Supported Standards and frameworks
- 21 Mar 2024
- 1 Minute to read
- PDF
Supported Standards and frameworks
- Updated on 21 Mar 2024
- 1 Minute to read
- PDF
Article summary
Did you find this summary helpful?
Thank you for your feedback
Red Canary helps many organizations satisfy or support their compliance controls through our monitoring and security operations. We’re happy to help you and your auditors better understand how Red Canary works behind the scenes.
The following tables list a set of common controls, describe how Red Canary supports those controls, and map to relevant compliance framework sections.
Asset Management/Inventory Management

Configuration Family / Name / Activity

Incident Response

Systems Monitoring / Audit Logging

Systems Monitoring / Secure Audit Logging

Systems Monitoring / Audit Logging: Cardholder Data Environment Activity

Systems Monitoring / Security Monitoring Alert Criteria

Systems Monitoring / Security Monitoring Alert Criteria: Privileged Functions

Systems Monitoring / Security Monitoring Alert Criteria: Cardholder System Components

Systems Monitoring / System Security Monitoring

Vulnerability Management / External Alerts and Advisories

Vulnerability Management / Vulnerability Remediation

Was this article helpful?