GARTNER-PG

GARTNER-PG

Compliance standard for information security.

Total Requirements
48
defined requirements
Mapped Controls
0
control mappings
Overall Compliance
0%
0/0 controls compliant
Related Risks
0
0 critical · 0 high

Requirements Coverage

HCM/IAM Integration HR-IAM Integration
Not mapped
Integração entre sistemas de RH (HCM) e IAM para automação de provisioning
No controls mapped to this requirement
Provisioning Automation Automated Provisioning
Not mapped
Automação do provisionamento de acessos
No controls mapped to this requirement
Provisioning Integration Provisioning System Integration
Not mapped
Integração de sistemas de provisionamento
No controls mapped to this requirement
License Automation License Lifecycle Automation
Not mapped
Automação do ciclo de vida de licenças
No controls mapped to this requirement
License Governance Software License Governance
Not mapped
Governança e otimização de licenças de software
No controls mapped to this requirement
Workflow Automation Workflow Automation
Not mapped
Automação de workflows de aprovação e provisionamento
No controls mapped to this requirement
IGA Tools IGA Tooling Selection
Not mapped
Seleção e implementação de ferramentas IGA
No controls mapped to this requirement
IGA Integration IGA Platform Integration
Not mapped
Integração da plataforma IGA com ecossistema de TI
No controls mapped to this requirement
IGA Workflow IGA Workflow Design
Not mapped
Design de workflows IGA para solicitação e aprovação
No controls mapped to this requirement
IGA Features IGA Feature Maturity
Not mapped
Maturidade das funcionalidades IGA implementadas
No controls mapped to this requirement
Onboarding Governance Onboarding Process Governance
Not mapped
Governança do processo de onboarding
No controls mapped to this requirement
Offboarding Governance Offboarding Process Governance
Not mapped
Governança do processo de offboarding
No controls mapped to this requirement
HR Governance HR Process Governance
Not mapped
Governança dos processos de RH integrados com IAM
No controls mapped to this requirement
HR Source of Truth HR as Source of Truth
Not mapped
RH como fonte autoritativa de identidades
No controls mapped to this requirement
HR-Driven IAM HR-Driven IAM Processes
Not mapped
Processos IAM dirigidos por eventos de RH
No controls mapped to this requirement
Supplier Governance Supplier Access Governance
Not mapped
Governança de acessos de fornecedores
No controls mapped to this requirement
Supplier Identity Supplier Identity Management
Not mapped
Gestão de identidades de fornecedores
No controls mapped to this requirement
Supplier Lifecycle Supplier Lifecycle Management
Not mapped
Gestão do ciclo de vida de fornecedores
No controls mapped to this requirement
Security Automation Security Process Automation
Not mapped
Automação de processos de segurança
No controls mapped to this requirement
Access Catalog Access Catalog Management
Not mapped
Gestão do catálogo de acessos disponíveis
No controls mapped to this requirement
Access Review Access Review Strategy
Not mapped
Estratégia de revisão de acessos
No controls mapped to this requirement
Access Review Campaigns Access Review Campaigns
Not mapped
Campanhas de revisão e recertificação de acessos
No controls mapped to this requirement
Application Ownership Application Ownership Model
Not mapped
Modelo de ownership de aplicações e dados
No controls mapped to this requirement
Automation Maturity Automation Maturity Assessment
Not mapped
Avaliação da maturidade de automação
No controls mapped to this requirement
Control Standards Control Standards Definition
Not mapped
Definição de padrões de controle
No controls mapped to this requirement
Data Model Identity Data Model
Not mapped
Modelo de dados de identidade
No controls mapped to this requirement
Data Quality Identity Data Quality
Not mapped
Qualidade dos dados de identidade
No controls mapped to this requirement
Exception Governance Exception Governance
Not mapped
Governança de exceções nos processos IAM
No controls mapped to this requirement
IAM UX IAM User Experience
Not mapped
Experiência do usuário nos processos IAM
No controls mapped to this requirement
IGA Data Model IGA Data Model Design
Not mapped
Design do modelo de dados IGA
No controls mapped to this requirement
IGA Efficiency IGA Operational Efficiency
Not mapped
Eficiência operacional dos processos IGA
No controls mapped to this requirement
IGA Identity Repository Identity Repository Management
Not mapped
Gestão do repositório de identidades
No controls mapped to this requirement
IGA Operations IGA Day-to-Day Operations
Not mapped
Operações diárias do IGA
No controls mapped to this requirement
IGA Remediation IGA Remediation Processes
Not mapped
Processos de remediação IGA
No controls mapped to this requirement
Identity Data Integration Identity Data Integration
Not mapped
Integração de dados de identidade entre sistemas
No controls mapped to this requirement
Identity Data Model Enterprise Identity Data Model
Not mapped
Modelo de dados de identidade corporativo
No controls mapped to this requirement
Identity Source of Truth Identity Source of Truth
Not mapped
Fonte autoritativa de identidades
No controls mapped to this requirement
PAM Governance Privileged Access Governance
Not mapped
Governança de acessos privilegiados
No controls mapped to this requirement
Passwordless Maturity Passwordless Authentication Maturity
Not mapped
Maturidade da autenticação sem senha
No controls mapped to this requirement
Policy Automation Policy Automation
Not mapped
Automação de políticas de acesso
No controls mapped to this requirement
Privileged Governance Privileged Access Governance
Not mapped
Governança de contas e acessos privilegiados
No controls mapped to this requirement
Process Governance IAM Process Governance
Not mapped
Governança dos processos IAM
No controls mapped to this requirement
RBAC RBAC Implementation Guidance
Not mapped
Orientação para implementação RBAC
No controls mapped to this requirement
RBAC Modeling Role Modeling Methodology
Not mapped
Metodologia de modelagem de roles
No controls mapped to this requirement
Role Governance Role Governance Framework
Not mapped
Framework de governança de roles
No controls mapped to this requirement
Role Lifecycle Role Lifecycle Management
Not mapped
Gestão do ciclo de vida de roles
No controls mapped to this requirement
Role Mining Role Mining Approach
Not mapped
Abordagem de role mining para descoberta de roles
No controls mapped to this requirement
Source of Truth Authoritative Data Source
Not mapped
Fonte autoritativa de dados de identidade
No controls mapped to this requirement

Educational Content

Standard Overview

Compliance standard for information security.

How Compliance is Calculated

Compliance is calculated based on the maturity level of each control mapped to this standard. Controls with maturity level 3 or above are considered compliant. The overall compliance percentage represents the ratio of compliant controls to total mapped controls.

  • Compliant: Maturity level 3 or above
  • Partial: Maturity level 1-2
  • Non-compliant: Maturity level 0 (not implemented)
Best Practices for Implementation
  1. Conduct a gap analysis to identify areas needing improvement
  2. Prioritize controls based on risk assessment results
  3. Establish clear ownership and accountability for each control
  4. Implement continuous monitoring and regular reviews
  5. Document evidence of compliance for audit readiness
  6. Train staff on security awareness and standard requirements