SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Control Standards for
Information Security
ISO 27001
SOC 2
John Paz
June 19, 2020
Contents
3. Overview and Purpose
4. Benefits
5. Comparison
6. The Needs and Requirements of the Customer
7. Roadmap
8. What Success Looks Like
9. Q&A
Overview and Purpose
ISO 27001 Standard
• The international security standard that
provides the specifications to implement
an effective Information Security
Management System (ISMS)
• ISO 27001 focuses on protecting
confidentiality, integrity and availability.
• Assists in complying with General Data
Protection Regulation (GDPR) and
Network and Information Systems (NIS)
regulations.
• A risk management framework.
SOC 2 -Service Organization Control
(SOC) report
• SOC 2 is an assessment platform for
technology companies developed by the
AICPA (American Institute of Certified
Public Accountants )
• SOC2 is specifically designed for service
providers that store customer data in the
cloud and must protect this data
• SOC 2 applies to every company that uses
cloud to store customers data.
With both standards, the objective is to implement reasonable technical
security controls, policies, procedures, and overall security management
to protect the security of you company’s or client’s valuable assets
Benefits
ISO 27001 Benefits
• Provides the framework to build an effective ISMS for
your organization
• Simplifies compliance with multiple regulatory
frameworks (e.g., HIPAA, PCI, PII)
• Provides a baseline to implement and demonstrate
measures to comply with strict GDPR and Data Privacy
objectives worldwide
SOC 2 Benefits
• SOC 2 compliance can benefit businesses
that handle customer data for others—
such as SaaS companies, banking, or
healthcare companies
• Compliance helps strengthen company
reputations, financial statements, and
stability by documenting, evaluating,
and improving their internal controls
• SOC 2 ensures integrations with AWS,
Azure, GCP, GitHub, are compliant and
data is protected
• Data Center and Colocation service
providers can also offer security
compliance to their customers
• You implement governance, policies and controls
that secure your data
• You improve your company’s security posture.
• Assets and confidential information are kept
more secure
• Customers and stakeholders gain confidence on
how you manage and reduce security risks
• You meet/exceed Third Party Risk Management
requirements
With either or both:
Comparison
ISO 27001
• ISO 27001 is a standard that includes the
specifications necessary to design,
implement and operate the ISMS and
validate the operation of technical
controls within the system
• More robust and comprehensive than
SOC2
• 27001 compliant architecture can
provide controls to comply with GDPR,
PII, HIPAA and other regulatory and
compliance requirements
• ISO 27001 can be thought of applying to
building an organization's security
infrastructure while SOC2 applies more
to verifying the existence of data
security protection controls
SOC 2
• A SOC 2 Type 2 report is an internal
controls report capturing how a company
safeguards customer data and how well
those controls are operating
• The (SOC) 2 Report will be performed in
accordance with AT-C 205 and based upon
the Trust Services Criteria
• The SOC2 audit examines Five Trust Services
Criteria (TSPs)
1. Security
2. Availability
3. Processing integrity
4. Confidentiality
5. Privacy
The needs and requirements of the customer
ISO 27001
• An effective approach to
security to defend against
external attacks and
common internal threats.
• Provides a proven
framework to define,
document, monitor,
review, update, security
controls to address
security risks specific to
your business.
• Is a non-prescriptive
standard that tells you
what you need to do not
how to do it. So your
business implements a
program specific to your
organization
SOC 2
• SOC 2 compliance is a
minimal requirement
when considering any
SaaS, PaaS or IaaS
provider.
• The move to cloud
requires evidence of
third-party compliance
and data protection
measures
• SOC 2 reports on various
organizational controls
related to security,
availability, processing
integrity, confidentiality
or privacy.
InfoSec Requirements
Leadership Requirements
Planning Requirements
Support Requirements
Operational
Requirements
Evaluation Requirements
Improvement
Requirements
For success you need to
understand your
company’s:
Roadmap
ISO 27001
1. Create a plan for Security Management
2. Determine your scope – What assets need to be
protected?
3. Understand all the risks associated with all
assets
4. Perform a Risk Assessment
5. Find the gaps between desired and current
state. Determine the best way to manage the
risks. Determine what must be done
6. Close the Gaps – Create a Gap Remediation Plan
(GRP)
7. Execute the GRP – Develop
Polices/Standards/Procedures
8. Conduct an ISMS Internal Audit
9. Remediate, policies, procedures, practices and
configurations before the official audit.
10. Begin the external certification audit
5-15 months to become 27001 certified
Internal resources, third party consultants
Audits - $20K-30K, Consulting $30K – 90K
1. SOC 2 reports are usually issued by independent
third-party auditors
2. Find a competent CPA firm
3. 1st step is to perform a SOC 2 scoping and
readiness assessment.
1. This evaluates the organizations internal
control framework.
2. Determines business functions which will be
in-scope of the SOC 2 audit
4. The conduct a SOC 2 Internal Audit
5. Remediate, policies, procedures, practices and
configurations before the official audit.
6. Begin the external certification audit.
6 weeks – 3 months on average
Internal resources, third party consultants
SOC Type 1 starts at $20,000, SOC Type 2 starts at
$30,000.
SOC 2
What success looks like.
A successful compliance program means:
• Controls are in place at all levels to protect the security of all assets.
• You have an infrastructure that achieves your security objectives
• You see a measurable risk reduction across all business divisions
• Marked reduction of self identified issues and external audit findings
• A security posture that provides Continuous Compliance through integrations with AWS,
Azure, GCP, GitHub, and more.
• Continued successful external certification audits
• The ability to demonstrate continuous improvement
• Increased customer confidence
• Higher ROI
The cost of non-compliance can result in
attacks that can debilitate your business.
This can include lost revenue, customers,
opportunities, and out-of-pocket costs.
Security breaches affect people, operations,
finance, intellectual property, and brand
reputation. The impact is high.
Q&A

