IT Controls Reference
SECTION:
4
Plan and Organize:
• PO9 Assess and Manage IT Risks
Assessing Security Risks
Identify, quantify, and prioritize risks against
criteria for risk acceptance relevant to the
organization
Monitor and Evaluate:
• ME3 Ensure Compliance with External
Requirements
• ME4 Provide IT Governance
PCI DSS 1.2
NERC
Standards CIP
PIPEDA — Canada
• 002 – Critical Cyber Asset
Identification
• 4.7.2 – Safeguards will vary depending
on sensitivity of the information collected
Before treating, organization must ascertain
ability and level of risk acceptable to an
organization
• Risk Assessment
• Objective Setting
• Event Identification
Security Standard:
a) 1. Risk Analysis (R)
PCI is an audit standard and risks are quantified and
prioritized within it
III.B. Assess Risk
5
Symantec™ Security Information Manager
Ability to associate risk scores to assets and discriminate threat response activities based on risk rating
Symantec™ Control Compliance Suite
Ability to group, trend and remediate asset vulnerabilities and configurations based on risk categorizations
Maintain an Information Security Policy:
12.1.2 - Includes an annual process that identifies
threats, and vulnerabilities, and results in a formal risk
assessment
Symantec Enterprise Vault™
Monitor, block and review email before it is sent
Symantec Data Loss Prevention - Identify, classify, adn monitor critical information stores across hetergenous
infrastructures
• Risk Response
• Event Identification
Security Standard:
a) 1. Risk Management (R)
Monitor and Evaluate:
• ME1 Monitor and Evaluate IT Performance
• ME2 Monitor and Evaluate Internal Control
Protect Cardholder Data:
3.4 - Render PAN, at a minimum, unreadable anywhere
it is store (including on portable digital media,
backup media, in logs)
6 - Develop and maintain secure systems and
applications
III.C. Manage and
Control Risk
• 002 – Critical Cyber
Asset Identification
• 4.7.2 – Safeguards will vary depending
on sensitivity of the information collected
Symantec™ Security Information Manager
Discriminate threat response activities based on risk rating
Symantec Altiris
Inventory, treat, and manage information technology assets, ensuring the security posture throughout an assets lifecycle
Symantec Consulting Services
Assess and prioritize risks against frameworks and standards
• 007 – Systems Security
Management
• 008 – Incident Report
and Response Planning
Symantec Data Loss Prevention - Gain visibility of data in motion and prevent sensitive data from being leaving an organization
Knowing and objectively accepting risk
in accordance with organizations risk
tolerance
Avoiding risk by not engaging in
activities that introduce risk
Transferring risks to other parties
(insurance, partner, service provider)
SECTION:
Symantec Products,
Solutions & Capabilities
Symantec Consulting Services
Assess and prioritize risks against frameworks and standards
Plan and Organize:
• PO9 Assess and Manage IT Risks
Treating Security Risks
•
•
GLBA*
Performed Periodically
Systematic Approach estimating risks
Clearly defined scope
4.2
•
COSO
Payment Card Industry
Risk Assessment and Treatment
4.1
•
•
•
HIPAA
Requirements
Sarbanes-Oxley
COBIT® 4.1
ISO 27002:2005
Security Policy
5.1
Information Security Policy
Information security policies should be
sponsored/approved by management,
published to all employees and relevant
external parties
Plan and Organize:
• PO1 Define a Strategic IT Plan
• PO4 Define the IT Processes, Organization
and Relationships
• PO6 Communicate Management Aims and
Direction
• PO7 Manage IT Human Resources
• Internal Environment
• Objective Setting
• Risk Assessment
Security Standard:
a) 1. Sanction Policy (R)
a) 2. Assigned Security Responsibility (R)
Maintain an Information Security Policy:
12.4 - Ensure that the security policy and procedures
clearly define information security responsibilities for
all employees and contractors.
12.5.1 - Establish, document, and distribute security
policies and procedures
II.A. Information
Security Program
II.B. Objectives
III.A. Invoice Board
of Directors
• 003 – Security Management Controls
• Internal Environment
• Control Activities
• Information and
Communication
Security Standard:
a) 1. Information System Activity
Review (R)
a) 2. Assigned Security Responsibility (R)
Maintain an Information Security Policy:
12.4 - Ensure that the security policy and procedures
clearly define information security responsibilities for
all employees and contractors.
12.5.1 - Establish, document, and distribute security
policies and procedures
II. A. Information
Security Program
II.B. Objectives
III. A. Involve the
Board of Directors
III.C. Manage and
Control Risk
III.F. Report to the
Board
• 003 – Security
Management Control
III.C. Manage and
Control Risk
III.D. Oversee
Service Provider
Arrangements
N/A
• 4.1.4
(a) implement procedures to protect
personal information
(d) develop information to explain the
organization’s policies and procedures
Symantec™ Control Compliance Suite
Ability to author, review, publish and gather approval on corporate policies
N/A
Symantec™ Security Information Manager
Provides a critical component of Information Security management process; implementing offers one way
to establish the required control
Symantec Consulting Services
Develop security strategy, security policy and security policy documentation
Include within:
•
•
•
Definition of information security,
objectives, scope, and importance
Statement of management intent,
supporting goals and principles
Framework for setting control
objectives and controls
SECTION:
6
Organization of Information Security
6.1
Deliver and Support:
• DS5 Ensure Systems Security
Internal Organization
A management framework should be
established to initiate and control the
implementation of information security
within the organization
6.2
Plan and Organize:
• PO8 Manage Quality
External Parties
To maintain the security of information and
information processing facilities that are
accessed, processed, communicated to, or
managed by external parties
Deliver and Support:
• DS1 Define and Manage Service Levels
• DS2 Manage Third-Party Services
• DS5 Ensure Systems Security
•
•
•
•
Internal Environment
Risk Assessment
Control Activities
Information and
Communication
• Monitoring
Security Standard:
b) 1. Written Contract or Other
Arrangement (R)
Maintain an Information Security Policy:
12.8.2 - Maintain a written agreement that includes an
acknowledgement that the service providers are
responsible for the security of cardholder data the
service providers posess.
