GRC External
GRC External
ISO 27001 provides a framework of standards for how a modern organization should manage their
information and data. Risk management is a key part of ISO 27001, ensuring that a company or non-
profit understands where their strengths and weaknesses lie. Companies of all sizes need to recognize
the importance of cybersecurity, but simply setting up an IT security group within the organization is not
enough to ensure data integrity. An ISMS is a critical tool, especially for groups that are spread across
multiple locations or countries, as it covers all end-to-end processes related to security.
An ISMS (information security management system) should exist as a living set of documentation within
an organization for the purpose of risk management. Decades ago, companies would actually print out
the ISMS and distribute it to employees for their awareness. Today, an ISMS should be stored online in a
secure location, typically a knowledge management system. Employees need to be able to refer to the
ISMS at any time and be alerted when a change is implemented. When seeking ISO 27001 certification,
the ISMS is the chief piece of reference material used to determine your organization’s compliance level.
1. Context of the Organization – explains what stakeholders should be involved in the creation and
maintenance of the ISMS.
2. Leadership – describes how leaders within the organization should commit to ISMS policies and
procedures.
3. Planning – covers an outline of how risk management should be planned across the organization.
4. Support – describes how to raise awareness about information security and assign
responsibilities.
5. Operation – covers how risks should be managed and how documentation should be performed
to meet audit standards.
6. Performance Evaluation – provides guidelines on how to monitor and measure the performance
of the ISMS.
7. Improvement – explains how the ISMS should be continually updated and improved, especially
following audits.
8. Reference Control Objectives and Controls – provides an annex detailing the individual elements
of an audit.
The documentation for ISO 27001 breaks down the best practices into 14 separate controls.
In order to remain compliant, organizations must conduct their own ISO 27001 internal audits once
every three years. Cybersecurity experts recommend doing it annually so as to reinforce risk
management practices and look for any gaps or shortcomings. Process follows as –
1. Original Certification: Full Audit
1. Project Planning
2. Current State Assessment
3. Information Asset Profiling
4. Risk Assessment
5. Risk Treatment planning
6. Design/Fine tune security policy & procedures
7. Policy and Procedure roll out
8. Implementation of Risk Treatment Plan
9. Internal compliance assessment
10. Stage-I audit (Documentation and walk through)
11. Corrective and preventative action
12. Stage II Audit Implementation Audit
Benefits:
1. Providing a framework for resolving security issues; focusing only on those relevant to your
specific organisation
2. Enhancing the confidence and perception of your clients, stakeholders and partners
3. Increasingly become a differentiator in contract tenders
4. Breeding internal and external confidence in the management of risk within your organisation
5. Increasing security awareness throughout the business via staff training and involvement
6. Helping develop best practice
7. Helping adherence to the Standard proving business continuity is managed professionally and
vigilantly in the event of a catastrophe
The standard adopts the “Plan-Do-Check-Act” (PDCA) model which is applied to structure all ISMS processes:
Plan: basically establish the ISMS policies and objectives relevant to managing risk
The organization should ...
o Define ISMS scope and policy
o Identify and assess the risks
o Manage risks through control objectives and controls
o Prepare Statement of Applicability
Do: implement and operate the ISMS policy
The organization should ...
o Formulate and implement a risk mitigation plan
o Implement controls selected to meet the control objectives
Check: assess and measure process performance against policy
The organization should ...
o Perform monitoring procedures
o Conduct periodic reviews of for effectiveness
o Review level of acceptable and residual risk
o Conduct internal ISMS audits at planned intervals
Act: take corrective and preventative actions based on results of internal ISMS audit
The organization should ...
o Implement identified improvements in ISMS
o Take appropriate corrective and preventive actions
o Maintain communications with all stakeholders
o Validate improvement.
PCI-DSS
The Payment Card Industry Data Security Standard (PCI DSS) is an information security standard for
organizations that handle branded credit cards from the major card schemes.
PCI DSS was developed to enhance cardholder data security and facilitate broad adoption of consistent
data security measures globally
Goal: Managing the ongoing evolution of the Payment Card Industry Data Security Standard.
The PCI Council is independent of Payment brands.
Provides a baseline technical and operational requirements designed to protect account data. It is
applies to any entity that stores, processes and/or transmits cardholder data (CHD) and/or sensitive
authentication data (SAD).
6 Major Principles –
Build and maintain a secure network.
Protect cardholder data.
Maintain a vulnerability management program.
Implement strong access control measures.
Regularly monitor and test networks.
Maintain an information security policy.
HIPPA Rules - Privacy and security address separately under two distinct rules under HIPAA
Privacy rules
Sets the standards for how protected health information should be controlled.
Defines who is authorised to access information and includes the right of individuals to keep information
about themselves from being disclosed.
Privacy is the ability of an individual or group to seclude themselves or information about themselves
and thereby reveal themselves selectively. The boundaries and content of what is considered private
differ among cultures and individuals, but share basic common themes. Internet privacy is the desire or
mandate of personal privacy concerning transactions or transmission of data via the Internet. It involves
the exercise of control over the type and amount of information a person reveals about himself on the
Internet and who may access such information. Privacy deals with the revelation and use of (personal)
data
Security rules
Defines the standards that requires covered entities to implement basic safeguards to protect it
electronic protected health information (ePHI).
