{"id":42030,"date":"2017-06-22T07:39:33","date_gmt":"2017-06-22T11:39:33","guid":{"rendered":"https:\/\/www.cyberark.com\/iso-iec\/"},"modified":"2020-07-16T21:46:29","modified_gmt":"2020-07-17T01:46:29","slug":"iso-iec","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/it\/solutions\/audit-compliance\/iso-iec\/","title":{"rendered":"ISO\/IEC 27002"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;top&#8221; css=&#8221;.vc_custom_1537199219328{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/aud-comp-hero.jpg?id=26743) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_class=&#8221;cyb-hero-section&#8221;][vc_column][vc_row_inner content_placement=&#8221;middle&#8221; el_class=&#8221;cyb-hero-header&#8221;][vc_column_inner el_class=&#8221;cyb-hero-header-text&#8221;][vc_custom_heading text=&#8221;ISO\/IEC 27002&#8243; font_container=&#8221;tag:h1|text_align:left|color:%234d8fcc|line_height:2.625rem&#8221; use_theme_fonts=&#8221;yes&#8221; css=&#8221;.vc_custom_1537909361755{margin-bottom: 0.75rem !important;}&#8221;][vc_btn title=&#8221;SCARICA IL DATA SHEET&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;#ffffff&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fit%2Fresource%2Fprivileged-account-security-data-sheet%2F|&#8221; el_class=&#8221;cyb-button xlarge event-click&#8221; el_id=&#8221;ISO\/IEC 27002 Page: Download Datasheet&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column css=&#8221;.vc_custom_1538257810346{padding-top: 2rem !important;padding-bottom: 2rem !important;}&#8221;][vc_column_text]<\/p>\n<h4>Implementare la sicurezza degli account privilegiati per superare i controlli ISO\/IEC 27002<\/h4>\n<p>International Organization for Standardization (ISO) e International Electrotechnical Commission (IEC) 27002 sono standard di rilevanza internazionale che includono best practice per la sicurezza delle informazioni. Questi standard riconosciuti a livello internazionale aiutano le organizzazioni a rispettare gli obblighi contrattuali con i clienti e i Partner di business. La licenza di esercizio dei service provider, dai data center cloud agli uffici legali, \u00e8 sempre pi\u00f9 subordinata alla dimostrazione di una tutela responsabile dei dati sensibili per una clientela globale. Anche gli auditor in tutto il mondo si affidano alla sicurezza ISO 27002 come base per valutare i controlli e\/o verificare la conformit\u00e0 a vari regolamenti e standard.<\/p>\n<p>La <a href=\"https:\/\/www.cyberark.com\/it\/products\/privileged-account-security-solution\/privileged-session-manager\/\">soluzione CyberArk Privileged Access Security<\/a> consente alle organizzazioni di implementare la gamma completa dei controlli previsti dallo standard ISO\/IEC 27002:2013 relativi alla messa in sicurezza degli account privilegiati. Grazie alle funzionalit\u00e0 di gestione centralizzata e reporting incluse nella soluzione, i revisori della sicurezza, gli auditor e gli enti di certificazione della sicurezza ISO possono verificare facilmente la gestione e il controllo degli accessi privilegiati, riducendo il costo delle valutazioni.<\/p>\n<p>Vantaggi principali:<\/p>\n<ul>\n<li>Proteggere tutti i componenti di sistema nelle strutture di elaborazione delle informazioni<\/li>\n<li>Creare un processo di responsabilizzazione e controllo sull&#8217;utilizzo degli account privilegiati<\/li>\n<li>Ridurre il costo delle revisioni di sicurezza, degli audit e della certificazione ISO 27002<\/li>\n<li>Aumentare la consapevolezza situazionale e la visibilit\u00e0 nelle strutture di elaborazione delle informazioni<\/li>\n<li>Implementare i controlli di sicurezza ISO e rispettare i requisiti di conformit\u00e0 (es. HIPAA, SOX, NIST) relativi alla sicurezza degli account privilegiati<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;top&#8221; css=&#8221;.vc_custom_1537199219328{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/aud-comp-hero.jpg?id=26743) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_class=&#8221;cyb-hero-section&#8221;][vc_column][vc_row_inner content_placement=&#8221;middle&#8221; el_class=&#8221;cyb-hero-header&#8221;][vc_column_inner el_class=&#8221;cyb-hero-header-text&#8221;][vc_custom_heading text=&#8221;ISO\/IEC 27002&#8243; font_container=&#8221;tag:h1|text_align:left|color:%234d8fcc|line_height:2.625rem&#8221; use_theme_fonts=&#8221;yes&#8221; css=&#8221;.vc_custom_1537909361755{margin-bottom: 0.75rem !important;}&#8221;][vc_btn title=&#8221;SCARICA IL DATA SHEET&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;#ffffff&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fit%2Fresource%2Fprivileged-account-security-data-sheet%2F|&#8221; el_class=&#8221;cyb-button xlarge event-click&#8221;&#8230;<\/p>\n","protected":false},"author":17,"featured_media":0,"parent":42076,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-42030","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Soddisfa i requisiti dei controlli ISO\/IEC 27002 con le soluzioni CyberArk<\/title>\n<meta name=\"description\" content=\"Le soluzioni Privileged Access Security di CyberArk consentono alle organizzazioni di implementare la sicurezza degli accessi privilegiati per allinearsi agli standard ISO\/IEC 27002.