SlideShare a Scribd company logo
1 of 21
IMPLEMENTING IT
COMPLIANCE
A GUIDE FOR IT ORGANIZATIONS AND SERVICE PROVIDERS
AGENDA
 Compliance vs. Security
 Compliance Program overview
 Making the Program Successful: People
 Making the Program Successful: Documentation
 Making the Program Successful: Implementation
 Making the Program Successful: Maintenance
 Q & A
COMPLIANCE VS. SECURITY
Controls how corporate IT resources that contain information are
accessed and used
Protects from internal and external threats
to the information and underlying assets
Consists of Devices, Applications, Protocols, and Procedures
Dynamic – corresponds to daily changes in
the security threat landscape
COMPLIANCE VS. SECURITY
Conformity of the security program with standards
proposed by regulatory organizations
Consists of documentation of how these standards are
being met
Covers information and asset protection from
internal, external, and environmental threats
Corresponds to changes in policies that are often
spread out over years
COMPLIANCE PROGRAM REQUIREMENTS
WHO DEFINES THE STANDARDS
COMPLIANCE PROGRAM REQUIREMENTS
DETERMINATION OF APPLICABILITY
FEDERAL REGULATIONS
INDUSTRY SPECIFIC
SOME REQUIREMENTS OVERLAP, SOME DON’T
STATE REGULATIONS
VARY FROM STATE TO STATE
SOME ARE INDUSTRY SPECIFIC, OTHERS ARE INDUSTRY AGNOSTIC
HOMOGENEOUS THROUGHOUT THE COUNTRY
REQUIREMENTS VARY GREATLY
COMPLIANCE PROGRAM REQUIREMENTS
PROGRAM PURPOSE
MITIGATE RISKS
REDUCE FINES AND PENALTIES
IMPROVED IMAGE OF THE ORGANIZATION
CLIENT ACQUISITION/RETENTION
BASELINE SECURITY POLICY FRAMEWORK
COMPLIANCE PROGRAM REQUIREMENTS
BASE PROGRAM REQUIREMENTS
WRITTEN INFORMATION SECURITY POLICY
WRITTEN BUSINESS CONTINUITY AND DISASTER RECOVERY POLICY
WRITTEN PERIODIC AUDIT POLICY
IDENTIFICATION OF KEY PERSONNEL
WRITTEN CHANGE MANAGEMENT POLICY
COMPLIANCE PROGRAM REQUIREMENTS
INFORMATION SECURITY POLICY
HOW IS ACCESS TO THE INFORMATION GRANTED
HOW IS ACCESS TO THE INFORMATION CONTROLLED
HOW IS ACCESS TO THE INFORMATION TERMINATED
HOW IS ACCESS TO THE SYSTEMS AND APPLICATIONS CONTROLLED
HOW ARE THREATS MANAGED AND REPORTED ON
HOW ARE INCIDENTS RESPONDED TO AND REPORTED ON
COMPLIANCE PROGRAM REQUIREMENTS
BUSINESS CONTINUITY AND DISASTER RECOVERY POLICY
IDENTIFY SYSTEMS AND APPLICATIONS CRITICAL TO DAILY BUSINESS
OPERATIONS
IDENTIFY RECOVERY TIME AND RECOVERY POINT OBJECTIVES FOR EACH
SYSTEM AND APPLICATION
IDENTIFY PROVISIONS TO MEET RECOVERY TIME AND RECOVERY POINT
OBJECTIVES
DESCRIBE THE BACKUP AND RECOVERY PROCESS FOR EACH SYSTEM AND
APPLICATION
DETAIL TESTING FREQUENCY FOR THE BC/DR PLAN
DETAIL FREQUENCY OF BC/DR PLAN REVIEW AND UPDATE
COMPLIANCE PROGRAM REQUIREMENTS
BUSINESS CONTINUITY AND DISASTER RECOVERY POLICY
IDENTIFY SYSTEMS AND APPLICATIONS CRITICAL TO DAILY BUSINESS
OPERATIONS
IDENTIFY RECOVERY TIME AND RECOVERY POINT OBJECTIVES FOR EACH
