SOT

SOT

SOAR
Security Orchestration, Automation and Response

Automation of response to information security incidents using dynamic playbooks and information security tools, building an attack chain and with an object-oriented approach

NG SOAR
Next Generation SOAR

Automation of response to information security incidents with built-in basic correlation (SIEM), vulnerability Scanner (VS), collection of raw events directly from information security tools, dynamic playbooks, building an attack chain and an object-oriented approach. AM and VM are included

AM
Asset Management

Description of the IT landscape, detection of new objects on the network, categorization of assets, inventory, life cycle management of equipment and software on automated workstations and servers of organizations

VS
Vulnerability Scanner

Scanning information assets with enrichment from any external services (additional scanners, The Data Security Threats Database and other analytical databases) to analyze the security of the infrastructure.

VM
Vulnerability Management

Building a process for detecting and eliminating technical vulnerabilities, collecting information from existing security scanners, update management platforms, expert external services and other solutions

FinCERT
Financial Computer Emergency Response Team

Bilateral interaction with the Central Bank, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

GovCERT
Government Computer Emergency Response Team

Bilateral interaction with the state coordination center for computer incidents, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

Mail us to sales@securityvision.ru or get demo presentation

Auto Compliance: Automation of asset compliance assessment for safety standards and requirements

Auto Compliance: Automation of asset compliance assessment for safety standards and requirements
24.07.2025

Security Vision


Introduction

In today's world, compliance is becoming an increasingly complex task. Organizations must comply with a multitude of standards, regulations, and internal policies, which requires significant resources and time. At Security Vision we are interested in quickly passing the compliance process. In this article, we will look at how neural networks can automatically assess the compliance of assets by analyzing their properties and text requirements.


1. What is Compliance?

Compliance is a company's compliance with laws, standards, and internal rules to minimize the risks of violations and fines. It includes monitoring, employee training, and the implementation of procedures to meet regulatory requirements.


1.1. Auto Compliance

Auto Compliance is an approach to automating the processes of assessing the compliance of assets (e.g. servers, applications, databases) with the requirements of standards, regulators or internal policies. Instead of manual analysis and verification, Auto Compliance uses neural network technologies to compare asset properties with text requirements and issue a compliance verdict, as well as checking secure setup practices (Technical Compliance ) and company policies for compliance.


Main components of Auto Compliance:

   ·    Assets: Servers, applications, databases, networks and other infrastructure elements.

   ·    Asset properties: Operating systems, information security tools, etc.

   ·    Requirements: Text descriptions of standards, regulations, or internal policies.

   ·    AI Agent Systems: Machine learning algorithms that analyze asset properties and requirement text.


1.2 What is Technical Compliance?

Technical Compliance includes checking the security parameters of IT assets in accordance with the requirements of the FSTEC of Russia and best cybersecurity practices.


Hardening is a key step in improving an organization's security. It reduces vulnerabilities in software, hardware, networks, and infrastructure, reducing the attack surface and cyber risks.


Application areas of hardening:

   ·    Cloud services and databases

   ·    Application software (workstations, servers)

   ·    Mobile and network devices

   ·    Information security tools

   ·    Operating systems


Hardening levels:

   1.  Basic recommendations (minimizing attack surface without loss of functionality).

   2.  Defense - in-Depth , but with the risk of failures due to implementation errors.

   3.  Combined or custom standards for a specific infrastructure.


Stages technical Compliance:

   1.  Inventory of systems and networks.

   2.  Identifying owners of assets and critical systems.

   3.  Classification of assets.

   4.  Assigning security profiles.

   5.  Setting up security settings.

   6.  Automation of checks (for example, using Security Vision SPC).


Result: the system automatically checks compliance with requirements and generates reports (Telegram, email, etc.).


2. How is conformity assessment performed using a trained model?

The automated conformity assessment process can be divided into several stages:


2.1 Data collection

   ·    Asset Properties: Asset data is collected automatically from various sources such as monitoring systems, inventory results, CMDB (Configuration Management Database), vulnerability scanners, etc.

   ·    Requirements: Text requirements are loaded from standards, security policies or internal documents.


2.2. Text processing

   ·    The text is converted into a vector (a set of numbers) through methods that encode the meaning or structure of the text into a numerical form. Preprocessing stages: tokenization (breaking into words), removal of stop words (e.g., "and", "in"), lemmatization (reduction to the initial form).


2.3. Comparison of properties of assets and claims

The neural network compares asset property values with the requirement text using the following approaches:

   ·    Text2Text Generation — a task in NLP (Natural Language Processing), where the model takes a text input (a "questionnaire" to fill out and data about the asset) and generates a text output (returns the filled-out "questionnaire"), preserving the semantic connection with the original text.

   ·    LLM ( Large Language Model ) is a standard approach using a locally deployed model. The model is fed with a description of the asset and the text of the requirement, and at the output we receive a response of the required format. Small models with up to 7 billion parameters can be used.

   ·    Matching — the approach is applicable only if the text of the requirement is converted into a description of the "ideal asset" — an asset where there is a complete match to the requirements. Then it will be possible to compare the asset model with the real asset.


2.4. Report generation

The evaluation results are automatically generated into a report, which includes:

   ·    List of assets and their compliance with requirements.

   ·    Recommendations for eliminating discrepancies.

   ·    Data visualization (e.g. charts and graphs).


If there are no pre-prepared report templates, then such capabilities can be provided by a system of agents based on LLM, for example, YandexGPT.


3. Advantages of Auto Compliance

Using neural networks to automate Compliance provides several key benefits:


3.1. Saving time and resources

Automation can significantly reduce the time spent on manual analysis and verification. This is especially important for medium and large organizations.


3.2. Improving accuracy

Neural networks are capable of analyzing large amounts of data with high accuracy, minimizing human errors, provided that the agents are fine-tuned in advance.


3.3 Scalability

Auto Compliance scales easily to large infrastructures, as well as cloud environments and distributed systems.


3.4. Constant updating

Neural networks can automatically update themselves to take into account changes in requirements, new threats, highlighting new risks and asset vulnerabilities.


4. Examples of use

4.1. Compliance with ISO 27001

The organization can use Auto Compliance to check whether your assets meet the requirements of the ISO 27001 standard. For example, the neural network checks whether data encryption and regular software updates are configured on the servers.


4.2. Compliance with internal security policies

Companies can use Auto Compliance to check whether assets comply with internal security policies. For example, the neural network checks whether antiviruses and firewalls are used on all devices.


5. The Future of Auto Compliance

With the development of neural network and machine learning technologies, Auto Compliance will become an increasingly powerful tool. In the future, we can expect:

   ·   More accurate analysis: Neural networks will better understand context and complex requirements.

   ·   Risk prediction: Neural networks will be able to not only assess current compliance, but also predict potential risks.


Conclusion

Auto Compliance, powered by AI agents, is a revolutionary approach to automating compliance assessment processes. It allows organizations to save time, improve accuracy, and scale compliance assessments to large infrastructures. In the context of a growing number of standards, regulatory requirements, and information security threats, such technologies are becoming an essential element of security and risk management strategies.