ISO27001 Compliance With Netwrix
ISO27001 Compliance With Netwrix
ISO/IEC 27001:2005 was the first edition of the standard. This edition was technically revised in 2013 and replaced by the
current version of the standard, ISO/IEC 27001:2013.
ISO/IEC 27001:2013 has 14 security control sections collectively containing a total of 35 main security categories and 114
controls.
2
Mapping of the provisions of the ISO/IEC 27001 information
security controls to Control Processes
The following table lists some of the key controls of the ISO/IEC 27001 and explains how Netwrix Auditor can help your
organization implement those controls and achieve compliance with ISO/IEC 27001. Please note that the efforts and
procedures required to comply with ISO/IEC 27001 requirements may vary depending on an organization’s systems
configuration, internal procedures, nature of business and other factors. Implementation of the procedures described
below will not guarantee ISO/IEC 27001 compliance, and not all the controls that Netwrix Auditor can possibly support are
included. This mapping should be used as a reference guide to help you implement policies and procedures tailored to your
organization’s unique situation and needs.
3
A.9.2.1 User registration and de-registration Identification and Authentication
A formal user registration and de-registration process User Identification
shall be implemented to enable assignment of access Identifier Management
rights. Authenticator Management
Access Control
Account Management Audit
Account Usage Monitoring
4
A.9.4.3 Password management system Identification and Authentication
Password management systems shall be interactive Authenticator Management
and shall ensure quality passwords. Access Control
Account Usage Monitoring
5
A.13 Communications security
6
A.16.1.5 Response to information security Incident Response
incidents Incident Analysis
Information security incidents shall be responded to Incident Mitigation
in accordance with the documented procedures.
A.18 Compliance
7
Control Processes
Control Processes Facilitated by Netwrix Auditor
From the compliance perspective, IT operations can be viewed and managed as a collection of control processes. Such
processes allow focusing organizational efforts on a specific area of IT, enforcing certain policies, and establishing particular
set of compliance controls. While control processes can be seen as separate entities for the purposes of implementation
and management simplicity, in fact all these processes are deeply interconnected and often intrinsic to many regulations
and best practices frameworks.
User Identification
Audit the identification and authentication processes for users who access your information systems.
Cross-reference HR data with Active Directory user Active Directory State-in-Time reports
accounts in order to: User Accounts
Ensure that each user with a business need to
access your information systems has a unique
account.
Identify personal accounts that cannot be traced
to a particular individual.
Review audit trails to check whether the use of shared User Behavior and Blind Spot Analysis reports
accounts complies with your policies. Logons by Single User from Multiple
Endpoints
Interactive Search
Who = shared account
8
Correlate employee absence data (typically from HR) with Active Directory – Logon Activity reports
the access audit trail to spot suspicious activity. All Logon Activity
Interactive Search
Action = Interactive Logon
Device Identification
Audit the identification and authentication processes for devices used to access your information systems.
Crosscheck the IT inventory against the list of computer Active Directory — State-in-Time reports
accounts in Active Directory. Computer Accounts
Review all computer domain joins and all account Active Directory Changes reports
creations, modifications and deletions to spot any Computer Account Changes
unauthorized changes to computer accounts. Interactive Search
Object Type = Computer
Audit remote network connections to identify Netwrix Auditor Add-on for RADIUS Server
unauthorized remote devices. Active Directory - Logon Activity reports
Identifier Management
Audit provisioning, modification and de-provisioning of users and groups.
Review the creation, modification and deletion of users Active Directory Changes reports
and groups to spot: User Account Changes
Unauthorized changes Active Directory Changes reports
Identifiers that do not comply with the your Security Group Changes
naming standards and policies (e.g., no public, Interactive Search
generic or reused identifiers) Object Type = Group | User
Configure alerts to notify designated personnel about Custom alerts for user account modifications
unauthorized account changes.
9
Authenticator Management
Review changes to password policy requirements, and audit user and admin activity for policy compliance.
