ITIL4

ITIL4

Compliance standard for information security.

Total Requirements
6
defined requirements
Mapped Controls
0
control mappings
Overall Compliance
0%
0/0 controls compliant
Related Risks
0
0 critical · 0 high

Requirements Coverage

SRM Service Request Management
Not mapped
Gestão de solicitações de serviço: submissão, categorização, aprovação, atendimento, verificação
No controls mapped to this requirement
AM Access Management
Not mapped
Gestão de acessos: verificação de identidade, concessão/modificação/revogação de direitos
No controls mapped to this requirement
ISM Information Security Management
Not mapped
Definição de políticas de acesso, controles de segurança e frameworks de autorização
No controls mapped to this requirement
SCM Service Catalog Management
Not mapped
Catálogo de opções de solicitação de acesso com descrições e tempos de atendimento
No controls mapped to this requirement
CE Change Enablement
Not mapped
Gestão de mudanças complexas de acesso que requerem avaliação de risco
No controls mapped to this requirement
IM Incident Management
Not mapped
Resolução de interrupções de acesso (contas bloqueadas, falhas de autenticação)
No controls mapped to this requirement

Educational Content

Standard Overview

Compliance standard for information security.

How Compliance is Calculated

Compliance is calculated based on the maturity level of each control mapped to this standard. Controls with maturity level 3 or above are considered compliant. The overall compliance percentage represents the ratio of compliant controls to total mapped controls.

  • Compliant: Maturity level 3 or above
  • Partial: Maturity level 1-2
  • Non-compliant: Maturity level 0 (not implemented)
Best Practices for Implementation
  1. Conduct a gap analysis to identify areas needing improvement
  2. Prioritize controls based on risk assessment results
  3. Establish clear ownership and accountability for each control
  4. Implement continuous monitoring and regular reviews
  5. Document evidence of compliance for audit readiness
  6. Train staff on security awareness and standard requirements