{"id":32246,"date":"2017-06-22T07:39:33","date_gmt":"2017-06-22T11:39:33","guid":{"rendered":"https:\/\/www.cyberark.com\/iso-iec\/"},"modified":"2022-03-22T11:39:03","modified_gmt":"2022-03-22T15:39:03","slug":"iso-iec","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/de\/solutions\/audit-compliance\/iso-iec\/","title":{"rendered":"ISO\/IEC 27002"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8220;stretch_row&#8220; content_placement=&#8220;top&#8220; css=&#8220;.vc_custom_1537199219328{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/aud-comp-hero.jpg?id=26743) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220; el_class=&#8220;cyb-hero-section&#8220;][vc_column][vc_row_inner content_placement=&#8220;middle&#8220; el_class=&#8220;cyb-hero-header&#8220;][vc_column_inner el_class=&#8220;cyb-hero-header-text&#8220;][vc_custom_heading text=&#8220;ISO\/IEC 27002&#8243; font_container=&#8220;tag:h1|text_align:left|color:%234d8fcc|line_height:2.625rem&#8220; use_theme_fonts=&#8220;yes&#8220; css=&#8220;.vc_custom_1537909361755{margin-bottom: 0.75rem !important;}&#8220;][vc_btn title=&#8220;DATENBLATT HERUNTERLADEN&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;#ffffff&#8220; shape=&#8220;square&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Fresources%2Fproduct-datasheets%2Fdatenblatt-privileged-account-security&#8220; el_class=&#8220;cyb-button xlarge event-click&#8220; el_id=&#8220;ISO\/IEC 27002 Page: Download Datasheet&#8220;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column css=&#8220;.vc_custom_1538257810346{padding-top: 2rem !important;padding-bottom: 2rem !important;}&#8220;][vc_column_text]<\/p>\n<h4>Privileged-Account-Security zur Erf\u00fcllung von ISO\/IEC 27002 schnell und einfach implementieren<\/h4>\n<p>Die Norm 27002 der International Organization for Standardization (ISO) und der International Electrotechnical Commission (IEC) ist ein weltweit anerkannter Standard, der Empfehlungen f\u00fcr Kontrollmechanismen f\u00fcr die Informationssicherheit beinhaltet. Durch die Befolgung dieses internationalen Standards k\u00f6nnen Unternehmen ihre vertraglichen Verpflichtungen gegen\u00fcber Kunden und Gesch\u00e4ftspartnern besser erf\u00fcllen. Betreiber von Cloud-Rechenzentren bis hin zu Anwaltskanzleien stehen immer h\u00e4ufiger in der Pflicht, Ihren verantwortungsvollen Umgang mit sensiblen Informationen im Rahmen von ISO\/IEC 27002 nachweisen. Auch Auditoren in aller Welt nutzen die Norm als Grundlage, um Kontrollmechanismen zu bewerten und die Einhaltung verschiedener Vorschriften und Standards zu pr\u00fcfen.<\/p>\n<p>Die <a href=\"https:\/\/www.cyberark.com\/de\/products\/privileged-access\/\">CyberArk Privileged Access Security L\u00f6sung<\/a> versetzt Unternehmen in die Lage, s\u00e4mtliche Kontrollen gem\u00e4\u00df ISO\/IEC 27002:2013 in Bezug auf die Sicherung privilegierter Accounts umzusetzen. Dank den Funktionen f\u00fcr zentrales Management und Reporting k\u00f6nnen Sicherheitsgutachter, Auditoren und ISO-Zertifizierungsstellen die Verwaltung und Kontrolle privilegierter Accounts einfach pr\u00fcfen, wodurch die Kosten entsprechender Verfahren sinken.<\/p>\n<p>Vorteile:<\/p>\n<ul>\n<li>Sch\u00fctzen Sie s\u00e4mtliche Systemkomponenten in Ihren Datenverarbeitungseinrichtungen.<\/li>\n<li>Schaffen Sie Verantwortlichkeit und setzen Sie Kontrollmechanismen bei der Nutzung privilegierter Accounts ein.<\/li>\n<li>Erzielen Sie Einsparungen bei Sicherheitsgutachten, Audits und Zertifizierungen nach ISO\/IEC 27002.<\/li>\n<li>Verbessern Sie Lageerfassung und Transparenz in Ihren Datenverarbeitungseinrichtungen.<\/li>\n<li>Implementieren Sie ISO-Sicherheitskontrollen und erf\u00fcllen Sie Compliance-Anforderungen (z.\u00a0B. HIPAA, SOX, NIST) bez\u00fcglich der Sicherung privilegierter Accounts.<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8220;stretch_row&#8220; content_placement=&#8220;top&#8220; css=&#8220;.vc_custom_1537199219328{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/aud-comp-hero.jpg?id=26743) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220; el_class=&#8220;cyb-hero-section&#8220;][vc_column][vc_row_inner content_placement=&#8220;middle&#8220; el_class=&#8220;cyb-hero-header&#8220;][vc_column_inner el_class=&#8220;cyb-hero-header-text&#8220;][vc_custom_heading text=&#8220;ISO\/IEC 27002&#8243; font_container=&#8220;tag:h1|text_align:left|color:%234d8fcc|line_height:2.625rem&#8220; use_theme_fonts=&#8220;yes&#8220; css=&#8220;.vc_custom_1537909361755{margin-bottom: 0.75rem !important;}&#8220;][vc_btn title=&#8220;DATENBLATT HERUNTERLADEN&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;#ffffff&#8220; shape=&#8220;square&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Fresources%2Fproduct-datasheets%2Fdatenblatt-privileged-account-security&#8220; el_class=&#8220;cyb-button xlarge event-click&#8220; el_id=&#8220;ISO\/IEC 27002&#8230;<\/p>\n","protected":false},"author":17,"featured_media":0,"parent":32278,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-32246","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Mit CyberArk L\u00f6sungen k\u00f6nnen Sie die ISO\/IEC 27002 Compliance Anforderungen problemlos erf\u00fcllen.