A guide for choosing the most appropriate tools per category for your specific security and compliance needs
Introduction
This straightforward guide helps you improve your security measures and meet compliance requirements. It organizes tools across different areas, such as HR processes, laptop protection, and security and monitoring tools.
This guide will enhance security in daily operations, making sure compliance efforts are focused and effective. By using this matrix, companies can decide on the most appropriate tools for their specific security and compliance needs, creating a more secure and compliant environment. It also will help you prepare for audits.
However, it is important to understand that this matrix is not exhaustive. It provides examples and suggestions from the evolving landscape of available solutions, offering a foundation for a secure and compliant Information Security Program.
Use this guide to accurately complete your Trustero “Scope” page, which allows for tracking and documenting selected tools. This ensures the scoping page remains a valuable resource, reflecting the ongoing changes in the security environment and aligning with current security practices.
Tools that support the People Team
This section lists tools that help companies follow HR security policies and protect employee information, with an emphasis on preparing for audits and securing information. It covers systems for managing HR processes related to information security, including training your staff on security awareness.
Service |
Definition |
Example Tools |
HRIS (Human Resource Information/Management System) |
Manages HR processes, including payroll, benefits, and employee data, crucial for audit compliance and data integrity |
BambooHR, TriNet |
Employee Performance Management |
Manages employee performance evaluations, critical for ensuring compliance with performance management standards and identifying training needs |
TriNet Perform |
ATS (Applicant Tracking System) |
Tracks and records recruitment process, from posting jobs to hiring, essential for maintaining data on recruitment processes |
Greenhouse, Lever, Recruitee |
Background Checks |
Tracks and records background checks submissions and completion, including criminal records and employment history |
AssureHire, Certn, Checkr, Deel, Paycom, VerificationX, Zinc |
Security Awareness Training |
Programs aimed at educating employees on information security, necessary for mitigating risks and ensuring adherence to security policies and regulations |
Huntress (FKA Curricula), KnowBe4, Right-Hand, Skilljar, Wizer |
Identity and Access Management & Physical Asset Protection
This section focuses on tools for securing digital identities and physical devices like laptops and mobile phones. It is important for preventing unauthorized access and ensuring that devices are protected. It highlights solutions for controlling access to sensitive systems and data, and for keeping devices safe from security threats.
Service |
Definition |
Example Tools |
MDM (Mobile Device Management) |
Solutions that enforce encryption, malware protection, security updates, and enable remote wipe capabilities |
Azure Intune, Jamf, Miradore |
Identity and Access Management (IAM) Solutions |
Software to protect systems from unauthorized access or misuse by only allowing authenticated, authorized users (based on job roles) access to specific, protected company systems and data |
Cisco, Duo,Google Workspace IAM, JumpCloud, Microsoft (Azure) Entra ID, Okta, OneLogin |
Employee “Everyday Operational Systems”
This segment looks at the tools employees use daily, such as applications for business, communication, internal documentation, customer support, and code management. It shows the role these tools play in making work processes efficient, supporting teamwork, and ensuring secure and effective communication. This information helps companies secure these systems and boost productivity.
Service |
Definition |
Example Tools |
Business Productivity and Collaboration Suite |
Central platforms for document creation, collaboration, and productivity |
Google Workspace, Microsoft 365 |
Internal Security Event and Incident Management Communication |
Tools for real-time internal messaging and monitoring alerts from automated scanning technologies (e.g., vulnerabilities, application errors and crashes, security events) |
Slack, Teams (MicroSoft) |
Internal Wiki/Intranet |
Platforms for internal knowledge sharing and documentation (e.g., posting policies, plans and procedures) |
Azure DevOps Wiki, Confluence, Notion, Teams (MicroSoft) |
Customer Support Management |
Systems for managing customer inquiries and support tickets |
HubSpot, Zendesk, Jira Service Management |
Internal Ticketing System |
Tools for tracking internal tasks and projects (e.g., software development, change management, access requests and removals) |
Azure DevOps, Jira Software |
Code Repository |
Services for code storage and version control |
GitHub, GitLab |
Incident Management and External Communication |
Manages and communicates externally during and after incidents. |
Opsgenie (on call and alert management), Statuspage (incident communication tool) |
Security & Monitoring Tools per Cloud Hosting Provider
Aimed at security and monitoring tools offered by cloud providers like AWS, Azure, and GCP, this section is crucial for businesses using cloud services. It includes information on tools for detecting vulnerabilities, monitoring systems, managing configurations, and responding to security incidents. This guide helps businesses choose the right tools for protecting their cloud-based operations and handling security issues properly.
Service |
Definition |
AWS |
Azure |
GCP |
Application Monitoring - Errors and Crashes |
Monitors application performance and tracks errors and crashes. |
AWS CloudWatch, Datadog |
Azure Application Insights |
Google Clouds Operations Suite |
Cloud Infrastructure Vulnerability Scanning |
Scans for security vulnerabilities in the infrastructure. |
AWS Inspector |
Azure Security Center |
Google Cloud Security Command Center |
Threat Detection |
Identifies potential threats to cloud environments and provides alerts. |
AWS GuardDuty |
Azure Sentinel |
Event Threat Detection (Security Command Center Premium Tier) |
Admin Activity Logging, Monitoring & Alerting |
Tracks administrative actions and provides alerts on significant events. |
AWS CloudTrail |
Azure Monitor, Azure Log Analytics |
Google Clouds Operations Suite (formerly Stackdriver) |
Capacity Monitoring & Management |
Monitors resource utilization and manages capacity planning. |
AWS CloudWatch, Grafana |
Azure Monitor, Grafana |
Google Clouds Operations Suite, Grafana |
Configuration Management (baseline for setup) |
Manages and automates system configurations. Ex. Infrastructure as Code (IaC) |
AWS CloudFormation |
Azure Automation, Azure Policy |
Cloud Deployment Manager |
Configuration Management Monitoring (after setup) |
Monitors and reports on the state of system configurations |
AWS SecurityHub (SaaS SMB), AWS Config (mid-enterprise) |
Azure Policy |
Google Cloud Security Command Center |
Code Scanning (Dependency) |
Scans project dependencies for known vulnerabilities |
GitHub Dependabot, Snyk |
GitHub Advanced Security for Azure DevOps |
Artifact Registry - Artifact analysis and vulnerability scanning |
Code Scanning (SAST) |
Static application security testing to identify vulnerabilities, prior to pull requests (PRs) being merged |
Snyk, Semgrep, DeepSource, SonarQube |
Azure DevOps (with Snyk integration) |
Google Cloud Build (with third-party tools) |
Perimeter Security Firewall |
Defends the network border from unauthorized access. |
AWS WAF, AWS Shield |
Azure Firewall |
Google Cloud Armor |
Host-based Firewalls |
Provides firewall rules at the resource/instance level. |
AWS Security Groups |
Azure Firewall on Virtual Machines |
Google Compute Engine has built-in firewalls |
Public and Private Network Segmentation |
Defines and enforces isolation between public and private network areas in a cloud environment. |
AWS VPC |
Azure Virtual Network (VNet) |
Google Cloud VPC |
Network ACLs/Subnets (network segmentation) |
Allows or denies specific inbound or outbound traffic at the subnet level within VPCs (virtual private cloud). |
AWS Network Access Control List (NACL) |
Azure Network Security Groups (NSG) |
Google Cloud VPC Network |