Regulatory compliance monitoring is a key component of any cybersecurity program. But it's becoming increasingly difficult to ensure you are meeting your regulatory requirements. Driven by an increasing web of complex extraterritorial laws, industry-specific regulations, and general data protection laws.
This is not a valid excuse for non-compliance. Regulators and lawmakers will impose significant fines on organizations that aren't able to align their cybersecurity and compliance programs.
A good way to do this is by creating a compliance monitoring plan capable of continually assessing your organization's compliance activities in real-time.
To build a successful compliance monitoring program, you must first understand what laws and regulations are applicable to your organization, and what compliance with them looks like.
This will allow you to perform a gap analysis of what your current compliance controls and business processes are, and what additional security controls need to be in place. This risk assessment process will outline risk areas and should inform your information security policy.
Learn the difference between IT compliance and auditing.
The cybersecurity and data protection regulations that apply to your organization depend on your industry. With that said, several regulations span across multiple industries and continents. These are the ones you should consider.
Joe Biden's Cybersecurity Executive Order call for a complete reformation of security programs throughout government entities and the entire private sector.
Some of the key mandates of the Executive Order includes:
Learn how to be compliant with the Cybersecurity Executive Order.
The Payment Card Industry Data Security Standard (PCI DSS) is an information security standard for organizations that handle branded credit cards from major credit card schemes.
PCI DSS aims to increase controls around cardholder data to reduce credit card fraud. Validation of compliance is performed annually or quarterly, either by an external Qualified Security Assessor (QSA) or by a firm-specific Internal Security Assessor (ISA) that creates a Report of Compliance for organizations handling large volumes of transactions, or by Self-Assessment Questionnaire (SAQ) for companies handling smaller volumes.
To comply with PCI DSS, you must meet twelve requirements
These twelve requirements are then organized into six control objectives:
Fines for non-compliance can range from $5,000 to $25,000 per month depending on the size of your organization. In the event of a security breach, you can be fined up to $5,000 which is why it's essential to comply with PCI DSS. And remember, the true cost of a data breach goes far beyond the fine.
Learn how to comply with the third-party risk requirements of PCI DSS.
Sarbanes-Oxley (SOX) was passed by the United States Congress in 2002 to protect shareholders and the general public from accounting errors and fraudulent practices, and to improve the accuracy of corporate disclosures. Australian businesses should also comply with SOX security controls.
All public companies must comply with SOX, both on the financial side and the IT side. The way in which IT teams store corporate electronic records has changed as a result of SOX, even though it does not directly specify how records should be stored. It does, however, define which records should be stored and for how long (not less than five years).
SOX requires a written statement to be submitted by the Chief Executive Officer (CEO) and Chief Financial Officer (CFO). The content of the written statement, according to section 906 “shall certify that the periodic report containing the financial statements fully complies with the requirements of section 13(a) or 15(d) of the Securities Exchange Act of 1934 (15 U.S.C. 78m or 78o(d)) and that information contained in the periodic report fairly presents, in all material respects, the financial condition and results of operations of the issuer.”
The penalties for violations are either:
Read our full guide on SOX compliance.
The General Data Protection Regulation (GDPR) was passed by the European Union (EU) to protect the personally identifiable information (PII) of EU citizens. GDPR is mandatory for any organization that processes the PII of EU citizens, regardless of where it is located.
Furthermore, any third-party vendors you use must also be compliant with GDPR.
Fines for non-compliance have two tiers:
Learn how to comply with the third-party risk requirements of the GDPR.
The California Consumer Privacy Act (CCPA) or AB 375 is a new law that became effective on January 1 2020, designed to enhance consumer privacy rights and protection for residents in the state of California by imposing rules on how businesses handle their personal information.
The CCPA is the most extensive consumer privacy legislation to pass in the United States and is akin to the European Union's General Data Protection Regulation (GDPR) and other data privacy laws and privacy regulations.
CCPA allows class-action lawsuits against companies who fail to take reasonable precautions to prevent data breaches. Apart from that, it is up to the Attorney General's office to ensure CCPA compliance, who was indicated it only has the bandwidth to bring a handful of cases each year.
Even if cases are rare, the threat of large files–$7,500 per data record–should be enough to entice most organizations to comply.
The Brazilian General Data Protection Law (Lei Geral de Proteção de Dados Pessoais or LGPD) is a new law that was passed by the National Congress of Brazil on August 14, 2018 and comes into effect on August 15, 2020.
The LGPD creates a legal framework for the use of personal data of individuals in Brazil, regardless of where the data processor is located. It is closely modeled after the European Union's General Data Protection Regulation (GDPR) and like GDPR, the LGPD has far-reaching consequences for data processing activities in and outside of Brazil.
Penalties for non-compliance with LGPD is "2% of a private legal entity’s, group’s, or conglomerate’s revenue in Brazil, for the prior fiscal year, excluding taxes, up to a total maximum of 50 million reais (~$12.8 million USD)."
The New York Stop Hacks and Improve Electronic Data Security Act (SHIELD Act) or Senate Bill 5575, was enacted on July 25, 2019, as an amendment to the New York State Information Security Breach and Notification Act. The law goes into effect on March 21, 2020.
The motivation behind the SHIELD Act is to update New York's data breach notification law to keep pace with current technology. The bill broadens the scope of information covered under the notification law and updates breach notification requirements when there has been a breach of data.
Critically, the bill requires the designation of a person to run the processes of Vendor Risk Management to sufficiently track the data security measures of third-party vendors and service providers.
