Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

ISO 27001 Audit Record Retention Requirements

As one of the most common information security frameworks in the world, ISO 27001 is used by tens of thousands of organizations worldwide. That means it has to fit a lot of different groups with a lot of different needs. It also means that there’s a lot of information pertaining to ISO 27001 within each of those companies. Data like the logs of access control systems, the chain of custody for sensitive information, and the results of audits are all stored somewhere.

Ultimate Guide to ISO 27001's Cryptographic Controls

Ask anyone on the outside of information security what the most important part of the industry is, and you’ll get a lot of different answers, but among them will be cryptography. Using strong encryption to hide information where it can’t be accessed without the proper authorization makes a lot of sense, and the idea of strong cryptography has saturated popular culture.

What Is DISA ACAS Certification and How Does It Work?

Here on the Ignyte blog, we talk a lot about the most important cybersecurity frameworks for the federal government, including FedRAMP and CMMC. There’s a lot that goes into these frameworks, with contributors all across the information security world, but one of the more important agencies is DISA. The United States Defense Information Systems Agency, formerly known as the Defense Communications Agency, is the DoD sub-agency responsible for IT services and security for the Department of Defense.

Is CMMC Still Needed if You Have a QMS or ISMS?

CMMC is a strict and difficult standard to meet, which leads a lot of companies to wonder: how necessary is it, really? After all, CMMC is not alone in the world of security and compliance. There are a lot of other frameworks, both within the United States (like FedRAMP) or internationally (like ISO 27001). Companies that meet other compliance standards and have systems in place, like an ISMS or a QMS, might wonder: Is CMMC still required?

Is Microsoft 365 GCC High Needed for CMMC Certification?

CMMC is a strict certification, but there’s also a lot of variation within its security controls and the demands it makes of agencies looking to achieve that certification. The standards are high, especially at the higher levels of CMMC, but there are also many tools and platforms available to meet those needs appropriately, without reinventing the wheel from base principles. Businesses need the tools necessary to function in a modern digital world.

6 Best Practices for CMMC Physical Security Control

The first C in CMMC stands for cybersecurity, so it makes sense that the vast majority of content and information about it (both here and elsewhere online) is focused on the cyber aspect. Digital security makes up the bulk of the certification, and it’s by far the biggest threat vector in a modern business space. There is, however, still that detail that has to matter sooner or later: the fact that everything digital has to have somewhere it lives in physical space.

FedRAMP Monthly ConMon vs Annual Assessments

We say this just about every time the subject comes up (which is often, given our industry and role in it), but valid information security is not a state of being. It is a moving target and a process. Achieving certification for a certain level of security is a snapshot of a moment in time, but before the hands on the clock swing around again, that snapshot is out of date. Security frameworks like FedRAMP deal with this reality in a few different ways.

FedRAMP 20x Phase One: What is The New Pilot Program?

By now, you likely know the basics of FedRAMP, especially if you’ve read our robust coverage of the program. But, like all good cybersecurity frameworks, it evolves and changes over time, and our knowledge needs to be updated. One recent development is the 20x pilot program, which entered phase one in March of 2025. What is this pilot program, what does it do, and who is it for? Read on to learn more about 20xP1 and what it means for you.

Visualize Compliance: Explore the Ignyte Platform Dashboard

If your business has to adhere to compliance rules for a framework like FedRAMP, CMMC, or ISO 27001, keeping track of all of the proof of implementation and artifacts is a full-time job. From individual security controls to overall framework compliance to ISMS implementation to stakeholder assignments, it can very easily be a cluttered, disconnected mess. Being able to see it all at a glance can feel like an unattainable dream.