Weitere ähnliche Inhalte

Was ist angesagt?

Lessons Learned from the NIST CSF
Lessons Learned from the NIST CSFLessons Learned from the NIST CSF
Lessons Learned from the NIST CSFDigital Bond
 
Cybersecurity Risk Management Framework Strategy Workshop
Cybersecurity Risk Management Framework Strategy WorkshopCybersecurity Risk Management Framework Strategy Workshop
Cybersecurity Risk Management Framework Strategy WorkshopLife Cycle Engineering
 
2022 Webinar - ISO 27001 Certification.pdf
2022 Webinar - ISO 27001 Certification.pdf2022 Webinar - ISO 27001 Certification.pdf
2022 Webinar - ISO 27001 Certification.pdfControlCase
 
Privacy Trends: Key practical steps on ISO/IEC 27701:2019 implementation
Privacy Trends: Key practical steps on ISO/IEC 27701:2019 implementationPrivacy Trends: Key practical steps on ISO/IEC 27701:2019 implementation
Privacy Trends: Key practical steps on ISO/IEC 27701:2019 implementationPECB
 
NIST Critical Security Framework (CSF)
NIST Critical Security Framework (CSF) NIST Critical Security Framework (CSF)
NIST Critical Security Framework (CSF) Priyanka Aash
 
NQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA
 
ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?PECB
 
Top management role to implement ISO 27001
Top management role to implement ISO 27001Top management role to implement ISO 27001
Top management role to implement ISO 27001PECB
 
Basic introduction to iso27001
Basic introduction to iso27001Basic introduction to iso27001
Basic introduction to iso27001Imran Ahmed
 
ISO/IEC 27001 as a Starting Point for GRC
ISO/IEC 27001 as a Starting Point for GRCISO/IEC 27001 as a Starting Point for GRC
ISO/IEC 27001 as a Starting Point for GRCPECB
 
SOC 2 Compliance and Certification
SOC 2 Compliance and CertificationSOC 2 Compliance and Certification
SOC 2 Compliance and CertificationControlCase
 
isms-presentation.ppt
isms-presentation.pptisms-presentation.ppt
isms-presentation.pptHasnolAhmad2
 
ISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdfISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdfControlCase
 
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security Controls
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security ControlsSOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security Controls
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security ControlsMark S. Mahre
 

Was ist angesagt? (20)

