Governance, Risk, and Compliance (GRC) - Comprehensive Guide

Why GRC Matters - The Real World Context

The Billion Dollar Question

In 2023, a major US healthcare provider paid $4.5 million in HIPAA fines for failing to conduct a risk assessment. In 2024, Irish Data Protection Commission fined Meta €91 million for GDPR violations related to password storage. These aren't just numbers - they represent real business failures that could have been prevented.

Here's the reality: You can be the best penetration tester in the world, find every vulnerability, write perfect firewall rules, and detect every intrusion - but if your organization doesn't have proper governance, doesn't understand its risks, and isn't compliant with regulations, you will fail.

The Technical vs. Business Security Gap

As cybersecurity professionals with red team and blue team experience, you understand:

  • How to exploit vulnerabilities (red team thinking)

  • How to detect and respond to attacks (blue team operations)

  • How malware works and how to analyze it

But here's what you might not yet fully grasp:

Technical Scenario:

  • You discover a critical SQL injection vulnerability in the company's payment system

  • You write a detailed report with PoC, CVSS score 9.8

  • You submit it to the development team

  • ...and nothing happens for 6 months

Why? Because there's no governance structure defining who is responsible, no risk assessment showing the business impact, and no compliance requirement forcing action.

GRC Scenario:

  • Same vulnerability discovered

  • Risk assessment shows potential PCI-DSS violation (business cannot process cards without compliance)

  • Governance policy states "Critical vulnerabilities must be patched within 72 hours"

  • Compliance team escalates to CISO who has authority and budget

  • ...vulnerability fixed in 48 hours

This is why GRC matters. It's the bridge between technical security and business reality.

GRC cheatsheet - brief presentation of most important information:

The GRC Triangle - Understanding the Interconnections

How They Work Together

Think of GRC as a three-legged stool:

Governance = The rules of the game

  • "Who decides what gets protected and how?"

  • "What's our security strategy?"

  • "Who has authority and budget?"

Risk = The prioritization engine

  • "What should we protect first?"

  • "How much should we spend on security?"

  • "What's the likelihood and impact?"

Compliance = The proof and accountability

  • "Can we prove we're doing what we said we'd do?"

  • "Are we meeting legal requirements?"

  • "What happens if we fail?"

Real-World Example: The Data Breach Chain

Let's trace how poor GRC leads to disaster:

Bad Governance:

  • No clear policy on data classification

  • IT department and Security team don't communicate

  • No one knows who "owns" customer data

Ignored Risk:

  • No risk assessment performed on customer database

  • Database contains 5 million credit card numbers (high value asset)

  • Database accessible from internet with weak password (high likelihood)

  • Risk = CRITICAL, but no one calculated it

Failed Compliance:

  • Company stores full PAN (Primary Account Number) in plaintext

  • Direct violation of PCI-DSS Requirement 3.4

  • No one checked compliance before going live

Result:

  • Database breached in 3 hours

  • 5 million cards stolen

  • Company loses PCI compliance → cannot process cards → business stops

  • GDPR fine: €20 million

  • PCI fine: $500,000/month until compliant

  • Reputation destroyed

  • Total cost: Company bankrupt in 6 months

With proper GRC:

  • Governance: Clear data ownership, security policies mandated by CISO

  • Risk: Risk assessment identifies critical risk → triggers immediate mitigation

  • Compliance: PCI-DSS requirements checked before deployment → encryption mandated

  • Result: Breach prevented, business thrives

Governance - The Strategic Foundation

What Governance Really Means

Governance isn't about technical controls - it's about decision-making authority and strategic direction.

Think of it this way:

  • Red Team thinking: "How can I break this?"

  • Blue Team thinking: "How can I detect and stop this?"

  • Governance thinking: "Should we even build this? Who decides? Who pays? Who's accountable?"

The Policy Hierarchy - Making Strategy Actionable

One of the most misunderstood aspects of governance is how high-level strategy becomes day-to-day action. This is where the policy hierarchy becomes critical.

Practical Example: Password Security

Let's see how this hierarchy works in practice:

Level 1: Business Strategy "Our company must protect customer trust and prevent unauthorized access to systems"

Level 2: Policy (WHY) "All company systems must implement authentication controls to prevent unauthorized access. This policy applies to all employees, contractors, and systems."

