Streamline CyberFundamentals Compliance

Meet CBB requirements while strengthening your privileged access security, with no special training or infrastructure overhaul

Unified CyFun Support at Every Assurance Level

From Small to Essential, we offer support tailored to your compliance and cybersecurity needs

Small

Starter Security

  • Protect: Identity integration and MFA for Rule 1
  • Protect: Just-in-time privilege management for Rule 2
  • Protect: Applicaiton control and monitoring for Rule 3
  • Detect: Comprehensive audit system for Rule 4
  • Respond: Emergency access and alerts for Rule 5

Basic

Foundation Security

  • Identify: Endpoint Discovery and inventory for ID.AM-1
  • Identity: Application discovery and control for ID.AM-2
  • Protect: Identity integration for PR.AC-1
  • Protect: Break glass for PR.AC-2
  • Protect: Secure Remote Access for PR.AC-3
  • Protect: Just-in-time privilege elevation for PR.AC-4
  • Protect: Encrypted communications for PR.DS-2
  • Protect: Comprehensive audit logs for PR.PT-1
  • Detect: Network activity monitoring for DE.CM-1
  • Respond: Alert and notification system for RS.CO-1

Important

Enhanced Security

  • Identify: Vendor access management for ID.BE-1
  • Protect: Advanced authentication for PR.AC-6
  • Protect: Credential and data protection for PR.DS-1
  • Protect: Application whitelisting, blocking by vendor/checksum, and least functionality enforcement for PR.PT-3
  • Protect: Policy reminders and security awareness during privilege requests for PR.AT-1
  • Detect: AI powered detection of behavioral baseline and analytics, Cross-endpoint correlation, SIEM integration, and threat intelligence for DE.AE-1 and DE.AE-3
  • Detect: Session recording, comprehensive access monitoring, and advanced behavior analysis for DE.CM-3 and DE.CM-7
  • Respond: Rapid response and containment capabilities for RS.RP-1, RS.AN-1, and RS.MI-1

 

Essential

Maximum Security

  • Respond: Immediate application blocking and risk documentation for RS.MI-1
  • Recover: Break glass accounts, rapid admin access restoration, and recovery procedures for RC.RP-1
  • Recover: Incident analysis, policy updates, and process refinement for RC.IM-1

Reporting Capabilities

The audit and reporting tools allow you to extract anything in real-time, such as a graphical representation of the requests and elevations happening – as they happen. Admin By Request’s management tools put you in the front seat of the whole operation.

Device Location

See where all of your devices are on a scalable Google Map. Click for detailed info on each device.

Inventory

Get extensive details on hardware, software, local admins, events, and more for each endpoint.

Activity

Tracked activity includes API, Login, and SCIM activity, mobile app usage, and a settings changelog.

New Devices

At a glance, see which devices have recently installed Admin By Request software.

Local admins

Track and manage your local administrators from a central, birds-eye-view point.

Elevated apps

Use the Auditlog to see which apps have been elevated, by who, and when.

Get Your Detailed Compliance Report

Tell us a bit about your company and we’ll send you a detailed compliance report with information, timeline, checklists, and helpful advice to get you audit-ready.

Trusted by thousands, managing millions

0 K+
Happy Customers
0 K+
Malware Preventions
0 M+
Managed Endpoints
0 +
Countries

Compliance Pack

We’ve made it easy to get your hands on all the necessary documentation needed for our compliance checks at your organization. Our Compliance Pack contains all the docs that you’ve got access to on this page – download it below.

Because you're not logged in, you'll only get the Public documents when you download the Compliance Pack. Log in to access all compliance documentation.

What is Compliance by Design?

» admin by request

Rather than retrofitting security solutions to meet audit requirements, forward-thinking organizations are building their IT infrastructure with compliance as the foundation. This proactive approach eliminates the costly scramble of implementing disconnected point solutions when audit deadlines loom, instead creating integrated systems where security controls naturally align with regulatory frameworks from day one. By Designing infrastructure around compliance requirements companies achieve stronger security posture and audit readiness as inherent qualities of their systems, not afterthoughts.

How Can Privileged Access Management Help You with CyFun/CBB Compliance?

The Cybersecurity Fundamentals framework from the Centre of Cybersecurity Belgium provides flexible structure for managing and reducing cybersecurity risk across four assurance levels: Small, Basic, Important, and Essential. Admin By Request helps organizations of any size and security requirement through effective endpoint privilege management and secure remote access.

Easy Integration

Admin By Request integrates with Windows, macOS, and hybrid cloud environments without requiring major infrastructure changes. There is no need for complex infrastructure changes, so you can strengthen your access controls without impacting daily operations.

Enhanced Security

Control privileged access through just-in-time elevation, approval workflows, and session time limits. Reduce risk by enforcing least privilege and monitoring all administrative actions to protect sensitive systems and data.

Simple Implementation

Deploy and manage granular access policies at scale using built-in automations. Admin By Request simplifies privilege governance with intuitive controls and automation for both endpoints and remote sessions.

Compliance Support

Generate comprehensive logs, reports, and dashboards that directly support FISMA continuous requirements and security control assessments. Admin By Request provides verifiable evidence of policy enforcement aligned with Cyber Fundamentals outcomes.

Credential Protection

Eliminate the use of shared administrator accounts and unsecured credentials. Admin By Request delivers temporary, authenticated access that expires automatically, helping reduce identity-based risks.

Reduced Attack Surface

Remove standing privileges and lock down remote access to prevent lateral movement and privilege escalation. Admin By Request supports continuous protection that maps directly to CBB safeguards.