<\/title>\n<meta name=\"description\" content=\"Die CyberArk Privileged Account Security L\u00f6sung erm\u00f6glicht Unternehmen den Schutz privilegierter Accounts zur Erf\u00fcllung der Norm ISO\/IEC 27002.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/iso-iec\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ISO\/IEC 27002\" \/>\n<meta property=\"og:description\" content=\"Die CyberArk Privileged Account Security L\u00f6sung erm\u00f6glicht Unternehmen den Schutz privilegierter Accounts zur Erf\u00fcllung der Norm ISO\/IEC 27002.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/iso-iec\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-22T15:39:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"535\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/iso-iec\/\",\"url\":\"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/iso-iec\/\",\"name\":\"Mit CyberArk L\u00f6sungen k\u00f6nnen Sie die ISO\/IEC 27002 Compliance Anforderungen problemlos erf\u00fcllen.\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"datePublished\":\"2017-06-22T11:39:33+00:00\",\"dateModified\":\"2022-03-22T15:39:03+00:00\",\"description\":\"Die CyberArk Privileged Account Security L\u00f6sung erm\u00f6glicht Unternehmen den Schutz privilegierter Accounts zur Erf\u00fcllung der Norm ISO\/IEC 27002.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/iso-iec\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/iso-iec\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/iso-iec\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"L\u00f6sungen f\u00fcr Identity Security\",\"item\":\"https:\/\/www.cyberark.com\/solutions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Audit und Compliance\",\"item\":\"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"ISO\/IEC 27002\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Mit CyberArk L\u00f6sungen k\u00f6nnen Sie die ISO\/IEC 27002 Compliance Anforderungen problemlos erf\u00fcllen.","description":"Die CyberArk Privileged Account Security L\u00f6sung erm\u00f6glicht Unternehmen den Schutz privilegierter Accounts zur Erf\u00fcllung der Norm ISO\/IEC 27002.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/iso-iec\/","og_locale":"de_DE","og_type":"article","og_title":"ISO\/IEC 27002","og_description":"Die CyberArk Privileged Account Security L\u00f6sung erm\u00f6glicht Unternehmen den Schutz privilegierter Accounts zur Erf\u00fcllung der Norm ISO\/IEC 27002.","og_url":"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/iso-iec\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2022-03-22T15:39:03+00:00","og_image":[{"width":1024,"height":535,"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"2 Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/iso-iec\/","url":"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/iso-iec\/","name":"Mit CyberArk L\u00f6sungen k\u00f6nnen Sie die ISO\/IEC 27002 Compliance Anforderungen problemlos erf\u00fcllen.","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"datePublished":"2017-06-22T11:39:33+00:00","dateModified":"2022-03-22T15:39:03+00:00","description":"Die CyberArk Privileged Account Security L\u00f6sung erm\u00f6glicht Unternehmen den Schutz privilegierter Accounts zur Erf\u00fcllung der Norm ISO\/IEC 27002.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/iso-iec\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/solutions\/audit-compliance\/iso-iec\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/iso-iec\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"L\u00f6sungen f\u00fcr Identity Security","item":"https:\/\/www.cyberark.com\/solutions\/"},{"@type":"ListItem","position":3,"name":"Audit und Compliance","item":"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/"},{"@type":"ListItem","position":4,"name":"ISO\/IEC 27002"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/32246","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/comments?post=32246"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/32246\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/32278"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/media?parent=32246"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/product_category?post=32246"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}