Policy Components
Technical Policy
Nanitor's Technical Policy Management supports building organizational consensus around your cybersecurity strategy.
Your approved goals and rule definitions are articulated in your security baseline settings so that you can focus on what's important in terms of minimizing risk.
Key benefits
01
Flexibility
Nanitor supports your technical policy creation with built-in support for benchmarks based on CIS and NIST recommendations and is guided by compliance frameworks (e.g. ISO 27001, PCI DSS and others).
You decide your security baseline.
02
Collaboration
With centralized management of cybersecurity policies and rules with integrated detailed descriptions and remediation support, Nanitor enables effective team-collaboration.
03
Best Practices
Nanitor supports your journey towards secure by default with industry best-practices and compliance frameworks built into the platform, assisting you with enforcement of your technical policy.
04
Security Policy Assurance
Issue remediations are automatically detected and linked to your policy decisions, reflecting high-level decisions about risk management and rule enforcement. With Nanitor your security posture is monitored and updated in real time.
Assisting your security objectives
Managing your cybersecurity strategy and aligning with compliance frameworks, recognized best practices and company requirements can be a difficult and expensive task.
Challenges include:
- building consensus around security strategies
- sourcing and using industry best practices
- setting security baseline according to acceptable risk
- enforcing rules accross all assets
- documentation of security policy.
The Nanitor Technical Policy component supports your efforts with all of the above and much more.
- Maintain a comprehensive inventory of your IT assets.
- Document and enforce risk as part of your Cyber Security program.
- Accurately assess criticality of assets and ensure you focus on the top priority.
In Nanitor your Technical Policy addresses:
- Security configurations
- Known vulnerabilities
- Security patches
- User privileges
- Software policy
- Asset detection
- End-of-life asset management
Define your Technical Policy
Decide how to address cybersecurity requirements in Nanitor based on best-practices, compliance frameworks and company-approved policies.
Nanitor supports and drives effective collaboration with stakeholders on your technical policy and enables conscious decisions regarding your cybersecurity strategy.
Effective remediation based on long-term policy
Nanitor helps you prioritize issues so that you can focus on addressing and implementing your approved technical policy and spend less time on addressing minor issues.
With the Nanitor Diamond™ and its built-in systematic prioritization combined with an effective technical policy, your remediation team knows where to concentrate their efforts - saving both cost and valuable time.
Manage asset risk
Nanitor supports automatic application of risk assessment rules in your environment, assigning risk ratings to your assets using the established Confidentiality Intergrity Availability triad.
With Nanitor, you manage and document your asset risk inside the Nanitor platform. Automatic risk adjustment taking into account asset risk across the organization as well as the risk posed by different issues ensures that your focus stays on your most critical issues while maintaining complete real-time visibility.