  • Characteristics: High-level, mandatory, approved by senior management

  • Audience: Everyone in the organization

  • Frequency: Reviewed annually or after major incidents

Level 3: Standard (WHAT) *"User passwords must meet the following requirements:

  • Minimum 16 characters

  • Complexity: mix of uppercase, lowercase, numbers, symbols

  • Cannot reuse last 12 passwords

  • Must change every 90 days: no (this is outdated feature)

  • Multi-factor authentication (MFA) required for all remote access"*

  • Characteristics: Specific, measurable, technical

  • Audience: System administrators, developers

  • Frequency: Updated based on threat landscape

Level 4: Procedure (HOW) *"To configure Active Directory password policy:

  1. Open Group Policy Management

  2. Navigate to Default Domain Policy

  3. Edit: Computer Configuration > Windows Settings > Security Settings > Account Policies > Password Policy

  4. Set minimum password length = 16

  5. Enable password complexity requirements

  6. Set password history = 12

  7. Click Apply..."*

  • Characteristics: Step-by-step instructions, screenshots

  • Audience: Specific technical role (AD admins)

  • Frequency: Updated when technology changes

Level 5: Guideline (RECOMMENDATIONS) "Consider using a password manager like 1Password or Bitwarden to generate and store complex passwords. While the minimum length is 16 characters, 20+ is recommended for sensitive systems."

  • Characteristics: Best practices, non-mandatory

  • Audience: End users

  • Frequency: Flexible

Why This Hierarchy Matters

Common Mistake #1: Writing procedures instead of policies

  • Wrong: "Employees must use the bcrypt() function with cost factor 16"

  • Right Policy: "All passwords must be stored using industry-standard cryptographic hashing"

  • Why: Technology changes, policies shouldn't

Common Mistake #2: Making guidelines mandatory

  • Leads to unenforceable rules and compliance confusion

Common Mistake #3: No clear hierarchy

  • Result: No one knows what's mandatory vs. optional

  • Example: "It is recommended that all passwords be changed monthly" - Is this required or not?

Governance Roles and Responsibilities

Understanding WHO makes decisions is crucial:

Key Roles:

  1. Board of Directors / Executive Management

    • Sets overall risk appetite

    • Approves major security investments

    • Accountable for major breaches

  2. CISO (Chief Information Security Officer)

    • Defines security strategy

    • Manages security budget

    • Reports risk to executives

    • Not necessarily technical - more business/risk focused

  3. Data Protection Officer (DPO) (Required by GDPR for some orgs)

    • Independent advocate for privacy

    • Monitors GDPR compliance

    • Acts as contact point for authorities

    • Must be independent - cannot report to IT or have conflicts of interest

  4. Security Governance Committee

    • Reviews and approves policies

    • Prioritizes security initiatives

    • Cross-functional (IT, Legal, HR, Business units)

  5. System Owners

    • Responsible for specific systems/applications

    • Makes risk decisions for their systems

    • Often business managers, not technical staff

  6. Security Operations (Your likely role)

    • Implements technical controls

    • Executes procedures

    • Reports on effectiveness

The NIST Cybersecurity Framework (CSF) 2.0

The CSF is the most widely adopted governance framework globally. Let's understand why it's so popular and how to use it.

The 6 Functions - Your Security Program Blueprint

GOVERN (GV) - Added in CSF 2.0, previously implicit

This is the "brain" - it oversees and directs everything else.

What it covers:

  • Organizational context and cybersecurity strategy (GV.OC)

  • Risk management strategy (GV.RM)

  • Roles, responsibilities, and authorities (GV.RR)

  • Policy creation and oversight (GV.PO)

  • Cybersecurity supply chain risk management (GV.SC)

Real-world example: A company using CSF starts here:

  1. Board approves cybersecurity strategy aligned with business goals

  2. CISO creates risk management framework

  3. Policies written based on risk priorities

  4. All other functions (Identify, Protect, etc.) follow from these decisions

IDENTIFY (ID)

"You can't protect what you don't know you have"

Key categories:

  • Asset Management (ID.AM): Hardware, software, data inventory

  • Risk Assessment (ID.RA): Understanding threats and vulnerabilities

  • Improvement (ID.IM): Lessons learned and continuous enhancement

Why this matters for you: As a pentester/SOC analyst, you need accurate asset inventories to:

  • Know what systems to test/monitor

  • Understand data flows

  • Identify critical assets vs. low-value targets

Common failure: Companies skip this step and build security on guesswork

  • Result: Protecting wrong things, missing critical assets

PROTECT (PR)

Technical and administrative controls to prevent incidents.