Symantec™ Control Compliance Suite
Ability to ensure complete IT policy coverage and evidence of compliance across multiple management frameworks
Symantec Enterprise Vault™
Support Information security policy with audited roles based search and review of email, IM and files
Symantec Consulting Services
Help structure security organization and develop supporting policy
N/A
Symantec™ Security Information Manager
Ensure that information is secure and best practices are in place
Symantec Enterprise Protection
Ability to prevent introduction of non-compliant, insecure devices onto corporate network, reducing the likelihood
of information being compromised
Symantec Data Loss Prevention - Gain visibility of data in motion and ensure that sensiitive data is being shared with third
parties in accordance with security policies and any relevant security controls
Consulting Services
Develop security policy for client external parties and conduct related security assessments
SECTION:
7
Asset Management
7.1
Responsibility for Assets
Plan and Organize:
• PO4 Define the IT Processes, Organization
and Relationships
• Control Activities
Plan and Organize:
• PO2 Define the Information Architecture
• PO9 Assess and Manage IT Risks
• Risk Assessment
• Event Identification
Physical Standard:
d) 2. Device and Media Controls
– Accountability (A)
Maintain an Information Security Policy:
12.3.4 Labeling of devices with owner, contact
information, and purpose
N/A
Security Standard:
a) 1. Risk Analysis (R)
a) 1. Risk Management (R)
Implement Strong Access Control Measures:
7.1 - Limit access to system components and cardholder
data to only those individuals whose job requires
such access.
7.2 - Establish an access control system for system
components with multiple users that restricts access
based on a user’s need to know and is set to “deny
all” unless specifically allowed.
N/A
• 002 – Critical Cyber
Asset Identification
All assets should be accounted for and have
a nominated owner
7.2
Information Classification
Information should be classified to indicate
the need, priorities and expected degree of
protection
•
Deliver and Support:
• DS5 Ensure Systems Security
Define an information classification
scheme
SECTION:
8
• 002 – Critical Cyber
Asset Identification
• 4.1 – An organization responsible
for personal information under its
control shall designate an individual or
individuals who are accountable for the
organization’s compliance
Symantec™ Security Information Manager
Ability to classify assets and reporting accordingly and allows for definition of asset owners
• 4.7.2 – Safeguards will vary depending
on sensitivity of the information collected
Symantec™ Security Information Manager
Ability to classify assets and reporting accordingly
Symantec Consulting Services
Produce asset registers including asset valuation as part of risk assessments
Symantec™ Enterprise Vault
Automated classification and retention or expiry of email, IM, and files
Symantec Data Loss Prevention - Identify, classify, adn monitor critical information stores across hetergenous
infrastructures
Symantec Consulting Services
Produce Information Classification schemes, associated policies and detailed set of procedures as part of assessments
Human Resources Security
8.1
Plan and Organize:
• PO7 Manage IT Human Resources
Prior to Employment
To ensure that employees, contractors and
third party users understand responsibilities,
and are suitable for their roles; reduce the
risk of theft, fraud, and or misuse of facilities/
resources
8.2
Deliver and Support:
• DS12 Manage the Physical Environment
Plan and Organize:
• PO7 Manage IT Human Resources
During Employment
To ensure that employees, contractors and
third party users are aware of information
security threats and concerns, their
responsibilities and liabilities, and are
equipped to support security policy in the
course of their normal work
8.3
Termination or Change of Employment
To ensure that employees, contractors and
third party users exit an organization or
change employment in an orderly manner
Deliver and Support:
• DS7 Educate and Train Users
Plan and Organize:
• PO4 Define the IT Processes, Organization
and Relationships
• PO7 Manage IT Human Resources
• Internal Environment
• Control Activities
• Information and
Communication
Security Standard:
a) 1. Sanction Policy (R)
a) 3. Authorization and/or Supervision (A)
a) 3. Workforce Clearance Procedure (A)
a) 5. Security Reminders (A)
Maintain an Information Security Policy:
12.7 - Screen potential employees prior to hire to
minimize the risk of attacks from internal sources.
III.C. Manage and
Control Risk
• 004 – Personnel and Training
Symantec Consulting Services
• 4.7.4 – Organizations shall make their
Develop policies and procedures covering Human Resources related information security
employees aware of the importance of maintaining the confidentiality of personal information
• Internal Environment
• Control Activities
• Information and
Communication
Security Standard:
a) 5. Security Reminders (A)
Maintain an Information Security Policy:
12.6 - Implement a formal security awareness program
to make all employees aware of the importance of
cardholder data security.
III.C. Manage and
Control Risk
• 004 – Personnel and Training
N/A
N/A
Security Standard:
a) 3. Termination Procedures (A)
Implement Strong Access Control Measures:
8.5.4 - Immediately revoke access for any terminated
users
Maintain an Information Security Policy:
12. Maintain a policy that addresses information
security for employees and contractors
N/A
Symantec™ Control Compliance Suite
Ability to disseminate policy to employees, contractors, and 3rd party and ensure sign-off; ensure, via controls
self-assessment capability, that critical procedures are understood and implemented
Symantec Consulting Services
Develop policies and procedures covering Human Resources related information security
• 004 – Personnel and Training
N/A
Symantec™ Security Information Manager
Ability to monitor, search and query on user activity
Symantec™ Control Compliance Suite
Ability to establish termination policies and track compliance to the requirements; help ensure, via controls
self-assessment capability, that termination procedures are understood and implemented
Symantec Enterprise Vault™
Prevent the use of PST files and risk of PST files leaving the company
Symantec Consulting Services
Develop policies and procedures covering Human Resources related information security
SECTION:
9
Physical and Environmental Security
9.1
Secure Areas
To prevent unauthorized physical
access, damage, and interference to the
organization’s premises and information
•
•
Deliver and Support:
• DS5 Ensure Systems Security
• DS11 Manage Data
• DS12 Manage the Physical Environment
• Control Activities
• Information and
Communication
• Monitoring
Security Standard:
a) 3. Authorization and/or Supervision (A)
a) 3. Workforce Clearance Procedure (A)
Deliver and Support:
• DS12 Manage the Physical Environment
• Control Activities
• Information and
Communication
Critical or sensitive information
processing facilities should be housed
in secure areas
Protection provided should be
commensurate with the identified risks
9.2
Equipment Security
To prevent loss, damage, theft or
compromise of assets and interruption to
the organization’s activities
SECTION:
10
III.C. Manage and
Control Risk
• 006 – Physical Security
of Critical Cyber Assets
• 4.7.3 – Methods of protection should
include:
(a) physical measures, for example,
locked filing cabinets and restricted
access to offices
(b) organizational measures, for example,
security clearances and limiting access
on a “need-to-know” basis
Symantec Consulting Services
Deliver physical security posture assessment; develop policies and procedures covering Physical
and Environmental Security
Physical Standard:
a) 1. Facility Access Control
b) Workstation Use (R)
c) Workstation Security
d) 1. Device and Media Controls –
Disposal (R)
d) 2. Media Re-use (R)
d) 2. Device and Media Controls
– Accountability (A)
Implement Strong Access Control Measures:
9.1.3 - Restrict physical access to wireless access points,
gateways, and handheld devices
III.C. Manage and
Control Risk
• 006 – Physical Security
of Critical Cyber Assets
• 4.7.3 – Methods of protection should
include:
(a) physical measures, for example,
locked filing cabinets and restricted
access to offices
Symantec Consulting Services
Develop policies and procedures covering Equipment Security
Security Standard:
a) 1. Information System Activity
Review (R)
a) 1. Sanction Policy (R)
a) 2. Assigned Security Responsibility (R)
b) 1. Written Contract or Other
Arrangement (R)
a) 6. Response and Reporting (R)
Maintain a Vulnerability Management Program
6.3.3 - Separate development/test and production
environments
III.C. Manage and
Control Risk
• 003 – Security
Management Controls
• 4.7.1 – The security safeguards shall
protect personal information against loss
or theft, as well as unauthorized access,
disclosure, copying, use, or modification.