Security is the ability to control access and protect information from accidental or intentional disclosure
to unauthorised persons and from alteration destruction on loss.
Security is the degree of protection against danger, damage, loss, and criminal activity. Security as a form
of protection are structures and processes that provide or improve security as a condition. Information
security means protecting information and information systems from unauthorized access, use,
disclosure, disruption, modification, perusal, inspection, recording or destruction. Security deals with the
control of data.
Determine which of the required annual audits and assessments are applicable to your organization.
Conduct the required audits and assessments, analyze the results, and document any deficiencies.
Document your remediation plans, put the plans into action, review annually, and update as
necessary.
If the organization has not already done so, appoint a HIPAA Compliance, Privacy and/or Security
Officer.
Ensure the designated HIPAA Compliance Officer conducts annual HIPAA training for all members of
staff.
Ensure HIPAA training and staff member attestation of HIPAA policies and procedures is documented.
Perform due diligence on Business Associates to assess HIPAA compliance and annually review BAAs.
Review processes for staff members to report breaches and how breaches are notified to HHS OCR.
HIPAA Rules:
HIPAA Privacy: Privacy Officer, Employee Training(Individual having access to PHI), Documents &
Controls.
HIPAA Security: Security Officer, Employee Training(Individual implementing HIPAA Security
Controls), Security Risk Assessment, Documents & Controls.
Examples of PHI –
Name, photograph, date of birth
Social security number, passport number
Physical and mental condition
1. Past history of a condition
2. Present condition
3. Plan or predictions about the future of a condition.
Health information from record
1. Who provided care
2. What type of care was given
3. Where care was given
4. Why care was give
Individuals health care payment billing forms
1. Who was paid
2. What services were covered by the payment
3. Where payment was made
4. When payment was made
5. How payment was made
Address, telephone number, fax, email lD
Admission date information medical record number
Fingerprints health status diagnosis
Clinical records
Administrative safeguards
Policies, processes and procedures.
Define the basis of security
The most current version of given policy process and procedure should be in active circulation and
use
All documents are reviewed periodically to ensure no violation and the routine spot checks are
performed to double-check adherence by the work force. E.g. Training, Awareness and BVG
Technical Safeguards
Electronic or mechanic measures such as combination keypads or closed circuit camera systems
password control or system access passwords or pin numbers for sensitive files etc.
E.g. Password, Encryption, Logical Access Control List defining 'How' & 'What' a user can access data.
Physical Safeguards
Measures taken with respect to the premises storage containers room and the like where is the PHI
is kept.
Security guards lockable storage containers access control lists paper or electronic identification
package and other such items that control access to the PHI on the system that stores it
E.g. Media handling, Physical Access Controls List defining 'How' & 'What' a user can access within
the facility.
CSO – The chief security officer (CSO) is the company executive responsible for the security of
personnel, physical assets, and information in both physical and digital form. The importance of this
position has increased in the age of information technology (IT) as it has become easier to steal sensitive
company information.
Responsibilities of the CSO - The CSO is responsible for executing and overseeing, among others, the
following duties:
Day-to-day operations: Implementing and overseeing strategies to assess and mitigate risk,
safeguarding the corporation and its assets, crisis management.
Security: Developing, implementing, and maintaining security processes and policies, identifying
and reducing risks, limiting liability and exposure to informational, physical, and financial risk.
Compliance: Making sure the company is compliant with local, national and global regulations,
especially in areas like privacy, health, and safety.
Innovation: Conducting research and executing security management solutions to help keep the
organization safe.
CTO - A chief technology officer (CTO) is the executive in charge of an organization's technological needs
as well as its research and development (R&D). Also known as a chief technical officer, this individual
examines the short- and long-term needs of an organization and utilizes capital to make investments
designed to help the organization reach its objectives. The CTO usually reports directly to a company's
chief information officer (CIO), but may also report to the chief executive officer (CEO) of the firm.
CPO - A chief product officer (CPO) is a corporate title referring to an executive who leads the entire
product organization. Alternatively, the CPO is known as VP of product or head of product. A CPO is
responsible for the strategic product direction. Usually, it includes product vision, product innovation,
product design, product development, project management, and product marketing. In many tech
companies, this position also provides distribution, manufacturing, and procurement.
A CPO’s primary objectives include:
COBIT
COBIT stands for Control Objectives for Information and related Technology. It is a framework created by
the ISACA (Information Systems Audit and Control Association) for IT governance and management. It
was designed to be a supportive tool for managers—and allows bridging the crucial gap between
technical issues, business risks, and control requirements. COBIT is essential to developing, controlling,
and maintaining risk and security for enterprises around the world, regardless of your industry.
These five principles enable an organisation to build a holistic framework for the governance and
management of IT that is built on seven ‘enablers’:
2. Processes
3. Organisational structures
Together, the principles and enablers allow an organisation to align its IT investments with its objectives
to realise the value of those investments.