Key categories:

  • Identity Management & Access Control (PR.AA)

  • Awareness and Training (PR.AT)

  • Data Security (PR.DS)

  • Platform Security (PR.PS) - formerly "Protective Technology"

  • Technology Infrastructure Resilience (PR.IR)

Mapping to your knowledge:

  • Red team: These are the controls you try to bypass

  • Blue team: These are the controls you implement and tune

Example: MFA (Multi-Factor Authentication)

  • Governance: Policy requires MFA

  • Standard: MFA required for all remote access

  • Protect function: PR.AA-05 "Authenticators are managed by the organization"

  • Your job: Configure Duo/Okta/Azure MFA, ensure enrollment

DETECT (DE)

Your SOC/Blue Team home.

Key categories:

  • Continuous Monitoring (DE.CM)

  • Adverse Event Analysis (DE.AE)

Critical connection to blue team:

  • This is where SIEM, IDS/IPS, EDR live

  • Log collection → Analysis → Alerts → Investigation

  • CSF provides the "why" for your SIEM rules

Example:

  • CSF Subcategory: DE.CM-01 "Networks are monitored to find potentially adverse events"

  • Your implementation: Suricata/Snort IDS rules, network flow analysis

  • Governance link: Monitoring policy requires 90-day log retention

RESPOND (RS)

Incident response - what to do when (not if) you're breached.

Key categories:

  • Incident Management (RS.MA)

  • Incident Analysis (RS.AN)

  • Incident Response Reporting and Communication (RS.CO)

  • Incident Mitigation (RS.MI)

Why governance matters here: Without governance, you might:

  • Not know who has authority to shut down production systems

  • Not know when to call law enforcement

  • Not know if you can legally analyze the malware sample

  • Not know who communicates with customers/press

Example decision tree:

RECOVER (RC)

Getting back to business after an incident.

Key categories:

  • Incident Recovery Plan Execution (RC.RP)

  • Incident Recovery Communication (RC.CO)

Connection to risk:

  • RTO (Recovery Time Objective): How fast must we recover?

  • RPO (Recovery Point Objective): How much data loss is acceptable?

  • These are risk decisions made during governance, not technical decisions

Example:

  • Business: "We cannot afford more than 4 hours of downtime on e-commerce"

  • Risk assessment: 4-hour outage = €500k revenue loss

  • Governance decision: Invest €200k in redundant infrastructure

  • Recovery procedure: Your job to implement and test the DR plan

How to Actually Use CSF

Step 1: Current State Assessment Map your existing controls to CSF categories

  • "We have a firewall" → PR.PS-04 (Protect Platform Security)

  • "We monitor logs in SIEM" → DE.CM-01 (Detect Continuous Monitoring)

Step 2: Target State Definition Based on risk, decide where you need to be

  • "We're currently at Tier 1 (Partial) for DE.CM, need to get to Tier 3 (Repeatable)"

Step 3: Gap Analysis Identify what's missing

  • "We don't have DE.AE-02 (Adverse event analysis), need to implement investigation procedures"

Step 4: Prioritize & Implement Use risk assessment to prioritize gaps

  • High-risk gaps first, low-risk gaps later

Step 5: Measure & Improve Create metrics to track progress

  • "95% of critical systems have MFA (PR.AA-05)" - good

  • "Only 40% have MFA" - gap to close

CSF Implementation Tiers

CSF defines 4 maturity levels for implementing each function:

Tier 1: Partial

  • Ad hoc, reactive

  • No formal processes

  • Example: "We patch when we remember"

Tier 2: Risk Informed

  • Some risk awareness

  • Processes not formalized

  • Example: "We patch critical systems based on severity"

Tier 3: Repeatable

  • Formal, documented processes

  • Regular updates

  • Example: "We have documented patch management procedure, run monthly"

Tier 4: Adaptive

  • Continuously improving

  • Predictive, proactive

  • Example: "We use threat intelligence to prioritize patching, automate deployment, measure effectiveness"

Important: You don't need Tier 4 for everything. A small company might be:

  • Tier 4 for PROTECT (core business)

  • Tier 2 for RECOVER (acceptable risk)