Symantec™ Security Information Manager
Ability to search and query on user activity and that best practices are in place
Physical Standard:
a) 1. Facility Access Control
a) 2. Facility Security Plan
a) 2. Access Control and Validation
Procedures (A)
Communications and Operations Management
10.1
OperationalProceduresandResponsibilities
Responsibilities and procedures for
the management and operation of all
information processing facilities should be
established
•
Implement Strong Access Control Measures:
9. Restrict physical access to cardholder data
Plan and Organize:
• PO4 Define the IT Processes, Organization
and Relationships
Acquire and Implement:
• A16 Manage Changes
•
•
•
•
Internal Environment
Risk Response
Control Activities
Monitoring
Deliver and Support:
• DS4 Ensure Continuous Service
• DS13 Manage Operations
10.2
Third Party Service Delivery Management
Validate the implementation of agreements,
monitor compliance, and manage changes
to ensure that all services delivered meet
requirements set out in agreements
10.3
System Planning and Acceptance
Plan and Organize:
• PO4 Define the IT Processes, Organization
and Relationships
• PO8 Manage Quality
• PO10 Manage Projects
• Internal Environment
• Control Activities
Security Standard:
b) 1. Written Contract or Other
Arrangement
Maintain an Information Security Policy:
12.8.2 Maintain a written agreement that includes
acknowledgement that the service providers are
responsible for the security of cardholder data teh
service providers posess.
III.D. Oversee
Service Provider
Arrangements
N/A
N/A
Maintain a Vulnerability Management Program:
6. Develop and maintain secure systems and
applications
III.C. Manage and
Control Risk
• 007 – Systems Security
Management
•
• 4.1.3 – The organization shall use
contractual or other means to provide a
comparable level of protection while the
information is being processed by a third
party.
Symantec™ Control Compliance Suite
Define and manage information security programs
• 4.7.1 – The security safeguards shall
protect personal information against loss
or theft, as well as unauthorized access,
disclosure, copying, use, or modification.
Symantec™ Security Information Manager
• 4.7.1 – The security safeguards shall
protect personal information against loss
or theft, as well as unauthorized access,
disclosure, copying, use, or modification.
Symantec™ Security Information Manager
Ability to manage response through incident notification and workflow
Deliver and Support:
• DS1 Define and Manage Service Levels
• DS2 Manage Third-Party Services
Deliver and Support:
• DS3 Manage Performance and Capacity
• DS4 Ensure Continuous Service
• Control Activities
• Monitoring
Regularly Monitor and Test Networks:
11. Regularly test security systems and processes
To minimize the risk of systems failures
•
Symantec Altiris
Inventory, treat, and manage information technology assets, ensuring the security posture throughout an assets lifecycle
Symantec Enterprise Vault™
Supports audited, roles based search and review of email, IM and files
Symantec Consulting Services
Develop policies, procedures, guidelines and standards covering Communications and Operations Management
Physical Standard:
a) 2. Contingency Operations (R)
Segregation of duties should be
implemented
Advanced planning and preparation
are required to ensure availability and
adequate capacity of resources
Operational requirements of new
systems should be established,
documented, and tested
10.4
Protection Against Malicious and Mobile
Code
Precautions are required to prevent and
detect the introduction of malicious code
and unauthorized mobile code
Deliver and Support:
• DS5 Ensure Systems Security
• DS8 Manage Service Desk and Incidents
• DS9 Manage the Configuration
• DS10 Manage Problems
• Control Activities
• Event Identification
• Information and
Communication
Security Standard:
a) 4. Access Establishment and
Modification (A)
a) 5. Protection from Malicious Software
Symantec™ Control Compliance Suite
Gather permissions on control points data, provides a consolidated view of entitlements,
and enable periodic approval workflow
Maintain a Vulnerability Management Program:
5. Use and regularly update anti-virus software
6. Develop and maintain secure systems and
applications
III.C. Manage and
Control Risk
• 007 – Systems Security
Management
Symantec Consulting Services
Develop policies, procedures, guidelines and standards covering Communications
and Operations Management related to Third Party Service Delivery
Symantec™ Control Compliance Suite
Ensure that systems are secure and best practices are in place
Symantec Altiris
Inventory, treat, and manage information technology assets, ensuring the security posture throughout an assets lifecycle
Symantec Consulting Services
Deliver Application Design Assessments, Application Architecture Assessments, Application Development
Lifecycle Review, Code Review and Application Penetration Test
Symantec™ Endpoint Protection
Prevents, detects and remediates malicious and unauthorized code for managed endpoints
(laptops, desktops and servers owned by the organization)
Symantec™ Mobile Security
Prevents, detects and remediates malicious and unauthorized code for managed endpoints
(PDAs, handhelds, smartphones owned by the organization)
Symantec Altiris
Inventory, treat, and manage information technology assets, ensuring the security posture throughout an assets lifecycle
Symantec™ On-Demand Protection
Protects against malicious and unauthorized code for unmanaged endpoints
(laptops, desktops and servers not owned by the organization)
Symantec™ Critical System Protection
Prevents, detects and remediates malicious and unauthorized code for heterogeneous servers
that host sensitive and confidential information
Symantec Consulting Services
Deliver Application Design Assessments, Application Architecture Assessments, Application Development
Lifecycle Review, Code Review and Application Penetration Test
10.5
Deliver and Support:
• DS4 Ensure Continuous Service
• DS11 Manage Data
Back-up
• Event Identification
• Control Activities
• Monitoring
To maintain the integrity and availability
of information and information processing
facilities
10.6
Network Security Management
Deliver and Support:
• DS5 Ensure Systems Security
• Risk Assessment
• Control Activities
• Monitoring
To ensure the protection of information
in networks and the protection of the
supporting infrastructure
10.7
• Control Activities
• Information and
Communication
To prevent unauthorized disclosure,
modification, removal or destruction of
assets, and interruption to business activities
•
•
Implement Strong Access Control Measures:
9. Restrict physical access to cardholder data
Physical Standard:
a) 2. Contingency Operations (R)
a) 2. Data Backup and Storage (A)
Maintain an Information Security Policy:
12. Maintain a policy that addresses information
security for employees and contractors
Technical Standard:
a)2. Encryption and Decryption (A)
(e)1. Transmission Security
(e)2. Integrity Controls (A)
Physical Standard:
d) 1. Device and Media Controls –
Disposal (R)
d) 2. Media Re-use (R)
d) 2. Device and Media Controls Accountability (A)
Regularly Monitor and Test Networks:
10. Track and monitor all access to network resources
and cardholder data
Build and Maintain a Secure Network:
1. Install and maintain a firewall
2. Do not use vendor-supplied defaults for system
passwords and other security parameters
• 4.7.1 – The security safeguards shall
protect personal information against loss
or theft, as well as unauthorized access,
disclosure, copying, use, or modification.