Audit changes to account policy settings to spot Active Directory – Group Policy Changes reports
inappropriate or unauthorized modifications. Settings to Account Policy Changes
check include: Password Policy Changes
Account lockout threshold, duration and status GPO Link Changes
reset Active Directory Group Policy State-in-Time reports
Max/min password age Account Policies
Enforce password history
Enforce strong passwords
Irreversible password encryption
Correlate new user account creation with account Active Directory Changes reports
password resets to ensure that users change their initial User Account Changes (added)
password on first logon. User Password Changes
Interactive Search
Details Contains ‘Password Reset’
Ensure that accounts with credentials reported lost or Active Directory Changes reports
compromised are promptly reset or disabled according to User Account Status Changes
policy. Password Resets by Administrator
10
Access Control
The goal of access control measures is to ensure that information system accounts are properly managed and that access
is granted based on the principle of least privilege. Netwrix Auditor supports access control by enabling full visibility into
account provisioning and deprovisioning, permissions management, and user activity.
Review changes to user accounts on key information Active Directory Changes reports
systems to spot deviations from your account User Account Changes
management policies and procedures. User Account Status Changes
Recently Enabled Accounts
Temporary User Accounts
Azure AD reports
User Account Management in Azure AD
Oracle Database reports
Account Management
Windows Server Changes reports
Local Users and Groups Changes
Review user logons and resource access on a regular basis Activity Summary email notifications
to spot abnormal account use and violations of account use User Behavior and Blind Spot Analysis reports
policy.
Temporary User Accounts
Recently Enabled Accounts
Access to Archive Data
Data Access Surges
Activity Outside Business Hours
Failed Activity Trend
11
Logons by Multiple Users from Single
Endpoint
Logons by Single User from Multiple
Endpoints
Non-owner Mailbox Access
Review user access to sensitive and regulated data to Data Discovery and Classification reports
detect access policy violations Activity Related to Sensitive Files and Folders
Review audit trails to spot use of shared accounts that User Behavior and Blind Spot Analysis reports
violates your policies. Logons by Single User from Multiple
Endpoints
Interactive Search
Who = shared account
Inactive Accounts
Disable unused accounts after a defined period of inactivity.
Identify dormant or orphaned user and computer accounts Inactive User Tracker tool, which can identify unused
and handle them appropriately according to policy. accounts and automatically:
Notify the manager
Disable the account
Change the password
Move the account to a specified OU
Remove the account
Active Directory State-in-Time reports
User Accounts – Last Logon Time
12
Role and Group Assignment
Review group and role assignments to ensure that user accounts meet established membership conditions and the
principle of least privilege.
Ensure that users are added security groups and access Active Directory Changes reports
roles in accordance with the least privilege principle and Security Group Membership Changes
only with proper authorization. Azure AD reports
Group Membership Changes in Azure AD
Active Directory State-in-Time reports
Group Members
Effective Group Membership
Windows Server State-in-Time reports
Local Users and Groups
Monitor privileged group and role assignments to prevent Active Directory Changes reports
unauthorized privilege escalation, and regularly review the Administrative Group Membership Changes
membership of these groups and roles to validate the need User Behavior and Blind Spot Analysis reports
for privileged access. Temporary Users in Privileged Groups
Windows Server Changes reports
Local Users and Groups Changes
Active Directory State-in-Time reports
Administrative Group Members
Windows Server State-in-Time reports
Members of Local Administrators Group
Oracle Database reports
Privilege Management
SQL Server reports
All SQL Server Activity by Object Type (Object
Type = Server Role | Database Role
|Application Role)
Predefined alerts
Group Membership Changes
13
Personnel Status Changes
Ensure proper handling of the accounts and access permissions of temporary, transferred or terminated employees.
Review audit trails to confirm that the user accounts of Active Directory Changes reports
temporary and terminated employees are disabled or User Account Changes
removed in all information systems and applications User Account Status Changes
according to your policy.
Access Enforcement
Ensure user permissions comply with your access control policies.
Review access permissions for sensitive information assets User Behavior and Blind Spot Analysis
on a regular basis to identify and rectify the following: Data Access
Excessive permissions Excessive Permissions
Permissions assigned directly, rather than File Servers State-in-Time reports
through roles and groups Folder and File Permission Details
Broken permission inheritance Folder Permissions
Data Discovery and Classification reports
Sensitive Files and Folders by Owner
Sensitive File and Folder Permissions Details
14
Least Privilege
Maintain user access permissions based on the principle of least privilege.
