Posts

What is FedRAMP and Why Does My Organization Need It?

Image
  It’s a common practice to shorten long and complicated organizational names to more digestible acronyms. However, navigating these acronyms and the programs behind them can sometimes feel like sifting through alphabet soup.  That’s why I’m here to help decode one of the most-well known federal programs: the Federal Risk and Authorization Management Program—otherwise known as FedRAMP.   What is FedRAMP?  Created in 2011, FedRAMP was designed to provide a cost-efficient and risk-based approach to cloud adoption for federal departments and agencies. The creation of the FedRAMP security assessment framework was based on the Risk Management Framework (RMF) that implements the FISMA (Federal Information Security Modernization Act) requirements, and NIST SP 800-53. FedRAMP allows for cloud service providers (CSPs) to be assessed and authorized by federal agencies.   FedRAMP provides a standardized approach to security assessment, authorization, and ...

5 Reasons Why You Need SOC 2 Compliance

Image
Many organizations outsource their business operations and services to third-party vendors, possibly putting client data at risk. Therefore, organizations request that their vendors achieve SOC 2 compliance to demonstrate IT security standards. Let’s review additional reasons you need SOC 2 compliance now. Protecting your clients’ personal and trusted information is critical.  Mishandled data can make your organization vulnerable to breaches and increasing security threats, such as the  CloudBleed bug ,  Wannacry ransomware attacks ,  Spectre vulnerability , and more. In addition,  it’s common for businesses to outsource various operations in order to leverage technology and skilled resources while reducing costs. In such cases, vulnerabilities in the application and network of your provider may leave your business open to a variety of attacks, including malware installation or ransomware, significantly costing y...

Cyber Security Capacity Maturity Model : cybersecurity beyond compliance

Image
  In recent years, ‘compliance’ has become a bit of a buzzword within the cyber security sphere. However, whilst companies have been concerning themselves with ticking regulatory boxes, they have lost sight of the outcome. An outcome-driven approach Instead of conducting box-ticking exercises, organizations should be driving information security priorities and investments with an outcome-driven approach that takes their capabilities into account. All too often, businesses assume they can quickly adopt new, sophisticated cyber security schemes where no such capabilities have been before. But this is not the case. Information security programs have to go through a maturation process, and these improvements take time. In much the same way you would teach a child to walk before teaching them to run, organizations’ cyber security programs have to grow up — mature — steadily, taking one cautious step at a time. To understand how ‘mature’ a company’s information security is, cyber securit...

Ace Your SOC Report with a SOC Audit Checklist

Image
For many organizations, obtaining a System and Organization Controls (SOC) attestation report is table stakes for doing business. Many customers and vendors won’t even consider working with an organization that can’t produce a SOC report issued by an independent third-party assessor. Going through a SOC examination for the first time can seem overwhelming, but by taking the time to work through a simple audit checklist, many organizations can set themselves up for success. What is SOC Compliance? Companies are often asked if they are “SOC compliant” or if they can provide proof of “SOC compliance.” These terms can create confusion around what a SOC report represents, because SOC itself is not a compliance framework. SOC reports are attestation examinations performed by an independent third party to assess whether the organization’s internal controls are designed and operating effectively to mitigate different types of risk. The guidelines for what types of risk mitigation measures are ...

What is the Cybersecurity Maturity Model Certification (CMMC)?

Image
  The Cybersecurity Maturity Model Certification (CMMC) is the Department of Defense’s (DoD) newest verification mechanism designed to ensure that cybersecurity controls and processes adequately protect Controlled Unclassified Information (CUI) that resides on Defense Industrial Base (DIB) systems and networks. The DoD implemented requirements for safeguarding Covered Defense Information (CDI) and cyber incident reporting through the release of Defense Federal Acquisition Regulation Supplement (DFARS) 252.204–7012 in October 2016. The DFARS directed DoD Contractors to self-attest that adequate security controls were implemented within contractor systems to ensure that CDI confidentiality was maintained. The security controls required to be implemented by the DFARS are defined within National Institute of Standards and Technology ( NIST ) Special Publication (SP) 800–171, Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations . The Office of the Unde...

7 HITRUST Regulatory Factors to Consider for Healthcare

Image
  This article is Part One of a Four-part Series on the HITRUST Framework When you think of HITRUST, you probably think of healthcare. After all, HITRUST was originally created as the “Health Information Trust Alliance.” However, over the past few years HITRUST has evolved to serve as an industry-agnostic common security framework – such that any company in any industry can now pursue a HITRUST CSF certification. At its core, HITRUST is based on best practices from ISO/IEC 27001 and 27002, as well as more than 40 additional security and privacy regulations and standards, such as PCI, NIST and HIPAA. HITRUST considers these standards and regulations to be its authoritative sources. In addition to these authoritative sources that serve as the foundation of HITRUST, there are also more than 20 regulatory factors that an organization could consider individually based on specific industry requirement – these are optional inclusions to an assessment. Whether your organization is pursuing...