Regulatory Compliance

Logcollect was designed with regulatory and audit requirements in mind. It provides end-to-end support for security logging, retention, and reporting across multiple frameworks while keeping storage costs under control.

compliance
lifecycle-support

Full Lifecycle Support

  • Map of requirement to implementation – clear traceability from control to log data and reports.
  • Automatic report generation for each supported framework.
  • Framework for annotation – annotate findings, compensating controls, and remediation steps.
  • Proven across many customers worldwide, including U.S. Government and DoD environments.

Support for 26 Frameworks

Out-of-the-box content and reporting for a broad range of regulatory and industry standards, including:

PCI DSS

The Payment Card Industry is a private industry group set up by the major credit card companies to define standards for companies that process…

HIPAA

HIPAA regulations were established to protect the integrity of patient information and compliance is intended to secure health information against…

NIST 800-171

National Institute of Standards and Technology’s (NIST) Special Publication (SP) 800-171 outlines cybersecurity-related requirements…

FISMA/NIST 800-53

(NIST) announced the Final Release of Special Publication (SP) 800-53, Revision 4, Security and Privacy Controls for Federal Information Systems…

GDPR

The EU General Data Protection Regulation (GDPR) protects the personal information and data privacy of EU citizens, or individuals that reside in…

NERC

NERC develops and enforces Reliability Standards; annually assesses seasonal and long-term reliability; monitors the bulk power system through…

SAS 70

Since 1992, companies that provide business process outsourcing and data services, also known as service organizations, have utilized Statement…

GPG 13

The Good Practice Guide 13 (GPG 13) is a protective monitoring framework for all British government systems and networks, service providers and…

NIST CSF

The President of the United States issued Executive Order (EO) 13636, Improving Critical Infrastructure Cybersecurity, to address the growing…

ARS v3.1

The Centers for Medicare & Medicaid Services (CMS) Information Security ARS, CMSR contain a broad set of required security standards based upon…

CJIS

The Criminal Justice Information System (CJIS) Security Policy was created by the Federal Bureau of Investigation (FBI) to provide guidance to…

DoDI 8500

The DoD Information Assurance Certification and Accreditation Process (DIACAP) is the DoD process to ensure that risk management is applied on…

FFIEC/CFPB

FFIEC requires financial institutions and their service providers to maintain effective security compliance management programs which provide…

ICD503/DCID 6/3

The Director of Central Intelligence Directive 6/3 governs the protection of sensitive compartmented information within Information Systems.

GCSx

(GCSX) is a secure wide area network (WAN) that allows officials at local public-sector organizations to interact and share data privately and…

GLBA

The Gramm-Leach-Bliley Act requires financial services companies to explain their information-sharing practices to their customers, plus safeguard…

NIST (RMF)

There are a number of approaches to managing risk. Managing risk is a complex process and requires the input from the whole organization…

NCUA

NCUA is an independent federal agency that requires U.S. federally-insured credit unions to establish a security program that addresses the privacy…

ISO 27001

ISO/IEC 27001 formally specifies an Information Security Management System (ISMS), a suite of activities concerning the management of information…

ISO 27002

ISO 27002 provides organizations with the assurance of knowing that they are protecting their information assets using criteria in harmonization…

JAFAN

JAFAN Manual for Protecting SAP Information within Information Systems manual establishes the security policy and procedures for storing…

NISPOM

ISO/IEC 27001 formally specifies an Information Security Management System (ISMS), a suite of activities concerning the management of information…

SANS CAG

The Twenty (20) Critical Security Controls for Cyber Defense are a culmination of exhaustive research and development of information security…

23 NYCRR 500

The New York State Department of Financial Services (DFS) has passed the State of New York’s Cybersecurity Requirements for Financial…

NDB Australia

The Notifiable Data Breaches (NDB) was passed as an Amendment to the Australian Privacy Act and aims to help people whose personal information…

SOX 404

The Sarbanes-Oxley Act came into force in 2002 and introduced major changes to the regulation of financial practice and corporate governance…