  • This is a governance decision based on risk appetite

Risk Management - The Heart of Cybersecurity

Understanding Risk: The Formula That Drives Decisions

Here's the fundamental concept that drives everything in cybersecurity:

Let's break this down with a real scenario:

Scenario: Public Website with Customer Database

Asset Value:

  • Website itself: €50k to rebuild

  • Customer database: 100,000 email addresses

  • Reputation impact: Immeasurable but significant

Threat:

  • Script kiddies scanning for vulnerabilities (common)

  • Competitors wanting customer list (less common)

  • Nation-state actors (unlikely for small business)

Vulnerability:

  • Unpatched WordPress plugin with known SQL injection

  • CVSS Score: 9.8 (Critical)

  • Public exploit available on ExploitDB

Likelihood:

  • Known vulnerability + public exploit + automated scanners = HIGH

  • "When, not if"

Impact:

  • Data breach → GDPR fine (up to €20M or 4% revenue)

  • Customer notification costs

  • Reputation damage

  • Legal fees

  • Total estimated impact: €500k for small company

Risk Calculation:

  • High likelihood × High impact = CRITICAL RISK

  • Action required: Immediate remediation

The Risk Assessment Process

Qualitative vs Quantitative Risk Analysis

Qualitative Analysis (Most common)

Uses descriptive scales: Low, Medium, High, Critical

Risk Matrix Example:

Advantages:

  • Fast, easy to understand

  • Works when you don't have precise data

  • Good for communicating with non-technical stakeholders

Disadvantages:

  • Subjective ("What's 'high' to you vs. me?")

  • Hard to prioritize multiple "high" risks

  • Difficult to justify budget

Quantitative Analysis (More sophisticated)

Uses actual numbers (€) to calculate expected losses.

Key Metrics:

SLE (Single Loss Expectancy)

How much money do you lose if this risk happens once?

Example:

  • Asset: Server worth €10,000

  • Exposure Factor: 100% (server completely destroyed by ransomware)

  • SLE = €10,000 × 1.0 = €10,000

ARO (Annualized Rate of Occurrence) How many times per year will this happen?

Examples:

  • Ransomware attack: 0.1 (once every 10 years)

  • Phishing attempt: 365 (daily)

  • Natural disaster: 0.01 (once per 100 years)

ALE (Annualized Loss Expectancy)

How much do you expect to lose per year from this risk?

Example:

  • SLE = €10,000

  • ARO = 0.1

  • ALE = €10,000 × 0.1 = €1,000/year

This is the number that justifies security spending:

  • ALE = €1,000/year from ransomware

  • Backup solution costs = €500/year

  • ROI: Positive! Spend €500 to avoid €1,000 loss

Practical Risk Assessment Example

Let's assess risk for a realistic scenario:

Company: Small e-commerce business (50 employees) Asset: Customer database with credit card data Value: 50,000 customers, potential GDPR fine €2M, PCI fine €500k, reputation damage €1M = €3.5M total

Risk #1: SQL Injection on Payment Page

  • Vulnerability: Found in pentest, CVSS 9.1

  • Threat: Automated bots constantly scanning

  • Likelihood: High (public exploits exist)

  • Impact: Severe (lose all card data)

  • Qualitative: CRITICAL

  • Quantitative:

    • SLE = €3.5M × 0.8 (not all data compromised) = €2.8M

    • ARO = 0.3 (once every 3 years given automation)

    • ALE = €2.8M × 0.3 = €840,000/year

Risk Response Decision:

  • Cost to fix SQLi: €10,000 (developer time)

  • Cost to implement WAF: €20,000/year

  • Total: €30k to avoid €840k = OBVIOUS YES

Risk #2: Physical Theft of Office Laptops

  • Vulnerability: No full disk encryption

  • Threat: Burglary (office in high-crime area)

  • Likelihood: Medium (burglaries reported monthly in area)

  • Impact: Moderate (some customer data on laptops, but not full DB)

  • Qualitative: HIGH

  • Quantitative:

    • SLE = €100,000 (GDPR fine for unencrypted devices) + €5,000 (laptop value) = €105k

    • ARO = 0.2 (once every 5 years)

    • ALE = €105k × 0.2 = €21,000/year

Risk Response Decision:

  • Cost to implement BitLocker/FileVault: €0 (built-in OS feature)