SYSTEM AND APPLICATION
IDENTIFY PROVISIONS TO MEET RECOVERY TIME AND RECOVERY POINT
OBJECTIVES
DESCRIBE THE BACKUP AND RECOVERY PROCESS FOR EACH SYSTEM AND
APPLICATION
DETAIL TESTING FREQUENCY FOR THE BC/DR PLAN
DETAIL FREQUENCY OF BC/DR PLAN REVIEW AND UPDATE
COMPLIANCE PROGRAM REQUIREMENTS
KEY PERSONNEL
IDENTIFY PERSONNEL RESPONSIBLE FOR:
IMPLEMENTATION OF POLICY COMPONENTS
POLICY MAINTENANCE AND UPDATE
PERIODIC SYSTEM AUDITS AND ASSESSMENT
RISK IDENTIFICATION AND MITIGATION
PERFORMANCE OF TASKS AS IDENTIFIED BY POLICIES AND PROCEDURES
COMPLIANCE PROGRAM REQUIREMENTS
PERIODIC AUDIT
A COMPREHENSIVE ANNUAL AUDIT OF ALL POLICY COMPONENTS
AN ANNUAL THIRD PARTY PENETRATION AND VULNERABILITY ASSESSMENT
CONTINUOUS REVIEW OF STANDARDS TO ENSURE POLICY COMPLIANCE
AUDIT OF SYSTEMS AND APPLICATIONS DURING DEVELOPMENT AND POST
PRODUCTION DEPLOYMENT
ANNUAL AUDIT REVIEW AND REMEDIATION PLANNING
COMPLIANCE PROGRAM REQUIREMENTS
CHANGE MANAGEMENT POLICY
DESCRIBES HOW SYSTEMS AND APPLICATIONS ARE UPDATED OR REPLACED
IF APPLICATIONS ARE DEVELOPMENT INTERNALLY, DESCRIBES APPLICATION
DEVELOPMENT METHODOLOGY AND PROCESSES USED
NEW SYSTEM TESTING AND IMPLEMENTATION
CHANGE TRACKING
POST IMPLEMENTATION REVIEW/POST-MORTEM
COMPLIANCE PROGRAM REQUIREMENTS
MAKING THE PROGRAM SUCCESSFUL: PEOPLE
IDENTIFY KEY BUSINESS STAKEHOLDERS
TO ENSURE ORGANIZATION BUY-IN
ENSURE SEGREGATION OF DUTIES:
DESIGN, IMPLEMENTATION, AUDIT
ASSIGN ROLES BASED ON FUNCTION
IN THE ORGANIZATION
COMPLIANCE PROGRAM REQUIREMENTS
MAKING THE PROGRAM SUCCESSFUL: PEOPLE
ENSURE THAT STAFF IS PROPERLY
TRAINED ON THE POLICIES
MAKE SURE PEOPLE UNDERSTAND
WHY THIS IS NECESSARY
TRAINING MUST BE PERIODIC AND
CONTINUOUS
IT’S A TEAM EFFORT
COMPLIANCE PROGRAM REQUIREMENTS
MAKING THE PROGRAM SUCCESSFUL: DOCUMENTATION
FORMAL DOCUMENT
VERSION TRACKING
IDENTIFY SCOPE AND TARGET AUDIENCE
IDENTIFY CONTROLS THE DOCUMENT ADDRESSES
COMPLIANCE PROGRAM REQUIREMENTS
MAKING THE PROGRAM SUCCESSFUL: IMPLEMENTATION
TREAT IT LIKE YOU WOULD TREATE A SYSTEM DEPLOYMENT PROJECT
USE PROJECT MANAGEMENT METHODS/TOOLS
GIVE YOURSELF PLENTY OF TIME
UTILIZE A PHASED APPROACH
WORK CLOSELY WITH BUSINESS LEADERS
COMPLIANCE PROGRAM REQUIREMENTS
MAKING THE PROGRAM SUCCESSFUL: IMPLEMENTATION
ENSURE CONTINUOUS BUY-IN
IDENTIFY IMPACT TO DAILY WORKFLOW
REVIEW WORKFLOW IMPACT WITH BUINESS
LEADERS TO MITIGATE PUSH BACK
ENSURE CONTINUOUS COMMUNICATION
DURING THE IMPLEMENTATION
TEST WHENEVER POSSIBLE TO ADDRESS
ISSUES PRIOR TO THEM BECOMING
PROBLEMS
COMPLIANCE PROGRAM REQUIREMENTS
MAKING THE PROGRAM SUCCESSFUL: MAINTENANCE
PERIODICALLY REVIEW REQUIREMENTS FOR CHANGES
KEEP AN EYE ON BELL-WEATHER STATES: NY, MA, CA
KEEP UP TO DATE WITH GUIDANCE FROM
ISC(2) AND NIST
USE THE AUDIT FUNCTION TO MAINTAIN
THE PROGRAM
WORK WITH INDUSTRY PEERS TO TEST
IDEAS
COMPLIANCE PROGRAM REQUIREMENTS
QUESTIONS AND ANSWERS

