COBIT

COBIT

Compliance standard for information security.

Total Requirements
7
defined requirements
Mapped Controls
0
control mappings
Overall Compliance
0%
0/0 controls compliant
Related Risks
0
0 critical · 0 high

Requirements Coverage

DSS05.04 Manage User Identity and Logical Access
Not mapped
Gestão do ciclo de vida de identidades, concessão/modificação/revogação de acessos, princípio do menor privilégio
No controls mapped to this requirement
DSS06.03 Manage Roles, Responsibilities and Access Privileges
Not mapped
Definição de roles, processos de autorização, segregação de funções
No controls mapped to this requirement
DSS05.01 Protect Against Malware
Not mapped
Proteção contra malware em endpoints e sistemas de identidade
No controls mapped to this requirement
DSS05.05 Manage Physical Access
Not mapped
Controles de acesso físico: crachás, biometria, monitoramento
No controls mapped to this requirement
DSS05.07 Monitor Infrastructure for Security Events
Not mapped
Monitoramento de eventos de segurança e detecção de intrusão
No controls mapped to this requirement
APO13 Manage Security
Not mapped
Sistema de gestão de segurança da informação (ISMS)
No controls mapped to this requirement
MEA03 Monitor and Assess Compliance
Not mapped
Monitoramento de conformidade para políticas IAM
No controls mapped to this requirement

Educational Content

Standard Overview

Compliance standard for information security.

How Compliance is Calculated

Compliance is calculated based on the maturity level of each control mapped to this standard. Controls with maturity level 3 or above are considered compliant. The overall compliance percentage represents the ratio of compliant controls to total mapped controls.

  • Compliant: Maturity level 3 or above
  • Partial: Maturity level 1-2
  • Non-compliant: Maturity level 0 (not implemented)
Best Practices for Implementation
  1. Conduct a gap analysis to identify areas needing improvement
  2. Prioritize controls based on risk assessment results
  3. Establish clear ownership and accountability for each control
  4. Implement continuous monitoring and regular reviews
  5. Document evidence of compliance for audit readiness
  6. Train staff on security awareness and standard requirements