Skip to main content

Context ManagementContext Management Administration Guide

Pre-Built Compliance Context Tables

icon-pre-built.png

The Context Management service includes a set of pre-built compliance context tables used mainly to provide context for compliance dashboards. These dashboards, available in the Dashboards application, are used to monitor the activities of users and accounts with privileged access and to monitor other physical and network security systems. The following compliance context tables are available:

  • Compliance - Privileged Users – This context table lists any user accounts with privileged access to production systems in your environment that you want to visualize in the Dashboards application. The accounts in this table should be subject to periodic review. By default, the table is empty until you populate it with privileged account users. This table supports the Privileged Account Activity visualization in the following pre-built compliance dashboards:

    • CMMC - Analyst

    • HIPAA - Analyst

    • ISO 27001 - Analyst

    • NIST 800-171 - Analyst

    • NIST 800-53 - Analyst

    • NIST CSF - Analyst

    • PCI DSS - Analyst

  • Compliance - Shared Accounts – This context table lists any shared user accounts in your environment that you want to visualize in the Dashboards application. These should include any accounts to which multiple users have access. By default, the table is empty until you populate it with shared account users. This table supports the Shared Account Activity visualization in the following pre-built compliance dashboards:

    • CMMC - Analyst

    • HIPAA - Analyst

    • ISO 27001 - Analyst

    • NIST 800-171 - Analyst

    • NIST 800-53 - Analyst

    • NIST CSF - Analyst

    • PCI DSS - Analyst

  • Compliance - Third-Party Users – This context table lists any contractor, vendor, or other third-party users in your environment that you want to visualize in the Dashboards application. By default, the table is empty until you populate it with third-party users. This table supports the Third Party Activity visualization in the following pre-built compliance dashboards:

    • CMMC - Analyst

    • HIPAA - Analyst

    • ISO 27001 - Analyst

    • NIST 800-171 - Analyst

    • NIST 800-53 - Analyst

    • NIST CSF - Analyst

    • PCI DSS - Analyst

  • Compliance - System & Service Accounts – This context table lists any default, service, or automation accounts in your environment that you want to visualize in the Dashboards application. By default, the table is empty until you populate it with system and service accounts. This table supports the System and Service Account Activity visualization in the following pre-built compliance dashboards:

    • CMMC - Analyst

    • HIPAA - Analyst

    • ISO 27001 - Analyst

    • NIST 800-171 - Analyst

    • NIST 800-53 - Analyst

    • NIST CSF - Analyst

    • PCI DSS - Analyst

  • Compliance - In-Scope Data Systems – This context table lists any in-scope data systems in your environment that you want to visualize in the Dashboards application, including databases. By default, the table is empty until you populate it with in-scope data systems. This table supports a pre-built dashboard called TBD.

  • Compliance - Physical Security Systems – This context table lists any physical security systems in your environment that you want to visualize in the Dashboards application. These can include any system used to authenticate access to a physical location, including badge or card readers and door access. By default, the table is empty until you populate it with physical security systems. This table supports a pre-built dashboard called TBD.

  • Compliance - Network Security Systems – This context table lists any production network security systems in your environment that you want to visualize in the Dashboards application. These can include systems like firewalls, intrusion detection or prevention, malware detection and prevention, network access control, remote access, virtual private network and vulnerability scanning. By default, the table is empty until you populate it with network security systems. This table supports a pre-built dashboard called TBD.