SlideShare a Scribd company logo
Divya Kothari
IMT 553 - Assignment 1
SECURITY COMPLIANCE MODELS: CHECKLISTS VERSUS RISK
INTRODUCTION
Technology is pacing forward at a speed that is forcing everything else to play catch up, especially law &
regulations. This has resulted in highly convoluted threat landscapes. The government, industry regulators,
small/large businesses and individuals are almost on the same page (if you forget the NSA for a moment)
when it comes to protection of privacy and security for all stakeholders of a society. This has led to
numerous compliance regimes in the hope of getting better sleep at night. This paper highlights three such
compliance standards: 1) Payment Card Industry Data Security Standard (“PCI”), 2) Gramm–Leach–Bliley
Act1
(“GLBA”) & 3) The Health Insurance Portability and Accountability Act, 1996 (“HIPAA”)
categorizing them into different kinds of models, their applicability and the intent behind the same.
CATEGORIZATION: CHECKLIST, RISK MANAGEMENT FRAMEWORK OR BOTH?
1) PCI DSS
PCI, an industry standard checklist, came into existence in 2004 when five major financial institutions
decided to align their schemes2
to up the level of protection for card issuers and increase safeguards for
card users by making sure that all entities comply with a certain baseline of security controls. Thus
compliance of this ‘one size fits all’ approach is mandated by the industry regulators. For cut and dry
issues such as firewalls, vulnerability patches, encryption, etc. there can be no exceptions made for
different environments. Thus questions such as - (i) Your Company is employing new workers with
remote access to a system which processes card payment, is their identity authenticated? (ii) New
patches have been released for the latest vulnerabilities, have you updated to the latest patch? (iii) Is
the outsourced vendor following secure practices?3
– in the form of a checklist, make it easy for a
organizations without a dedicated security team and a limited budget, as this ‘security checklist’
provides for much leeway when it comes to self-regulation & ease of audit with appropriate guidance
at each step.4
As Bob Russo, General Manager of the PCI Council puts it:
“PCI is a structured "blend...[of] specificity and high-level concepts" that allows "stakeholders the
opportunity and flexibility to work with Qualified Security Assessors (QSAs) to determine
appropriate security controls within their environment that meet the intent of the PCI standards."
It may be noted that since PCI is an industry standard, it is not compulsory by law to adopt it. However
if an organization chooses to do so, it must comply with all its requirements.
2) GLBA
Protecting the privacy of consumer’s personally identifiable financial information held by "financial
institutions" is at the heart of the financial privacy provisions of this Act. It requires companies to give
consumers - privacy notices explaining the institutions' information-sharing practices. In turn,
1
Also known as the Financial Services Modernization Act, 1999
2Visa's Cardholder Information Security Program, MasterCard's Site Data Protection, American Express' Data Security Operating
Policy, Discover's Information Security and Compliance, and the JCB's Data Security Program
3Herbig J, 2011 “Security as a Checklist? Think Again” PCI Compliance Guide website. Retrieved from:
https://www.pcicomplianceguide.org/security-as-a-checklist-think-again/
4
Refer to Appendix 1 for an illustration
consumers have the right to limit some (not all) sharing of their information.5
GLBA aims to achieve
its underlying principles of security and compliance by laying down a risk-based approach. This
approach allows the ‘financial institutions’ (as defined by the act) certain autonomy is how to conduct
various internal processes, for instance prioritization of assets, identification of risks, etc. to achieve an
end result. For instance, the Safeguards Rule clause in the Act6
stipulates the development of a written
security plan and subsequently conducting a thorough risk analysis so as to evolve/build safeguards
needed to comply with GLBA.7
While a checklist as seen above, provides for a baseline of controls,
for a more comprehensive risk mitigation/avoidance/transference strategy, a risk-based model can be
adopted, eg. By establishing an internal team for such an assessment or having a third-party audit. This
helps an organization to customize the framework according to its unique needs and resources.
GLBA being a federal statue is compulsorily applicable to whether a financial discloses nonpublic
information or not. Furthermore, the Federal Trade Commission has authority to enforce the law with
respect to "financial institutions" that are not covered by the federal banking agencies, the Securities
and Exchange Commission, the Commodity Futures Trading Commission, and state insurance
authorities.8
3) HIPAA
Initially an industry based standard, HIPAA was enacted into law in 1996. In brief it aims to protect
‘patient health information’ (“PHI”) by putting safeguards in place, limiting the use, share and access
to the ‘minimum necessary’, have appropriate agreements with related parties that use/disclose
sensitive information & implement sufficient training programs. The way HIPAA is structured is a
hybrid of a checklist and risk based model. “Essentially, a ‘covered entity’ (as defined by the act) is
given a broad power to disclose protected PHI. However from then on, the limitations on disclosure
begin to stack up. With the exception of disclosures for treatment activities, most other disclosures are
subject to the “minimum necessary” limitation embodied in HIPAA – the protected health information
disclosed should be the minimum necessary to accomplish the purpose of the disclosure.”9
As Michael Whaley (2015) puts it:
“Regulators chose a hybrid framework for HIPAA because healthcare data transverses a broad