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/iso-iec\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ISO\/IEC 27002\" \/>\n<meta property=\"og:description\" content=\"Le soluzioni Privileged Access Security di CyberArk consentono alle organizzazioni di implementare la sicurezza degli accessi privilegiati per allinearsi agli standard ISO\/IEC 27002.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/iso-iec\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-17T01:46:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"535\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/iso-iec\/\",\"url\":\"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/iso-iec\/\",\"name\":\"Soddisfa i requisiti dei controlli ISO\/IEC 27002 con le soluzioni CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"datePublished\":\"2017-06-22T11:39:33+00:00\",\"dateModified\":\"2020-07-17T01:46:29+00:00\",\"description\":\"Le soluzioni Privileged Access Security di CyberArk consentono alle organizzazioni di implementare la sicurezza degli accessi privilegiati per allinearsi agli standard ISO\/IEC 27002.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/iso-iec\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/iso-iec\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/iso-iec\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Soluzioni di Identity Security\",\"item\":\"https:\/\/www.cyberark.com\/solutions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Audit e conformit\u00e0\",\"item\":\"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"ISO\/IEC 27002\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Soddisfa i requisiti dei controlli ISO\/IEC 27002 con le soluzioni CyberArk","description":"Le soluzioni Privileged Access Security di CyberArk consentono alle organizzazioni di implementare la sicurezza degli accessi privilegiati per allinearsi agli standard ISO\/IEC 27002.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/iso-iec\/","og_locale":"it_IT","og_type":"article","og_title":"ISO\/IEC 27002","og_description":"Le soluzioni Privileged Access Security di CyberArk consentono alle organizzazioni di implementare la sicurezza degli accessi privilegiati per allinearsi agli standard ISO\/IEC 27002.","og_url":"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/iso-iec\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2020-07-17T01:46:29+00:00","og_image":[{"width":1024,"height":535,"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Tempo di lettura stimato":"2 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/iso-iec\/","url":"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/iso-iec\/","name":"Soddisfa i requisiti dei controlli ISO\/IEC 27002 con le soluzioni CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"datePublished":"2017-06-22T11:39:33+00:00","dateModified":"2020-07-17T01:46:29+00:00","description":"Le soluzioni Privileged Access Security di CyberArk consentono alle organizzazioni di implementare la sicurezza degli accessi privilegiati per allinearsi agli standard ISO\/IEC 27002.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/iso-iec\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/solutions\/audit-compliance\/iso-iec\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/iso-iec\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Soluzioni di Identity Security","item":"https:\/\/www.cyberark.com\/solutions\/"},{"@type":"ListItem","position":3,"name":"Audit e conformit\u00e0","item":"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/"},{"@type":"ListItem","position":4,"name":"ISO\/IEC 27002"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/42030","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/comments?post=42030"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/42030\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/42076"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/media?parent=42030"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/product_category?post=42030"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}