More Related Content

What's hot

Let me guess covid will be in all top risk studies this year
Let me guess covid will be in all top risk studies this yearLet me guess covid will be in all top risk studies this year
Let me guess covid will be in all top risk studies this yearHernan Huwyler, MBA CPA
 
Information Risk Management - Cyber Risk Management - IT Risks
Information Risk Management - Cyber Risk Management - IT RisksInformation Risk Management - Cyber Risk Management - IT Risks
Information Risk Management - Cyber Risk Management - IT RisksHernan Huwyler, MBA CPA
 
International Standard on Assurance Engagements ISAE 3000 Audits
International Standard on Assurance Engagements ISAE 3000 AuditsInternational Standard on Assurance Engagements ISAE 3000 Audits
International Standard on Assurance Engagements ISAE 3000 AuditsHernan Huwyler, MBA CPA
 
Implementing, Documenting and Testing Compliance Controls Hernan Huwyler
Implementing, Documenting and Testing Compliance Controls Hernan HuwylerImplementing, Documenting and Testing Compliance Controls Hernan Huwyler
Implementing, Documenting and Testing Compliance Controls Hernan HuwylerHernan Huwyler, MBA CPA
 
How to Navigate an EHR Implementation Lifecycle
How to Navigate an EHR Implementation LifecycleHow to Navigate an EHR Implementation Lifecycle
How to Navigate an EHR Implementation LifecycleLarry Kaiser
 
Healthcare It Security Risk 0310
Healthcare It Security Risk 0310Healthcare It Security Risk 0310
Healthcare It Security Risk 0310John Reno
 
Competence in the major hazard industries
Competence in the major hazard industriesCompetence in the major hazard industries
Competence in the major hazard industriesAlan Bassett
 
Risk Management Research 2016
Risk Management Research 2016Risk Management Research 2016
Risk Management Research 2016Niamh Lynch
 
Safety management
Safety managementSafety management
Safety managementSrini Vasan
 
Risk management in medical devices industry
Risk management in medical devices industryRisk management in medical devices industry
Risk management in medical devices industryGlobalCompliancePanel
 
Risk management-medical-devices-seattle-wa
Risk management-medical-devices-seattle-waRisk management-medical-devices-seattle-wa
Risk management-medical-devices-seattle-waGlobalCompliancePanel
 

What's hot (11)

Let me guess covid will be in all top risk studies this year
Let me guess covid will be in all top risk studies this yearLet me guess covid will be in all top risk studies this year
Let me guess covid will be in all top risk studies this year
 
Information Risk Management - Cyber Risk Management - IT Risks
Information Risk Management - Cyber Risk Management - IT RisksInformation Risk Management - Cyber Risk Management - IT Risks
Information Risk Management - Cyber Risk Management - IT Risks
 
International Standard on Assurance Engagements ISAE 3000 Audits
International Standard on Assurance Engagements ISAE 3000 AuditsInternational Standard on Assurance Engagements ISAE 3000 Audits
International Standard on Assurance Engagements ISAE 3000 Audits
 
Implementing, Documenting and Testing Compliance Controls Hernan Huwyler
Implementing, Documenting and Testing Compliance Controls Hernan HuwylerImplementing, Documenting and Testing Compliance Controls Hernan Huwyler
Implementing, Documenting and Testing Compliance Controls Hernan Huwyler
 
How to Navigate an EHR Implementation Lifecycle
How to Navigate an EHR Implementation LifecycleHow to Navigate an EHR Implementation Lifecycle
How to Navigate an EHR Implementation Lifecycle
 
Healthcare It Security Risk 0310
Healthcare It Security Risk 0310Healthcare It Security Risk 0310
Healthcare It Security Risk 0310
 
Competence in the major hazard industries
Competence in the major hazard industriesCompetence in the major hazard industries
Competence in the major hazard industries
 
Risk Management Research 2016
Risk Management Research 2016Risk Management Research 2016
Risk Management Research 2016
 