spectrum of health care providers, insurance companies, law firms, and clearinghouses.”10
APPLICATION OF FRAMEWORK
PCI GLBA HIPAA
PCI applies to all entities
irrespective of size that store,
process and transmit cardholder
This law applies to financial institutions
such as banks, security firms, insurance
companies, etc. that sell financial products
and services to consumers. They are
An individual or organization that falls under
the definition of ‘covered entity’ under HIPAA
must comply with the necessary rules (for
Privacy, Security, Enforcement and Breach
5Federal Trade Commission, “In Brief: The Financial Privacy Requirements of the Gramm-Leach-Bliley Act” Retrieved from:
https://www.ftc.gov/tips-advice/business-center/guidance/brief-financial-privacy-requirements-gramm-leach-bliley-act
6 Refer to Appendix 3
7 Miller M. 2014, “ Compliance versus Risk: A look at checklist versus risk based models” Retrieved from:
https://accelerite.com/blog/entry/compliance-versus-risk-a-look-at-checklist-versus-risk-based-models
8
Federal Trade Commission, “In Brief: The Financial Privacy Requirements of the Gramm-Leach-Bliley Act” Retrieved from:
https://www.ftc.gov/tips-advice/business-center/guidance/brief-financial-privacy-requirements-gramm-leach-bliley-act
9 Anderson S. 2013 “Does HIPAA apply to employers” Lexis Nexis. Retrieved from: https://www.lexisnexis.com/legalnewsroom/labor-
employment/b/labor-employment-top-blogs/archive/2013/10/03/does-hipaa-apply-to-employers.aspx?Redirected=true
10 Whaley M. 2015, “PCI Checklists versus HIPAA Risk Management Framework” Retrieved from: https://www.linkedin.com/pulse/pci-checklists-
versus-hipaa-risk-management-framework-michael-whaley
data.11
Thus the smallest physical
point-of-sale interaction for any of
the above-stated five credit/debit
card brands to the biggest online
retailer is subject to PCI.
required to ensure the security and
confidentiality of consumer financial
information against “reasonably
foreseeable” internal or external threats.12
Notification). This includes health care
providers, health plan providers and clearing
houses. Additionally if any of these engages
with a ‘business associate’ to help carry out its
functions, the latter shall also have to comply
with HIPAA.
For purposes of our paper, let us
take the example of Braintree
(Level 1 PCI DSS compliant)13
.
Now acquired by Paypal, but still
run independently, Braintree14
provides payment processing
options across a plethora of devices
and on a global scale for thousands
of online and mobile companies
including Uber, Airbnb, Fab, etc.15
which indirectly means that it has
access to a lot of cardholder data.
On the other hand, an entity like
Thai Tom, a Thai restaurant in
Seattle that only accepts cash and
does not take online orders does not
need to be PCI compliant.
The Banking industry by virtue of being an
information-intensive sector, comes under
the purview of GLBA. Despite its primary
intention to integrate a variety of financial
services offered by one institution, the act
also attempts to upgrade and modernize the
financial industry. With the end user being
constantly apprehensive of ‘Big Brother’
issues, this Act marks a distinction between
affiliated and non-affiliated third parties, in
terms of customer financial information
disclosure and the consumer’s consent to
such disclosure with the latter. Thus apart
from functional regulation, the Act aims to
protect confidential information via its
‘Financial Privacy Rule’, ‘Safeguards Rule’
and ‘Pretexting Protection’.
One such ‘business associate’ is Maximus.
“For 40 years, MAXIMUS has partnered with
federal, state and local governments to make
public health insurance programs run
effectively for the individuals and families they
serve.”16
For all its projects pertaining to
healthcare, Maximus has written contracts with
the party at the other end which is a covered
entity establishing specifically what is
contracted to be performed and comply with
the Rules mandated to protect PHI. In addition
to the contractual obligations, Maximus is
directly liable for certain provisions of the
HIPAA rules.
INTENT BEHIND ADOPTION OF FRAMEWORKS
PCI gives organizations of different scale the opportunity to cookie cut their relations and accordingly meet
compliance needs of their clients. Resorting to PCI also gives the company/institution a stamp of approval
which is a good strategy to build and maintain their customer share. A company like Braintree by
advertising their compliance with PCI shows that they take have secure security controls in place, which
though do not guarantee complete protection, still help give them a competitive edge by bagging votes for
consumer trust.
Being compliant with GLBA is synonymous to a pre-emptive and adaptive risk management approach. It
also provides the banking industry a substantial degree of freedom for the ‘hows’ of implementing systemic
and people processes within a risk model. GLBA as a risk management framework is often viewed as a less
expensive and efficient guide to navigate within the company affairs.
An entity’s risk tolerance changes over time and eventually compliance becomes just one factor in the entire
risk profile. In such cases a hybrid model often stands out. Thus in our example, the hybrid approach allows
Maximus to follow a checklist for certain provisions of the Act only when it acts in the capacity of a business
associate as per HIPAA.
11
PCI DSS Applicability Information, page 7. Retrieved from: https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf
12Airmagnet GLBA Compliance Report. Retrieved from: http://airmagnet.flukenetworks.com/assets/reports/Reports_GLBA_Report.pdf
13 Refer to Appendix 2
14
Braintree website <https://www.braintreepayments.com/>
15 VB|Profiles catalog website https://www.vbprofiles.com/companies/521983e1843bac676e0003a2
16
Maximus website < http://www.maximus.com/health >
APPENDIX 1
APPENDIX 217
17
Braintree’s website <https://www.braintreepayments.com/developers/security>
APPENDIX 3

