Coverage

Requirements coverage ENS Supplier ATOS

Requeriments Capacities Services/Solutions Coverage
org.1 Security Policy Compliance, Cybersecurity assessment, Risk and Vulnerability Management, Communications plan
Compliance and supplier approval services Partial coverage
Global Intelligence Service Partial coverage
org.2 Security standard Compliance
org.3 Security procedures Compliance, Use control policy, Activity log policy, Backup Policy
Business Continuity Management Services (BCMS) Partial coverage
org.4 Authorization process Account management, PKI infrastructure
Evidian Web Access Manager (Web Access Control) Partial coverage
Evidian Identity Governance & Administration Partial coverage
Evidian Analytics & Intelligence (Identity Management) Partial coverage
Horus IoT Solutions (Plataforma IoT) Partial coverage
op.pl.1 Risk analysis Cybersecurity assessment, Risk and Vulnerability Management
Information Security Management Services (ISMS) Partial coverage
Risk Analysis and Management Services Partial coverage
Security Strategy Services Partial coverage
Compliance and supplier approval services Partial coverage
Technical security offices Partial coverage
Compliance audit Partial coverage
Vulnerability analysis Partial coverage
Global Intelligence Service Partial coverage
op.pl.2 Security architecture Network communications control, Secure network design
Security Infrastructures in Industrial Environments Partial coverage
Information Security Management Services (ISMS) Partial coverage
Security Strategy Services Partial coverage
Compliance and supplier approval services Partial coverage
Trustway IP Protect (Network Encryption) Full coverage
op.pl.3 Acquisition of new components Configuration control, Equipment use control, Device control
op.pl.4 Sizing / Capacity Management Hardware and software inventory, Redundancy system
Business Continuity Management Services (BCMS) Partial coverage
op.pl.5 Certified components Certification of the main ICS providers
op.acc.1 Identification Hardware and software inventory, Access control policy
Identity, Access, Electronic Signature, Smart Cards and Biometrics Service Partial coverage
Evidian Web Access Manager (Web Access Control) Partial coverage
Evidian Identity Governance & Administration Partial coverage
op.acc.2 Access requirements Basic user access control, Multi-factor user access control, Access control policy
Identity, Access, Electronic Signature, Smart Cards and Biometrics Service Partial coverage
Evidian Web Access Manager (Web Access Control) Partial coverage
Evidian Identity Governance & Administration Partial coverage
Evidian Analytics & Intelligence (Identity Management) Partial coverage
op.acc.3 Segregation of functions and tasks Account management
Evidian Identity Governance & Administration Full coverage
Evidian Analytics & Intelligence (Identity Management) Full coverage
Evidian Web Access Manager (Web Access Control) Full coverage
op.acc.4 Access rights management process Device control, Account management
Evidian Web Access Manager (Web Access Control) Partial coverage
Evidian Identity Governance & Administration Partial coverage
Evidian Analytics & Intelligence (Identity Management) Partial coverage
op.acc.5 op.acc.5 Authentication methods (external users) Hardware Security Keys, Basic user access control, Multi-factor user access control
Identity, Access, Electronic Signature, Smart Cards and Biometrics Service Partial coverage
Evidian Web Access Manager (Web Access Control) Partial coverage
Evidian Identity Governance & Administration Partial coverage
Evidian Analytics & Intelligence (Identity Management) Partial coverage
op.acc.6 op.acc.6 Authentication methods (organization\'s users) Hardware Security Keys, Basic user access control, Multi-factor user access control
Identity, Access, Electronic Signature, Smart Cards and Biometrics Service Partial coverage
Evidian Web Access Manager (Web Access Control) Partial coverage
Evidian Identity Governance & Administration Partial coverage
Evidian Analytics & Intelligence (Identity Management) Partial coverage
op.exp.1 Asset inventory Hardware and software inventory
op.exp.2 Security configuration Configuration control
op.exp.3 Security Configuration Management Configuration control
op.exp.4 Maintenance and security updates Reliable updates, Upgrade testing support
op.exp.5 Change Management Configuration control
op.exp.6 Protection against malicious code Advanced antimalware
Global Intelligence Service Full coverage
op.exp.7 Incident Management Incident response support
Security Infrastructures in Industrial Environments Full coverage
Early warning management and security incident management Full coverage
Security management and monitoring service Full coverage
Global Intelligence Service Full coverage
op.exp.8 Activity log Inspect endpoint logs, Activity log policy
op.exp.9 Incident management log Inspect endpoint logs, Activity log policy
op.exp.10 Protection of cryptographic keys PKI infrastructure
Horus IoT Solutions (Plataforma IoT) Full coverage
op.ext.1 Contracting and service level agreements Certification of the main ICS providers
op.ext.2 Day-to-day management Account management
Evidian Identity Governance & Administration Full coverage
Evidian Analytics & Intelligence (Identity Management) Full coverage
