Compliance or Conformity
Compliance is not security, or is it?
There is a view (anecdotal) that compliance is not security. To be more
precise, information and cyber security.
For those aware of this standard, ISO/IEC 27001:2013
(information security management system, requirements) asks those organisations
seeking certification to conform to its requirements.
On the other hand, the Payment Card Industry (PCI) security
standards, and for example the Data Security Standard (PCI DSS), requires compliance.
Conformity or compliance; in the cases above they both seek
to achieve something similar; security, in the context of information and cyber
security, by ensuring that important data assets are protected (specifically card
holder data for PCI DSS, and ‘other’ sensitive and critical information/data for
ISO/IEC 27001:2013).
Having generalised with the use of the word ‘other’ for
27001, in truth if card holder data were in scope then in fact ‘other’ would
include cardholder data. But, if by ‘other’ it is meant confidential company financial
data (not card holder data), or perhaps special categories of personal data
(not card holder data) then PCI DSS does not come into play.
However, in both cases, the objective is to manage the risk
to what can be suggested as being sensitive and (or) critical data. In one it asks us to conform to requirements, the other it
asks us to be compliant.
Many a tech company and cyber security company, having
jumped onto the (EU) GDPR bandwagon back in 2016, offered solutions to
enable an organisation to become compliant to the Regulation.
The bandwagon jumping antics of many of these businesses is
an entirely different topic of conversation; in the meantime, how do they in
fact determine that their customers are compliant to the (EU) GDPR simply by
offering a technical solution?
Coming back to the original question of compliance and
security; (EU) GDPR has a number of Articles (and recitals) directing
controllers and processors to manage risk (likelihood and severity) and to
respond by implementing appropriate technical and organisational controls.
In part only (many more non-security related obligations must
be met), and in order to reach a degree of compliance, the risk associated with
the processing of personal data by a controller and processor from an
information and cyber security standpoint must be managed and levels of risk treated
in some fashion to assist in complying with the Regulation.
ISO deprecated the use of the word compliance from its
management system vocabulary preferring the use of the word conform or
conformity, and forgetting that in fact conformity means, ‘compliance’ with
standards, rules or laws (thank you Google), the simple answer is; given the
context of information and cyber security, compliance is a valid word to use
and given the context, compliance can indeed be used with the word security.
KanSecurity (NL)