Safety management
Safety managementSafety management
Safety management
 
Risk management in medical devices industry
Risk management in medical devices industryRisk management in medical devices industry
Risk management in medical devices industry
 
Risk management-medical-devices-seattle-wa
Risk management-medical-devices-seattle-waRisk management-medical-devices-seattle-wa
Risk management-medical-devices-seattle-wa
 

Similar to Implementing a compliance program

Beijaflore inc. white paper IT compliance program v1.0
Beijaflore inc. white paper   IT compliance program v1.0Beijaflore inc. white paper   IT compliance program v1.0
Beijaflore inc. white paper IT compliance program v1.0Maxime de Jabrun
 
An Intro to Resolver's Compliance Application
An Intro to Resolver's Compliance ApplicationAn Intro to Resolver's Compliance Application
An Intro to Resolver's Compliance ApplicationResolver Inc.
 
Cybersecurity Best Practices for 3rd Party Supply Chain
Cybersecurity Best Practices for 3rd Party Supply ChainCybersecurity Best Practices for 3rd Party Supply Chain
Cybersecurity Best Practices for 3rd Party Supply ChainAnthony Braddy
 
How to Implement a Project Management Information System
How to Implement a Project Management Information SystemHow to Implement a Project Management Information System
How to Implement a Project Management Information SystemPMA Consultants
 
Quality Assurance & Post Award Performance Measurement
Quality Assurance & Post Award Performance MeasurementQuality Assurance & Post Award Performance Measurement
Quality Assurance & Post Award Performance Measurementmubarak2009
 
Increasing the probability of project success using Earned Value Management
Increasing the probability of project success using Earned Value ManagementIncreasing the probability of project success using Earned Value Management
Increasing the probability of project success using Earned Value ManagementGlen Alleman
 
Create an Enterprise Architecture Strategy in 3 Steps
Create an Enterprise Architecture Strategy in 3 StepsCreate an Enterprise Architecture Strategy in 3 Steps
Create an Enterprise Architecture Strategy in 3 StepsMauricio 'MJ' Jimenez
 
05 integrated management system telkom 2016 penanganan bencana - tanggap da...
05 integrated management system   telkom 2016 penanganan bencana - tanggap da...05 integrated management system   telkom 2016 penanganan bencana - tanggap da...
05 integrated management system telkom 2016 penanganan bencana - tanggap da...wisnu wardhana, i nyoman
 
gray_audit_presentation.ppt
gray_audit_presentation.pptgray_audit_presentation.ppt
gray_audit_presentation.pptKhalilIdhman
 
Agile or DevOps? What is Your Calling for Custom Software Development?
Agile or DevOps? What is Your Calling for Custom Software Development?Agile or DevOps? What is Your Calling for Custom Software Development?
Agile or DevOps? What is Your Calling for Custom Software Development?Jai Mehta
 
Massachusetts data privacy rules v6.0
Massachusetts data privacy rules v6.0Massachusetts data privacy rules v6.0
Massachusetts data privacy rules v6.0stevemeltzer
 
Article on Emergency Management and Corporate Certification
Article on Emergency Management and Corporate CertificationArticle on Emergency Management and Corporate Certification
Article on Emergency Management and Corporate CertificationThomas Bronack
 
Introduction to IT compliance program and Discuss the challenges IT .pdf
Introduction to IT compliance program and Discuss the challenges IT .pdfIntroduction to IT compliance program and Discuss the challenges IT .pdf
Introduction to IT compliance program and Discuss the challenges IT .pdfSALES97
 
Business Objectives & Control Objectives in Information Technology
Business Objectives  &  Control Objectives  in  Information TechnologyBusiness Objectives  &  Control Objectives  in  Information Technology
Business Objectives & Control Objectives in Information TechnologyMufaddal Nullwala
 
High impact facilities organizations for submission
High impact facilities organizations for submissionHigh impact facilities organizations for submission
High impact facilities organizations for submissionRobin Camarote, LLC
 
A Closer Look at Application Support and Maintenance.pdf
A Closer Look at Application Support and Maintenance.pdfA Closer Look at Application Support and Maintenance.pdf
A Closer Look at Application Support and Maintenance.pdfVertexplusUS
 
Bussiness continuity
Bussiness continuityBussiness continuity
Bussiness continuityatharabbas
 

Similar to Implementing a compliance program (20)

