{"id":53008,"date":"2017-06-22T07:39:33","date_gmt":"2017-06-22T11:39:33","guid":{"rendered":"https:\/\/www.cyberark.com\/iso-iec\/"},"modified":"2020-07-16T21:46:03","modified_gmt":"2020-07-17T01:46:03","slug":"iso-iec","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/es\/solutions\/audit-compliance\/iso-iec\/","title":{"rendered":"ISO\/IEC 27002"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=\u00bbstretch_row\u00bb content_placement=\u00bbtop\u00bb css=\u00bb.vc_custom_1537199219328{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/aud-comp-hero.jpg?id=26743) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb el_class=\u00bbcyb-hero-section\u00bb][vc_column][vc_row_inner content_placement=\u00bbmiddle\u00bb el_class=\u00bbcyb-hero-header\u00bb][vc_column_inner el_class=\u00bbcyb-hero-header-text\u00bb][vc_custom_heading text=\u00bbISO\/IEC 27002&#8243; font_container=\u00bbtag:h1|text_align:left|color:%234d8fcc|line_height:2.625rem\u00bb use_theme_fonts=\u00bbyes\u00bb css=\u00bb.vc_custom_1537909361755{margin-bottom: 0.75rem !important;}\u00bb][vc_btn title=\u00bbDESCARGAR FICHA T\u00c9CNICA\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb#ffffff\u00bb shape=\u00bbsquare\u00bb link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fes%2Fresource%2Fprivileged-account-security-data-sheet%2F|\u00bb el_class=\u00bbcyb-button xlarge event-click\u00bb el_id=\u00bbISO\/IEC 27002 Page: Download Datasheet\u00bb][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column css=\u00bb.vc_custom_1538257810346{padding-top: 2rem !important;padding-bottom: 2rem !important;}\u00bb][vc_column_text]<\/p>\n<h4>Implemente la protecci\u00f3n de cuentas con privilegios para cumplir con la norma ISO\/IEC 27002<\/h4>\n<p>La norma 27002 de la Organizaci\u00f3n Internacional para la Normalizaci\u00f3n (ISO) y la Comisi\u00f3n Electrot\u00e9cnica Internacional (IEC) es un reglamento reconocido a escala internacional que establece buenas pr\u00e1cticas para la seguridad de la informaci\u00f3n. Cumplir esta norma reconocida en todo el mundo ayuda a las organizaciones a cumplir sus obligaciones contractuales con sus clientes y socios comerciales. Las licencias de operaci\u00f3n exigen cada vez m\u00e1s a los proveedores de servicios (desde centros de datos en la nube hasta bufetes de abogados) que demuestren que administran de forma responsable la informaci\u00f3n confidencial de una cartera de clientes globales. Los auditores de todo el mundo tambi\u00e9n toman la seguridad de la norma ISO 27002 como referencia para evaluar los controles o verificar el cumplimiento de distintos reglamentos y normas.<\/p>\n<p>La <a href=\"https:\/\/www.cyberark.com\/es\/products\/privileged-account-security-solution\/privileged-session-manager\/\">soluci\u00f3n CyberArk Privileged Access Security<\/a> permite a las empresas implementar la gama completa de controles de la norma ISO\/IEC 27002:2013 relacionada con la seguridad de las cuentas con privilegios. Las prestaciones centralizadas de gesti\u00f3n y generaci\u00f3n de informes de la soluci\u00f3n permiten que los inspectores de seguridad, los auditores y los organismos de certificaci\u00f3n de la seguridad seg\u00fan la ISO comprueben f\u00e1cilmente c\u00f3mo se gestionan y controlan las cuentas privilegiadas, por lo que se reducen los costes de las evaluaciones.<\/p>\n<p>Principales ventajas:<\/p>\n<ul>\n<li>Proteja todos los componentes del sistema de todas sus instalaciones de procesamiento de informaci\u00f3n<\/li>\n<li>Genere responsabilidad y controles del uso de las cuentas privilegiadas<\/li>\n<li>Reduzca los costes de las inspecciones de seguridad, las auditor\u00edas y la certificaci\u00f3n ISO 27002<\/li>\n<li>Aumente su conciencia situacional y su visibilidad de todas las instalaciones de procesamiento de informaci\u00f3n<\/li>\n<li>Implemente los controles de seguridad de la ISO y cumpla los requisitos de la normativa en materia de protecci\u00f3n de cuentas privilegiadas como la ley de Portabilidad y Responsabilidad de Seguros M\u00e9dicos de EE. UU. (HIPAA), la ley SOX y las directrices del NIST.<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=\u00bbstretch_row\u00bb content_placement=\u00bbtop\u00bb css=\u00bb.vc_custom_1537199219328{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/aud-comp-hero.jpg?id=26743) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb el_class=\u00bbcyb-hero-section\u00bb][vc_column][vc_row_inner content_placement=\u00bbmiddle\u00bb el_class=\u00bbcyb-hero-header\u00bb][vc_column_inner el_class=\u00bbcyb-hero-header-text\u00bb][vc_custom_heading text=\u00bbISO\/IEC 27002&#8243; font_container=\u00bbtag:h1|text_align:left|color:%234d8fcc|line_height:2.625rem\u00bb use_theme_fonts=\u00bbyes\u00bb css=\u00bb.vc_custom_1537909361755{margin-bottom: 0.75rem !important;}\u00bb][vc_btn