Compliance

Interconnected nodes representing data points analyzed with federating identities

FedRAMP High vs. Moderate: The Complete 87-Control Delta

One of the most common questions we hear from agencies and cloud service providers is: “What exactly does it take to go from FedRAMP Moderate to High?” The answer isn’t just “more controls”; it’s a fundamentally different security posture built around one question: what happens if this system fails? UberEther CEO Matt Topper put together […]

FedRAMP High vs. Moderate: The Complete 87-Control Delta Read More »

Lock showing the protection of building a useful FedRAMP SSP

How to Make a Useful SSP: System Security Plans That Work

If you’ve spent any time in the federal compliance world, you’ve probably seen a System Security Plan (SSP) that runs 400 pages but somehow says almost nothing. It’s filled with boilerplate, copy-pasted control descriptions, and vague references to “policies and procedures” that may or may not exist. It passes a cursory review, gets filed away,

How to Make a Useful SSP: System Security Plans That Work Read More »

A cloud with lines, illustrating how an SSP connect to other assets in a business

ISO/IEC 27001: An Information Security Management System Standard

Modern organizations need a defensible way to protect critical data, prove due diligence, and build trust. ISO/IEC 27001 is the international standard for establishing an Information Security Management System (ISMS) that aligns people, processes, and technology. For security leaders in regulated industries and government, the 27001 standard offers a proven path to demonstrate governance, reduce

ISO/IEC 27001: An Information Security Management System Standard Read More »

Business professionals working on laptops with an overlay of digital padlocks and global network graphics, representing GLBA Compliance

GLBA Compliance: Key Requirements

The Gramm-Leach-Bliley Act (GLBA) is a cornerstone of financial privacy in the United States. This article delves into the key requirements of GLBA compliance, providing a comprehensive overview of what financial institutions must do to protect customer information and maintain client trust. Understanding and implementing these requirements is crucial for any organization subject to GLBA

GLBA Compliance: Key Requirements Read More »

Futuristic skyscrapers with digital icons representing Identity Governance Solutions

What is the Federal Financial Institutions Examination Council (FFIEC)?

In today’s interconnected world, financial institutions face ever-growing cybersecurity risks. The FFIEC, or Federal Financial Institutions Examination Council, plays a crucial role in guiding these institutions toward robust cybersecurity preparedness. This article will delve into the FFIEC’s function and how financial institutions can effectively navigate the complexities of cybersecurity risk management and achieve FFIEC compliance.

What is the Federal Financial Institutions Examination Council (FFIEC)? Read More »

Laptop screen displaying secure data in an SSP

Audit Log vs. Audit Trail: What’s the Difference?

This article explores the nuances between audit logs and audit trails, clarifying their distinct roles in maintaining data integrity and security. Understanding the difference is vital for compliance, effective auditing, and safeguarding sensitive information within any organization. We’ll delve into their definitions, purposes, and practical applications. Executive Summary Audit logs and audit trails are foundational

Audit Log vs. Audit Trail: What’s the Difference? Read More »

User accessing a workspace using SSO

Federal Information Security Modernization Act: FISMA Compliance

The Federal Information Security Modernization Act (FISMA) is United States legislation that defines a framework for federal information security. It mandates security standards for federal agencies and their contractors. FISMA compliance ensures the confidentiality, integrity, and availability of federal information systems and data. This article provides an overview of FISMA, its requirements, and how organizations

Federal Information Security Modernization Act: FISMA Compliance Read More »

A brightly colored padlock, signifying the protection of IAM Systems

ITAR Compliance with AWS IAM: Managing International Traffic in Arms Regulations

Navigating the complexities of International Traffic in Arms Regulations (ITAR) can be daunting, especially when leveraging cloud services like Amazon Web Services (AWS). This guide provides a comprehensive overview of ITAR, its significance, and how to achieve compliance using AWS Identity and Access Management (IAM). Understanding and implementing robust  compliance measures is crucial for organizations

ITAR Compliance with AWS IAM: Managing International Traffic in Arms Regulations Read More »

Electric power lines to symbolize the BES and NERC CIP regulations

NERC CIP Compliance: Cybersecurity for North American Reliability

The North American Electric Reliability Corporation (NERC) is essential for the reliable operation of the BES. NERC achieves this, in part, through cybersecurity measures, which include: NERC CIP compliance, a set of cybersecurity standards. The protection of critical infrastructure from cyber threats. These efforts, known as NERC CIP standards, ultimately safeguard the bulk electric system

NERC CIP Compliance: Cybersecurity for North American Reliability Read More »

Person holding credit cards showing the need to protect cardholder data with Zero Trust in Financial Services

PCI DSS Compliance: Access Controls & Security Standards

The Payment Card Industry Data Security Standard (PCI DSS) is a crucial set of security standards designed to protect cardholder data and prevent fraud. Achieving and maintaining PCI DSS compliance is essential for any organization that handles credit card information. This article delves into the intricacies of PCI DSS, focusing specifically on access controls and

PCI DSS Compliance: Access Controls & Security Standards Read More »