5 Areas That Will Allow you to Achieve Compliance


Security compliance can seem daunting. Understanding the work to be done helps relieve the stress.

Compliance standards require work that typically falls into a few simple buckets. Understanding what these priorities are allows you to build your team, roll up your sleeves and get the job done.


Identify key people, named roles, authorities and responsibilities. Data Privacy Officer. Technical Information Security Officer. It’s also important to define job descriptions and reporting structures.


Policies help to guide employees, IT staff and others on day-to-day activities within the organization and with assets and data. Do you have a policy that requires multi-factor security on any code repositories? Is anyone allowed to stand up a new service or is there a policy on how these decisions are made and who makes them?


What is the process for vulnerability management and remediation? How do you identify and manage risk? What happens when you have a system outage? What is the protocol when you have a data breach? Process covers about the activities, methods and procedures team members undertake to deal with various aspects of the compliance program.


Many standards require specific technical controls (or often, alternative compensating controls) to help address specific areas of risk. Perimeter firewalls to help secure office locations. Endpoint security and encryption to ensure data held on laptops and removable devices is secure. Some standards demand specific controls, while others have only specific aims/objectives in mind.


Many compliance standards require not just written policies and technologies, but also evidence that they are being used and stored as artifacts for an auditor to confirm adherence. Collecting and maintaining artifacts can consume a significant portion of staff’s time in helping to achieve compliance.

Starting with a simple checklist of areas to develop and build, it can initially seem daunting to address a large security compliance standard. Once you break down into the five simple buckets above, you’ll find yourself on a path to success. Kobalt can help you address the ongoing people, process and technology needs around security logging and monitoring – critical elements in any compliance standard. Contact us for more information.