PCI
The PCI DSS controls focus on the security of
payment card data. Within the software
development lifecycle, Snyk supports key
vulnerability management and education
requirements of the following controls
r Cohpyo.QlucQ.QghaaQw@cyhQoee@y Qmo hp@xQ @Siy paQ
training to developers in real-tim&
r
[email protected] Qi @y QpoQ
identify software assets and components and
Sy@cp@QcQ oephcy@Qti .x QoeQkcp@y c. QogSntu
r Cohpyo. QcunuocataSiaQcucuocatiaQcusuocatiQ.Q6?@QghaaQ
platform identifies vulnerabilities in proprietary
code and open source code as related to
applications, containers, and infrastructure as
code. It offers automated notification,
remediation, reporting, security gating, and
exception handlin2
r Cohpyo.
[email protected]
automatically notifies of vulnerability changes
for any project included in the scanning function
03
SOC 2
Vulnerability management controls within SOC 2 require
reporting, validation, identification, scoring,
prioritization, and radiation tracking. Snyk can help you
address the following SOC 2 control requirements: o
r Cohpyo.QCCnulQ.QghaaQoee@y Qy@moyp QoeQdi.h@yct . p @ Q
across the entire platform and validates specific
logging in Snyk CloudE
r Cohpyo.QCCcunQ.QghaaQ x@hp e @ aQ Soy@ aQmy oy p G@ aQ
and remediates — and trains developers on —
identified code vulnerabilities in scanned projectso
r Cohpyo.QCCBQ.QghaaQC.oixQSchQx Spcp@Q @pp hs Qtc @xQ
on policies to define and limit authorized access
Software Development LifeCycle controls within SOC 2
focus on appropriate manual or orchestrated policies
that ensure standardization across baseline
configurations. This applies to all cloud infrastructure,
images, and containers. Snyk can help you address the
following SOC 2 control requirements
r Cohpyo.QCCAulaQAunaQAucaQAu@Qoom@hQ oiyS@QSox@iM
CC7.1, 7.2, CC8.1 - Snyk Cloud provides a single
policy to administer baseline configuration and
standardization for cloud infrastructure, images, and
containers (e.g. logical access, network, encryption,
port setting, backups, etc.)
01
ISO 27001
The ISO 27001 controls cover several areas supported by the Snyk platform,
including: improved education and training of developers, vulnerability management,
standardization of base images, license management and inventory, reporting,
monitoring and visibility, and malware identification and management in source
Sox@u?
Specifically, Snyk can help you address the following ISO 27001 control
requirements:o
r BulMKunMKucQ?mm@hx yQ?uKununQ.QghaaQoee@y Q @Siy paQpyc h hsQpcys@p@xQx
[email protected]
developer?
r ?u@u?M@unBQolsululalsunuliM@unAolsulunalsuluciM@un?olsunu@alsunu?iM?u@
[email protected]
offers policy-based configurations and industry-recognised standardization from
code to cloud, for both proprietary and open source cod&
r AunSM?uBuKQ.QghaaQmy oy p G@ Qdi.h@yct . p @ Qtc @xQimohQ @Siy paQ hp@.. s@hS@QeoyQ
enhanced risk assessmen?
r KusQ?mm@hx yQ?ulBulucM?ulAulucQ.QghaaQc.@yp Qx@
[email protected]@y QchxQ @Siy paQp@ck QpoQ
changes in the risk of code and open source dependencies in all scanned project?
r ?mm@hx
[email protected] ?ohQc..Qom@hQ oiyS@Q. S@h hsQ hQi @aQ hS.ix hsQp?@Q
type of licens&
r
[email protected] x@hp e @ Qdi.h@yct . p @
[email protected] oy p G@ Q
threats based on known exploits, social media, and reachability factor?
r ?ul@
[email protected]@moyp hsQc..oh QeoyQkoh poy hsQchxQsod@yhchS@
[email protected]
application security maturit?
r ?u@
[email protected] x@hp e @ QSox@Qy@mo poy @ QchxQx@m@hx@hS @ Q hQi @QeoyQ
SBoM creation and risk management of those component?
r ?u?unucM?u?usulM?u?usunM?u?usucM?u?ulunM?u?unuBM?u?unuAM?ulcululM?lsunuBQ.QghaaQ
provides strict access control within the platform as well as code-level control of
baseline secure configuration of Infrastructure, containers, and images in
project?
r ?ulnunulQ.QghaaQnm@hQgoiyS@Q x@hp e @ Qkc.hcy@Qmy@ @hpQ hQom@hQ oiyS@QSoxl
r ?lsunuAQ.QghaaQoee@y Q @Siy@Qtn?QchxQCwtQomp oh QeoyQi @Q hQp?@Qgnw
r ?ulnuAulQ.QghaaQx@. d@y QSokmy@?@h d@Q. p QoeQdi.h@yct . p @ Q hQc..Q Schh@xQ
projects with auto pull request generation for remediation, prioritization, and
continuous improvement
02
Compliance auditors want to see evidence of risk management in your SDLC. The following Snyk features help you establish controls for meeting SOC 2, ISO, and PCI compliance requirements.
Best practices for meeting security compliance standards
Schedule an expert demo to
learn how Snyk can help you
meet your compliance goals.
Questions? Contact us at
[email protected].