Key Points
Embarking on your cybersecurity compliance journey can be complex, but Intruder is here to help simplify the process. In this blog, we share the key compliance frameworks Intruder supports and highlight the specific criteria it can help you meet, including:
- SOC 2
- ISO 27001
- HIPAA
- Cyber Essentials
- GDPR
SOC 2
CC3.2
Requirements from the official guidelines | How Intruder can help |
---|---|
|
|
CC7.1
Requirements from the official guidelines | How Intruder can help |
---|---|
“To meet its objectives, the entity uses detection and monitoring procedures to identify (1) changes to configurations that result in the introduction of new vulnerabilities, and (2) susceptibilities to newly discovered vulnerabilities
|
Easily conduct vulnerability scans on an event-driven (triggered by a change in your attack surface), scheduled, or ad hoc basis to identify vulnerabilities and misconfigurations in infrastructure, web applications, and APIs. |
CC7.4
Requirements from the official guidelines | How Intruder can help |
---|---|
“The entity responds to identified security incidents by executing a defined incident-response program to understand, contain, remediate, and communicate security incidents, as appropriate.
|
Receive remediation advice and recommendations for how to fix identified vulnerabilities. |
ISO 27001
A 8.8
Requirements from the official guidelines | How Intruder can help |
---|---|
“Management of Technical Vulnerabilities: Information about technical vulnerabilities of information systems in use should be obtained, the organisations exposure to such vulnerabilities should be evaluated and appropriate measures should be taken.” |
|
A 8.25
Requirements from the official guidelines | How Intruder can help |
---|---|
“Secure Development Life Cycle: Rules for the secure development of software and systems should be established and applied.” |
|
A 8.28
Requirements from the official guidelines | How Intruder can help |
---|---|
“Secure Coding: Secure coding principles should be applied to software development.” |
Intruder is a dynamic application security testing (DAST) tool that finds vulnerabilities in web applications and APIs. Integrate Intruder with your CI/CD pipeline for security while you build. |
A 8.29
Requirements from the official guidelines | How Intruder can help |
---|---|
“Security Testing in Development and Acceptance: Security testing processes should be defined and implemented in the development life cycle.” |
Intruder is a dynamic application security testing (DAST) tool that finds vulnerabilities in web applications and APIs. Integrate Intruder with your CI/CD pipeline for security while you build. |
HIPAA
164.308(a)(1)(i)
Requirements from the official guidelines | How Intruder can help |
---|---|
“Standard: Security management process. Implement policies and procedures to prevent, detect, contain, and correct security violations.” |
Run vulnerability scans to detect vulnerabilities in software used to handle, store, and transmit health data. |
164.308(a)(1)(ii)(A)
Requirements from the official guidelines | How Intruder can help |
---|---|
“Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic protected health information held by the covered entity or business associate.” |
|
164.308(a)(1)(ii)(B)
Requirements from the official guidelines | How Intruder can help |
---|---|
“Implement security measures sufficient to reduce risks and vulnerabilities to a reasonable and appropriate level to comply with Section 164.306(a).” |
|
164.308(a)(8)
Requirements from the official guidelines | How Intruder can help |
---|---|
“Perform a periodic technical and nontechnical evaluation, based initially upon the standards implemented under this rule and subsequently, in response to environmental or operational changes affecting the security of electronic protected health information, that establishes the extent to which a covered entity’s or business associate’s security policies and procedures meet the requirements of this subpart.” |
|
Cyber Essentials
Firewalls
Requirements from the official guidelines | How Intruder can help |
---|---|
“Aim: To make sure that only secure and necessary network services can be accessed from the internet.” |
|
Security Configuration
Requirements from the official guidelines | How Intruder can help |
---|---|
“Aim: Ensure that computers and network devices are properly configured to:
|
|
Security Update Management
Requirements from the official guidelines | How Intruder can help |
---|---|
“Aim: Ensure that devices and software are not vulnerable to known security issues for which fixes are available.” |
|
GDPR
Section 2 Article 32 Paragraph 1
Requirements from the official guidelines | How Intruder can help |
---|---|
“1. Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, the controller and the processor shall implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk, including inter alia as appropriate: (a) the pseudonymisation and encryption of personal data; (b) the ability to ensure the ongoing confidentiality, integrity, availability and resilience of processing systems and services; (c) the ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident; (d) a process for regularly testing, assessing and evaluating the effectiveness of technical and organisational measures for ensuring the security of the processing.” |
|
Streamline your security compliance process with Intruder
Intruder's high quality reports can be used to support audits. We also integrate with Drata and Vanta, so you can share evidence in just one click.
Get started with a 14 day free trial or chat with us to find out more.
Get our free
Ultimate Guide to Vulnerability Scanning
Learn everything you need to get started with vulnerability scanning and how to get the most out of your chosen product with our free PDF guide.
Andy has a long career in cyber security including a decade in threat simulation and consulting. Career highlights include being the Assurance Regional Lead at one of the UK's leading cyber security consultancies and helping critical national infrastructure providers stay secure. Most recently, Andy was the EU Red Team Operations Lead at Mandiant, building out and leading the security team to deliver high quality intelligence-led threat simulations.