More Related Content

What's hot

IBM Counter Financial Crimes Management
IBM Counter Financial Crimes ManagementIBM Counter Financial Crimes Management
IBM Counter Financial Crimes Management
Virginia Fernandez
 
Red Storm Rising
Red Storm RisingRed Storm Rising
Red Storm RisingJohn Bonora
 
Sel03129 usen
Sel03129 usenSel03129 usen
Sel03129 usen
Andrey Apuhtin
 
IBM Security Services
IBM Security ServicesIBM Security Services
IBM Security Services
Rainer Mueller
 
Sept 2012 data security & cyber liability
Sept 2012   data security & cyber liabilitySept 2012   data security & cyber liability
Sept 2012 data security & cyber liabilityDFickett
 
Cyber Review_April 2015
Cyber Review_April 2015Cyber Review_April 2015
Cyber Review_April 2015James Sheehan
 
2017 global-cyber-risk-transfer-report-final
2017 global-cyber-risk-transfer-report-final2017 global-cyber-risk-transfer-report-final
2017 global-cyber-risk-transfer-report-final
Δρ. Γιώργος K. Κασάπης
 
SecurityScorecard_2016_Financial_Report
SecurityScorecard_2016_Financial_ReportSecurityScorecard_2016_Financial_Report
SecurityScorecard_2016_Financial_ReportAlex Himmelberg
 
2016 Finance industry cybersecurity report
2016 Finance industry cybersecurity report2016 Finance industry cybersecurity report
2016 Finance industry cybersecurity report
Owen Bartolome
 
Cyber Crime is Wreaking Havoc
Cyber Crime is Wreaking HavocCyber Crime is Wreaking Havoc
Enterprise Fraud Management
Enterprise Fraud ManagementEnterprise Fraud Management
Enterprise Fraud Management
Manish Desai
 
Enterprise Fraud Risk Management
Enterprise Fraud Risk ManagementEnterprise Fraud Risk Management
Enterprise Fraud Risk Management
Tommy Seah
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
- Mark - Fullbright
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
PwC France
 
IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016
thinkASG
 
Global Cyber Market Overview June 2017
Global Cyber Market Overview June 2017Global Cyber Market Overview June 2017
Global Cyber Market Overview June 2017
Graeme Cross
 
Fraud Monitoring Solution
Fraud Monitoring SolutionFraud Monitoring Solution
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurity
Mark Albala
 
Internet Threats and Risk Mitigation
Internet Threats and Risk MitigationInternet Threats and Risk Mitigation
Internet Threats and Risk Mitigation
BrandProtect
 

What's hot (19)

IBM Counter Financial Crimes Management
IBM Counter Financial Crimes ManagementIBM Counter Financial Crimes Management
IBM Counter Financial Crimes Management
 
Red Storm Rising
Red Storm RisingRed Storm Rising
Red Storm Rising
 
Sel03129 usen
Sel03129 usenSel03129 usen
Sel03129 usen
 
IBM Security Services
IBM Security ServicesIBM Security Services
IBM Security Services
 
Sept 2012 data security & cyber liability
Sept 2012   data security & cyber liabilitySept 2012   data security & cyber liability
Sept 2012 data security & cyber liability
 
Cyber Review_April 2015
Cyber Review_April 2015Cyber Review_April 2015
Cyber Review_April 2015
 
2017 global-cyber-risk-transfer-report-final
2017 global-cyber-risk-transfer-report-final2017 global-cyber-risk-transfer-report-final
2017 global-cyber-risk-transfer-report-final
 
SecurityScorecard_2016_Financial_Report
SecurityScorecard_2016_Financial_ReportSecurityScorecard_2016_Financial_Report
SecurityScorecard_2016_Financial_Report
 
2016 Finance industry cybersecurity report
2016 Finance industry cybersecurity report2016 Finance industry cybersecurity report
2016 Finance industry cybersecurity report
 
Cyber Crime is Wreaking Havoc
Cyber Crime is Wreaking HavocCyber Crime is Wreaking Havoc
Cyber Crime is Wreaking Havoc
 
