5 Reasons Why Compliance Alone is Not Efficient at Reducing Cyber Risks

Compliance is an ongoing business concern, especially in the world of cybersecurity.  Compliance is actually the biggest driver (59%) behind the identification of an organization’s security needs instead of business risk reduction. This is probably because an increasing number of regulatory bodies mandate that organizations abide by security standards like GDPR, HIPAA, SOX, GLBA, etc.

Organizations spend large amounts of money, time and resources trying to meet audit requirements and when they successfully meet criteria and pass tests, they often get a false sense of security that they are battle ready against real-world cyber threats. Unfortunately, this is far from true. Compliance is only a small part of cybersecurity and there are many reasons why compliance is inefficient in reducing cyber risks.

  1. Compliance is an Audit Mentality
    When the unsinkable Titanic sank in 1911, it was fully compliant with all marine regulations. In fact, it exceeded the number of lifeboats mandated by the British Board Of Trade at the time. But when catastrophe struck the ship was not equipped with enough lifeboats to save all passengers on board. The problem? Management, too focused on meeting compliance, undermined real-world risks. Cybersecurity compliance too is a lot like that. There’s a compliance document where every checkmark becomes as valuable as the next checkmark. Security teams develop a kind of checkmark mentality because the end goal is not to be secure, but to be compliant.
  2. When Compliance Conflicts with Security, Compliance Always Wins
    In many cases, especially with enterprises, the C-suite is responsible for making sure the company meets its compliance requirements. Leadership often does not want to hear about any deviating from those requirements for the sake of security. That’s because oftentimes they’re legally obligated to meet those compliance requirements. For example, a business that operates in a fully cloud, perimeter-less environment might need zero-trust more than a firewall. Yet some businesses might still be obligated to have a firewall in place (even though it’s not needed), just to meet legislative requirements.
  3. Compliance Controls are Not Ranked for Risk Relevance
    Compliance documents only view risk as bubbles in a glass of champagne. They fail to inform security teams that two or three of those bubbles are much larger than all the other bubbles put together. For example, phishing and unpatched vulnerabilities are one of the top root causes of all cyber attacks but most compliance documents fail to highlight or prioritize those risks.
  4. Compliance is Binary
    Auditors will typically ask yes/no questions such as whether the organization conducts software updates and backups and has firewalls. In case there is a minor deviation, auditors only view it as an exception or a failure because they can only check for a yes or no response. In reality, security isn’t binary. It generally falls along a spectrum of continuum — from no security to all possible security.
  5. Compliance Documents Do Not Provide Enough Detail
    Most compliance documents fail to set clear expectations and define clear guidelines. For example, “One should apply critical patches in a timely manner”.  But what does ‘in a timely manner’ mean? What is a critical patch? “One should collect reviews and logs”. Which logs? What type of review? “One should back-up data and regularly test it”. Test in what way?  Since such details are not clearly defined, it creates a lot of confusion. In the end, everyone knows (including the auditor) that the audit isn’t very accurate. “We are fully compliant with patching” literally means nothing. One might end up patching 15,000 things that never got attacked, but end up missing out on patching the five most riskiest applications and still be compliant with vague statements.

How Businesses Can Achieve Compliance and Risk Reduction at the Same Time

The bottom-line is, businesses need to put risk ahead of compliance as compliance doesn’t always lead to adequate security. Start with risks and vulnerabilities in the order of their importance: exploits actively being used against you, exploits likely to be used against you in the near future, and exploits that were successfully used against you in the recent past. Use a vulnerability scoring system (such as the CVSS) to rank your risks.

Less than a handful of threats compromise the vast majority of real risks. Focus on the root causes of exploitation like social engineering and unpatched software. Start by patching internet-facing applications (browser, OS, productivity apps, browser and add-ons). Where compliance conflicts with security, invest in education and set clear expectations. Discuss with management about the differences between compliance and security, explain why security should win and agree how compliance expectations will be handled. Since compliance and risk management go hand in hand, it might also be a good idea to leverage GRC (governance, risk, compliance) platforms as these can help track your compliance progress, drive mitigations against the most likely risks and monitor changes in controls over time.

Compliance is not an obligation but an opportunity. Organizations that recognize this and live everyday like its Audit Day will not only fare better at compliance but also achieve real reduction in cyber risks.

About the Author

Stu Sjouwerman is founder and CEO of KnowBe4, [NASDAQ: KNBE] developer of security awareness training and simulated phishing platforms, with 41,000 customers and more than 25 million users. He was co-founder of Sunbelt Software, the anti-malware software company acquired in 2010. He is the author of four books, including “Cyberheist: The Biggest Financial Threat Facing American Businesses.” He can be reached at ssjouwerman@knowbe4.com.

 

Share

Related

The Dangerous Tech Game

It’s good to have a relentless outlook towards life,...

Uncovering the Importance of Electronic Health Records

Electronic Health Records or EHRs are kept to help...

Is it Time to Press the Panic Button on Crypto Mining?

It’s barely a secret that human beings boast a...

The Rising Enterprise Security Threats in 2021

2020 was unprecedented in nearly every way, and cyberattacks...

Improving Hospital Workforce Through Predictive Analysis Systems

One of the most important aspects that are bothering...

Predicting e-commerce trends with AI

We are living in the age of data-driven decision-making,...

Laying Out a Physical Road to the Virtual World

A great thing about the human mindset is that...

Another Building Block for a High-End EV Infrastructure

Human beings boast a ton of notable traits, and...

Latest

No posts to display

No posts to display