GARTNER-MM
GARTNER-MM
Compliance standard for information security.
Total Requirements
9
defined requirements
Mapped Controls
0
control mappings
Overall Compliance
0%
0/0 controls compliant
Related Risks
0
0 critical · 0 high
Requirements Coverage
IAM Maturity
IGA Maturity Assessment
Not mapped
Avaliação dos estágios de maturidade do programa IGA
No controls mapped to this requirement
IAM Automation
IGA Automation Maturity
Not mapped
Nível de automação dos processos IGA
No controls mapped to this requirement
IAM Metrics
IGA Metrics & KPIs
Not mapped
Métricas e indicadores de desempenho do programa IGA
No controls mapped to this requirement
IAM Operations
IGA Operations
Not mapped
Operações e processos do programa IGA
No controls mapped to this requirement
IAM KPIs
IGA Key Performance Indicators
Not mapped
Indicadores-chave de desempenho para governança de identidades
No controls mapped to this requirement
RBAC Maturity
RBAC Maturity Model
Not mapped
Modelo de maturidade para implementação RBAC
No controls mapped to this requirement
RBAC Governance
RBAC Governance Framework
Not mapped
Framework de governança para roles e perfis de acesso
No controls mapped to this requirement
IGA Lifecycle
Identity Lifecycle Management
Not mapped
Gestão do ciclo de vida de identidades end-to-end
No controls mapped to this requirement
IGA Governance
IGA Governance Framework
Not mapped
Framework de governança para o programa IGA
No controls mapped to this requirement
Educational Content
Standard Overview
Compliance standard for information security.
How Compliance is Calculated
Compliance is calculated based on the maturity level of each control mapped to this standard. Controls with maturity level 3 or above are considered compliant. The overall compliance percentage represents the ratio of compliant controls to total mapped controls.
- Compliant: Maturity level 3 or above
- Partial: Maturity level 1-2
- Non-compliant: Maturity level 0 (not implemented)
Best Practices for Implementation
- Conduct a gap analysis to identify areas needing improvement
- Prioritize controls based on risk assessment results
- Establish clear ownership and accountability for each control
- Implement continuous monitoring and regular reviews
- Document evidence of compliance for audit readiness
- Train staff on security awareness and standard requirements