Protect Cardholder Data:
3. Protect stored data
4. Encrypt transmissions of cardholder data and
sensitive information across public networks
Symantec™ Security Information Manager
Ensure that systems are secure and best practices are in place
Symantec Enterprise Vault™
Facilitates faster backup and recovery of email applications and file systems
Veritas NetBackup™ Server
Symantec Backup Exec™
Ability to conduct backup and recovery on all enterprise devices
Symantec Consulting Services
Policy Development Services, Residency Services to transfer best-practices for storage management to enterprise,
Services to outsource storage management
III.C. Manage and
Control Risk
• 005 – Electronic
Security Perimeters
• 007 – Systems Security
Management
• 4.7.1 – The security safeguards shall
protect personal information against loss
or theft, as well as unauthorized access,
disclosure, copying, use, or modification.
Symantec™ Security Information Manager
Ensure that systems are secure and best practices are in place
Symantec Endpoint Protection
Ability to prevent introduction of non-compliant, insecure devices onto corporate network, reducing the likelihood of
information being compromised
Symantec Altiris
Inventory, treat, and manage information technology assets, ensuring the security posture throughout an assets lifecycle
Symantec Data Loss Prevention - Gain visibility of data in motion and ensure that sensiitive data is being disseminated in
accordance with security policies and any relevant security controls
Symantec Consulting Services
Deliver security reviews, penetration tests and vulnerability assessments of network security; provide monitoring of
compliance of servers and devices through Symantec Operational Services
III.C. Manage and
Control Risk
• 003 – Security
Management Controls
• 006 – Physical Security
Implement Strong Access Control Measures:
7. Restrict access to data by business need-to-know
9. Restrict physical access to cardholder data
• 4.7.1 – The security safeguards shall
protect personal information against loss
or theft, as well as unauthorized access,
disclosure, copying, use, or modification.
• 4.7.5 – Care shall be used in the disposal
or destruction of personal information
Symantec Enterprise Vault™
Prevent the use of PST files and risk of PST files leaving the company; enforce preservation of data with legal hold
Symantec Consulting Services
Provide policies, procedures, standards and guidelines covering Media Handling
Maintain an Information Security Policy:
12. Maintain a policy that addresses information
security for employees and contractors
Deliver and Support:
• DS5 Ensure Systems Security
Exchange of Information
• 009 – Recovery Plans for
Critical Cyber Assets
Regularly Monitor and Test Networks:
11. Regularly test security systems and processes
Media should be controlled and
physically protected
Appropriate operating procedures
should be established to protect,
documents, and computer media
10.8
III.C. Manage and
Control Risk
Maintain a Vulnerability Management Program:
5. Use and regularly update anti-virus software
6. Develop and maintain secure systems and
applications
Deliver and Support:
• DS11 Manage Data
Media Handling
Security Standard:
a) 7. Data Backup Plan (R)
a) 7. Disaster Recovery Plan (R)
a) 7. Emergency Mode Operation Plan (R)
a) 7. Testing And Revision Procedure (A)
To maintain the security of information and
software exchanged within an organization
and with any external entity
•
•
•
•
Risk Assessment
Risk Response
Control Activities
Information and
Communication
• Monitoring
Security Standard:
b) 1. Written Contract or Other
Arrangement (R)
Technical Standard:
a)2. Encryption and Decryption (A)
(d)Person or Entity Authentication (R)
(e)1. Transmission Security
(e)2. Integrity Controls (A)
Build and Maintain a Secure Network:
1. Install and maintain a firewall
III.C. Manage and
Control Risk
• 005 – Electronic
Security Perimeters
Protect Cardholder Data:
4. Encrypt transmissions of cardholder data and
sensitive information across public networks
• 4.7.1 – The security safeguards shall
protect personal information against loss
or theft, as well as unauthorized access,
disclosure, copying, use, or modification.
Symantec Enterprise Vault™
Audited export of electronically stored information for E-discovery
Symantec Data Loss Prevention - Gain visibility of data in motion and ensure that sensiitive data is being shared with third
parties in accordance with security policies and any relevant security controls
Symantec Consulting Services
Provide policies, procedures, standards and guidelines covering Exchange of Information
Implement Strong Access Control Measures:
7. Restrict access to data by business need-to-know
Implement Strong Access Control Measures:
8. Assign a unique ID to each person with computer
access
Maintain an Information Security Policy:
12. Maintain a policy that addresses information
security for employees and contractors
10.9
Electronic Commerce Services
Deliver and Support:
• DS5 Ensure Systems Security
• Event Identification
• Control Activities
N/A
To ensure the security of electronic
commerce services, and their secure use.