Regularly review access rights granted to users and roles to User Behavior and Blind Spot Analysis reports
ensure users have only the permissions they need to do Excessive Permissions
their jobs. Active Directory Changes reports
Object Security Changes
Security Group Changes
Active Directory State-in-Time reports
Account Permissions in Active Directory
Object Permissions in Active Directory
Users and Computers - Effective Group
Membership
Group Policy Changes reports
User Rights Assignment Policy Changes
Security Settings Changes
Exchange Server reports
Mailbox Delegation and Permissions Changes
File Servers Activity reports
Permissions Changes
File Servers State-in-Time reports
Account Permissions
Excessive Access Permissions
Folder and File Permission Details
Folder Permissions
Windows Server Changes reports
File Share Changes
15
Remote Access
Monitor remote access connections to ensure they conform to organizational secure access policies.
Review detailed remote access logon events along with AD Interactive Search
logon activity. (Object Type = RADIUS Logon)
Active Directory - Logon Activity reports
Monitor changes to security groups used for remote access Active Directory Changes reports
authorization. Security Group Membership Changes
Interactive Search
Object Type = Group AND What CONTAINS
GroupID
Predefined alerts
Group Membership Changes
Wireless Access
Monitor wireless network connections for conformance with your wireless networking policies.
Monitor wireless connections to your networks. Netwrix Auditor Add-on for Cisco Network Devices
Monitor your wireless networking policies for unauthorized Active Directory – Group Policy Changes reports
or inappropriate changes. Wireless Network Policy Changes
Audit user activity in SharePoint Online, Exchange Online Office 365 Overview Dashboards
and OneDrive for Business in order to discover and prevent SharePoint Online reports
violations of your information handling policies, such as the All SharePoint Online Activity by User
storing of sensitive data outside of your control Content Management
boundaries. Data Access
Sharing and Security Changes
User Behavior and Blind Spot Analysis reports
Information Disclosure
Suspicious Files
16
Audit and Accountability
Audit and accountability measures are intended to maintain a trail of activity in information systems that ensures individuals
can be held accountable for their actions. Netwrix Auditor directly implements many of the audit and accountability
requirements by capturing a complete audit trail and securely storing it for more than 10 years, enabling easy access to
audit information for investigations and compliance reviews, and enabling video recording of user activity in systems that
do not produce audit events.
Collect detailed records (including Who, What, When, A complete audit trail from across all IT systems and
Where and Where details) of events in your information applications
systems and applications. Data-in API, which enables creation of add-ons for
integrating Netwrix Auditor with other systems and
applications
Adjust the data collection settings to ensure the audit trail Review reports and Interactive Search results and
contains all required details. fine-tune monitoring plans as needed
Store your audit data in a way that ensures easy access for AuditArchive™, a two-tiered storage that provides:
incident investigations while meeting long-term retention SQL Server audit database for operational
requirements specified by your policies or regulatory reporting (data is stored for 180 days by
mandates. default)
Separate file-based archive for long-term
storage of audit data (data is stored for 10
years by default)
17
Audit Trail Review
Regularly review audit records for indications of inappropriate or unusual activity and report findings to appropriate
personnel, such as your incident response team or InfoSec group.
Regularly review a consolidated audit trail across your Predefined change and activity reports
critical information systems. Activity Summary email notifications
Interactive Search
Export reports for evidence when reporting inappropriate Export of reports to a variety of formats, including
or unusual activity to responsible security staff. PDF and Microsoft Excel
Configure alerts to automatically trigger incidents in your IT Netwrix Auditor Add-On for ServiceNow Incident
service support management (ITSSM) solution. Management (ticket creation)
Add audit records from other key systems and applications Netwrix Auditor Add-On for Cisco Network Devices
to your system-wide, time-correlated audit trail.
Netwrix Auditor Add-On for Linux Systems
Aggregate audit records from multiple information Enterprise Overview Dashboards, Overview
systems. Diagrams, Organization Level reports, predefined
change and activity reports
Activity Summary email notifications
Generate custom reports on events of interest across all Reports based on Interactive search results
monitored systems.