  • Time to deploy: 2 hours × 50 devices = 100 hours = €5,000

  • Total: €5k one-time to avoid €21k/year = OBVIOUS YES

Risk #3: CEO Email Compromise

  • Vulnerability: CEO doesn't use MFA, predictable password pattern

  • Threat: BEC (Business Email Compromise) attackers

  • Likelihood: Medium (BEC is common)

  • Impact: Major (can approve fraudulent wire transfers)

  • Qualitative: HIGH

  • Quantitative:

    • SLE = €200,000 (average BEC loss)

    • ARO = 0.1 (BEC attempts are common, but success rate low)

    • ALE = €200k × 0.1 = €20,000/year

Risk Response Decision:

  • Cost to implement MFA: €10/user/month × 12 months = €6,000/year

  • Training cost: €2,000

  • Total: €8k to avoid €20k = YES

The Four Risk Response Strategies

Understanding these is crucial because not all risks should be "fixed":

1. MITIGATE (Reduce) Implement controls to reduce likelihood or impact

Examples:

  • Install firewall (reduce likelihood of network intrusion)

  • Implement backups (reduce impact of ransomware)

  • Deploy MFA (reduce likelihood of account compromise)

Cost vs. Benefit:

  • Control cost < ALE = Good investment

  • Control cost > ALE = Consider other options

2. TRANSFER (Share) Shift the financial burden to another party

Examples:

  • Cyber Insurance: Pay €50k/year premium to cover potential €5M breach

  • Cloud Provider: AWS responsible for physical security, power, network

  • Outsourced SOC: MSSP responsible for 24/7 monitoring

Important: Transfer of risk ≠ Transfer of liability

  • You still have legal obligations (GDPR, PCI-DSS)

  • Your customers still blame you if your cloud provider fails

  • Insurance doesn't prevent the breach, only pays for cleanup

3. ACCEPT Consciously decide to live with the risk

When to accept:

  • Risk level is Low

  • Cost of mitigation > potential loss

  • Risk is unavoidable (meteor strike)

Critical rules:

  • Must be documented - "We accept risk of [X] because [Y]"

  • Must be approved - By appropriate authority level (CISO, Board)

  • Must be re-assessed - Regularly, as threats change

Example:

  • Risk: Old WordPress blog gets defaced

  • Impact: Low (not main site, no customer data)

  • Cost to maintain/update: €10k/year

  • Decision: Accept the risk, shut it down if defaced

4. AVOID Stop doing the activity that causes risk

Examples:

  • Don't store credit card data → use payment processor (Stripe, PayPal)

  • Don't collect personal data if not needed → avoid GDPR obligations

  • Shut down vulnerable legacy system → eliminate attack surface

Best example:

  • Old application with unfixable vulnerabilities

  • Cost to secure > value it provides

  • Solution: Decommission it - risk goes to zero

Third-Party Risk Management (TPRM)

Modern companies don't operate in isolation. Your security is only as strong as your weakest vendor.

The Supply Chain Problem:

Real-world disaster: Target Breach (2013)

  • Target (retailer) had good security

  • HVAC vendor (Fazio Mechanical) had weak security

  • Attackers compromised HVAC vendor

  • Used vendor access to Target's network

  • Stole 40 million credit cards

  • Cost: $290 million to Target

Key lesson: Your vendors' security problems become your security problems.

TPRM Process

Phase 1: Vendor Assessment (Before signing contract)

Send security questionnaire covering:

  • Do you have ISO 27001 or SOC 2 certification?

  • Do you encrypt data at rest and in transit?

  • Do you perform penetration testing?

  • What's your incident response plan?

  • What data of ours will you have access to?

  • Where is data stored (which countries)?

  • Do you have cyber insurance?

Risk rating:

  • Critical vendors: Have access to crown jewels (payment processor, cloud provider)

  • High vendors: Have sensitive data access

  • Medium vendors: Limited data access

  • Low vendors: No data access (e.g., office coffee supplier)

Phase 2: Contractual Requirements

Security clauses to include:

  • Right to audit their security

  • Breach notification within 24-72 hours

  • Compliance with applicable regulations (GDPR, PCI-DSS)

  • Data deletion after contract ends

  • Minimum security controls (encryption, MFA, etc.)

  • Liability terms

Phase 3: Continuous Monitoring

Don't just assess once and forget:

  • Annual security reassessment

  • Monitor for breaches (use services like SecurityScorecard, BitSight)

  • Review their SOC 2 reports

  • Track their security posture over time

Phase 4: Incident Response Planning

Have a plan for when (not if) a vendor is breached:

  • Who do they contact immediately?