Build and Maintain a Secure Network:
1. Install and maintain a firewall configuration to
protect data
2. Do not use vendor-supplied defaults for system
passwords and other security parameters
III.C. Manage and
Control Risk
N/A
• 4.7.1 – The security safeguards shall
protect personal information against loss
or theft, as well as unauthorized access,
disclosure, copying, use, or modification.
Symantec Altiris
Inventory, treat, and manage information technology assets, ensuring the security posture throughout an assets lifecycle
Symantec Consulting Services
Develop policies, procedures and standards covering Electronic Commerce Services; conduct vulnerability assessments;
conduct security infrastructure review
III.C. Manage and
Control Risk
• 005 – Electronic
Security Perimeters
• 4.7.1 – The security safeguards shall
protect personal information against loss
or theft, as well as unauthorized access,
disclosure, copying, use, or modification.
Symantec™ Security Information Manager
Ability to consolidate logs and conduct period reviews of access
• 4.1.4
(a) implement procedures to protect
personal information
Symantec™ Security Information Manager
Ability to search, query and notify on user activity
Protect Cardholder Data:
4. Encrypt transmissions of cardholder data and
sensitive information across public networks
Maintain a Vulnerability Management Program:
6. Develop and maintain secure systems and
applications
10.10
Deliver and Support:
• DS5 Ensure Systems Security
Monitoring
To detect unauthorized information
processing activities including review of
operator logs and fault logging
•
•
•
• Control Activities
• Monitoring
Monitor and Evaluate:
• ME1 Monitor and Evaluate IT Performance
• ME2 Monitor and Evaluate Internal Control
Security Standard:
a) 5. Log-In Monitoring (A)
a) 1. Information System Activity
Review (R)
b) 8. Audit Controls (R)
Implement Strong Access Control Measures:
8. Assign a unique ID to each person with computer
access
Security Standard:
a) 4. Access Authorization (A)
Implement Strong Access Control Measures:
8. Assign a unique ID to each person with computer
access
• 007 – Systems Security
Management
Symantec Data Loss Prevention - Identify, classify, adn monitor critical information stores across hetergenous
infrastructures
Symantec Consulting Services
Develop policies, procedures and standards covering Electronic Commerce Services; conduct vulnerability assessments;
conduct security infrastructure review
Systems should be monitored and
information security events should be
recorded
Organization should comply with all
relevant legal requirements applicable
to monitoring and logging
System monitoring should be used
to check the effectiveness of controls
adopted and to verify conformity to
access policies
SECTION:
11
Access Control
11.1
Business Requirement for Access Control
Deliver and Support:
• DS5 Ensure Systems Security
• Internal Environment
• Control Activities
III.C. Manage and
Control Risk
• 003 – Security
Management Controls
• 005 – Electronic
Security Perimeters
Maintain an Information Security Policy:
12. Maintain a policy that addresses information
security for employees and contractors
Access to information, information
processing facilities, and business processes
should be controlled based upon business
and security requirements.
•
• 006 – Physical Security
Regularly Monitor and Test Networks:
10. Track and monitor all access to network resources
and cardholder data
Access controls should take account
policies for information dissemination
and authorization
11.2
Deliver and Support:
• DS5 Ensure Systems Security
User Access Management
• Control Activities
• Monitoring
Formal procedures to control the allocation
of access rights to information systems and
services
11.3
• Internal Environment
• Control Activities
III.C. Manage and
Control Risk
• 003 – Security
Management Controls
• 005 – Electronic
Security Perimeters
• 007 – Systems Security
Management
Build and Maintain a Secure Network:
2. Do not use vendor-supplied defaults for system
passwords
III.C. Manage and
Control Risk
• 003 – Security
Management Controls
• 004 – Personnel and
Training
Implement Strong Access Control Measures:
8. Assign a unique ID to each person with computer
access
Maintain an Information Security Policy:
12. Maintain a policy that addresses information
security for employees and contractors
Deliver and Support:
• DS5 Ensure Systems Security
Network Access Control
Security Standard:
a) 5. Password Management (A)
Physical Standard:
b) Workstation Use (R)
c) Workstation Security
To prevent unauthorized user access, and
compromise or theft of information and
information processing capabilities
11.4
Implement Strong Access Control Measures:
7. Restrict access to data by business need-to-know
8. Assign a unique ID to each person with computer
access
Technical Standard :
a) 2. Unique User Identification (R)
Deliver and Support:
• DS5 Ensure Systems Security
User Responsibilities
Security Standard:
a) 4. Access Authorization (A)
a) 4. Access Establishment and
Modification (A)
a) 5. Password Management (A)
• Internal Environment
• Control Activities
• Monitoring
Ensure that appropriate interfaces and
authentication mechanisms to networked
services are in place
Security Standard:
a) 5. Password Management (A)
Technical Standard:
c) 2. Mechanism to Authenticate
Electronic Protected Health
Information (A)
d) Person or Entity Authentication (R)
Build and Maintain a Secure Network:
2. Do not use vendor-supplied defaults for system
passwords
• 4.7.3 – Methods of protection should
include:
(b) organizational measures, for example,
security clearances and limiting access
on a “need-to-know”
(c) technological measures, for example,
the use of passwords and encryption
• 4.1.4 (a) implement procedures to protect
personal information
• 4.7.3 – Methods of protection should
include:
(b) organizational measures, for example,
security clearances and limiting access
on a “need-to-know”
(c) technological measures, for example,
the use of passwords and encryption
• 4.7.3 – Methods of protection should
include:
(b) organizational measures, for example,
security clearances and limiting access
on a “need-to-know”
(c) technological measures, for example,
the use of passwords and encryption
• 4.7.4 – Organizations shall make their
employees aware of the importance
of maintaining the confidentiality of
personal information
IlI.C. Manage and
Control Risk
• 005 – Electronic
Security Perimeters
• 007 – Systems Security
Management
Implement Strong Access Control Measures:
8. Assign a unique ID to each person with computer
access
• 4.7.1 – The security safeguards shall
protect personal information against loss
or theft, as well as unauthorized access,
disclosure, copying, use, or modification.