18
Protection of Audit Information
Protect audit information and audit tools from unauthorized access, modification and deletion.
Protect audit information by storing it in a physically AuditArchive™, a two-tiered storage that provides:
separate repository. SQL Server audit database for operational
reporting
Separate file-based archive for long-term
storage of audit data
Restrict access to audit records and tools by assigning Role delegation for audit configuration and review,
security personnel to operational roles using the least both on the global level and on the individual
privilege principle monitoring plan level
Monitor changes to your audit configuration settings to Group Policy Changes reports
spot modification that could reduce the level of audit, Audit Policy Changes
either intentionally or by accident. Windows Server Changes reports
Audit Log Clearing report
Local Audit Policy Changes report
Session Audit
Capture user activity for audit purposes.
Record user activity in mission-critical systems. Windows Server User Activity reports
User activity video recording (available even
for systems and applications that do not
produce logs)
Monitor the status of audit data collection across Health Status dashboard
managed systems and audit storage capacity on a regular
basis Health Summary report
19
Configuration Management
Configuration management is required to ensure that the configuration of information systems complies with internal
policies and external regulations, and that all changes are both proper and authorized.
Baseline Configuration
Establish and maintain baseline configurations and inventories of organizational information systems.
Review the configuration of your Windows servers and Windows Server State-in-Time reports
identify deviations from the established baseline. Windows Server Inventory
Windows Server Configuration Details
Members of Local Administrators Group
Review changes to the server and network infrastructure Windows Server Changes reports
to ensure that only authorized changes are being Windows Server Changes
implemented in accordance with you change Active Directory – Group Policy Changes
management procedures. VMware reports
All VMware change
SharePoint reports
SharePoint Configuration Changes
Exchange reports
Database Changes
New Exchange Servers
Interactive Search
Source = Windows Server
Source = Policy
Source = Netwrix API
Alert designated security personnel to critical change Custom alerts on specific configuration changes
events to enable timely response.
20
Access Restrictions for Changes
Establish and enforce logical access restrictions associated with changes to the information system.
Ensure that information system configuration is limited to Windows Server State-in-Time reports
authorized users by reviewing privileged security groups Members of Local Administrator Group
and monitoring changes to their membership. Local Users and Groups
Windows Server Changes reports
Local Users and Groups Changes
Predefined alerts
User Added to Windows Server
Administrative Group
User-Installed Software
Control and monitor user-installed software.
Exercise security control over programs and applications Windows Server State-in-Time reports
on your critical Windows Servers by maintaining an Windows Server Configuration Details
inventory of resident software and ensuring that only Installed Software
permitted software is installed.
21
Incident Response
Incident response controls prescribe careful planning of response measures to security incidents on the organizational
level, along with proper training of personnel and regular testing of the plan. The plan should cover incident detection,
analysis, containment and recovery. Netwrix Auditor capabilities relating to incident response revolve around the detection
(including automated response triggering through the ServiceNow integration) and analysis aspects of security incident
handling.
Incident Detection
Detect security incidents in a timely manner.
Regularly review user activity (system logons, resource Behavior Anomalies Discovery
access, configuration changes) across information systems Top users with behavior anomalies
to spot abnormal behavior that could lead to a security Detailed trail of user anomalous behavior
breach. User Behavior and Blind Spot Analysis reports
Temporary User Accounts
Recently Enabled Accounts
Access to Archive Data
Data Access Surges
Activity Outside Business Hours
Failed Activity Trend
Logons by Multiple Users from Single
Endpoint
Data Discovery and Classification reports
Activity Related to Sensitive Files and Folders
22
Incident Analysis
Investigate anomalous activity and events that are detected.
Adjust alerts settings or create new alerts based on Custom alerts based on Interactive Search
findings from the security incident analysis.
Incident Mitigation
Respond quickly to a security incident to mitigate its effects.
Automate the triggering of incident response procedures Netwrix Auditor Add-On for ServiceNow Incident
upon detection of suspicious activity to ensure timely Management
response and remediation.