Enterprise Fraud Management
Enterprise Fraud ManagementEnterprise Fraud Management
Enterprise Fraud Management
 
Enterprise Fraud Risk Management
Enterprise Fraud Risk ManagementEnterprise Fraud Risk Management
Enterprise Fraud Risk Management
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
 
IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016
 
Global Cyber Market Overview June 2017
Global Cyber Market Overview June 2017Global Cyber Market Overview June 2017
Global Cyber Market Overview June 2017
 
Fraud Monitoring Solution
Fraud Monitoring SolutionFraud Monitoring Solution
Fraud Monitoring Solution
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurity
 
Internet Threats and Risk Mitigation
Internet Threats and Risk MitigationInternet Threats and Risk Mitigation
Internet Threats and Risk Mitigation
 

Viewers also liked

1986_Chernobyl_Meltdown.pptx
1986_Chernobyl_Meltdown.pptx1986_Chernobyl_Meltdown.pptx
1986_Chernobyl_Meltdown.pptxDivya Kothari
 
земля в солнечной системе
земля в солнечной системеземля в солнечной системе
земля в солнечной системе
yarkovaleksandr
 
дидактический материал
дидактический материал дидактический материал
дидактический материал
yarkovaleksandr
 
C. SpâNu Fabry.Cong.Balcanic.2009
C. SpâNu Fabry.Cong.Balcanic.2009C. SpâNu Fabry.Cong.Balcanic.2009
C. SpâNu Fabry.Cong.Balcanic.2009Mihaiela Fazacas
 
Comuna balesti
Comuna balestiComuna balesti
Comuna balestirrapl
 
When does a company need to be PCI compliant
When does a company need to be PCI compliantWhen does a company need to be PCI compliant
When does a company need to be PCI compliantDivya Kothari
 
窮得只剩下錢1
窮得只剩下錢1窮得只剩下錢1
窮得只剩下錢1bbbilly
 
El gasolinazo en méxico
El gasolinazo en méxicoEl gasolinazo en méxico
El gasolinazo en méxico
Blanca Hernandez
 
Trabajo final robotica
Trabajo  final roboticaTrabajo  final robotica
Trabajo final robotica
Yorle Arias
 
Machote programacion yorleny urena
Machote programacion yorleny urenaMachote programacion yorleny urena
Machote programacion yorleny urena
Yorle Arias
 
жумаш айжан+услуги+идея
жумаш айжан+услуги+идеяжумаш айжан+услуги+идея
жумаш айжан+услуги+идея
Айжан Жумаш
 
Mamifere
MamifereMamifere
Winning the Online Marketplace IV - 'Building a Sustainable Growth Engine'
Winning the Online Marketplace IV - 'Building a Sustainable Growth Engine'Winning the Online Marketplace IV - 'Building a Sustainable Growth Engine'
Winning the Online Marketplace IV - 'Building a Sustainable Growth Engine'
Raghav Bahl
 
Nitesh Mishra Short Cut Key
Nitesh Mishra Short Cut KeyNitesh Mishra Short Cut Key
Nitesh Mishra Short Cut KeyNitesh Mishra
 
SCRISOARE DE RECOMANDARE_Prof Irina Petrescu, ASE
SCRISOARE DE RECOMANDARE_Prof Irina Petrescu, ASESCRISOARE DE RECOMANDARE_Prof Irina Petrescu, ASE
SCRISOARE DE RECOMANDARE_Prof Irina Petrescu, ASELupu Andreea
 
Ghid de buna practica competenta digitala
Ghid de buna practica   competenta digitalaGhid de buna practica   competenta digitala
Ghid de buna practica competenta digitala
Icesicon
 

Viewers also liked (20)

1986_Chernobyl_Meltdown.pptx
1986_Chernobyl_Meltdown.pptx1986_Chernobyl_Meltdown.pptx
1986_Chernobyl_Meltdown.pptx
 
земля в солнечной системе
земля в солнечной системеземля в солнечной системе
земля в солнечной системе
 
дидактический материал
дидактический материал дидактический материал
дидактический материал
 
C. SpâNu Fabry.Cong.Balcanic.2009
C. SpâNu Fabry.Cong.Balcanic.2009C. SpâNu Fabry.Cong.Balcanic.2009
C. SpâNu Fabry.Cong.Balcanic.2009
 
Comuna balesti
Comuna balestiComuna balesti
Comuna balesti
 
When does a company need to be PCI compliant
When does a company need to be PCI compliantWhen does a company need to be PCI compliant
When does a company need to be PCI compliant
 
窮得只剩下錢1
窮得只剩下錢1窮得只剩下錢1
窮得只剩下錢1
 
El gasolinazo en méxico
El gasolinazo en méxicoEl gasolinazo en méxico
El gasolinazo en méxico
 
Trabajo final robotica
Trabajo  final roboticaTrabajo  final robotica
Trabajo final robotica
 
