January 9, 2017 • Published by Todd Stephenson
Security Assessments
If your organization handles sensitive data on behalf of its clients, then you’re likely required to comply with one or more security frameworks in order to conduct business. Not all information security frameworks are the same, however; some standards are designed to be holistic while others focus on a specific business function.
Each information security framework was created for a purpose, but the shared goal is some form of assurance that sensitive data is effectively protected. Unfortunately, compliance requests vary by client and too frequently are based on incorrect assumptions or a check-list mentality that jeopardizes true information security.
Identifying the right security framework (or set of frameworks) for your organization not only provides real information security assurance, it also gives you the opportunity to consolidate the audits you’re conducting or undergoing to save valuable time and money.
So which framework is best and how do you leverage that with clients and prospects while accomplishing the actual goal of information security assurance? Let’s start with a basic understanding of the common information security standards and their intrinsic purposes.
First, let’s take a look at the holistic standards. Holistic standards take a general, risk-based approach to information security by prescribing controls that directly counteract an organization’s defined security risks.
There are two common frameworks that target a specific type of data: The Payment Card Industry Data Security Standard (PCI DSS or just PCI) and the HITRUST Common Security Framework (HITRUST CSF).
Some security frameworks are a requirement due to your organization’s client base. For example, working with payment data makes PCI compliance a must, and federal data requires FISMA (NIST SP 800-53) compliance.
There are many commonalities between standards and it is common to utilize a framework to map multiple compliance requirements together. For example, HITRUST is one vehicle for meeting HIPAA compliance, but it’s not a requirement, and SOC 2 can be used as a vehicle for demonstrating GLBA compliance.
What does this mean? Your organization has the opportunity to take a fresh look at the information security assurance vehicles it needs to effectively meet clients’ risk-reduction objectives.
Because the PCI DSS is a prescriptive standard, you can actually apply its controls not just to payment data, but also to PHI and personal financial data. This means the PCI DSS standards can be applied to other data types to help support HIPAA and/or GLBA compliance as well.
Don’t expect your clients to immediately understand this. You may need to educate. Once you do, consolidating standards is possible and efforts can be concentrated to go beyond compliance to the higher goal of true information security.