By Chad Thiemann & Becki Memmer, Dallas Baptist University, Adjunct Professors of Cybersecurity
Many compliance requirements are also simply too vague and often implemented in insecure ways. For example, HIPAA recommends covered entities and business associates encrypt protected health information (PHI) at rest. But what good is implementing encryption of data at rest if you also store the encryption keys on the same server as the data? This is where compliance requirements often lack value and security processes, such as an encryption key management process – alongside encryption of data at rest, can better secure and protect assets.
While compliance efforts, such as SOC 2 attestations or ISO certifications are part of doing business, they must not be the lone indicator of cybersecurity, as certifications (i.e., compliance alone) will not prevent the risk of a cyberattack.[4] An effective cybersecurity program should be capable of assimilating real-time requirements, address ever-evolving threats and vulnerabilities, and determine or apply mitigations while priorities and resources are constantly in flux.
Building a proper cyber-security program, however, does not mean that it is mutually exclusive from compliance. A strong program can leverage compliance requirements as an opportunity to showcase your overall maturity. For example, if GDPR or HIPPA compliance is a requirement for your organization then use this exercise to document and understand the data that needs to be protected for the entire organization not just those associated with a compliance initiative. By going beyond the compliance scope and addressing data security you can select the appropriate tools or technologies that not only meet those needs of compliance but could ensure that your data is also encrypted or otherwise protected against other types of threats or vulnerabilities which are a component of your cyber program.
As cyber-security programs do their best to prevent attacks and breaches, the expenses to the organization increase exponentially. While some organizations choose not to fully fund these programs because they don’t see the value, others like small-medium size businesses may not have the overall budget to implement the solutions needed for a best-in-class cyber-security program. When forced to decide between compliance and security, compliance will often win, which leaves the organization vulnerable to inevitable breach or attack that may have been prevented with a proper focus on security. By taking advantage of opportunities to combine these efforts, when possible, organizations can ensure that compliance and security are both equally important.
[1]"The Titanic: Lifeboats" History on the Net. 2000-2022, Salem Media. February 14, 2022. <https://www.historyonthenet.com/the-titanic-lifeboats>
[2]Radichel, Teri. “Case Study: Critical Controls That Could Have Prevented Target Breach.” SAN GIAC Certification White Paper, 2014, pp.2-4.
[3]Jarvis, David & Milletary, Jason. “Inside a Targeted Point-of-Sale Data Breach.” Dell SecureWorks Counter Threat Unit - Threat ID: 773, 2014, pg 15.
[4]Goldman, Jim. “Why Cyber Compliance And Cybersecurity Are Not The Same.” Forbes Technology Council - Innovation. October 2021, pgs 2-3.