Feature to Compliance Map

On this page we provide a quick overview of how our capabilities map to certain stipulations in major compliance frameworks. The tables below indicate a stated requirement by the framework and delivered by Filemail. NA denoted in a particular framework means it is not a stated requirement.

Access & Identity Management

RequirementCyber Essentials UKFINRAFISMAGDPRGLBAHIPAANSM Norway
Access controls (2FA, SAML/SSO)CheckedCheckedCheckedCheckedCheckedCheckedChecked
Session managementChecked
NA
CheckedCheckedCheckedCheckedChecked

Audit, Logging & Integrity

RequirementCyber Essentials UKFINRAFISMAGDPRGLBAHIPAANSM Norway
Audit logging & monitoringCheckedCheckedCheckedCheckedCheckedCheckedChecked
Integrity protectionCheckedCheckedCheckedCheckedCheckedCheckedChecked

Data Governance & Compliance

RequirementCyber Essentials UKFINRAFISMAGDPRGLBAHIPAANSM Norway
Data retention & records
NA
CheckedCheckedCheckedCheckedCheckedChecked
Breach detection & notification
NA
CheckedCheckedCheckedCheckedCheckedChecked

Security & Encryption

RequirementCyber Essentials UKFINRAFISMAGDPRGLBAHIPAANSM Norway
Encryption (transit & rest)CheckedCheckedCheckedCheckedCheckedCheckedChecked
Secure configuration / hardeningChecked
NA
CheckedCheckedCheckedCheckedChecked
Patch vulnerability managementChecked
NA
CheckedCheckedCheckedCheckedChecked
Anti-virus / Malware ProtectionChecked
NA
CheckedCheckedCheckedCheckedChecked
Would You Like More Information?
You'll find more information on our page Compliant File Sharing.
Go To Compliant File Sharing