You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Apr 4, 2025. It is now read-only.
Copy file name to clipboardExpand all lines: QuickStart.md
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -53,7 +53,7 @@ Follow the provided guide: [Generate SSL with Certbot](./Installation/SSLConfigu
53
53
54
54
## 2. Initial Configuration
55
55
56
-
Post installation, the first time you get access to UTMStack, its going to be required that enter the old password and establish the new one.The default username is `admin`. Your initial password and other configurations can be found in `/root/UTMStack.yml`.
56
+
Post installation, the first time you get access to UTMStack, its going to be required that enter the old password and establish the new one.The default username is `admin`. Your initial password and other configurations can be found in `/root/utmstack.yml`.
57
57
58
58
After that you need to configure the email setting
Our module supports several critical compliance standards, ensuring that your organization stays compliant in various sectors:
29
+
Compliance with the latest regulations often requires generating reports for internal use and auditors.
30
+
UTMStack simplifies compliance management by combining essential security tools into a single database
31
+
and providing several built-in reports and interactive dashboards. It is reinforced by an event and logs
32
+
explorer for advanced analysis and a report/dashboard builder that helps visualize and display data.
30
33
31
34
### 1. Health Insurance Portability and Accountability Act (HIPAA)
32
-
HIPAA is a U.S. federal law that sets national standards to protect sensitive patient health information from unauthorized disclosure. The HIPAA section within the Compliance Management module incorporates reports specifically designed to monitor compliance with critical HIPAA provisions, such as sections §164.308(a)(1)(ii)(A)(D), §164.312(b), and others. Each report aims to facilitate the implementation of policies and procedures to detect and manage security violations effectively.
35
+
Security management process and audit controls
36
+
report include accounts validation, relevant
37
+
security alerts, login reports, relevant windows
38
+
events, file and system access, cloud reports
39
+
(Azure, AWS), Office365 threat Intelligence,
40
+
account validations, firewall relevant activity,
41
+
relevant system statistics, unsuccessful logon,
42
+
privilege escalation.
33
43
34
44
### 2. General Data Protection Regulation (GDPR)
35
-
GDPR is a comprehensive data protection law in the European Union (EU), which regulates the processing of personal data. The software offers pre-configured reports to ensure that your data processing operations adhere to GDPR's core principles.
potential data exposure, relevant Security alerts,
47
+
data retention, and potential data privacy
48
+
compromises.
36
49
37
50
### 3. Gramm-Leach-Bliley Act (GLBA)
38
-
GLBA, also known as the Financial Modernization Act of 1999, controls how financial institutions handle the private information of individuals. The GLBA section in the module contains reports tailored to key GLBA provisions, assisting you in maintaining GLBA compliance.
51
+
§§6801(b)(3) Successful Login / Logoff,
52
+
§§6801(b)(1) File Access,
53
+
§§6801(b)(2) Policy Changes in Active Directory,
54
+
§§6801(b)(2) New and enabled user Accounts in
55
+
Active Directory,
56
+
§§501B(2)(3) GLBA Login section
39
57
40
58
### 4. System and Organization Controls 2 (SOC 2)
41
59
SOC 2 report focuses on a business’s non-financial reporting controls relating to security, availability, processing integrity, confidentiality, and privacy of a system. The software provides essential reports aligned with the Control Criteria (CC) of SOC 2 to facilitate the achievement and maintenance of SOC 2 compliance.
0 commit comments