Compliance or Conformity


Compliance is not security, or is it?







There is a view (anecdotal)  that compliance is not security. To be more precise, information and cyber security.

For those aware of this standard, ISO/IEC 27001:2013 (information security management system, requirements) asks those organisations seeking certification to conform to its requirements.
On the other hand, the Payment Card Industry (PCI) security standards, and for example the Data Security Standard (PCI DSS), requires compliance.

Conformity or compliance; in the cases above they both seek to achieve something similar; security, in the context of information and cyber security, by ensuring that important data assets are protected (specifically card holder data for PCI DSS, and ‘other’ sensitive and critical information/data for ISO/IEC 27001:2013).

Having generalised with the use of the word ‘other’ for 27001, in truth if card holder data were in scope then in fact ‘other’ would include cardholder data. But, if by ‘other’ it is meant confidential company financial data (not card holder data), or perhaps special categories of personal data (not card holder data) then PCI DSS does not come into play.

However, in both cases, the objective is to manage the risk to what can be suggested as being sensitive and (or) critical data. In one it asks us to conform to requirements, the other it asks us to be compliant.

Many a tech company and cyber security company, having jumped onto the (EU) GDPR bandwagon back in 2016, offered solutions to enable an organisation to become compliant to the Regulation.

The bandwagon jumping antics of many of these businesses is an entirely different topic of conversation; in the meantime, how do they in fact determine that their customers are compliant to the (EU) GDPR simply by offering a technical solution?

Coming back to the original question of compliance and security; (EU) GDPR has a number of Articles (and recitals) directing controllers and processors to manage risk (likelihood and severity) and to respond by implementing appropriate technical and organisational controls.

In part only (many more non-security related obligations must be met), and in order to reach a degree of compliance, the risk associated with the processing of personal data by a controller and processor from an information and cyber security standpoint must be managed and levels of risk treated in some fashion to assist in complying with the Regulation.

ISO deprecated the use of the word compliance from its management system vocabulary preferring the use of the word conform or conformity, and forgetting that in fact conformity means, ‘compliance’ with standards, rules or laws (thank you Google), the simple answer is; given the context of information and cyber security, compliance is a valid word to use and given the context, compliance can indeed be used with the word security.

KanSecurity (NL)

Popular posts from this blog

Black Swans and other things

Personal data or PII

Risk and micro, small business