Failure to implement a compliant information security program is enforced by the New York State Attorney General and can result in injunctive relief and civil penalties of up to $5,000 per violation.
Businesses that fail to comply with the breach notification requirements can be held liable for the "actual costs or losses incurred by a person entitled to notice". In addition, if the business violates the provision "knowingly or recklessly", a civil penalty of the greater of $5,000 or $20 per instance of failed notification, up to a maximum of $250,000.
Learn how to comply with the third-party risk requirements of the NY SHIELD Act.
The Gramm-Leach-Bliley Act (GLBA, GLB Act or the Financial Services Modernization Act of 1999) is a United States federal law requiring financial institutions to explain how they share and protect their customers' nonpublic personal information (NPI).
The three major components of the GLBA are designed to work together to govern the collection, disclosure, and protection of customers' nonpublic personal information (NPI), namely:
Non-compliance penalties include:
The Florida Information Protection Act of 2014 (FIPA) came into effect July 1, 2014, expanding Florida's existing data breach notification statute requirements for covered entities that acquire, use, store or maintain Floridian's personal information.
FIPA is an extraterritorial law, which means any company that acquires, uses, stores or maintains the personally identifiable information (PII) of Floridians must comply.
Entities who fail to provide required notices under FIPA violate Florida Deceptive and Unfair Trade Practices Act (FDUTPA) and are subject to civil penalties:
The Federal Information Security Management Act of 2002 (FISMA) is a United States federal law that defines a comprehensive framework to protect government information, operations, and assets against natural and manmade threats. FISMA was enacted as part of the E-Government Act of 2002.
There are seven main FISMA requirements:
For government agencies and their third-party vendors, failing to comply with FISMA could result in censure by congress, a reduction in federal funding, reputational damage, government hearings, loss of future contracts and poor cybersecurity infrastructure.
The Personal Information Protection and Electronic Documents Act (PIPEDA) is the federal privacy legislation for private-sector organizations in Canada.
PIPEDA became law in April 13, 2000 to promote trust and data privacy in eCommerce and has since expanded to include industries like banking, broadcasting and the health sector.
Like the European Union's General Data Protection Regulation (GDPR), under PIPEDA individuals have the right to access personal information held by an organization, know who is responsible for collecting it, understand why it's being collected and to challenge its accuracy.
Failure to comply with PIPEDA's data breach notification and record-keeping requirements can result in fines of up to CAD$100,000.
CPS 234 is an APRA Prudential Standard that aims to ensure that an APRA-regulated entity takes measures to be resilient against information security incidents (including cyber-attacks) by maintaining an information security capability commensurate with information security vulnerabilities and threats.
CPS 234 applies to all APRA-regulated entities namely:
Failure to comply with CPS 234 can result in loss of RSE license.
Read more about how to comply with CPS 234 here.
After you've identified the regulations your organization must adhere to, the next step is to assess your overall compliance by conducting a cybersecurity audit. The goal of the audit is to evaluate your current security governance structure, any compliance issues, risky business activities or business units, and to understand your current monitoring efforts. Here are some things you will likely want to address.
A cybersecurity risk assessment is about understanding, managing, controlling, and mitigating cybersecurity risk.
The primary purpose of cyber risk assessments is to help inform decision-making and to streamline proper risk responses. Leveraging risk timely risk assessments can greatly reduce compliance risk and improve your compliance management processes by:
Read more about how to perform a cybersecurity risk assessment here.
Configuration management (CM) is a systems engineering process for establishing and maintaining consistency of a product's performance, functional, and physical attributes with its requirements, design, and operational information throughout its life.
And an important part of CM are the monitoring processes that look for changes made to cybersecurity controls. Without automation, a single engineer forgetting to update a piece of software can leave a system with an outdated version of the software that has a known vulnerability listed on CVE. This vulnerability could be exploited to spread computer worms, install ransomware or other types of malware.
Security ratings or cybersecurity ratings are a data-driven, objective, and dynamic measurement of an organization's security posture. They are created by a trusted, independent security rating platform making them valuable as an objective indicator of an organization's cybersecurity performance.
Just as credit ratings and FICO scores aim to provide a quantitative measure of credit risk, security ratings aim to provide a quantitative measure of cyber risk.
Security ratings are increasingly used for internal security performance management, including:
Security ratings have been widely adopted because they supplement and can sometimes replace time-consuming vendor risk assessment techniques like questionnaires, on-site visits, and penetration tests. Most importantly, they are always up-to-date.
Read our complete guide on security ratings here and our complete guide to the top security questionnaires here.
This is an evaluation of the cybersecurity awareness training you have in place. Your workforce will have to take an assessment that focuses on their understanding of your regulatory requirements to identify gaps.
Once the initial audit has been completed, you can begin creating a compliance monitoring plan.
While you may only be required to conduct a cybersecurity audit once a year, many industry best practices recommend continuous monitoring. This ensures you are always in compliance and can remediate any gaps you find in controls on an as-needed basis, rather than once a year.
Additionally, you should document any changes and the results of ongoing evaluation so it can be used in future audits.
The plan should aim to address all the risks identified, however, the largest risks should be prioritized first. When deciding on the control and responsible individual remember to map the required expertise against the employee's skill set. Where possible, you may find it helpful to combine risk monitoring activities.
The output of your compliance monitoring plan will depend on the level and frequency required by your regulatory requirements. With that in mind, it is very important to keep regulators informed about any potential issues and to invest in the gaps you identify.