What is iso 27001 isms
What is iso 27001 ismsWhat is iso 27001 isms
What is iso 27001 isms
 
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdfISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
 
Lessons Learned from the NIST CSF
Lessons Learned from the NIST CSFLessons Learned from the NIST CSF
Lessons Learned from the NIST CSF
 
Cybersecurity Risk Management Framework Strategy Workshop
Cybersecurity Risk Management Framework Strategy WorkshopCybersecurity Risk Management Framework Strategy Workshop
Cybersecurity Risk Management Framework Strategy Workshop
 
2022 Webinar - ISO 27001 Certification.pdf
2022 Webinar - ISO 27001 Certification.pdf2022 Webinar - ISO 27001 Certification.pdf
2022 Webinar - ISO 27001 Certification.pdf
 
Privacy Trends: Key practical steps on ISO/IEC 27701:2019 implementation
Privacy Trends: Key practical steps on ISO/IEC 27701:2019 implementationPrivacy Trends: Key practical steps on ISO/IEC 27701:2019 implementation
Privacy Trends: Key practical steps on ISO/IEC 27701:2019 implementation
 
NIST Critical Security Framework (CSF)
NIST Critical Security Framework (CSF) NIST Critical Security Framework (CSF)
NIST Critical Security Framework (CSF)
 
NQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation Guide
 
ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?
 
Top management role to implement ISO 27001
Top management role to implement ISO 27001Top management role to implement ISO 27001
Top management role to implement ISO 27001
 
Basic introduction to iso27001
Basic introduction to iso27001Basic introduction to iso27001
Basic introduction to iso27001
 
From NIST CSF 1.1 to 2.0.pdf
From NIST CSF 1.1 to 2.0.pdfFrom NIST CSF 1.1 to 2.0.pdf
From NIST CSF 1.1 to 2.0.pdf
 
How to use ChatGPT for an ISMS implementation.pdf
How to use ChatGPT for an ISMS implementation.pdfHow to use ChatGPT for an ISMS implementation.pdf
How to use ChatGPT for an ISMS implementation.pdf
 
ISO/IEC 27001 as a Starting Point for GRC
ISO/IEC 27001 as a Starting Point for GRCISO/IEC 27001 as a Starting Point for GRC
ISO/IEC 27001 as a Starting Point for GRC
 
SOC 2 Compliance and Certification
SOC 2 Compliance and CertificationSOC 2 Compliance and Certification
SOC 2 Compliance and Certification
 
isms-presentation.ppt
isms-presentation.pptisms-presentation.ppt
isms-presentation.ppt
 
Iso 27001 2013
Iso 27001 2013Iso 27001 2013
Iso 27001 2013
 
ISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdfISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdf
 
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security Controls
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security ControlsSOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security Controls
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security Controls
 
ISO 27001 - Information Security Management System
ISO 27001 - Information Security Management SystemISO 27001 - Information Security Management System
ISO 27001 - Information Security Management System
 

Ähnlich wie Control Standards for Information Security

How to effectively use ISO 27001 Certification and SOC 2 Reports
How to effectively use ISO 27001 Certification and SOC 2 ReportsHow to effectively use ISO 27001 Certification and SOC 2 Reports
How to effectively use ISO 27001 Certification and SOC 2 ReportsSalvi Jansen
 
Navigating the SOC 2 Certification Maze: What You Need to Know
Navigating the SOC 2 Certification Maze: What You Need to KnowNavigating the SOC 2 Certification Maze: What You Need to Know
Navigating the SOC 2 Certification Maze: What You Need to KnowShyamMishra72
 
Facility Environmental Audit Guidelines
Facility Environmental Audit GuidelinesFacility Environmental Audit Guidelines
Facility Environmental Audit Guidelinesamburyj3c9
 
Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001Yerlin Sturdivant
 
Achieving ISO 27001 Certification.pdf
Achieving ISO 27001 Certification.pdfAchieving ISO 27001 Certification.pdf
Achieving ISO 27001 Certification.pdfmicroteklearning21
 
Nist cybersecurity framework isc2 quantico
Nist cybersecurity framework  isc2 quanticoNist cybersecurity framework  isc2 quantico
Nist cybersecurity framework isc2 quanticoTuan Phan
 
