GARTNER-MM

GARTNER-MM

Compliance standard for information security.

Total Requirements
9
defined requirements
Mapped Controls
0
control mappings
Overall Compliance
0%
0/0 controls compliant
Related Risks
0
0 critical · 0 high

Requirements Coverage

IAM Maturity IGA Maturity Assessment
Not mapped
Avaliação dos estágios de maturidade do programa IGA
No controls mapped to this requirement
IAM Automation IGA Automation Maturity
Not mapped
Nível de automação dos processos IGA
No controls mapped to this requirement
IAM Metrics IGA Metrics & KPIs
Not mapped
Métricas e indicadores de desempenho do programa IGA
No controls mapped to this requirement
IAM Operations IGA Operations
Not mapped
Operações e processos do programa IGA
No controls mapped to this requirement
IAM KPIs IGA Key Performance Indicators
Not mapped
Indicadores-chave de desempenho para governança de identidades
No controls mapped to this requirement
RBAC Maturity RBAC Maturity Model
Not mapped
Modelo de maturidade para implementação RBAC
No controls mapped to this requirement
RBAC Governance RBAC Governance Framework
Not mapped
Framework de governança para roles e perfis de acesso
No controls mapped to this requirement
IGA Lifecycle Identity Lifecycle Management
Not mapped
Gestão do ciclo de vida de identidades end-to-end
No controls mapped to this requirement
IGA Governance IGA Governance Framework
Not mapped
Framework de governança para o programa IGA
No controls mapped to this requirement

Educational Content

Standard Overview

Compliance standard for information security.

How Compliance is Calculated

Compliance is calculated based on the maturity level of each control mapped to this standard. Controls with maturity level 3 or above are considered compliant. The overall compliance percentage represents the ratio of compliant controls to total mapped controls.

  • Compliant: Maturity level 3 or above
  • Partial: Maturity level 1-2
  • Non-compliant: Maturity level 0 (not implemented)
Best Practices for Implementation
  1. Conduct a gap analysis to identify areas needing improvement
  2. Prioritize controls based on risk assessment results
  3. Establish clear ownership and accountability for each control
  4. Implement continuous monitoring and regular reviews
  5. Document evidence of compliance for audit readiness
  6. Train staff on security awareness and standard requirements