  • What data might be compromised?

  • What's our response plan?

  • How do we contain the damage?

The Risk Management Framework (RMF)

For large organizations and government, NIST provides a formal process: NIST SP 800-37 Risk Management Framework

Step 1: PREPARE

  • Assign roles (System Owner, ISSO, Authorizing Official)

  • Define organizational risk tolerance

  • Establish risk management strategy

Step 2: CATEGORIZE Using FIPS 199, categorize system impact:

Each dimension rated Low, Moderate, or High:

  • Low: Limited adverse effect

  • Moderate: Serious adverse effect

  • High: Severe or catastrophic adverse effect

Example: E-commerce Website

  • Confidentiality: HIGH (customer payment data)

  • Integrity: HIGH (orders must be accurate)

  • Availability: MODERATE (short outage acceptable)

  • System Categorization: HIGH

Example: Public Marketing Website

  • Confidentiality: LOW (all info public)

  • Integrity: MODERATE (defacement is embarrassing)

  • Availability: LOW (not critical)

  • System Categorization: LOW

Step 3: SELECT Controls

Based on categorization, select baseline from NIST SP 800-53 (1000+ controls):

  • LOW system: ~130 controls

  • MODERATE system: ~240 controls

  • HIGH system: ~350 controls

Example controls:

  • AC-2: Account Management

  • IA-5: Authenticator Management

  • SC-7: Boundary Protection

  • SI-4: System Monitoring

Step 4: IMPLEMENT Actually deploy the controls:

  • Configure firewalls (SC-7)

  • Set up MFA (IA-5)

  • Deploy SIEM (SI-4)

  • Document everything

Step 5: ASSESS Independent assessment team tests:

  • Are controls implemented correctly?

  • Are they effective?

  • Are there weaknesses?

Creates Security Assessment Report (SAR) with:

  • Pass/Fail for each control

  • Identified weaknesses

  • Recommendations

Step 6: AUTHORIZE

Authorizing Official (AO) - usually very senior (CIO, CISO, or higher):

  1. Reviews all documentation

  2. Reviews assessment results

  3. Understands residual risks

  4. Makes risk decision

Two possible outcomes:

  • Authority to Operate (ATO): "I accept the residual risk, system approved for 3 years"

  • Denial: "Risks too high, fix critical issues first"

This is a formal, documented, signed decision

Step 7: MONITOR Continuous monitoring:

  • Vulnerability scanning

  • Patch management

  • Configuration monitoring

  • Incident tracking

  • Annual re-assessment

If significant changes occur (new features, new threats), cycle back to Step 2

Compliance - Legal and Regulatory Landscape

The Compliance Ecosystem

Understanding the Difference: Laws vs Standards vs Frameworks

Laws/Regulations = Mandatory, backed by government

  • GDPR, NIS2, DORA

  • Criminal or financial penalties for violation

  • Apply to specific entities/sectors

Standards = Can be mandatory or voluntary

  • PCI-DSS (mandatory if you process cards)

  • ISO 27001 (voluntary, but often required by customers)

  • Certification possible

Frameworks = Voluntary guidance

  • NIST CSF, COBIT, ITIL

  • No penalties for not using

  • Organizations choose to adopt

GDPR - General Data Protection Regulation

What Makes GDPR So Powerful

Jurisdiction:

  • Protects all EU citizens/residents

  • Applies to ANY company worldwide processing EU data

  • Extraterritorial reach - US company with EU customers must comply

Enforcement:

  • €20 million OR 4% global annual revenue (whichever is higher)

  • Per violation, can be cumulative

Key Concepts and Terminology

Personal Data ANY information relating to an identified or identifiable person:

  • Obvious: Name, address, email, phone, ID numbers

  • Less obvious: IP address, cookie ID, location data, biometric data, online identifiers

  • Special categories (extra protection): Health, genetics, race, religion, political views, sexual orientation

Data Subject The individual person whose data you have

  • Your customer, employee, website visitor

Data Controller Determines the PURPOSE and MEANS of processing

  • "Why are we collecting data?"

  • "How will we use it?"