• 4.7.3 – Methods of protection should
include:
(c) technological measures, for example,
the use of passwords and encryption
Symantec™ Control Compliance Suite
Ability to author, review, publish, and ensure sign-off on access control policies
Symantec Consulting Services
Develop policies, procedures, standards and guidelines covering Access Control; conduct audits
to ensure access control measures are in place and operational
Symantec™ Security Information Manager
Ability to search, query and notify on user activity
Symantec™ Control Compliance Suite
Gather permissions on control points data, provides a consolidated view of entitlements,
and enable periodic approval workflow
Symantec Consulting Services
Develop policies, procedures, standards and guidelines covering User Access Management;
conduct audits to ensure access control measures are in place and operational
Symantec™ Control Compliance Suite
Ensure user awareness of control requirements via policy dissemination and acceptance tracking
Symantec Altiris
Inventory, treat, and manage information technology assets, ensuring the security posture throughout an assets lifecycle
Symantec Consulting Services
Develop policies, procedures, standards and guidelines covering User Responsibilities; conduct audits
to ensure User Responsibilities policies are enforced
Symantec™ Security Information Manager
Ability to search, query and notify on user activity
Symantec™ Network Access Control
Enforces that managed endpoints (laptops, desktops and servers owned by the organization) meet minimum endpoint
security requirements prior to allowing access to the corporate network; non-compliant endpoint can be automatically
remediated
Symantec™ On-Demand Protection
Ensures that unmanaged endpoints (laptops, desktops and servers not owned by the organization) meet minimum
endpoint security requirements prior to allowing access to the corporate network
Symantec Consulting Services
Develop policies, procedures, standards and guidelines covering Network Access Control;
conduct audits to ensure Network Access Control measures are in place and operational
11.5
Operating System Access Control
Deliver and Support:
• DS5 Ensure Systems Security
• Internal Environment
• Control Activities
• Monitoring
To prevent unauthorized access to operating
systems.
Technical Standard:
a) 2. Unique User Identification (R)
a) 2. Automatic Logoff (A)
d) Person or Entity Authentication (R)
Some methods include: ensure quality
passwords, user authentication, and
the recording of successful and failed
system accesses, providing appropriate
authentication control means
11.6
ApplicationandInformationAccessControl
•
•
•
Deliver and Support:
• DS5 Ensure Systems Security
• Control Activities
• Monitoring
To prevent unauthorized access
to information held in application
systems.
Security facilities should be used to
restrict access to an within application
systems
Logical access to application software
and information system functions
11.7
Mobile Computing and Teleworking
Security Standard:
a) 4. Access Establishment and
Modification (A)
a) 5. Password Management (A)
Security Standard:
a) 4. Access Establishment and
Modification (A)
a) 5. Password Management (A)
Technical Standard:
a) 2. Unique User Identification (R)
d) Person or Entity Authentication (R)
Deliver and Support:
• DS5 Ensure Systems Security
• Internal Environment
• Control Activities
• Monitoring
Security Standard:
a) 4. Access Establishment and
Modification (A)
Build and Maintain a Secure Network:
2. Do not use vendor-supplied defaults for system
passwords
III.C. Manage and
Control Risk
• 005 – Electronic
Security Perimeters
• 007 – Systems Security
Management
Implement Strong Access Control Measures:
8. Assign a unique ID to each person with computer
access
Monitor and Test Networks:
10. Track and monitor all access to network resources
and cardholder data
Build and Maintain a Secure Network:
1. Do not use vendor-supplied defaults for system
passwords
III.C. Manage and
Control Risk
• 005 – Electronic
Security Perimeters
• 007 – Systems Security
Management
Maintain a Vulnerability Management System:
6. Develop and maintain secure systems and
applications
Implement Strong Access Control Measures:
8. Assign a unique ID to each person with computer
access
Build and Maintain a Secure Network:
1. Install and maintain a firewall configuration to
protect data
III.C. Manage and
Control Risk
• 005 – Electronic
Security Perimeters
Build and Maintain a Secure Network:
2. Do not use vendor-supplied defaults for system
passwords and other security parameters
To ensure information security when using
mobile computing and teleworking facilities
• 4.7.1 – The security safeguards shall
protect personal information against loss
or theft, as well as unauthorized access,
disclosure, copying, use, or modification.
• 4.7.3 – Methods of protection should
include:
(c) technological measures, for example,
the use of passwords and encryption
Symantec™ Control Compliance Suite
Ensure system security by automating the management of deviations from technical standards/best practices
and providing the ability to remediate misconfigurations
Symantec Altiris
Inventory, treat, and manage information technology assets, ensuring the security posture throughout an assets lifecycle
Symantec Consulting Services
Develop policies, procedures, standards and guidelines covering Operating System Access Control;
conduct audits to ensure Operational System Access Control are in place and operational
• 4.7.1 – The security safeguards shall
protect personal information against loss
or theft, as well as unauthorized access,
disclosure, copying, use, or modification.
Symantec™ Security Information Manager
Ability to search, query and notify on user activity
• 4.7.3 – Methods of protection should
include:
(c) technological measures, for example,
the use of passwords and encryption
Symantec Consulting Services
Develop policies, procedures, standards and guidelines covering Application and Information Access Control;
conduct audits to ensure Application and Information Access Control policies are enforced
• 4.7.1 – The security safeguards shall
protect personal information against loss
or theft, as well as unauthorized access,
disclosure, copying, use, or modification.
Symantec™ Endpoint Protection
Prevents, detects and remediates malicious and unauthorized code for mananged endpoints
(laptops, desktops and servers owned by the organization)
• 4.7.3 – Methods of protection should
include:
(c) technological measures, for example,
the use of passwords and encryption
Implement Strong Access Control Measures:
8. Assign a unique ID to each person with computer
access
Symantec™ Security Information Manager
Ability to search, query and notify on user activity
Symantec Altiris
Inventory, treat, and manage information technology assets, ensuring the security posture throughout an assets lifecycle
Symantec™ Mobile Security
Prevents, detects and remediates malicious and unauthorized code for mananged endpoints
(PDAs, handhelds, smartphones owned by the organization)
Symantec™ On-Demand Protection
Protects against malicious and unauthorized code for unmanged endpoints (laptops, desktops
and servers not owned by the organization)
Symantec Altiris
Inventory, treat, and manage information technology assets, ensuring the security posture throughout an assets lifecycle
Symantec Consulting Services
Develop policies, procedures, standards and guidelines covering Mobile Computing and Teleworking; conduct audits to
ensure Mobile Computing and Teleworking policies are enforced; conduct wireless assessments of client’s network
SECTION:
12
Information Systems Acquisition, Development and Maintenance
12.1
Ensure that security is an integral part of
information systems
Security should be built into operating
systems, infrastructure, business
applications, off the shelf products, and userdeveloped applications
12.2
Correct Processing in Applications
Acquire and Implement:
• A12 Acquire and Maintain Application
Software
• A13 Acquire and Maintain Technology
Infrastructure
• Control Activities
• Monitoring
Acquire and Implement:
• A12 Acquire and Maintain Application
Software
• Control Activities
N/A
Technical Standard:
e) 2. Transmission Security – Integrity
Controls (A)
Maintain a Vulnerability Management Program:
6. Develop and maintain secure systems and
applications
N/A
Maintain a Vulnerability Management Program:
6. Develop and maintain secure systems and
applications
III.C. Manage and
Control Risk
N/A
N/A
•
•
•
• Control Activities
• Monitoring
To protect the confidentiality,
authenticity or integrity of information
by cryptographic means.