Beijaflore inc. white paper IT compliance program v1.0
Beijaflore inc. white paper   IT compliance program v1.0Beijaflore inc. white paper   IT compliance program v1.0
Beijaflore inc. white paper IT compliance program v1.0
 
An Intro to Resolver's Compliance Application
An Intro to Resolver's Compliance ApplicationAn Intro to Resolver's Compliance Application
An Intro to Resolver's Compliance Application
 
Cybersecurity Best Practices for 3rd Party Supply Chain
Cybersecurity Best Practices for 3rd Party Supply ChainCybersecurity Best Practices for 3rd Party Supply Chain
Cybersecurity Best Practices for 3rd Party Supply Chain
 
How to Implement a Project Management Information System
How to Implement a Project Management Information SystemHow to Implement a Project Management Information System
How to Implement a Project Management Information System
 
Quality Assurance & Post Award Performance Measurement
Quality Assurance & Post Award Performance MeasurementQuality Assurance & Post Award Performance Measurement
Quality Assurance & Post Award Performance Measurement
 
Increasing the probability of project success using Earned Value Management
Increasing the probability of project success using Earned Value ManagementIncreasing the probability of project success using Earned Value Management
Increasing the probability of project success using Earned Value Management
 
Create an Enterprise Architecture Strategy in 3 Steps
Create an Enterprise Architecture Strategy in 3 StepsCreate an Enterprise Architecture Strategy in 3 Steps
Create an Enterprise Architecture Strategy in 3 Steps
 
05 integrated management system telkom 2016 penanganan bencana - tanggap da...
05 integrated management system   telkom 2016 penanganan bencana - tanggap da...05 integrated management system   telkom 2016 penanganan bencana - tanggap da...
05 integrated management system telkom 2016 penanganan bencana - tanggap da...
 
gray_audit_presentation.ppt
gray_audit_presentation.pptgray_audit_presentation.ppt
gray_audit_presentation.ppt
 
Agile or DevOps? What is Your Calling for Custom Software Development?
Agile or DevOps? What is Your Calling for Custom Software Development?Agile or DevOps? What is Your Calling for Custom Software Development?
Agile or DevOps? What is Your Calling for Custom Software Development?
 
Massachusetts data privacy rules v6.0
Massachusetts data privacy rules v6.0Massachusetts data privacy rules v6.0
Massachusetts data privacy rules v6.0
 
Article on Emergency Management and Corporate Certification
Article on Emergency Management and Corporate CertificationArticle on Emergency Management and Corporate Certification
Article on Emergency Management and Corporate Certification
 
Introduction to IT compliance program and Discuss the challenges IT .pdf
Introduction to IT compliance program and Discuss the challenges IT .pdfIntroduction to IT compliance program and Discuss the challenges IT .pdf
Introduction to IT compliance program and Discuss the challenges IT .pdf
 
Business Objectives & Control Objectives in Information Technology
Business Objectives  &  Control Objectives  in  Information TechnologyBusiness Objectives  &  Control Objectives  in  Information Technology
Business Objectives & Control Objectives in Information Technology
 
Bsc Complete
Bsc CompleteBsc Complete
Bsc Complete
 
High impact facilities organizations for submission
High impact facilities organizations for submissionHigh impact facilities organizations for submission
High impact facilities organizations for submission
 
A Closer Look at Application Support and Maintenance.pdf
A Closer Look at Application Support and Maintenance.pdfA Closer Look at Application Support and Maintenance.pdf
A Closer Look at Application Support and Maintenance.pdf
 
Gamp 5 overview by jaya prakash ra
Gamp 5 overview by jaya prakash raGamp 5 overview by jaya prakash ra
Gamp 5 overview by jaya prakash ra
 
Bussiness continuity
Bussiness continuityBussiness continuity
Bussiness continuity
 
OHSAS 18001 checklist
OHSAS 18001 checklistOHSAS 18001 checklist
OHSAS 18001 checklist
 

Recently uploaded

Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTopCSSGallery
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?Paolo Missier
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?Mark Billinghurst
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxMasterG
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Hiroshi SHIBATA
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdfMuhammad Subhan
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfalexjohnson7307
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 

Recently uploaded (20)

Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 

Implementing a compliance program

  • 1. IMPLEMENTING IT COMPLIANCE A GUIDE FOR IT ORGANIZATIONS AND SERVICE PROVIDERS
  • 2. AGENDA  Compliance vs. Security  Compliance Program overview  Making the Program Successful: People  Making the Program Successful: Documentation  Making the Program Successful: Implementation  Making the Program Successful: Maintenance  Q & A
  • 3. COMPLIANCE VS. SECURITY Controls how corporate IT resources that contain information are accessed and used Protects from internal and external threats to the information and underlying assets Consists of Devices, Applications, Protocols, and Procedures Dynamic – corresponds to daily changes in the security threat landscape
  • 4. COMPLIANCE VS. SECURITY Conformity of the security program with standards proposed by regulatory organizations Consists of documentation of how these standards are being met Covers information and asset protection from internal, external, and environmental threats Corresponds to changes in policies that are often spread out over years
  • 5. COMPLIANCE PROGRAM REQUIREMENTS WHO DEFINES THE STANDARDS
  • 6. COMPLIANCE PROGRAM REQUIREMENTS DETERMINATION OF APPLICABILITY FEDERAL REGULATIONS INDUSTRY SPECIFIC SOME REQUIREMENTS OVERLAP, SOME DON’T STATE REGULATIONS VARY FROM STATE TO STATE SOME ARE INDUSTRY SPECIFIC, OTHERS ARE INDUSTRY AGNOSTIC HOMOGENEOUS THROUGHOUT THE COUNTRY REQUIREMENTS VARY GREATLY
  • 7. COMPLIANCE PROGRAM REQUIREMENTS PROGRAM PURPOSE MITIGATE RISKS REDUCE FINES AND PENALTIES IMPROVED IMAGE OF THE ORGANIZATION CLIENT ACQUISITION/RETENTION BASELINE SECURITY POLICY FRAMEWORK
  • 8. COMPLIANCE PROGRAM REQUIREMENTS BASE PROGRAM REQUIREMENTS WRITTEN INFORMATION SECURITY POLICY WRITTEN BUSINESS CONTINUITY AND DISASTER RECOVERY POLICY WRITTEN PERIODIC AUDIT POLICY IDENTIFICATION OF KEY PERSONNEL WRITTEN CHANGE MANAGEMENT POLICY
  • 9. COMPLIANCE PROGRAM REQUIREMENTS INFORMATION SECURITY POLICY HOW IS ACCESS TO THE INFORMATION GRANTED HOW IS ACCESS TO THE INFORMATION CONTROLLED HOW IS ACCESS TO THE INFORMATION TERMINATED HOW IS ACCESS TO THE SYSTEMS AND APPLICATIONS CONTROLLED HOW ARE THREATS MANAGED AND REPORTED ON HOW ARE INCIDENTS RESPONDED TO AND REPORTED ON
  • 10. COMPLIANCE PROGRAM REQUIREMENTS BUSINESS CONTINUITY AND DISASTER RECOVERY POLICY IDENTIFY SYSTEMS AND APPLICATIONS CRITICAL TO DAILY BUSINESS OPERATIONS IDENTIFY RECOVERY TIME AND RECOVERY POINT OBJECTIVES FOR EACH SYSTEM AND APPLICATION IDENTIFY PROVISIONS TO MEET RECOVERY TIME AND RECOVERY POINT OBJECTIVES DESCRIBE THE BACKUP AND RECOVERY PROCESS FOR EACH SYSTEM AND APPLICATION DETAIL TESTING FREQUENCY FOR THE BC/DR PLAN DETAIL FREQUENCY OF BC/DR PLAN REVIEW AND UPDATE
