Product Alignment 27k1
Read to discover how the Egress Platform can assist your business in becoming ISO 27001:2013 compliant.
The Egress Platform can be used, along with appropriate documented policies and procedures, to assist organisations in achieving their goal of compliance with the ISO 27001:2013 standard for an Information Security Management System.
Below is a table of the ISO 27001 Annex A controls and how the Egress Platform can aid compliance with those controls.
A.8 – Asset Management
A.8.2 – Information Classification
A.8.2 – Information Classification |
|
Objective: To ensure that information receives an appropriate level of protection in accordance with its importance to the organisation. The Egress platform is relevant to the following controls:
|
Egress Protect and Egress Prevent enables administrators to configure a relevant digital information classification scheme for their organisation, dependant on the legal requirements, value, criticality and sensitivity of that information. Users can use Egress Protect and Egress Prevent swiftly and easily classify their documentation, mail and other unstructured data, with labels, overlays, watermarks and metadata, in accordance with the information classification scheme that the administrator has configured for the organisation. If Egress Protect and Egress Prevent is used in correlation with appropriate documentation, then the ISO 27001:2013 A.8.2 controls can be reached, and compliance with this control achieved. |
A.8.3 – Media Handling
A.8.3 – Media Handling |
|
Objective: To prevent unauthorised disclosure, modification, removal or destruction of information stored on media. The Egress platform is relevant to the following controls:
|
A feature of Egress Protect and Egress Prevent which aids compliance with A.8.3.3, is the ability to create encrypted packages on removable media, for example writing to USB sticks and burning onto disks. The software ensures confidentiality and integrity of information whilst being transported through this vector, via encryption, as well as access control to prevent unauthorised access, and audit logs of access and usage to combat misuse or corruption. Information on removable media can also be classified using Egress Protect and Egress Prevent, which, along with appropriate procedures by the customer organisation, can achieve compliance with the A.8.3.1 control also. |
A.9 – Access Control
A.9.1 – Business Requirements of Access Control
A.9.1 – Business Requirements of Access Control |
|
Objective: To limit access to information and information processing facilities. The Egress platform is relevant to the following controls:
|
The Egress platform is compatible with ADFS login which allows for role-based access control for Egress accounts (and other software). Additionally, Egress Secure Workspace is a cloud-hosted secure solution to file management and storage. Users can create document ‘Zones’ to store projects, create and edit files within them. They can then share those Zones with varying permission settings, providing appropriate access to their peers whilst still having control over potentially sensitive information, thereby aiding compliance with the control. |
A.9.4 – System and Application Access Control
A.9.4 – System and Application Access Control |
|
Objective: To prevent unauthorised access to systems and applications. The Egress platform is relevant to the following controls:
|
One of the main reasons for using Egress Protect is to ensure that access to information is restricted to only those who require it. Egress Protect encrypts emails and files into Egress packages so that when emails are sent, they can still be controlled by the sender (package owner) to restrict access in accordance with policy, even if an email or file has been sent to individual(s) who should not have access. Egress Secure Workspace also aids compliance with the control, alongside appropriate documentation, as it can be used to segregate organisation users from company information that they should not have access to, without preventing users from collaborating on or sharing information and data that requires sharing. |
A.10 – Cryptography
A.10.1 – Cryptographic Controls
A.10.1 – Cryptographic Controls |
|
Objective: To ensure proper and effective use of cryptography to protect the confidentiality, authenticity and/or integrity of information. The Egress platform is relevant to the following controls:
|
Egress Protect and Egress Secure Workspace are both ‘cryptographic control’ solutions which allow customers to enforce a higher level of security through cryptography, therefore, along with appropriate policy documentation, they can be used to aid in compliance with A.10. Both solutions can be used to secure files and unstructured data (as well as the information that are contained within these) in order to protect confidentiality and integrity. |
A.12 Operational Security
A.12.2 – Protection from Malware
A.12.2 – Protection from Malware |
|
Objective: To ensure that information and information processing facilities are protected against malware. The Egress platform is relevant to the following controls:
|
As a file management system, Egress Secure Workspace provides a multitude of security features which benefits end users. Features such as automatically scanning all uploaded content for anything malicious; white and blacklist-filtering of uploaded content which is done by inspecting file content not just the extension or filename; preventing macros from running when using both the Egress and Microsoft Office online editors; and segregating files away from user devices all help to avoid any malware infections that can be transferred through files. |
A.12.4 – Logging and Monitoring
A.12.4 – Logging and Monitoring |
|
Objective: To record events and generate evidence. The Egress platform is relevant to the following controls:
|
The Egress platform is designed with event logging in mind. When packages are created with Egress Protect, every single access attempt that is made to the package (successful or unsuccessful) is logged and can be viewed using the application, thereby complying with the control when coupled with regular review. Egress Secure Workspace also has event logging; the event logging shows the different users who have accessed content within Egress Secure Workspace, as well as whether they have edited any content and, if so, what editor they used to do so. Egress Respond allows even deeper review of user event logs. It shows user email activity and can then also highlight the types of information that users are sending, how they are sending it, who they are sending it to and whether they are operating against business policy. |
A.13 – Communications Security
A.13.1 – Information Transfer
A.13.2 – Information Transfer |
|
Objective: To maintain the security of information transferred within an organisation and with any external entity. The Egress platform is relevant to the following controls:
|
Egress’ flagship product, Egress Protect, allows users to have control of their emails even after they are sent, granting assurance and protection. Emails, depending on their classification (chosen by the user), are encrypted over a TLS connection with an RSA 2048 bit (SHA256 with RSA) certificate and sent to the recipient in the form of an Egress ‘.switch’ package, which the sender has full control of. They can remotely revoke access, allow others to access packages, as well as see who has and has not tried to access the packages. |
A.14 – System Acquisition, Development and Maintenance
A.14.1 – Security Requirements of Information Systems
A.14.1 – Security Requirements of Information Systems |
|
Objective: To ensure that information security is an integral part of information systems across the entire lifecycle. This also includes the requirements for information systems which provide services over public networks. The Egress platform is relevant to the following controls:
|
Egress Protect will secure information contained within Egress ‘.switch’ packages as they make their way to their destination across the internet (a public network). The encryption that Egress packages are secured with will protect the mail and file content from fraudulent activity as well as from unauthorised disclosure (using audit logging and the ability to change package access) and modification (unique package IDs and using audit logging). Egress Secure Workspace provides a secure service for users to work and collaborate on documents and files over the internet (a public network). The information sent between the user and the Egress Secure Workspace is encrypted. |
A.18 – Compliance
A.18.1 – Compliance with Legal and Contractual Requirements
A.18.1 – Compliance with Legal and Contractual Requirements |
|
Objective: To avoid breaches of legal, statutory, regulatory or contractual obligations related to information security and of any security requirements. The Egress platform is relevant to the following controls:
|
Egress Protect can help meet some of the compliance requirements of ISO 27001:2013 by ensuring that data is protected while at rest and in transit. This means information is appropriately secured, integrity maintained and only accessible to authorised personnel. Additionally, when Egress Protect used in conjunction with Egress Prevent, they can help to prevent unauthorised access and unauthorised release of information by alerting the user of any conflicts. For example, A spreadsheet which has been classified as “Internal” would raise a warning message if a user was attempting to send it to an external recipient. |