Context
Tool mentors explain how a tool can perform tasks, which are part of ITUP processes and activities. The tasks are listed as Related Elements in the Relationships section.
You can see the details of how processes and activities are supported by this tool mentor, by clicking the links next to the icons:
Details
Tivoli® Compliance Insight Manager (TCIM) provides customers with the capability of monitoring their organization's IT
assets and procedures against compliance with a policy (regulation, best practice, or customer defined). Specifically,
TCIM excels at user monitoring and monitoring of privileged users.
TCIM collects security audit events from sources around the enterprise and stores them for future processing in
its store called the Depot. The collection of audit logs is automated and runs on a schedule, and the logs
themselves are compressed before transmission. Transmission occurs over an encrypted link.
TCIM further provides a Log Management dashboard and two key reports: the Log Collect History
and Log Continuity.
The log management process is:
-
Reliable (automated, scheduled)
-
Secure (transmitted across the network on an encrypted link)
-
Verifiable (through reporting)
Once audit trails are collected and securely stored in the Insight Depot, they are then available for analysis and
reporting.
Reporting is a scheduled activity and creates reports in the normalized W7 format. This format can be used for
presentation to auditors, or for further investigation if needed.
The events are processed for reporting by first normalizing the events to a common model, known as W7 (WHO, WHEN,
WHAT, WHERE, onWHAT, WHEREFROM and WHERETO).
TCIM’s policy engine measures the normalized events against the best practice policy that is in place to highlight
those events that do not meet this acceptable use policy. This immediately highlights the events that need further
investigation, either using the built-in reporting facility, or by retrieving the original log data for forensic
analysis using external tools.
TCIM comes with many built-in reports that use the normalized event data to allow the user to easily perform:
-
Privileged User Monitoring and Audit (PUMA)
-
Reporting against best practices
-
Custom reporting against a custom policy
-
Compliance Reporting through optional compliance management modules
One key report is the compliance dashboard, showing at a glance, the overall security compliance posture of the
organization.
The compliance management modules currently available are:
-
ISO17799
-
Sarbanes Oxley
-
GLBA
-
HIPAA
-
Basel II
Using the custom reporting tool in TCIM, you can quickly develop new modules that are either specific to the customer's
usage, or in support of new regulations or standards.
For more information
For more information about this tool, click IBM® Tivoli Compliance InSight Manager at the top of
this page.
|