswood, NSW 2067

Tel: 02 83110854

info@secureforte.com.au

LINKS
  • LinkedIn

© 2020 Secure Forte Pty Ltd. All rights reserved.