Whitepaper iso 27001_isms | All about ISO 27001
Whitepaper iso 27001_isms | All about ISO 27001Whitepaper iso 27001_isms | All about ISO 27001
Whitepaper iso 27001_isms | All about ISO 27001Chandan Singh Ghodela
 
english_bok_ismp_202306.pptx
english_bok_ismp_202306.pptxenglish_bok_ismp_202306.pptx
english_bok_ismp_202306.pptxssuser00d6eb
 
SOC 2 certification: a Comprehensive Guide
SOC 2 certification: a Comprehensive GuideSOC 2 certification: a Comprehensive Guide
SOC 2 certification: a Comprehensive GuideShyamMishra72
 
Everything You Need to Learn About SOC 2 Compliance.pdf
Everything You Need to Learn About SOC 2 Compliance.pdfEverything You Need to Learn About SOC 2 Compliance.pdf
Everything You Need to Learn About SOC 2 Compliance.pdfnikhilahuja45612
 
Demystifying SOC 2 Certification: Enhancing Trust in Data Security
Demystifying SOC 2 Certification: Enhancing Trust in Data SecurityDemystifying SOC 2 Certification: Enhancing Trust in Data Security
Demystifying SOC 2 Certification: Enhancing Trust in Data SecurityShyamMishra72
 
ISO 27004- Information Security Metrics Implementation
ISO 27004- Information Security Metrics ImplementationISO 27004- Information Security Metrics Implementation
ISO 27004- Information Security Metrics ImplementationNetwork Intelligence India
 
The Virtual Security Officer Platform
The Virtual Security Officer PlatformThe Virtual Security Officer Platform
The Virtual Security Officer PlatformShanmugavel Sankaran
 
Soc 2 Compliance.pdf
Soc 2 Compliance.pdfSoc 2 Compliance.pdf
Soc 2 Compliance.pdfroguelogics
 
Soc 2 Compliance.pdf
Soc 2 Compliance.pdfSoc 2 Compliance.pdf
Soc 2 Compliance.pdfroguelogics
 
Demystifying SOC 2 Certification: What You Need to Know
Demystifying SOC 2 Certification: What You Need to KnowDemystifying SOC 2 Certification: What You Need to Know
Demystifying SOC 2 Certification: What You Need to KnowShyamMishra72
 
Integrating ISO 27001, ISO 20000, and Project Management – From Theory to Pra...
Integrating ISO 27001, ISO 20000, and Project Management – From Theory to Pra...Integrating ISO 27001, ISO 20000, and Project Management – From Theory to Pra...
Integrating ISO 27001, ISO 20000, and Project Management – From Theory to Pra...PECB
 
Fixnix GRC Suite A Glance
Fixnix GRC Suite A GlanceFixnix GRC Suite A Glance
Fixnix GRC Suite A GlanceFixNix Inc.,
 
ISO 27001 Certification - VA.pdf
ISO 27001 Certification - VA.pdfISO 27001 Certification - VA.pdf
ISO 27001 Certification - VA.pdfsabeenasaahir
 
A Comprehensive Guide To Information Security Excellence ISO 27001 Certificat...
A Comprehensive Guide To Information Security Excellence ISO 27001 Certificat...A Comprehensive Guide To Information Security Excellence ISO 27001 Certificat...
A Comprehensive Guide To Information Security Excellence ISO 27001 Certificat...Tromenz Learning
 

Ähnlich wie Control Standards for Information Security (20)

How to effectively use ISO 27001 Certification and SOC 2 Reports
How to effectively use ISO 27001 Certification and SOC 2 ReportsHow to effectively use ISO 27001 Certification and SOC 2 Reports
How to effectively use ISO 27001 Certification and SOC 2 Reports
 
Navigating the SOC 2 Certification Maze: What You Need to Know
Navigating the SOC 2 Certification Maze: What You Need to KnowNavigating the SOC 2 Certification Maze: What You Need to Know
Navigating the SOC 2 Certification Maze: What You Need to Know
 
Facility Environmental Audit Guidelines
Facility Environmental Audit GuidelinesFacility Environmental Audit Guidelines
Facility Environmental Audit Guidelines
 
Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001
 
Achieving ISO 27001 Certification.pdf
Achieving ISO 27001 Certification.pdfAchieving ISO 27001 Certification.pdf
Achieving ISO 27001 Certification.pdf
 
Nist cybersecurity framework isc2 quantico
Nist cybersecurity framework  isc2 quanticoNist cybersecurity framework  isc2 quantico
Nist cybersecurity framework isc2 quantico
 
Whitepaper iso 27001_isms | All about ISO 27001
Whitepaper iso 27001_isms | All about ISO 27001Whitepaper iso 27001_isms | All about ISO 27001
Whitepaper iso 27001_isms | All about ISO 27001
 
english_bok_ismp_202306.pptx
english_bok_ismp_202306.pptxenglish_bok_ismp_202306.pptx
english_bok_ismp_202306.pptx
 
SOC 2 certification: a Comprehensive Guide
SOC 2 certification: a Comprehensive GuideSOC 2 certification: a Comprehensive Guide
SOC 2 certification: a Comprehensive Guide
 
Everything You Need to Learn About SOC 2 Compliance.pdf
Everything You Need to Learn About SOC 2 Compliance.pdfEverything You Need to Learn About SOC 2 Compliance.pdf
Everything You Need to Learn About SOC 2 Compliance.pdf
 
Demystifying SOC 2 Certification: Enhancing Trust in Data Security
Demystifying SOC 2 Certification: Enhancing Trust in Data SecurityDemystifying SOC 2 Certification: Enhancing Trust in Data Security
Demystifying SOC 2 Certification: Enhancing Trust in Data Security
 
ISO 27004- Information Security Metrics Implementation
ISO 27004- Information Security Metrics ImplementationISO 27004- Information Security Metrics Implementation
ISO 27004- Information Security Metrics Implementation
 
The Virtual Security Officer Platform
The Virtual Security Officer PlatformThe Virtual Security Officer Platform
The Virtual Security Officer Platform
 
Soc 2 Compliance.pdf
Soc 2 Compliance.pdfSoc 2 Compliance.pdf
Soc 2 Compliance.pdf
 
Soc 2 Compliance.pdf
Soc 2 Compliance.pdfSoc 2 Compliance.pdf
Soc 2 Compliance.pdf
 
Demystifying SOC 2 Certification: What You Need to Know
Demystifying SOC 2 Certification: What You Need to KnowDemystifying SOC 2 Certification: What You Need to Know
Demystifying SOC 2 Certification: What You Need to Know
 
Integrating ISO 27001, ISO 20000, and Project Management – From Theory to Pra...
Integrating ISO 27001, ISO 20000, and Project Management – From Theory to Pra...Integrating ISO 27001, ISO 20000, and Project Management – From Theory to Pra...
Integrating ISO 27001, ISO 20000, and Project Management – From Theory to Pra...
 
Fixnix GRC Suite A Glance
Fixnix GRC Suite A GlanceFixnix GRC Suite A Glance
Fixnix GRC Suite A Glance
 
ISO 27001 Certification - VA.pdf
ISO 27001 Certification - VA.pdfISO 27001 Certification - VA.pdf
ISO 27001 Certification - VA.pdf
 
A Comprehensive Guide To Information Security Excellence ISO 27001 Certificat...
A Comprehensive Guide To Information Security Excellence ISO 27001 Certificat...A Comprehensive Guide To Information Security Excellence ISO 27001 Certificat...
A Comprehensive Guide To Information Security Excellence ISO 27001 Certificat...
 