  • 11. COMPLIANCE PROGRAM REQUIREMENTS BUSINESS CONTINUITY AND DISASTER RECOVERY POLICY IDENTIFY SYSTEMS AND APPLICATIONS CRITICAL TO DAILY BUSINESS OPERATIONS IDENTIFY RECOVERY TIME AND RECOVERY POINT OBJECTIVES FOR EACH SYSTEM AND APPLICATION IDENTIFY PROVISIONS TO MEET RECOVERY TIME AND RECOVERY POINT OBJECTIVES DESCRIBE THE BACKUP AND RECOVERY PROCESS FOR EACH SYSTEM AND APPLICATION DETAIL TESTING FREQUENCY FOR THE BC/DR PLAN DETAIL FREQUENCY OF BC/DR PLAN REVIEW AND UPDATE
  • 12. COMPLIANCE PROGRAM REQUIREMENTS KEY PERSONNEL IDENTIFY PERSONNEL RESPONSIBLE FOR: IMPLEMENTATION OF POLICY COMPONENTS POLICY MAINTENANCE AND UPDATE PERIODIC SYSTEM AUDITS AND ASSESSMENT RISK IDENTIFICATION AND MITIGATION PERFORMANCE OF TASKS AS IDENTIFIED BY POLICIES AND PROCEDURES
  • 13. COMPLIANCE PROGRAM REQUIREMENTS PERIODIC AUDIT A COMPREHENSIVE ANNUAL AUDIT OF ALL POLICY COMPONENTS AN ANNUAL THIRD PARTY PENETRATION AND VULNERABILITY ASSESSMENT CONTINUOUS REVIEW OF STANDARDS TO ENSURE POLICY COMPLIANCE AUDIT OF SYSTEMS AND APPLICATIONS DURING DEVELOPMENT AND POST PRODUCTION DEPLOYMENT ANNUAL AUDIT REVIEW AND REMEDIATION PLANNING
  • 14. COMPLIANCE PROGRAM REQUIREMENTS CHANGE MANAGEMENT POLICY DESCRIBES HOW SYSTEMS AND APPLICATIONS ARE UPDATED OR REPLACED IF APPLICATIONS ARE DEVELOPMENT INTERNALLY, DESCRIBES APPLICATION DEVELOPMENT METHODOLOGY AND PROCESSES USED NEW SYSTEM TESTING AND IMPLEMENTATION CHANGE TRACKING POST IMPLEMENTATION REVIEW/POST-MORTEM
  • 15. COMPLIANCE PROGRAM REQUIREMENTS MAKING THE PROGRAM SUCCESSFUL: PEOPLE IDENTIFY KEY BUSINESS STAKEHOLDERS TO ENSURE ORGANIZATION BUY-IN ENSURE SEGREGATION OF DUTIES: DESIGN, IMPLEMENTATION, AUDIT ASSIGN ROLES BASED ON FUNCTION IN THE ORGANIZATION
  • 16. COMPLIANCE PROGRAM REQUIREMENTS MAKING THE PROGRAM SUCCESSFUL: PEOPLE ENSURE THAT STAFF IS PROPERLY TRAINED ON THE POLICIES MAKE SURE PEOPLE UNDERSTAND WHY THIS IS NECESSARY TRAINING MUST BE PERIODIC AND CONTINUOUS IT’S A TEAM EFFORT
  • 17. COMPLIANCE PROGRAM REQUIREMENTS MAKING THE PROGRAM SUCCESSFUL: DOCUMENTATION FORMAL DOCUMENT VERSION TRACKING IDENTIFY SCOPE AND TARGET AUDIENCE IDENTIFY CONTROLS THE DOCUMENT ADDRESSES
  • 18. COMPLIANCE PROGRAM REQUIREMENTS MAKING THE PROGRAM SUCCESSFUL: IMPLEMENTATION TREAT IT LIKE YOU WOULD TREATE A SYSTEM DEPLOYMENT PROJECT USE PROJECT MANAGEMENT METHODS/TOOLS GIVE YOURSELF PLENTY OF TIME UTILIZE A PHASED APPROACH WORK CLOSELY WITH BUSINESS LEADERS
  • 19. COMPLIANCE PROGRAM REQUIREMENTS MAKING THE PROGRAM SUCCESSFUL: IMPLEMENTATION ENSURE CONTINUOUS BUY-IN IDENTIFY IMPACT TO DAILY WORKFLOW REVIEW WORKFLOW IMPACT WITH BUINESS LEADERS TO MITIGATE PUSH BACK ENSURE CONTINUOUS COMMUNICATION DURING THE IMPLEMENTATION TEST WHENEVER POSSIBLE TO ADDRESS ISSUES PRIOR TO THEM BECOMING PROBLEMS
  • 20. COMPLIANCE PROGRAM REQUIREMENTS MAKING THE PROGRAM SUCCESSFUL: MAINTENANCE PERIODICALLY REVIEW REQUIREMENTS FOR CHANGES KEEP AN EYE ON BELL-WEATHER STATES: NY, MA, CA KEEP UP TO DATE WITH GUIDANCE FROM ISC(2) AND NIST USE THE AUDIT FUNCTION TO MAINTAIN THE PROGRAM WORK WITH INDUSTRY PEERS TO TEST IDEAS