23
Risk Assessment
Every organization needs to conduct information system risk assessments to understand the likelihood and magnitude of
harm from various threats so they can prioritize them and mitigate risk to an acceptable level. Netwrix Auditor reports on
configuration risk factors common in Microsoft-centric IT infrastructures and estimates their impact in your environment.
Risk Assessment
Regularly assess risks to your information systems and act on the findings.
Review the results of data discovery and classification to Data Discovery and Classification reports
assess the risks posed by sensitive data not being stored Overexposed Files and Folders
and processed according to the established data security Most Accessible Sensitive Files and Folders
policy. Sensitive Files Count by Source
File and Folder Categories by Object
Security Categorization
Conduct the security categorization process for the data hosted by the organization.
Perform automated discovery of relevant types of DDC Collector Console that enables you to adjust
sensitive and regulated data in unstructured data predefined data categorization rules or define new
repositories (file shares) in order to prioritize data rules
protection measures.
24
System and Information Integrity
System and information integrity measures aim to protect information systems and the data they store and process from
being compromised by outsider attackers and malicious insiders. Netwrix Auditor reports and alerts on user behavior
indicative of an attack or unauthorized use of information systems.
Spot and investigate anomalies in user behavior in time to Behavior Anomalies Discovery
block external attackers who have compromised valid List of users with the most behavior
user accounts, as well as trusted insiders who have gone anomalies
rogue. Detailed trail of each user’s anomalous
actions
25
Information Management and Retention
Manage and retain sensitive personal information in accordance with applicable laws, regulations and operational
requirements.
Ensure that personally identifiable and other sensitive Data Discovery and Classification reports
information in the organizational data repositories is Overexposed Files and Folders
appropriately secured, including protection against Most Accessible Sensitive Files and Folders
unauthorized disclosure or accidental loss Sensitive File and Folder Permissions Details
Monitor for personally identifiable and other sensitive Data Discovery and Classification reports
information in the organizational data repositories, which Sensitive Files Count by Source
exceeds its legitimate retention time. File and Folder Categories by Object
Establish processes and procedures to support customers DDC Collector Console that enables you to locate
wishing to exercise their data subject rights: personal data instances
Right of access
Right to rectification
Right to erasure (right to be forgotten)
Right to portability
Data Sanitization
Perform data sanitization on sensitive information outside of authorized storage boundaries.
Monitor file and document repositories for sensitive Data Discovery and Classification reports
information in order to apply appropriate de-identification, Sensitive Files Count by Source
redaction or similar measures to mitigate the risk of File and Folder Categories by Object
unauthorized data access.
26
About Netwrix
Netwrix Corporation is a software company focused exclusively on providing IT security and operations teams with
pervasive visibility into user behavior, system configurations and data sensitivity across hybrid IT infrastructures to protect
data regardless of its location. Over 9,000 organizations worldwide rely on Netwrix to detect and proactively mitigate data
security threats, pass compliance audits with less effort and expense, and increase the productivity of their IT teams.
Founded in 2006, Netwrix has earned more than 140 industry awards and been named to both the Inc. 5000 and Deloitte
Technology Fast 500 lists of the fastest growing companies in the U.S.
Netwrix Auditor is a visibility platform for user behavior analysis and risk mitigation that enables control over changes,
configurations and access in hybrid IT environments to protect data regardless of its location. The platform provides security
intelligence to identify security holes, detect anomalies in user behavior and investigate threat patterns in time to prevent
real damage.
Netwrix Auditor includes applications for Active Directory, Azure AD, Exchange, Office 365, Windows file servers, EMC
storage devices, NetApp filer appliances, SharePoint, Oracle Database, SQL Server, VMware and Windows Server.
Empowered with a RESTful API and user activity video recording, the platform delivers visibility and control across all of your
on-premises or cloud-based IT systems in a unified way.
If you want to evaluate Netwrix Auditor in your environment, choose one of the deployment options below. To see Netwrix
Auditor in action without having to download and install it, visit netwrix.com/testdrive.
Corporate Headquarters:
300 Spectrum Center Drive, Suite 200, Irvine, CA 92618
Phone: 1-949-407-5125 Toll-free: 888-638-9749 EMEA: +44 (0) 203-588-3023 netwrix.com/social
27