Kürzlich hochgeladen

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 

Kürzlich hochgeladen (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 

Control Standards for Information Security

  • 1. Control Standards for Information Security ISO 27001 SOC 2 John Paz June 19, 2020
  • 2. Contents 3. Overview and Purpose 4. Benefits 5. Comparison 6. The Needs and Requirements of the Customer 7. Roadmap 8. What Success Looks Like 9. Q&A
  • 3. Overview and Purpose ISO 27001 Standard • The international security standard that provides the specifications to implement an effective Information Security Management System (ISMS) • ISO 27001 focuses on protecting confidentiality, integrity and availability. • Assists in complying with General Data Protection Regulation (GDPR) and Network and Information Systems (NIS) regulations. • A risk management framework. SOC 2 -Service Organization Control (SOC) report • SOC 2 is an assessment platform for technology companies developed by the AICPA (American Institute of Certified Public Accountants ) • SOC2 is specifically designed for service providers that store customer data in the cloud and must protect this data • SOC 2 applies to every company that uses cloud to store customers data. With both standards, the objective is to implement reasonable technical security controls, policies, procedures, and overall security management to protect the security of you company’s or client’s valuable assets
  • 4. Benefits ISO 27001 Benefits • Provides the framework to build an effective ISMS for your organization • Simplifies compliance with multiple regulatory frameworks (e.g., HIPAA, PCI, PII) • Provides a baseline to implement and demonstrate measures to comply with strict GDPR and Data Privacy objectives worldwide SOC 2 Benefits • SOC 2 compliance can benefit businesses that handle customer data for others— such as SaaS companies, banking, or healthcare companies • Compliance helps strengthen company reputations, financial statements, and stability by documenting, evaluating, and improving their internal controls • SOC 2 ensures integrations with AWS, Azure, GCP, GitHub, are compliant and data is protected • Data Center and Colocation service providers can also offer security compliance to their customers • You implement governance, policies and controls that secure your data • You improve your company’s security posture. • Assets and confidential information are kept more secure • Customers and stakeholders gain confidence on how you manage and reduce security risks • You meet/exceed Third Party Risk Management requirements With either or both:
  • 5. Comparison ISO 27001 • ISO 27001 is a standard that includes the specifications necessary to design, implement and operate the ISMS and validate the operation of technical controls within the system • More robust and comprehensive than SOC2 • 27001 compliant architecture can provide controls to comply with GDPR, PII, HIPAA and other regulatory and compliance requirements • ISO 27001 can be thought of applying to building an organization's security infrastructure while SOC2 applies more to verifying the existence of data security protection controls SOC 2 • A SOC 2 Type 2 report is an internal controls report capturing how a company safeguards customer data and how well those controls are operating • The (SOC) 2 Report will be performed in accordance with AT-C 205 and based upon the Trust Services Criteria • The SOC2 audit examines Five Trust Services Criteria (TSPs) 1. Security 2. Availability 3. Processing integrity 4. Confidentiality 5. Privacy
  • 6. The needs and requirements of the customer ISO 27001 • An effective approach to security to defend against external attacks and common internal threats. • Provides a proven framework to define, document, monitor, review, update, security controls to address security risks specific to your business. • Is a non-prescriptive standard that tells you what you need to do not how to do it. So your business implements a program specific to your organization SOC 2 • SOC 2 compliance is a minimal requirement when considering any SaaS, PaaS or IaaS provider. • The move to cloud requires evidence of third-party compliance and data protection measures • SOC 2 reports on various organizational controls related to security, availability, processing integrity, confidentiality or privacy. InfoSec Requirements Leadership Requirements Planning Requirements Support Requirements Operational Requirements Evaluation Requirements Improvement Requirements For success you need to understand your company’s:
  • 7. Roadmap ISO 27001 1. Create a plan for Security Management 2. Determine your scope – What assets need to be protected? 3. Understand all the risks associated with all assets 4. Perform a Risk Assessment 5. Find the gaps between desired and current state. Determine the best way to manage the risks. Determine what must be done 6. Close the Gaps – Create a Gap Remediation Plan (GRP) 7. Execute the GRP – Develop Polices/Standards/Procedures 8. Conduct an ISMS Internal Audit 9. Remediate, policies, procedures, practices and configurations before the official audit. 10. Begin the external certification audit 5-15 months to become 27001 certified Internal resources, third party consultants Audits - $20K-30K, Consulting $30K – 90K 1. SOC 2 reports are usually issued by independent third-party auditors 2. Find a competent CPA firm 3. 1st step is to perform a SOC 2 scoping and readiness assessment. 1. This evaluates the organizations internal control framework. 2. Determines business functions which will be in-scope of the SOC 2 audit 4. The conduct a SOC 2 Internal Audit 5. Remediate, policies, procedures, practices and configurations before the official audit. 6. Begin the external certification audit. 6 weeks – 3 months on average Internal resources, third party consultants SOC Type 1 starts at $20,000, SOC Type 2 starts at $30,000. SOC 2
  • 8. What success looks like. A successful compliance program means: • Controls are in place at all levels to protect the security of all assets. • You have an infrastructure that achieves your security objectives • You see a measurable risk reduction across all business divisions • Marked reduction of self identified issues and external audit findings • A security posture that provides Continuous Compliance through integrations with AWS, Azure, GCP, GitHub, and more. • Continued successful external certification audits • The ability to demonstrate continuous improvement • Increased customer confidence • Higher ROI The cost of non-compliance can result in attacks that can debilitate your business. This can include lost revenue, customers, opportunities, and out-of-pocket costs. Security breaches affect people, operations, finance, intellectual property, and brand reputation. The impact is high.
  • 9. Q&A