Evidian Web Access Manager (Web Access Control) Full coverage
op.ext.3 Supply Chain Protection Awareness and Training
op.ext.4 Systems interconnection Network communication visualization
op.nub.1 Cloud services protection Data Protection
Trustway DataProtect (Encryption Platform) Full coverage
op.cont.1 Impact analysis Risk and Vulnerability Management
op.cont.2 Continuity plan Redundancy system, Backup system
Business Continuity Management Services (BCMS) Full coverage
op.cont.3 Periodic tests Upgrade testing support
op.cont.4 Alternative means Redundancy system
Business Continuity Management Services (BCMS) Full coverage
op.mon.1 Intrusion detection Industrial DPI for anomaly detection, Advanced detection of anomalies in the IP layer
op.mon.2 Metrics system SIEM integration
Early warning management and security incident management Full coverage
Security management and monitoring service Full coverage
op.mon.3 Monitoring Network communication visualization
mp.if.1 Separate and access controlled areas Physical security in the installation of devices, Separation of environments
mp.if.2 Identification of persons Hardware Security Keys
HSM Trustway Proteccio, HSM Trustway Crypt2Pay (HSM) Full coverage
Identity, Access, Electronic Signature, Smart Cards and Biometrics Service Full coverage
mp.if.3 Fitting out of the premises Physical security in the installation of devices
mp.if.4 Electrical energy Redundancy system
Business Continuity Management Services (BCMS) Full coverage
mp.if.5 Fire protection Physical security in the installation of devices
mp.if.6 Flood protection Physical security in the installation of devices
mp.if.7 Entry and exit registration of equipment log Equipment protection diagnostics
Compliance audit Full coverage
mp.per.1 Job description Awareness and Training
mp.per.2 Duties and obligations Awareness and Training
mp.per.3 Awareness Awareness and Training
mp.per.4 Training Awareness and Training
mp.eq.1 Clear workstation Equipment use control
mp.eq.2 Workstation locking Equipment use control
mp.eq.3 Protection of portable equipment Equipment use control
mp.eq.4 Other network-connected devices Device control
mp.com.1 perimeter security Host-based firewall
Security management and monitoring service Full coverage
mp.com.2 Confidentiality protection Data Protection
Trustway DataProtect (Encryption Platform) Full coverage
mp.com.3 Integrity and authenticity protection Verification of integrity of software and hardware code
mp.com.4 Separation of information flows in the network Secure network design
Security Infrastructures in Industrial Environments Full coverage
Information Security Management Services (ISMS) Full coverage
Security Strategy Services Full coverage
Compliance and supplier approval services Full coverage
Trustway IP Protect (Network Encryption) Full coverage
mp.si.1 Support marking Industrial network event log (forensic analysis)
Global Intelligence Service Full coverage
Horus IoT Solutions (Plataforma IoT) Full coverage
mp.si.2 Cryptography PKI infrastructure
Horus IoT Solutions (Plataforma IoT) Full coverage
mp.si.3 Custody Equipment protection diagnostics
Compliance audit Full coverage
mp.si.4 Transport WI-FI control, Network communications control, Network integrity control, Data Protection
Security Infrastructures in Industrial Environments Partial coverage
Trustway IP Protect (Network Encryption) Partial coverage
mp.si.5 Erased and destruction Backup Policy
Business Continuity Management Services (BCMS) Full coverage
mp.sw.1 Application development Software usage control, Verify PLC integrity
Horus IoT Solutions (Plataforma IoT) Partial coverage
mp.sw.2 Acceptance and commissioning Cybersecurity assessment
Information Security Management Services (ISMS) Full coverage
Risk Analysis and Management Services Full coverage
Security Strategy Services Full coverage
Compliance and supplier approval services Full coverage
Technical security offices Full coverage
Compliance audit Full coverage
Vulnerability analysis Full coverage
Global Intelligence Service Full coverage
mp.info.1 Personal information Data Protection
Trustway DataProtect (Encryption Platform) Full coverage
mp.info.2 Information qualification Use control policy
mp.info.3 Electronic signature PKI infrastructure
Horus IoT Solutions (Plataforma IoT) Full coverage
mp.info.4 Timestamps Security log, File integrity monitoring
mp.info.6 Backup Backup system
Business Continuity Management Services (BCMS) Full coverage
mp.s.1 E-mail protection Network communications control, Host-based firewall
Security management and monitoring service Partial coverage
Trustway IP Protect (Network Encryption) Partial coverage
mp.s.2 Protection of web services and applications Device control
mp.s.3 Web browsing protection Network communications control, Host-based firewall
Security management and monitoring service Partial coverage
Trustway IP Protect (Network Encryption) Partial coverage
mp.s.4 Denial of service protection Network communications control, Device control, Host-based firewall
Security management and monitoring service Partial coverage
Trustway IP Protect (Network Encryption) Partial coverage
mp.info.5 Document cleaning Backup Policy
Business Continuity Management Services (BCMS) Full coverage