Why AD360
 
Solutions
 
Resources
 
 

Prepare for (ANAC) Cyber Security Assessment with AD360

The ANAC Cybersecurity Safety Assessment (CSA) defines a set of principles and measurable requirements for evaluating cybersecurity maturity in Brazil’s aviation sector. Effective identity governance and access control are key components of CSA compliance.

With AD360, organizations can generate system-generated evidence that aligns with multiple CSA principles, supporting auditors and internal compliance teams with traceable, timestamped controls.

Compliance

How AD360 can support CSA Requirements

Find the applicable CSA principles mapped to the AD360 reporting capabilities and expectations for technical evidence that help demonstrate those controls.

A1 — Governance Establish and enforce cybersecurity governance with traceable administrative authority and policy enforcement.

Assessment focus Expected technical evidence AD360 evidence/capabilities

Enforcement of cybersecurity governance and administrative controls

Policies enforced through access configuration, administrative changes, and privilege assignments

  1. Privileged Group Modification Reports
  2. Administrator Activity Reports
  3. GPO Modification Reports
  4. Audit Policy Changes

Description:

AD360 provides audit logs and reports that capture directory administrative actions, policy changes, and privilege modifications, which can be used as evidence of governance enforcement.

A2 — Risk management Identify and treat identity-related risks as part of the organization’s broader risk approach.

Assessment focus Expected technical evidence AD360 evidence/capabilities

Identify and monitor identity risk indicators

Risk registers, documented mitigation plans supported by observable risk signals

  1. Privileged access review reports
  2. Dormant and inactive account reports
  3. Excessive permission analysis
  4. Authentication policy violation logs

Description:

AD360’s identity risk indicators serve as supporting evidence for risk identification and monitoring, which can feed the formal risk register and treatment plans used in CSA assessments.

A3 — Asset management Maintain a comprehensive inventory of identity assets and their classification.

Assessment focus Expected technical evidence AD360 evidence/capabilities

Identification and inventory of identity assets

Asset inventory, classification documentation

  1. Inactive user reports
  2. Inactive computer reports
  3. Service account inventories

Description:

AD360 inventory reports provide reliable lists of identity objects that can be classified and maintained as part of the CSA asset inventory.

B2 — Identity and access management Enforce controlled authentication, authorization, and life cycle management.

Assessment focus Expected technical evidence AD360 evidence/capabilities

Authentication and authorization controls

User provisioning/deprovisioning logs, access reviews, role assignments

  1. Identity life cycle reports
  2. Privileged access review reports
  3. MFA enforcement logs

Description:

AD360’s identity life cycle and access certification reports provide evidence of how access is granted, reviewed, and controlled.

B3 — Data security Demonstrate controlled access to sensitive assets within directory scope.

Assessment focus Expected technical evidence AD360 evidence/capabilities

Permissions and access control logs

Directory permission assignments and access audit records

  1. Access audit reports (e.g., non-expiring passwords, excessive privileges)

Description:

AD360’s audit reports show identity and directory permission configurations as evidence for data access controls at the directory level.

C1 — Security monitoring Continuous monitoring of authentication and authorization events.

Assessment focus Expected technical evidence AD360 evidence/capabilities

Logs showing continuous monitoring of authentication and change events

Authentication logs, change audit trails

  1. Authentication activity logs
  2. Change audit trail reports

Description:

AD360 captures ongoing identity event data that can show continuous monitoring of identity use and modifications.

D1 — Incident response and recovery Support incident handling and identity evidence reconstruction.

Assessment focus Expected technical evidence AD360 evidence/capabilities

Identity event sequencing and incident-related activity

Authentication and change logs mapped to incident timelines

  1. Time-aligned authentication logs
  2. Privilege change history

Description:

When used with broader incident evidence (e.g., SIEM logs), AD360 logs provide ordered identity events for incident reconstruction.

Summary

AD360 generates system logs and audit reports that align with multiple CSA requirements related to identity governance, access control, authentication, and monitoring. These reports can provide objective evidence during ANAC CSA assessments.

Disclaimer: The information provided on this page is for general knowledge and awareness purposes only. It is not intended to serve as professional, legal, or regulatory advice. Compliance with ANAC CSA depends on your organization’s specific environment, processes, and risk profile.

To accurately assess your compliance posture, we strongly recommend engaging a qualified consultant, compliance agency, or referring directly to the official ANAC CSA documentation and guidelines.

 
Chat now
   

Hello!
How can we help you?

I have a sales question  

I need a personalized demo  

I have a product query  

E-mail our sales team  

Book a meeting  

Chat with sales now  

Back

Book your personalized demo

Thanks for registering, we will get back at you shortly!

Preferred date for demo
  •  
    • Please choose an option.
    • Please choose an option.
  •  
  •  
    This field is required.

    Done

     
  • Contact Information
    •  
    •  
    •  
    •  
  • By clicking ‘Schedule a demo’, you agree to processing of personal data according to the Privacy Policy.
Back

Book a meeting

Thanks for registering, we will get back at you shortly!

Topic

What would you like to discuss?

  •  
  • Details
  •  
    • Please choose an option.
    • Please choose an option.
    Contact Information
    •  
    •  
    •  
    •  
  • By clicking ‘Book Meeting’, you agree to processing of personal data according to the Privacy Policy.