CoCo compliance

Discover how EventLog Analyzer streamlines the process of demonstrating Code of Connection (CoCo) compliance

 

Streamline compliance management

NRC compliance Overview
1

Meet regulatory and industry compliance requirements with EventLog Analyzer's comprehensive log management, analysis, and reporting capabilities.

2

The file integrity monitoring (FIM) module tracks changes to critical files and configurations, helping to identify unauthorized modifications and maintain the integrity of sensitive data.

3

Create new reports and customize existing reports to facilitate compliance management. With a wide range of reporting options, organizations can tailor reports according to their specific compliance requirements.

EventLog Analyzer is trusted by over
10000 customers

           
         
CoCo compliance requirements What is it? Predefined reports in EventLog Analyzer
Vulnerability management This requirement focuses on the management of vulnerabilities. It enforces the need for a defined policy and relevant processes for identifying, prioritizing, and mitigating vulnerabilities. The policy should specify time periods for patch application and a set process for auditing compliance.
  • Windows System Events
  • Windows Services
  • Nessus Vulnerability Reports
  • Qualys Vulnerability Reports
  • Nexpose Vulnerability Reports
Secure configuration This requirement is about ensuring appropriate configurations for reducing the inherent vulnerability levels. Periodic checks should be performed to ensure that applications, services, processes, and ports that are not required are disabled. Devices, systems, and services should be able to detect, isolate, and respond to malicious software.
  • Windows System Events
  • Windows Services
  • Windows Application Crashes
  • Windows Program Inventory
  • Route 53
  • WAF Reports
  • AWS Network Security Groups
  • AWS Config Reports
  • Database Reports
  • EC2 Reports
  • Amazon ELB Reports
  • Trend Micro Security Reports
  • Symantec End Point Reports
Physical security This requirement centers on secure accommodation and establishing appropriate policies and practices governing its use to protect personnel, hardware, programs, networks, and data from loss, damage, or compromise.
  • Windows Firewall Auditing
  • Network Device Policy Management Reports
Protective monitoring and intrusion detection This requirement is about the collection and retention of event data that will help detect security incidents. It enforces the presence of a monitoring policy describing the potential use cases, which can be used to define parameters for event data collection. The policy must include use cases for technical attacks as well as important abuses of business processes.
  • Windows Threat Detection from Antivirus
  • Network Device Attack Reports
  • File Changes Audit
  • Route 53
  • VPC Activity
  • Storage Activity Reports
  • WAF Reports
  • AWS Network Security Groups
  • AWS Config Reports
  • EC2 Reports
  • Traffic Analysis Reports
  • Malwarebytes Reports
Authentication and access control This requirement focuses on granting appropriate permissions to user accounts. It stresses the need to exercise prudence on provisioning accounts with administrator-level or higher privileges. Privileges should be periodically reviewed and removed when no longer required. Mechanisms for users to identify and authenticate to devices and services should be in place.
  • Unix Logon Reports
  • Unix Account Management Reports
  • Unix Failed Logon
  • MSSQL Account Changes
  • MSSQL Password Changes
  • Oracle Security Changes
  • IIS Web Server Errors Reports
  • IIS FTP Server Reports
  • PostgreSQL Account Changes
  • IAM Activity
  • AWS User Activity
  • AWS Failed/Unauthorized Activity
  • Cloud User Login Activity
  • Hypervisor System Events
  • AS400 Reports
Boundary protection and interfaces This requirement is about the need for appropriately configured boundary protection between the organization's network and services and the internet or any other network. It enforces network traffic, services, and content to be limited to the business' needs. Services present outside the protected environment should be delivered from an appropriate architecture that can identify malware at the entry point.
  • Windows Threat Detection
  • Network Device Security Reports
  • Traffic Analysis Reports
  • FireEye Reports

Built-in support for IT compliances

ISO 27001:2013  FERPA  FISMA  SOX  HIPAA  GLBA  GDPR  NERC CIP  CCPA  ISLP  Cyber Essentials  GPG 13  PDPA 

What additional features does EventLog Analyzer provide?

  •  

    Log collection and analysis

    Collect and analyze logs from all end-user devices on your network from a single console. Syslogs from various devices can be collected, along with logs from multiple log sources such as Windows, Unix, and Linux systems. Manage application logs and gain in-depth security information on incidents.

    Learn more
  •  

    Event log correlation

    EventLog Analyzer's correlation engine allows the creation of custom correlation rules, the management of existing rules, and provides correlation reports to help administrators understand complex incidents happening across the network and the sequence in which they unfold. The solution also allows for easy access the ten most recent correlation incidents that occurred on the network, providing a swift overview in the event of an incident.

    Learn more
  •  

    Secure log storage and archiving

    EventLog Analyzer ensures that all stored log data is tamper proof and secure. The solution collects and archives log data from the moment of deployment, and the data can be archived for as long as needed.

    Learn more
  •  

    Incident management

    Get automated incident response through real-time alerts and scheduled, customizable reports. Streamline the process of identifying, responding to, and recovering from security incidents.

    Learn more

Frequently asked questions

What is CoCo compliance?

Code of Connection (CoCo) defines the standards and processes that must be followed when a formally accredited information system is to be connected to an unknown or unaccredited system. This can help you prevent malicious and unwanted devices from gaining access to your network and enhance your organizantion's security posture.

Why is CoCo compliance important and what does it involve?

CoCo compliance helps to maintain the security, integrity, and availability of data within an interconnected system. It aids in preventing unauthorized access and reduces the potential for damage caused by cyber threats through implementing a variety of security measures, including firewalls, intrusion detection systems, secure configurations, and user access controls.

How can I ensure that my organization is CoCo compliant?

To ensure CoCo compliance, organizations need to assess their current systems and controls to identify and address any gaps in relation to CoCo requirements. EventLog Analyzer provides detailed reports that will help ensure your organization is compliant and audit-ready.

Ensure CoCo compliance with EventLog Analyzer

Get your free trial

EventLog Analyzer Trusted By

Los Alamos National Bank Michigan State University
Panasonic Comcast
Oklahoma State University IBM
Accenture Bank of America
Infosys
Ernst Young

Customer Speaks

  • Credit Union of Denver has been using EventLog Analyzer for more than four years for our internal user activity monitoring. EventLog Analyzer provides great value as a network forensic tool and for regulatory due diligence. This product can rapidly be scaled to meet our dynamic business needs.
    Benjamin Shumaker
    Vice President of IT / ISO
    Credit Union of Denver
  • The best thing, I like about the application, is the well structured GUI and the automated reports. This is a great help for network engineers to monitor all the devices in a single dashboard. The canned reports are a clever piece of work.
    Joseph Graziano, MCSE CCA VCP
    Senior Network Engineer
    Citadel
  • EventLog Analyzer has been a good event log reporting and alerting solution for our information technology needs. It minimizes the amount of time we spent on filtering through event logs and provides almost near real-time notification of administratively defined alerts.
    Joseph E. Veretto
    Operations Review Specialist
    Office of Information System
    Florida Department of Transportation
  • Windows Event logs and device Syslogs are a real time synopsis of what is happening on a computer or network. EventLog Analyzer is an economical, functional and easy-to-utilize tool that allows me to know what is going on in the network by pushing alerts and reports, both in real time and scheduled. It is a premium software Intrusion Detection System application.
    Jim Lloyd
    Information Systems Manager
    First Mountain Bank

Awards and Recognitions

  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
A Single Pane of Glass for Comprehensive Log Management