Hinweis der Redaktion

  1. To implement ISO 27001 you will ne to define a compliant ISMS Define the scope Define a security policy Conduct a risk assessment Manage identified risks Select control objectives and controls to implement Prepare a Statement of Applicability Reduce costs by understanding risks and opportunities for security improvements Reduce risks by designing a risk treatment plan. Accepted risks manageability of the risks
  2. with the ability to test and report on the design (Type I) and operating (Type II) effectiveness of a service organization’s controls A SOC 2 report is based on the existing SysTrust and WebTrust Principles. The purpose of a SOC 2 report is to evaluate the organizations information systems relevant to security, availability, processing integrity, confidentiality or privacy. A SOC 1 report is an assessment of controls at a service organization that may be relevant to user entities’ internal control over financial reporting SOC 3 follows SOC principles does not detail that testing performed and is meant to be used as marketing material. SOC 2 covers 75-80% of the list of ISO 27002 controls
  3. What will ISO 27001 ISMS will accomplish for your business? What does top management need to do? How do we assess risks and confirm risk reduction? How do we ensure we have competence and awareness? How do we implement and control the processes needed to achieve our objectives? How do we ensure the effectiveness of our ISMS? How do we address deficiencies and continuously improve? The entity identifies, selects, and develops risk mitigation activities for risks arising from potential business disruptions. The entity implements policies and procedures over system inputs, including controls over completeness and accuracy, to result in products, services, and reporting to meet the entity’s objectives. The entity implements policies and procedures over system processing to result in products, services, and reporting to meet the entity’s objectives. The entity implements policies and procedures to make available or deliver output completely, accurately, and timely in accordance with specifications to meet the entity’s objectives. The entity creates and retains a complete, accurate, and timely record of authorized disclosures of personal information to meet the entity’s objectives related to privacy. The entity creates and retains a complete, accurate, and timely record of detected or reported unauthorized disclosures (including breaches) of personal information to meet the entity’s objectives related to privacy. The entity collects and maintains accurate, up-to-date, complete, and relevant personal information to meet the entity’s objectives related to privacy.
  4. Managed Services Managed services providers can set themselves apart by demonstrating their commitment to a maintaining the strong internal controls that customers want when entrusting them with the management of their information systems, including applications, databases, information security, backup and recovery, network management, and system monitoring. Banking and Financial Services Organizations like credit unions, banks, credit card companies, insurance companies, consumer finance companies, and stock brokerages face numerous challenges in internal controls. For example, physical and logical security play a major role in ensuring customer data is secure. They also must maintain confidentiality and privacy, as well as the completeness, timeliness, and accuracy of transactions. Thus, demonstrating a robust SOC 2 compliance program can be advantageous. Software as a Service (SaaS) Efficiency-seeking companies are turning to Software as a Service (SaaS) providers to reduce costs. SaaS providers can gain an edge by showing prospective customers that they can be trusted because of their adherence to widely accepted frameworks for internal controls. Data Centers and Colocation Facilities A single data center can serve many customers, housing vast amounts of sensitive data, which would make a breach exponentially damaging. Therefore, companies scrutinize the internal controls of a data center or colocation facility before trusting them with their data. SOC 2 compliance can provide those companies with the assurance they desire.