Policy should be developed on the use
of cryptographic controls
Key management should be in place to
support cryptographic techniques
12.4
Acquire and Implement:
• A16 Manage Changes
Security of System Files
To ensure security of system files through
the control of access to system files and
program source code
12.5
Security in Development and Support
Processes
• 4.6 – Personal information shall be as
accurate, complete, and up-to-date as is
necessary for the purposes for which it is
to be used
Deliver and Support
• DS5 Ensure Systems Security
• Control Activities
• Information and
Communication Monitoring
Technical Standard:
a) 2. Encryption and Decryption (A)
e) 2. Transmission Security – Encryption
(A)
Protect Cardholder Data:
3. Protect stored data
4. Encrypt transmission of cardholder data and
sensitive information across public networks
III.C. Manage and
Control Risk
N/A
Build and Maintain a Secure Network:
2. Do not use vendor-supplied defaults for system
passwords and other security parameters
III.C. Manage and
Control Risk
N/A
• 4.7.3 – Methods of protection should
include:
(c) technological measures, for example,
the use of passwords and encryption
• 005 – Electronic Security • 4.7.1 – The security safeguards shall
Perimeters
protect personal information against loss
or theft, as well as unauthorized access,
• 007 – Systems Security disclosure, copying, use, or modification.
Management
Technical Vulnerability Management
To reduce risks resulting from exploitation
of published technical vulnerabilities
•
Technical vulnerability management
should be effective, systematic, and
repeatable
SECTION:
13
Symantec Consulting Services
Design Assessments of applications to ensure encryption is correctly managed in applications; penetration assessments
to ensure encryption is correctly implemented within applications
Symantec™ Security Information Manager
Provide a watchlist for monitoring of critical system files
Symantec™ Control Compliance Suite
Gather permissions on control points data, provides a consolidated view of entitlements,
and enable periodic approval workflow
Acquire and Implement:
• A16 Manage Changes
• Control Activities
• Monitoring
N/A
Deliver and Support
• DS5 Ensure Systems Security
Maintain a Vulnerability Management Program:
6. Develop and maintain secure systems and
applications
N/A
N/A
N/A
Symantec™ Security Information Manager
Ensure that systems are secure and best practices are in place
Symantec Altiris
Inventory, treat, and manage information technology assets, ensuring the security posture throughout an assets lifecycle
Symantec Consulting Services
Host and Network Device Security Assessments to validate system security posture; Host Hardening,
Network Device Hardening and Secure Build Programs to manage system security
Plan and Organize;
• PO9 Assess and Manage IT Risks
N/A
Security Standard:
a) 6. Response and Reporting (R)
Deliver and Support:
• DS2 Manage Third-Party Services
• DS4 Ensure Continuous Service
• DS5 Ensure Systems Security
• DS9 Manage the Configuration
Maintain a Vulnerability Management
Program:
5. Use and regularly update antivirus software
6. Develop and maintain secure systems and
applications
III.C. Manage and
Control Risk
• 005 – Electronic
Security Perimeters
• 007 – Systems Security
Management
• 4.7.1 – The security safeguards shall
protect personal information against loss
or theft, as well as unauthorized access,
disclosure, copying, use, or modification.
Symantec™ Security Information Manager
Manage response through workflow and distribute reporting automatically
Symantec™ Control Compliance Suite
Ensure system security by automates the management of deviations from technical standards/best practices
and providing the ability to remediate misconfigurations
Symantec Altiris
Inventory, treat, and manage information technology assets, ensuring the security posture throughout an assets lifecycle
Symantec Consulting Services
Threat and Vulnerability Management Programs to provide an integrated approach to vulnerability management
Monitor and Evaluate:
• ME1 Monitor and Evaluate IT Performance
Information Security Incident Management
13.1
InformationSecurityIncidentManagement
To ensure information security events and
weaknesses associated with information
systems are communicated in a manner
allowing timely corrective action to be taken
•
Symantec™ Security Information Manager
Ensure that systems are secure and best practices are in place
Symantec Consulting Services
Host Security Assessments to validate system security posture; host Hardening and Secure Build Programs
to manage system security
Project and support environments should be
strictly controlled
12.6
Symantec Consulting Services
Security Architecture and Design Assessments of infrastructure and applications to ensure security is a key design
element; Application Development Lifecycle Reviews to ensure threat and security assessment is an integral part
of the development process
• 4.7.1 – The security safeguards shall
protect personal information against loss
or theft, as well as unauthorized access,
disclosure, copying, use, or modification.
Deliver and Support:
• DS5 Ensure Systems Security
Cryptographic Controls
Symantec™ Security Information Manager
Ensure that systems are secure and best practices are in place
Symantec Consulting Services
Security Architecture and Design Assessments of infrastructure and applications to ensure security is a key design
element; Application Development Lifecycle Reviews to ensure threat and security assessment is an integral part
of the development process
To prevent errors, loss, unauthorized
modification or misuse of information in
applications
12.3
N/A
Deliver and Support:
• DS5 Ensure Systems Security
• DS8 Manage Service Desk and Incidents
• DS10 Manage Problems
N/A
Security Standard:
a) 6. Response and Reporting (R)
Maintain a Vulnerability Management Program:
6. Develop and maintain secure systems and
applications
III.C. Manage and
Control Risk
• 008 – Incident Reporting
and Response Planning
Regularly Monitor and Test Networks:
11. Regularly test security systems and processes
Monitor and Evaluate:
• ME1 Monitor and Evaluate IT Performance
• ME2 Monitor and Evaluate Internal Control
• 4.7.1 – The security safeguards shall
protect personal information against loss
or theft, as well as unauthorized access,
disclosure, copying, use, or modification.
