Detection, Response & GRC

Compliance & GRC Frameworks

4 min read

GRC (Governance, Risk, Compliance) knowledge is essential for security leadership roles. This lesson covers major frameworks and audit preparation.

Major Compliance Frameworks

Framework Comparison

FrameworkFocusWho Needs It
SOC 2Service organization controlsSaaS vendors, cloud providers
ISO 27001Information security managementGlobal organizations
PCI DSSPayment card dataAnyone processing cards
HIPAAHealthcare informationHealthcare providers, associates
GDPRPersonal data (EU)Anyone handling EU citizen data
NIST CSF 2.0Cybersecurity frameworkUS federal, critical infrastructure

SOC 2 Deep Dive

SOC 2 evaluates controls against Trust Service Criteria:

CriteriaDescriptionCommon Controls
SecurityProtection against unauthorized accessFirewalls, MFA, encryption
AvailabilitySystem uptime and performanceMonitoring, DR, SLAs
Processing IntegrityAccurate, timely processingQA, change management
ConfidentialityProtection of confidential infoEncryption, access controls
PrivacyPersonal information handlingConsent, data minimization

Interview Question

Q: "What's the difference between SOC 2 Type 1 and Type 2?"

Answer:

  • Type 1: Point-in-time assessment - Are controls designed properly?
  • Type 2: Period assessment (6-12 months) - Are controls operating effectively?

Type 2 is more valuable because it demonstrates sustained compliance, not just a snapshot.

NIST Cybersecurity Framework 2.0

Released February 2024, NIST CSF 2.0 is the gold standard:

The Six Functions

┌─────────────────────────────────────────────────────────────┐
│                     NIST CSF 2.0                            │
│                                                             │
│  ┌─────────┐  ┌─────────┐  ┌─────────┐  ┌─────────┐       │
│  │ GOVERN  │  │IDENTIFY │  │ PROTECT │  │ DETECT  │       │
│  │(NEW)    │  │         │  │         │  │         │       │
│  └─────────┘  └─────────┘  └─────────┘  └─────────┘       │
│                                                             │
│  ┌─────────┐  ┌─────────┐                                  │
│  │ RESPOND │  │ RECOVER │                                  │
│  │         │  │         │                                  │
│  └─────────┘  └─────────┘                                  │
└─────────────────────────────────────────────────────────────┘

GOVERN (New in 2.0):
- Establishes organizational context
- Integrates cybersecurity with enterprise risk
- Sets accountability and oversight

CSF Maturity Levels

TierDescriptionCharacteristics
Tier 1: PartialAd-hoc, reactiveNo formal program
Tier 2: Risk InformedSome awarenessRisk not enterprise-wide
Tier 3: RepeatableFormal, approvedPolicies in place
Tier 4: AdaptiveContinuous improvementLessons learned applied

PCI DSS 4.0

The 12 Requirements

#RequirementKey Controls
1Install and maintain network security controlsFirewall configuration
2Apply secure configurationsRemove defaults
3Protect stored account dataEncryption, key management
4Protect cardholder data in transitTLS 1.2+
5Protect against malicious softwareAnti-malware
6Develop secure systemsSecure SDLC, patching
7Restrict accessNeed-to-know basis
8Identify users and authenticateMFA, strong passwords
9Restrict physical accessPhysical security
10Log and monitor accessAudit trails
11Test security regularlyPen testing, scanning
12Support security with policiesGovernance

GDPR Key Concepts

Data Subject Rights

RightDescriptionResponse Time
AccessGet copy of personal data30 days
RectificationCorrect inaccurate data30 days
Erasure"Right to be forgotten"30 days
PortabilityReceive data in portable format30 days
ObjectStop processing for marketing30 days

Key Roles

RoleResponsibility
Data ControllerDetermines purpose of processing
Data ProcessorProcesses on behalf of controller
DPOData Protection Officer - oversees compliance

Interview Question

Q: "A customer requests deletion of their data under GDPR. What do you do?"

Answer:

1. VERIFY REQUEST
   └── Confirm identity of requester
   └── Check if request is valid (some exceptions apply)

2. SCOPE DATA
   └── Identify all systems containing their data
   └── Include backups, logs, third-party systems

3. EXECUTE DELETION
   └── Delete or anonymize data
   └── Document what was deleted, when, by whom

4. HANDLE EXCEPTIONS
   └── Legal holds - cannot delete
   └── Legitimate interest - may keep some
   └── Document reasoning for any retained data

5. RESPOND TO CUSTOMER
   └── Within 30 days
   └── Confirm deletion or explain exceptions

Audit Preparation

Evidence Collection

Control AreaEvidence Types
Access ControlUser lists, role assignments, access reviews
Change ManagementChange tickets, approval workflows
MonitoringAlert configurations, incident logs
TrainingCompletion records, training materials
PoliciesDocumented policies, version history

Common Audit Findings

FindingPrevention
Stale user accountsQuarterly access reviews
Missing MFAEnforce MFA for all users
Unpatched systemsAutomated patch management
Incomplete loggingLog coverage assessment
Policy gapsAnnual policy review

Building a Compliance Program

Compliance Maturity

Level 1: Reactive
└── Respond to audit findings
└── Manual evidence collection

Level 2: Managed
└── Defined processes
└── Regular internal audits

Level 3: Proactive
└── Continuous monitoring
└── Automated compliance checks

Level 4: Optimized
└── Compliance as code
└── Real-time dashboards
└── Predictive gap analysis

Tools for Automation

CategoryExamples
GRC PlatformsServiceNow GRC, OneTrust, Vanta
Compliance as CodeChef InSpec, Open Policy Agent
Evidence CollectionDrata, Secureframe
Policy ManagementPowerDMS, LogicGate

Interview Tip: When discussing compliance, emphasize that it's a floor, not a ceiling. Compliance ensures minimum standards, but good security often goes beyond what's required by regulations.

Next, we'll cover risk assessment methodologies. :::

Quick check: how does this lesson land for you?

Quiz

Module 5: Detection, Response & GRC

Take Quiz
FREE WEEKLY NEWSLETTER

Stay on the Nerd Track

One email per week — courses, deep dives, tools, and AI experiments.

No spam. Unsubscribe anytime.