title=\u00bbDESCARGAR FICHA T\u00c9CNICA\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb#ffffff\u00bb shape=\u00bbsquare\u00bb link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fes%2Fresource%2Fprivileged-account-security-data-sheet%2F|\u00bb el_class=\u00bbcyb-button xlarge event-click\u00bb el_id=\u00bbISO\/IEC&#8230;<\/p>\n","protected":false},"author":17,"featured_media":0,"parent":53032,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-53008","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cumpla la norma ISO\/IEC 27002 con las soluciones de CyberArk<\/title>\n<meta name=\"description\" content=\"Las soluciones de seguridad para cuentas privilegiadas de CyberArk permiten a las organizaciones proteger sus cuentas privilegiadas para cumplir los requisitos de la norma ISO\/IEC 27002.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/iso-iec\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ISO\/IEC 27002\" \/>\n<meta property=\"og:description\" content=\"Las soluciones de seguridad para cuentas privilegiadas de CyberArk permiten a las organizaciones proteger sus cuentas privilegiadas para cumplir los requisitos de la norma ISO\/IEC 27002.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/iso-iec\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-17T01:46:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"535\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/iso-iec\/\",\"url\":\"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/iso-iec\/\",\"name\":\"Cumpla la norma ISO\/IEC 27002 con las soluciones de CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"datePublished\":\"2017-06-22T11:39:33+00:00\",\"dateModified\":\"2020-07-17T01:46:03+00:00\",\"description\":\"Las soluciones de seguridad para cuentas privilegiadas de CyberArk permiten a las organizaciones proteger sus cuentas privilegiadas para cumplir los requisitos de la norma ISO\/IEC 27002.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/iso-iec\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/iso-iec\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/iso-iec\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Soluciones de Seguridad de la Identidad\",\"item\":\"https:\/\/www.cyberark.com\/solutions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Auditor\u00eda y conformidad normativa\",\"item\":\"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"ISO\/IEC 27002\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cumpla la norma ISO\/IEC 27002 con las soluciones de CyberArk","description":"Las soluciones de seguridad para cuentas privilegiadas de CyberArk permiten a las organizaciones proteger sus cuentas privilegiadas para cumplir los requisitos de la norma ISO\/IEC 27002.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/iso-iec\/","og_locale":"es_ES","og_type":"article","og_title":"ISO\/IEC 27002","og_description":"Las soluciones de seguridad para cuentas privilegiadas de CyberArk permiten a las organizaciones proteger sus cuentas privilegiadas para cumplir los requisitos de la norma ISO\/IEC 27002.","og_url":"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/iso-iec\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2020-07-17T01:46:03+00:00","og_image":[{"width":1024,"height":535,"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/iso-iec\/","url":"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/iso-iec\/","name":"Cumpla la norma ISO\/IEC 27002 con las soluciones de CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"datePublished":"2017-06-22T11:39:33+00:00","dateModified":"2020-07-17T01:46:03+00:00","description":"Las soluciones de seguridad para cuentas privilegiadas de CyberArk permiten a las organizaciones proteger sus cuentas privilegiadas para cumplir los requisitos de la norma ISO\/IEC 27002.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/iso-iec\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/solutions\/audit-compliance\/iso-iec\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/iso-iec\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Soluciones de Seguridad de la Identidad","item":"https:\/\/www.cyberark.com\/solutions\/"},{"@type":"ListItem","position":3,"name":"Auditor\u00eda y conformidad normativa","item":"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/"},{"@type":"ListItem","position":4,"name":"ISO\/IEC 27002"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages\/53008","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/comments?post=53008"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages\/53008\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages\/53032"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/media?parent=53008"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/product_category?post=53008"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}