Sarbanes-Oxley Act
The Sarbanes –Oxley Actor more popularly know as the SOX act was passed in 2002in the wake of
number of notable corporate accounting scandals including Enron and Worldcom. It is also known as the
'Public Company Accounting Reform and Investor Protection Act and 'Corporate and Auditing
Accountability and Responsibility Act. This law set new or enhanced standards for all U.S. public
company boards, management and public accounting firms. It is named after sponsors U.S. Senator Paul
Sarbanes(D-MD) and U.S. Representative Michael G. Oxley. The main intent of this law is for the top
management must now individually certify the accuracy of financial information.
Purpose–to protect investors or stakeholders interest by improving the accuracy and reliability of
corporate and financial disclosures.
Applicability –All publicly traded companies in the US as well as foreign companies that are publicly
traded and do business in the US.
Requirement–Top management (CEO and CFO) must individually certify the accuracy of financial
information on annual and quarterly reports.
All companies that are doing audits of publicly traded companies they have to register with PCAOB
It is standard setter auditing industry GAAS generally accepted auditing standards, how to properly
do an audit.
Registered firms have to follow these standards sets by PCAOB.
PCAOB is going to monitor these auditing firms on an on-going basis. They sample audit some of the
registered companies audit.
SOX -
The act contains 11 titles, or sections, ranging from additional corporate board responsibilities to
criminal penalties, and requires the Securities and Exchange Commission (SEC) to implement rulings on
requirements to comply with the law.
•Title I: Public Company Accounting Oversight Board
•Title II: Auditor Independence
•Title III: Corporate Responsibility
•Title IV: Enhanced Financial Disclosures
•Title V: Analyst Conflicts Of Interest
•Title VI: Commission Resources And Authority
•Title VII: Studies & Reports
•Title VIII: Corporate and Criminal Fraud Accountability
•Title IX: White Collar Crime Penalty Enhancement
•Title X: Corporate Tax Returns
•Title XI: Corporate Fraud Accountability
Responsible:
In case of failure CEO and CFO accountable.
Requirements:
This act requires management to produce an "internal control report" as part of each annual
Exchange Act report.
The report must affirm "the responsibility of management for establishing and maintaining an
adequate internal control structure and procedures for financial reporting. Certification by quarterly
review and annual review
Responsible
Management
Independent auditor
GDPR:
Deals with part of data protection that deals with the proper handling (collection, storage,
managing and sharing) of data as well as compliance applicable privacy laws (such as GDPR).
3 Key Elements of Data Privacy:
1. Right of an individual to be left alone and have control over their personal data,
2. Procedures for Proper handling, processing, collecting and sharing of personal data,
3. Compliance with data protection laws.
Data Privacy - Data Privacy focuses on the rights of individuals, the purpose of data collection and
processing, privacy preferences, and the way organizations govern personal data of data subjects. It
focuses on how to collect, process, share, archive, and delete the data in accordance with the law.
Data Security - Data Security includes a set of standards and different safeguards and measures that an
organization is taking in order to prevent any third party from unauthorized access to digital data, or any
intentional or unintentional alteration, deletion or disclosure of data. It focuses on the protection of data
from malicious attacks and prevents the exploitation of stolen data (data breach or cyber-attack). It
includes Access control, Encryption, Network security, etc.
Terminologies-
Data Subjects – Natural person whose data is being used
Data Controller – One who determines purpose and the means
Data Processor- One who process the data on behalf of the controller
Sub-Processor – One who process the data on behalf on processor
Personal data – Any information which can directly or indirectly identify the data subject
Special Category personal data – Sensitive personal data e.g. Biometric, Health, Political or religious
views
Data Processing Agreement – legal binding between controller and processor
Key Concepts –
Data Subject Request management – 1 month from the data of request, extension of 2 more
month available
Data breach management – 72 hours notification to SA, may also need to notify data subjects
Data Protection Officer – Not all organizations need to appoint DPO
Public Authorities
Large scale systematic monitoring
Large scale processing of sensitive personal data
DPIA
Systematic and extensive profiling with significant effects;
Processing Special category or criminal offences data on large scale
Systematic monitoring of publicly accessible places on a large scale
SOC Reporting –
System and Organization Controls (SOC) reports enable companies to feel confident that service
providers, or potential service providers, are operating in an ethical and compliant manner. No one likes
to hear the word audit, but SOC reports establish credibility and trustworthiness for a service provider —
a competitive advantage that’s worth both the time and monetary investment.
SOC reports utilize independent, third-party auditors to examine various aspects of a company, such as:
Security
Availability
Processing Integrity
Confidentiality
Privacy
A number of service organizations are required to undergo a SOC examination, including payroll or
medical claims processors, data center companies, loan servicers, and Software as a Service (SaaS)
providers that may touch, store, process or impact financials or sensitive data of their user entities, or
clients. However, any company with a business model based on providing a service to another company
can benefit from a successful SOC examination. First and foremost, a SOC report is an independent,
third-party validation of a service organization’s commitment to evidencing the design and effective
operation of their controls. It not only lets potential clients know that your company is legitimate, but
going through the assessment process can point out weaknesses and flaws before a client does.