My cv
My cvMy cv
My cv
 
Machote programacion yorleny urena
Machote programacion yorleny urenaMachote programacion yorleny urena
Machote programacion yorleny urena
 
жумаш айжан+услуги+идея
жумаш айжан+услуги+идеяжумаш айжан+услуги+идея
жумаш айжан+услуги+идея
 
Mamifere
MamifereMamifere
Mamifere
 
eNest_Portfolio
eNest_PortfolioeNest_Portfolio
eNest_Portfolio
 
Winning the Online Marketplace IV - 'Building a Sustainable Growth Engine'
Winning the Online Marketplace IV - 'Building a Sustainable Growth Engine'Winning the Online Marketplace IV - 'Building a Sustainable Growth Engine'
Winning the Online Marketplace IV - 'Building a Sustainable Growth Engine'
 
Nitesh Mishra Short Cut Key
Nitesh Mishra Short Cut KeyNitesh Mishra Short Cut Key
Nitesh Mishra Short Cut Key
 
Scrisoare de recomandare supervisor (1)
Scrisoare de recomandare supervisor (1)Scrisoare de recomandare supervisor (1)
Scrisoare de recomandare supervisor (1)
 
El grupo de discusión
El grupo de discusiónEl grupo de discusión
El grupo de discusión
 
SCRISOARE DE RECOMANDARE_Prof Irina Petrescu, ASE
SCRISOARE DE RECOMANDARE_Prof Irina Petrescu, ASESCRISOARE DE RECOMANDARE_Prof Irina Petrescu, ASE
SCRISOARE DE RECOMANDARE_Prof Irina Petrescu, ASE
 
Ghid de buna practica competenta digitala
Ghid de buna practica   competenta digitalaGhid de buna practica   competenta digitala
Ghid de buna practica competenta digitala
 

Similar to Security Compliance Models- Checklist v. Framework

It industry regulations
It industry regulationsIt industry regulations
It industry regulationsNicholas Davis
 
It Industry Regulations
It Industry RegulationsIt Industry Regulations
It Industry RegulationsNicholas Davis
 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory Compliance
Lifeline Data Centers
 
CSR PII White Paper
CSR PII White PaperCSR PII White Paper
CSR PII White PaperDmcenter
 
2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance
Raffa Learning Community
 
2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?
Raffa Learning Community
 
Understanding Binding Corporate Rules
Understanding Binding Corporate RulesUnderstanding Binding Corporate Rules
Understanding Binding Corporate RulesJan Dhont
 
State of Compliance 2013
State of Compliance 2013State of Compliance 2013
State of Compliance 2013Stephen Selby
 
The Rise of Global Standards and How Insurers Can Comply
The Rise of Global Standards and How Insurers Can ComplyThe Rise of Global Standards and How Insurers Can Comply
The Rise of Global Standards and How Insurers Can Comply
Accenture Insurance
 
CBIZ Banking & Financial Services Hot Topics - January 2018
CBIZ Banking & Financial Services Hot Topics - January 2018CBIZ Banking & Financial Services Hot Topics - January 2018
CBIZ Banking & Financial Services Hot Topics - January 2018
CBIZ, Inc.
 
Employer 0409
Employer 0409Employer 0409
Employer 0409
dgade
 
Case for-secure-email-encryption
Case for-secure-email-encryptionCase for-secure-email-encryption
Case for-secure-email-encryptionNeoCertified
 
CHAPTER 3 Security Policies and Regulations In this chap
CHAPTER 3 Security Policies and Regulations In this chapCHAPTER 3 Security Policies and Regulations In this chap
CHAPTER 3 Security Policies and Regulations In this chap
EstelaJeffery653
 
Trends 121415 Citizens Bank
Trends 121415 Citizens BankTrends 121415 Citizens Bank
Trends 121415 Citizens BankMichael Ouellet
 
Adrs Presentation March 2008
Adrs Presentation March 2008Adrs Presentation March 2008
Adrs Presentation March 2008
guestabd20
 
Adrs Presentation Folder 051909
Adrs Presentation Folder 051909Adrs Presentation Folder 051909
Adrs Presentation Folder 051909
julchap
 
Affirmative Defense Response System (ADRS)
Affirmative Defense Response System (ADRS)Affirmative Defense Response System (ADRS)
Affirmative Defense Response System (ADRS)
guest95afa8
 
Adrs Flip Chart From Ppl
Adrs Flip Chart From PplAdrs Flip Chart From Ppl
Adrs Flip Chart From Ppl
Sue Tjernlund
 

Similar to Security Compliance Models- Checklist v. Framework (20)

It industry regulations
It industry regulationsIt industry regulations
It industry regulations
 
It Industry Regulations
It Industry RegulationsIt Industry Regulations
It Industry Regulations
 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory Compliance
 
DKapellmann_Security Compliance Models
DKapellmann_Security Compliance ModelsDKapellmann_Security Compliance Models
DKapellmann_Security Compliance Models
 
CSR PII White Paper
CSR PII White PaperCSR PII White Paper
CSR PII White Paper
 
2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance
 
arcsight_scmag_hcspecial
arcsight_scmag_hcspecialarcsight_scmag_hcspecial
arcsight_scmag_hcspecial
 
2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?
 