  • Example: E-commerce company collecting customer orders

Data Processor Processes data on behalf of controller

  • Cloud hosting provider (AWS, Azure)

  • Email marketing service (Mailchimp)

  • Payment processor (Stripe)

Important: Processor can still be fined for GDPR violations!

Data Protection Officer (DPO) Required if:

  • Public authority

  • Large-scale monitoring

  • Special categories of data processing

Must be independent, expert, properly resourced

GDPR Principles

1. Lawfulness, Fairness, Transparency

  • Must have legal basis for processing (consent, contract, legitimate interest, etc.)

  • Must be transparent about what you do with data

2. Purpose Limitation

  • Can only use data for stated purpose

  • Can't collect for one reason, then use for another

  • Example: Collect email for order confirmation → Can't use for marketing without separate consent

3. Data Minimization

  • Collect only what you NEED

  • Bad: "Enter your name, address, phone, date of birth, mother's maiden name" for a newsletter signup

  • Good: "Enter your email" for newsletter

4. Accuracy

  • Data must be accurate and up to date

  • Must provide way to correct errors

5. Storage Limitation

  • Don't keep data longer than necessary

  • Must define retention periods

  • Must delete after period expires

6. Integrity and Confidentiality

  • THIS IS WHERE CYBERSECURITY COMES IN

  • Protect data from unauthorized access, loss, destruction

  • Encryption, access controls, backups

7. Accountability

  • Controller must demonstrate compliance

  • Documentation is key

GDPR Article 32 - Security of Processing

This is the technical security article:

Required measures include:

  • Pseudonymization and encryption

  • Ability to ensure confidentiality, integrity, availability, resilience

  • Ability to restore availability after incident

  • Regular testing and assessment

Important: Not prescriptive - "appropriate to the risk"

  • Small blog: Basic security

  • Healthcare database: Strongest security

Your role as security professional:

  • Implement encryption (at rest: disk encryption; in transit: TLS)

  • Design resilient systems (high availability, backups)

  • Test systems (pentesting, DR drills)

  • Maintain logs for breach detection

Data Subject Rights

1. Right to be Informed

  • Privacy policy must explain everything

2. Right of Access

  • Subject can request copy of all their data

  • Must respond within 30 days

3. Right to Rectification

  • Fix wrong data

4. Right to Erasure ("Right to be Forgotten")

  • Delete data under certain conditions

  • Technical challenge: How do you delete from backups?

5. Right to Restrict Processing

  • "Stop using my data but don't delete it"

6. Right to Data Portability

  • Provide data in machine-readable format

  • Transfer to another controller

7. Right to Object

  • Object to processing (e.g., marketing)

8. Rights Related to Automated Decision Making

  • Protection against pure AI decisions

Data Breach Notification Requirements

72-Hour Rule: If breach likely to result in risk to rights and freedoms:

  • Notify supervisory authority within 72 hours of becoming aware

  • If later than 72 hours, must explain delay

Breach notification must include:

  • Nature of breach (what happened?)

  • Categories and number of affected individuals

  • Contact point (DPO)

  • Likely consequences

  • Measures taken/proposed

Individual Notification: If breach likely to result in high risk to individuals:

  • Must notify affected individuals without undue delay

  • Clear, plain language

  • Direct communication (email)

Penalties for late/missing notification:

  • Separate fine on top of breach fine

  • Can make total penalty worse

Real-World GDPR Penalties

Meta (Facebook) - €1.2 billion (2023)

  • Violation: Transferred EU data to US without proper safeguards

  • Lesson: International data transfers are risky

Amazon - €746 million (2021)

  • Violation: Improper processing of personal data

  • Lesson: Even tech giants aren't immune

Google - €90 million (2020)

  • Violation: Cookies without proper consent

  • Lesson: Cookie banners must be compliant

British Airways - €22 million (2020)

  • Violation: Data breach affecting 400,000 customers

  • Originally €204 million, reduced due to COVID impact

  • Lesson: Poor security = massive fines

Marriott - €18.4 million (2020)

  • Violation: Breach of Starwood guest database (500M records)

  • Lesson: Acquiring companies inherits data protection obligations

GDPR Compliance Checklist

Data Mapping:

Legal Basis:

Technical Security:

Processes:

Documentation:

PCI-DSS - Payment Card Industry Data Security Standard

What Makes PCI-DSS Different from GDPR

PCI-DSS is:

  • Industry standard, not law

  • Enforced through contracts with card brands

  • Extremely prescriptive (tells you exactly what to do)

  • Focused on ONE thing: protecting card data

GDPR is:

  • Law with criminal penalties

  • Principles-based (tells you goals, not always methods)

  • Covers all personal data

Both can apply: Credit card data is also personal data under GDPR!

