Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

The importance of Compliance in Cybersecurity like HITRUST are newer, focused on cloud systems, and

much
Incidents of cloud systems having their data stolen,
held hostage, leaked or destroyed are accelerating.
2019 data breaches include:

• Quest Diagnostics: medical, financial, and personal


information of 11.9 million subscribers

• Capital One: credit card information for 100 million


subscribers

• Zynga: Personal information and Facebook IDs for 218


million subscribers

In addition to these large incidents, smaller incidents


severely impact thousands of cloud systems every year.

As a result, almost all organizations understand the more prescriptive. Some standards like FedRAMP are still
importance of implementing robust cybersecurity for their more prescriptive and involve more oversight. Customers
cloud systems. Most organizations make sure they have that understand these differences place higher value on
good access controls, antimalware, intrusion prevention, cloud systems that are compliant with more prescriptive
monitoring, logging, and alert systems. Many organizations cybersecurity standards.
have the extensive QA testing procedures required to keep
their systems continually updated with the latest patches. Here’s an example. Multifactor authentication (MFA) is one
Some organizations continually train their employees so of the best protections against a wide range of
that as cloud technologies rapidly evolve, their staff cybersecurity attack vectors. What do ISO 27001, HITRUST,
understands how security protections must evolve with and FedRAMP require regarding MFA? ISO 27001: No
them. A few organizations take cybersecurity a step further requirement. HITRUST (level 2): “Multi-factor
and focus on compliance. authentication methods are used in accordance with
organizational policy”. FedRAMP: “The information system
Compliance??? Isn’t that just paperwork? implements multi-factor authentication for network access
to privileged and non-privileged accounts.” In other words:
Compliance to a cybersecurity standard means successfully no requirement vs. at your discretion vs. required for all
passing that standard’s annual third-party security audit. users. So compliance to a higher standard can give an
For an organization’s IT department, a focus on compliance organization’s customers an assurance of a higher level of
amounts to an understanding that no matter how talented cybersecurity.
their security team may be, their organization’s
cybersecurity will benefit from the close scrutiny of
thirdparty experts. For an organization’s sales teams, the
certification or authorization that comes with passing an
audit is a key element in assuring their customers that their
cloud systems are protected. Don’t take our word for it –
take the word of the third-party auditor.

But not all compliance standards are created equal. Some


compliance standards like ISO 27001 have been around for
many years and apply to both on-premises and cloud
systems, so they are not as prescriptive. Other standards
“continuous monitoring” requires the organization to have
monthly meetings with a government oversight agency to
present results of the cloud system’s latest vulnerability
scans along with plans for how those vulnerabilities will be
remediated in the required timeframes.

In summary, cloud cybersecurity is crucial. Most


organizations understand this. But leading organizations
also understand that certified compliance to a
cybersecurity standard is crucial as well. Cybersecurity
Here’s another example. Audits for all cybersecurity audits lead to improvements in the security of an
standards include reviewing an organization’s policies and organization’s cloud systems and the resulting certifications
procedures along with evidence that they have been provide assurance to the organization’s customers that the
implemented. But unlike ISO 27001 and HITRUST, FedRAMP cloud systems have implemented a known level of security.
goes beyond this by requiring auditors to also perform For sophisticated customers, that assurance is stronger if
vulnerability scanning and penetration testing (ethical the certified compliance is to a higher standard.
hacking) on the cloud system. In addition, FedRAMP
Project Hosts, Inc | 877-659-6055 | projecthosts.com |
sales@projecthosts.com

You might also like