Understanding Binding Corporate Rules
Understanding Binding Corporate RulesUnderstanding Binding Corporate Rules
Understanding Binding Corporate Rules
 
State of Compliance 2013
State of Compliance 2013State of Compliance 2013
State of Compliance 2013
 
The Rise of Global Standards and How Insurers Can Comply
The Rise of Global Standards and How Insurers Can ComplyThe Rise of Global Standards and How Insurers Can Comply
The Rise of Global Standards and How Insurers Can Comply
 
CBIZ Banking & Financial Services Hot Topics - January 2018
CBIZ Banking & Financial Services Hot Topics - January 2018CBIZ Banking & Financial Services Hot Topics - January 2018
CBIZ Banking & Financial Services Hot Topics - January 2018
 
Employer 0409
Employer 0409Employer 0409
Employer 0409
 
Case for-secure-email-encryption
Case for-secure-email-encryptionCase for-secure-email-encryption
Case for-secure-email-encryption
 
CHAPTER 3 Security Policies and Regulations In this chap
CHAPTER 3 Security Policies and Regulations In this chapCHAPTER 3 Security Policies and Regulations In this chap
CHAPTER 3 Security Policies and Regulations In this chap
 
Trends 121415 Citizens Bank
Trends 121415 Citizens BankTrends 121415 Citizens Bank
Trends 121415 Citizens Bank
 
Adrs Presentation March 2008
Adrs Presentation March 2008Adrs Presentation March 2008
Adrs Presentation March 2008
 
Adrs Presentation Folder 051909
Adrs Presentation Folder 051909Adrs Presentation Folder 051909
Adrs Presentation Folder 051909
 
Affirmative Defense Response System (ADRS)
Affirmative Defense Response System (ADRS)Affirmative Defense Response System (ADRS)
Affirmative Defense Response System (ADRS)
 
Adrs Flip Chart From Ppl
Adrs Flip Chart From PplAdrs Flip Chart From Ppl
Adrs Flip Chart From Ppl
 

More from Divya Kothari

The American Health Care System - Long Paper
The American Health Care System - Long PaperThe American Health Care System - Long Paper
The American Health Care System - Long PaperDivya Kothari
 
Effect of Multitasking on GPA - Research Paper
Effect of Multitasking on GPA - Research PaperEffect of Multitasking on GPA - Research Paper
Effect of Multitasking on GPA - Research PaperDivya Kothari
 
Intelligence Intelligence (Uber)
Intelligence Intelligence (Uber)Intelligence Intelligence (Uber)
Intelligence Intelligence (Uber)Divya Kothari
 
Homer Pithawala_Referral
Homer Pithawala_ReferralHomer Pithawala_Referral
Homer Pithawala_ReferralDivya Kothari
 
Umesh Aswar_Referral
Umesh Aswar_ReferralUmesh Aswar_Referral
Umesh Aswar_ReferralDivya Kothari
 

More from Divya Kothari (8)

The American Health Care System - Long Paper
The American Health Care System - Long PaperThe American Health Care System - Long Paper
The American Health Care System - Long Paper
 
Effect of Multitasking on GPA - Research Paper
Effect of Multitasking on GPA - Research PaperEffect of Multitasking on GPA - Research Paper
Effect of Multitasking on GPA - Research Paper
 
Intelligence Intelligence (Uber)
Intelligence Intelligence (Uber)Intelligence Intelligence (Uber)
Intelligence Intelligence (Uber)
 
Incident Response
Incident ResponseIncident Response
Incident Response
 
Homer Pithawala_Referral
Homer Pithawala_ReferralHomer Pithawala_Referral
Homer Pithawala_Referral
 
Umesh Aswar_Referral
Umesh Aswar_ReferralUmesh Aswar_Referral
Umesh Aswar_Referral
 