Maintain an Information Security Policy:
12. Maintain a policy that addresses information
security for employees and contractors
Symantec™ Security Information Manager
Ability to gather, alert, and trend on security events and weaknesses in real time
Symantec™ Control Compliance Suite
Ensure system security by automates the management of deviations from technical standards/best practices
and providing the ability to remediate misconfigurations
Symantec Consulting Services
Develop policies, procedures, standards and guidelines covering Reporting Information Security Events
and Weaknesses; Provide Incident Response Programs
Formal event reporting and and
escalation procedures should be in
place
13.2
Management of Information Security
Incidents and Improvements
• To ensure a consistent and
effective approach is applied to the
management of information security
incidents
SECTION:
14
Deliver and Support:
• DS5 Ensure Systems Security
• DS8 Manage Service Desk and Incidents
• DS10 Manage Problems
Information Security Aspects
of Business Continuity Management
Maintain an Information Security Policy:
12. Maintain a policy that addresses information
security for employees and contractors
III.C. Manage and
Control Risk
III.C. Manage and
Control Risk
• 008 – Incident Reporting
and Response Planning
• 4.7.1 – The security safeguards shall
protect personal information against loss
or theft, as well as unauthorized access,
disclosure, copying, use, or modification.
Symantec™ Security Information Manager
Ability to manage security events through incident workflow and integration to change management systems
• 4.7.1 – The security safeguards shall
protect personal information against loss
or theft, as well as unauthorized access,
disclosure, copying, use, or modification.
Symantec™ Security Information Manager
Ensure that systems are secure and best practices are in place
Monitor and Evaluate:
• ME1 Monitor and Evaluate IT Performance
• ME2 Monitor and Evaluate Internal Control
Deliver and Support:
• DS4 Ensure Continuous Service
• DS10 Manage Problems
• DS11 Manage Data
To counteract interruptions to business
activities and to protect critical business
processes from the effects of major failures
or disasters and to ensure their timely
resumption
15
N/A
Symantec Consulting Services
Develop policies, procedures, standards and guidelines covering Management of Information Security Incidents;
provide Incident Response Programs
Business Continuity Management
14.1
SECTION:
N/A
Event Identification
Risk Response
Control Activities
Information and
Communication
• Monitoring
Security Standard:
a) 7. Disaster Recovery Plan (R)
a) 7. Testing and Revision Procedures (A)
a) 7. Applications and Data Criticality
Analysis (A)
Maintain an Information Security Policy:
12. Maintain a policy that addresses information
security for employees and contractors
•
•
•
•
•
Security Standard:
a) 1. Sanction Policy (R)
a) 6. Response and Reporting (R)
b) 1. Written Contract or Other
Arrangement (R)
Maintain an Information Security Policy:
12. Maintain a policy that addresses information
security for employees and contractors
•
•
•
•
• 009 – Recovery Plans for
Critical Cyber Assets
Veritas™ product line
Ensure rapid data recovery from major failures
Symantec Consulting Services
Develop business continuity strategy, framework, plans, policies and procedures; conduct business impact analysis
and operational risk assessments to develop business continuity plans
Compliance
15.1
Compliance with Legal Requirements
To avoid breaches of any law, statutory,
regulatory or contractual obligations, and
of any security requirements
Monitor and Evaluate:
• ME3 Ensure Regulatory Compliance
• ME4 Provide IT Governance
Internal Environment
Event Identification
Risk Assessment
Control Activities
Information and
Communication
• Monitoring
III.C. Manage and
Control Risk
III.F. Report to the
Board
Each Standard CIP includes
compliance measures
• 4.10.2 – Organizations shall put
procedures in place to receive and
respond to complaints or inquiries about
their policies and practices relating to the
handling of personal information.
Symantec™ Security Information Manager
Ensure that systems are secure and best practices are in place
Symantec™ Control Compliance Suite
Automate assessment of legal IT procedural and technical controls from across infrastructure management systems,
and consolidate evidence into a single repository
Symantec Enterprise Vault™
Support email retention, monitoring and discovery requirements
Symantec Data Loss Prevention - Identify, classify, and monitor movement of critical information stores across hetergenous
infrastructures
Symantec Consulting Services
Conduct security audits to ensure Compliance with Legal Requirements; provide onsite compliance monitoring
15.2
Compliance with Security Policies and
Standards, and Technical Compliance
To ensure compliance of systems with
organizational security policies and
standards
Acquire and Implement:
• AI7 Install and Accredit Solutions
and Changes
Monitor and Evaluate:
• ME1 Monitor and Evaluate IT Performance
• ME2 Monitor and Evaluate Internal Control
• ME4 Provide IT Governance
• Internal Environment
• Control Activities
• Monitoring
Security Standard:
a) 8. Technical evaluation that measures
compliance with security requirements
(R)
Regularly Monitor and Test Networks:
10. Track and monitor all access to network
resources and cardholder data
11. Regularly test security systems and processes
Maintain an Information Security Policy:
12. Maintain a policy that addresses information
security for employees and contractors
III.C. Manage and
Control Risk
III.E. Adjust the
Program
III.F. Report to the
Board
Each Standard CIP includes
compliance measures
N/A
Symantec™ Security Information Manager
Ensure that systems are secure and best practices are in place via integration with compliance tools
like Symantec Control Compliance Suite
Symantec™ Network Access Control
Enforces that managed endpoints (laptops, desktops and servers owned by the organization) meet minimum endpoint
security requirements/policies/standards prior to allowing access to the corporate network; non-compliant endpoint can
be automatically remediated
Symantec™ On-Demand Protection
Enforces that unmanaged endpoints (laptops, desktops and servers not owned by the organization) meet minimum
endpoint security requirements/policies/standards prior to allowing access to the corporate network
Symantec™ Control Compliance Suite
Ensure policy coverage via mapping to control objectives, and collect/trend evidence of compliance
to key regulations and frameworks
Symantec Data Loss Prevention - Identify, classify, and monitor critical information stores across hetergenous
infrastructures ensuring compliance with regulatory requirements
Symantec Enterprise Vault™
Automatically enforce retention, preservation and expiry of unstructured content such as email, IM and files
Symantec Consulting Services
Conduct security audits to ensure Compliance with Legal Requirements; provide onsite compliance monitoring
© 2009 Symantec Corporation. All rights reserved. 12315417-1
www.symantec.com/compliance