Compliance ≠ Security

As we enter the new year, many of us will start the annual third-party attestations. It’s important to remember that holding a third-party attestation provides a baseline assurance on the effective implementation of management, operational, and technical controls. Compliance demonstrated by a clean SOC 2 report, ISO 27001 certification, HITRUST certification, etc. does not equate to ironclad security. It only assures that a third-party has audited the system and reviewed evidences against a set of controls.

Following are a few security-related projects that should be on the radar of a security team that are outside the scope of audit:

  1. Threat modeling
  2. SCA/SAST/DAST
  3. Source code review
  4. Assessing vendors after they had an incident or breach
  5. BCP call-tree exercise
  6. Social media account security
  7. Proactive brand protection from cybersquatting
  8. AI Governance
  9. AI Guardrails
  10. AI Observability
  11. PRD reviews, Tech spec reviews
  12. Internal pentest of major feature releases
  13. Vulnerability Disclosure / Bug Bounty Program
  14. Secure code training (only ISO 27001:2022 & HITRUST require it)
  15. Quality/effectiveness of security awareness training
  16. Data loss/leakage protection (DLP)
  17. Security of browser extensions, Slack bots, etc.
  18. Policy exception approval and review
  19. Integration with third-party systems
  20. Privacy on customer reporting (k-anonymity, l-diversity, t-closeness)
  21. Risk assessment with Delphi technique
  22. M&A due diligence

It’s easy to come up with a list of another 20, but the goal is to emphasize that while obtaining a third-party attestation is a great first step, the job of a security team is just getting started.

I spent the majority of my career in GRC and don’t want to discount the effort the above compliance standards would require, however, the goal of this post is to encourage us all to look beyond the singular focus of obtaining a certification and dive into other areas of security, compliance, and privacy.

Leave a Reply