Recognition_Letter
Recognition_LetterRecognition_Letter
Recognition_Letter
 
The Vyapam Case
The Vyapam CaseThe Vyapam Case
The Vyapam Case
 

Security Compliance Models- Checklist v. Framework

  • 1. Divya Kothari IMT 553 - Assignment 1 SECURITY COMPLIANCE MODELS: CHECKLISTS VERSUS RISK INTRODUCTION Technology is pacing forward at a speed that is forcing everything else to play catch up, especially law & regulations. This has resulted in highly convoluted threat landscapes. The government, industry regulators, small/large businesses and individuals are almost on the same page (if you forget the NSA for a moment) when it comes to protection of privacy and security for all stakeholders of a society. This has led to numerous compliance regimes in the hope of getting better sleep at night. This paper highlights three such compliance standards: 1) Payment Card Industry Data Security Standard (“PCI”), 2) Gramm–Leach–Bliley Act1 (“GLBA”) & 3) The Health Insurance Portability and Accountability Act, 1996 (“HIPAA”) categorizing them into different kinds of models, their applicability and the intent behind the same. CATEGORIZATION: CHECKLIST, RISK MANAGEMENT FRAMEWORK OR BOTH? 1) PCI DSS PCI, an industry standard checklist, came into existence in 2004 when five major financial institutions decided to align their schemes2 to up the level of protection for card issuers and increase safeguards for card users by making sure that all entities comply with a certain baseline of security controls. Thus compliance of this ‘one size fits all’ approach is mandated by the industry regulators. For cut and dry issues such as firewalls, vulnerability patches, encryption, etc. there can be no exceptions made for different environments. Thus questions such as - (i) Your Company is employing new workers with remote access to a system which processes card payment, is their identity authenticated? (ii) New patches have been released for the latest vulnerabilities, have you updated to the latest patch? (iii) Is the outsourced vendor following secure practices?3 – in the form of a checklist, make it easy for a organizations without a dedicated security team and a limited budget, as this ‘security checklist’ provides for much leeway when it comes to self-regulation & ease of audit with appropriate guidance at each step.4 As Bob Russo, General Manager of the PCI Council puts it: “PCI is a structured "blend...[of] specificity and high-level concepts" that allows "stakeholders the opportunity and flexibility to work with Qualified Security Assessors (QSAs) to determine appropriate security controls within their environment that meet the intent of the PCI standards." It may be noted that since PCI is an industry standard, it is not compulsory by law to adopt it. However if an organization chooses to do so, it must comply with all its requirements. 2) GLBA Protecting the privacy of consumer’s personally identifiable financial information held by "financial institutions" is at the heart of the financial privacy provisions of this Act. It requires companies to give consumers - privacy notices explaining the institutions' information-sharing practices. In turn, 1 Also known as the Financial Services Modernization Act, 1999 2Visa's Cardholder Information Security Program, MasterCard's Site Data Protection, American Express' Data Security Operating Policy, Discover's Information Security and Compliance, and the JCB's Data Security Program 3Herbig J, 2011 “Security as a Checklist? Think Again” PCI Compliance Guide website. Retrieved from: https://www.pcicomplianceguide.org/security-as-a-checklist-think-again/ 4 Refer to Appendix 1 for an illustration
  • 2. consumers have the right to limit some (not all) sharing of their information.5 GLBA aims to achieve its underlying principles of security and compliance by laying down a risk-based approach. This approach allows the ‘financial institutions’ (as defined by the act) certain autonomy is how to conduct various internal processes, for instance prioritization of assets, identification of risks, etc. to achieve an end result. For instance, the Safeguards Rule clause in the Act6 stipulates the development of a written security plan and subsequently conducting a thorough risk analysis so as to evolve/build safeguards needed to comply with GLBA.7 While a checklist as seen above, provides for a baseline of controls, for a more comprehensive risk mitigation/avoidance/transference strategy, a risk-based model can be adopted, eg. By establishing an internal team for such an assessment or having a third-party audit. This helps an organization to customize the framework according to its unique needs and resources. GLBA being a federal statue is compulsorily applicable to whether a financial discloses nonpublic information or not. Furthermore, the Federal Trade Commission has authority to enforce the law with respect to "financial institutions" that are not covered by the federal banking agencies, the Securities and Exchange Commission, the Commodity Futures Trading Commission, and state insurance authorities.8 3) HIPAA Initially an industry based standard, HIPAA was enacted into law in 1996. In brief it aims to protect ‘patient health information’ (“PHI”) by putting safeguards in place, limiting the use, share and access to the ‘minimum necessary’, have appropriate agreements with related parties that use/disclose sensitive information & implement sufficient training programs. The way HIPAA is structured is a hybrid of a checklist and risk based model. “Essentially, a ‘covered entity’ (as defined by the act) is given a broad power to disclose protected PHI. However from then on, the limitations on disclosure begin to stack up. With the exception of disclosures for treatment activities, most other disclosures are subject to the “minimum necessary” limitation embodied in HIPAA – the protected health information disclosed should be the minimum necessary to accomplish the purpose of the disclosure.”9 As Michael Whaley (2015) puts it: “Regulators chose a hybrid framework for