GARTNER-PG
GARTNER-PG
Compliance standard for information security.
Total Requirements
48
defined requirements
Mapped Controls
0
control mappings
Overall Compliance
0%
0/0 controls compliant
Related Risks
0
0 critical · 0 high
Requirements Coverage
HCM/IAM Integration
HR-IAM Integration
Not mapped
Integração entre sistemas de RH (HCM) e IAM para automação de provisioning
No controls mapped to this requirement
Provisioning Automation
Automated Provisioning
Not mapped
Automação do provisionamento de acessos
No controls mapped to this requirement
Provisioning Integration
Provisioning System Integration
Not mapped
Integração de sistemas de provisionamento
No controls mapped to this requirement
License Automation
License Lifecycle Automation
Not mapped
Automação do ciclo de vida de licenças
No controls mapped to this requirement
License Governance
Software License Governance
Not mapped
Governança e otimização de licenças de software
No controls mapped to this requirement
Workflow Automation
Workflow Automation
Not mapped
Automação de workflows de aprovação e provisionamento
No controls mapped to this requirement
IGA Tools
IGA Tooling Selection
Not mapped
Seleção e implementação de ferramentas IGA
No controls mapped to this requirement
IGA Integration
IGA Platform Integration
Not mapped
Integração da plataforma IGA com ecossistema de TI
No controls mapped to this requirement
IGA Workflow
IGA Workflow Design
Not mapped
Design de workflows IGA para solicitação e aprovação
No controls mapped to this requirement
IGA Features
IGA Feature Maturity
Not mapped
Maturidade das funcionalidades IGA implementadas
No controls mapped to this requirement
Onboarding Governance
Onboarding Process Governance
Not mapped
Governança do processo de onboarding
No controls mapped to this requirement
Offboarding Governance
Offboarding Process Governance
Not mapped
Governança do processo de offboarding
No controls mapped to this requirement
HR Governance
HR Process Governance
Not mapped
Governança dos processos de RH integrados com IAM
No controls mapped to this requirement
HR Source of Truth
HR as Source of Truth
Not mapped
RH como fonte autoritativa de identidades
No controls mapped to this requirement
HR-Driven IAM
HR-Driven IAM Processes
Not mapped
Processos IAM dirigidos por eventos de RH
No controls mapped to this requirement
Supplier Governance
Supplier Access Governance
Not mapped
Governança de acessos de fornecedores
No controls mapped to this requirement
Supplier Identity
Supplier Identity Management
Not mapped
Gestão de identidades de fornecedores
No controls mapped to this requirement
Supplier Lifecycle
Supplier Lifecycle Management
Not mapped
Gestão do ciclo de vida de fornecedores
No controls mapped to this requirement
Security Automation
Security Process Automation
Not mapped
Automação de processos de segurança
No controls mapped to this requirement
Access Catalog
Access Catalog Management
Not mapped
Gestão do catálogo de acessos disponíveis
No controls mapped to this requirement
Access Review
Access Review Strategy
Not mapped
Estratégia de revisão de acessos
No controls mapped to this requirement
Access Review Campaigns
Access Review Campaigns
Not mapped
Campanhas de revisão e recertificação de acessos
No controls mapped to this requirement
Application Ownership
Application Ownership Model
Not mapped
Modelo de ownership de aplicações e dados
No controls mapped to this requirement
Automation Maturity
Automation Maturity Assessment
Not mapped
Avaliação da maturidade de automação
No controls mapped to this requirement
Control Standards
Control Standards Definition
Not mapped
Definição de padrões de controle
No controls mapped to this requirement
Data Model
Identity Data Model
Not mapped
Modelo de dados de identidade
No controls mapped to this requirement
Data Quality
Identity Data Quality
Not mapped
Qualidade dos dados de identidade
No controls mapped to this requirement
Exception Governance
Exception Governance
Not mapped
Governança de exceções nos processos IAM
No controls mapped to this requirement
IAM UX
IAM User Experience
Not mapped
Experiência do usuário nos processos IAM
No controls mapped to this requirement
IGA Data Model
IGA Data Model Design
Not mapped
Design do modelo de dados IGA
No controls mapped to this requirement
IGA Efficiency
IGA Operational Efficiency
Not mapped
Eficiência operacional dos processos IGA
No controls mapped to this requirement
IGA Identity Repository
Identity Repository Management
Not mapped
Gestão do repositório de identidades
No controls mapped to this requirement
IGA Operations
IGA Day-to-Day Operations
Not mapped
Operações diárias do IGA
No controls mapped to this requirement
IGA Remediation
IGA Remediation Processes
Not mapped
Processos de remediação IGA
No controls mapped to this requirement
Identity Data Integration
Identity Data Integration
Not mapped
Integração de dados de identidade entre sistemas
No controls mapped to this requirement
Identity Data Model
Enterprise Identity Data Model
Not mapped
Modelo de dados de identidade corporativo
No controls mapped to this requirement
Identity Source of Truth
Identity Source of Truth
Not mapped
Fonte autoritativa de identidades
No controls mapped to this requirement
PAM Governance
Privileged Access Governance
Not mapped
Governança de acessos privilegiados
No controls mapped to this requirement
Passwordless Maturity
Passwordless Authentication Maturity
Not mapped
Maturidade da autenticação sem senha
No controls mapped to this requirement
Policy Automation
Policy Automation
Not mapped
Automação de políticas de acesso
No controls mapped to this requirement
Privileged Governance
Privileged Access Governance
Not mapped
Governança de contas e acessos privilegiados
No controls mapped to this requirement
Process Governance
IAM Process Governance
Not mapped
Governança dos processos IAM
No controls mapped to this requirement
RBAC
RBAC Implementation Guidance
Not mapped
Orientação para implementação RBAC
No controls mapped to this requirement
RBAC Modeling
Role Modeling Methodology
Not mapped
Metodologia de modelagem de roles
No controls mapped to this requirement
Role Governance
Role Governance Framework
Not mapped
Framework de governança de roles
No controls mapped to this requirement
Role Lifecycle
Role Lifecycle Management
Not mapped
Gestão do ciclo de vida de roles
No controls mapped to this requirement
Role Mining
Role Mining Approach
Not mapped
Abordagem de role mining para descoberta de roles
No controls mapped to this requirement
Source of Truth
Authoritative Data Source
Not mapped
Fonte autoritativa de dados de identidade
No controls mapped to this requirement
Educational Content
Standard Overview
Compliance standard for information security.
How Compliance is Calculated
Compliance is calculated based on the maturity level of each control mapped to this standard. Controls with maturity level 3 or above are considered compliant. The overall compliance percentage represents the ratio of compliant controls to total mapped controls.
- Compliant: Maturity level 3 or above
- Partial: Maturity level 1-2
- Non-compliant: Maturity level 0 (not implemented)
Best Practices for Implementation
- Conduct a gap analysis to identify areas needing improvement
- Prioritize controls based on risk assessment results
- Establish clear ownership and accountability for each control
- Implement continuous monitoring and regular reviews
- Document evidence of compliance for audit readiness
- Train staff on security awareness and standard requirements