HIPAA because healthcare data transverses a broad spectrum of health care providers, insurance companies, law firms, and clearinghouses.”10 APPLICATION OF FRAMEWORK PCI GLBA HIPAA PCI applies to all entities irrespective of size that store, process and transmit cardholder This law applies to financial institutions such as banks, security firms, insurance companies, etc. that sell financial products and services to consumers. They are An individual or organization that falls under the definition of ‘covered entity’ under HIPAA must comply with the necessary rules (for Privacy, Security, Enforcement and Breach 5Federal Trade Commission, “In Brief: The Financial Privacy Requirements of the Gramm-Leach-Bliley Act” Retrieved from: https://www.ftc.gov/tips-advice/business-center/guidance/brief-financial-privacy-requirements-gramm-leach-bliley-act 6 Refer to Appendix 3 7 Miller M. 2014, “ Compliance versus Risk: A look at checklist versus risk based models” Retrieved from: https://accelerite.com/blog/entry/compliance-versus-risk-a-look-at-checklist-versus-risk-based-models 8 Federal Trade Commission, “In Brief: The Financial Privacy Requirements of the Gramm-Leach-Bliley Act” Retrieved from: https://www.ftc.gov/tips-advice/business-center/guidance/brief-financial-privacy-requirements-gramm-leach-bliley-act 9 Anderson S. 2013 “Does HIPAA apply to employers” Lexis Nexis. Retrieved from: https://www.lexisnexis.com/legalnewsroom/labor- employment/b/labor-employment-top-blogs/archive/2013/10/03/does-hipaa-apply-to-employers.aspx?Redirected=true 10 Whaley M. 2015, “PCI Checklists versus HIPAA Risk Management Framework” Retrieved from: https://www.linkedin.com/pulse/pci-checklists- versus-hipaa-risk-management-framework-michael-whaley
  • 3. data.11 Thus the smallest physical point-of-sale interaction for any of the above-stated five credit/debit card brands to the biggest online retailer is subject to PCI. required to ensure the security and confidentiality of consumer financial information against “reasonably foreseeable” internal or external threats.12 Notification). This includes health care providers, health plan providers and clearing houses. Additionally if any of these engages with a ‘business associate’ to help carry out its functions, the latter shall also have to comply with HIPAA. For purposes of our paper, let us take the example of Braintree (Level 1 PCI DSS compliant)13 . Now acquired by Paypal, but still run independently, Braintree14 provides payment processing options across a plethora of devices and on a global scale for thousands of online and mobile companies including Uber, Airbnb, Fab, etc.15 which indirectly means that it has access to a lot of cardholder data. On the other hand, an entity like Thai Tom, a Thai restaurant in Seattle that only accepts cash and does not take online orders does not need to be PCI compliant. The Banking industry by virtue of being an information-intensive sector, comes under the purview of GLBA. Despite its primary intention to integrate a variety of financial services offered by one institution, the act also attempts to upgrade and modernize the financial industry. With the end user being constantly apprehensive of ‘Big Brother’ issues, this Act marks a distinction between affiliated and non-affiliated third parties, in terms of customer financial information disclosure and the consumer’s consent to such disclosure with the latter. Thus apart from functional regulation, the Act aims to protect confidential information via its ‘Financial Privacy Rule’, ‘Safeguards Rule’ and ‘Pretexting Protection’. One such ‘business associate’ is Maximus. “For 40 years, MAXIMUS has partnered with federal, state and local governments to make public health insurance programs run effectively for the individuals and families they serve.”16 For all its projects pertaining to healthcare, Maximus has written contracts with the party at the other end which is a covered entity establishing specifically what is contracted to be performed and comply with the Rules mandated to protect PHI. In addition to the contractual obligations, Maximus is directly liable for certain provisions of the HIPAA rules. INTENT BEHIND ADOPTION OF FRAMEWORKS PCI gives organizations of different scale the opportunity to cookie cut their relations and accordingly meet compliance needs of their clients. Resorting to PCI also gives the company/institution a stamp of approval which is a good strategy to build and maintain their customer share. A company like Braintree by advertising their compliance with PCI shows that they take have secure security controls in place, which though do not guarantee complete protection, still help give them a competitive edge by bagging votes for consumer trust. Being compliant with GLBA is synonymous to a pre-emptive and adaptive risk management approach. It also provides the banking industry a substantial degree of freedom for the ‘hows’ of implementing systemic and people processes within a risk model. GLBA as a risk management framework is often viewed as a less expensive and efficient guide to navigate within the company affairs. An entity’s risk tolerance changes over time and eventually compliance becomes just one factor in the entire risk profile. In such cases a hybrid model often stands out. Thus in our example, the hybrid approach allows Maximus to follow a checklist for certain provisions of the Act only when it acts in the capacity of a business associate as per HIPAA. 11 PCI DSS Applicability Information, page 7. Retrieved from: https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf 12Airmagnet GLBA Compliance Report. Retrieved from: http://airmagnet.flukenetworks.com/assets/reports/Reports_GLBA_Report.pdf 13 Refer to Appendix 2 14 Braintree website <https://www.braintreepayments.com/> 15 VB|Profiles catalog website https://www.vbprofiles.com/companies/521983e1843bac676e0003a2 16 Maximus website < http://www.maximus.com/health >
  • 4. APPENDIX 1 APPENDIX 217 17 Braintree’s website <https://www.braintreepayments.com/developers/security>