Who Must Comply

Anyone who:

  • Accepts card payments

  • Processes card payments

  • Stores card data

  • Transmits card data

Merchant Levels (based on transaction volume):

  • Level 1: 6M+ transactions/year → Full audit required

  • Level 2: 1-6M transactions/year → Annual self-assessment

  • Level 3: 20k-1M e-commerce transactions/year → Self-assessment

  • Level 4: <20k e-commerce OR <1M total → Self-assessment

Key Terminology

Cardholder Data (CHD):

  • Primary Account Number (PAN) - the card number (16 digits)

  • Cardholder name

  • Expiration date

  • Service code

Sensitive Authentication Data (SAD): NEVER ALLOWED TO STORE AFTER AUTHORIZATION:

  • Full magnetic stripe data

  • CVV/CVC (3-4 digit code on back)

  • PIN

Cardholder Data Environment (CDE): The network segment where CHD is stored, processed, or transmitted

  • Must be isolated from rest of network

  • All PCI-DSS requirements apply here

Scope: What systems are in-scope for PCI-DSS?

  • Systems that store/process/transmit CHD

  • Systems that can impact security of CDE

  • Example: Firewall protecting CDE is in-scope

The 12 Requirements (6 Goals)

Requirement 3: Protect Stored Cardholder Data

3.1: Keep CHD storage to minimum

  • Don't store if you don't need to

  • Best practice: Don't store at all, use tokenization

3.2: Don't store SAD after authorization

  • NEVER store CVV, magnetic stripe, PIN

  • One violation = instant loss of ability to process cards

3.3: Mask PAN when displayed

  • Show only last 4 digits: ************1234

  • Full PAN only for business need

3.4: Render PAN unreadable anywhere stored Options:

  • Strong cryptography (AES-256)

  • One-way hash (SHA-256 + salt)

  • Truncation (keep last 4 digits only)

  • Tokenization (replace PAN with random token)

As security professional: Your job is to scan for stored PANs:

  • Search database for 16-digit numbers

  • Search log files for card numbers

  • Search backup tapes

  • Use regex: \b[0-9]{13,16}\b

  • If found in plaintext → critical finding

Requirement 4: Encrypt Transmission

All card data transmitted over public networks must be encrypted

Public networks:

  • Internet

  • Wireless networks

  • Cellular networks

  • Not just "outside your building" - includes wireless inside

Technical requirements:

  • TLS 1.2 or higher (TLS 1.0/1.1 deprecated)

  • Strong cipher suites only

  • Valid certificates from trusted CA

  • No self-signed certs for production

Common violations:

  • HTTP instead of HTTPS for payment forms

  • Emailing card numbers (email is plaintext)

  • Saving card data in Slack/Teams messages

  • Storing in cloud storage without encryption

Requirement 6: Secure Systems and Applications

6.3: Develop secure software

  • Security testing during development

  • Code review for vulnerabilities

  • Follow OWASP Top 10

6.5: Address common vulnerabilities

  • SQL injection

  • XSS (Cross-Site Scripting)

  • CSRF

  • Buffer overflows

  • This is where your red team knowledge applies!

6.6: Web application protection Two options:

  • Application layer firewall (WAF) before web app

  • Manual/automated vulnerability assessment at least annually

Requirement 8: Identify and Authenticate Access

8.3: Secure remote access

  • MFA required for all remote access to CDE

  • No exceptions

  • Includes VPN, admin access, etc.

8.4: MFA for all users

  • PCI-DSS v4.0 (current): MFA required for ALL access to CDE

  • Not just remote, includes local access

8.5: Multi-factor authentication

  • Something you know (password)

  • Something you have (token, phone)

  • Something you are (biometric)

Requirement 10: Log and Monitor

10.2: Audit trails for all access Must log:

  • User access to CHD

  • Actions by privileged users

  • Access to audit logs

  • Invalid access attempts

  • System changes

10.4: Log retention

  • Minimum 90 days readily available

  • Minimum 12 months total retention

10.7: Detect failures

  • Automated alerts for security failures

  • Example: IDS alerts, WAF blocks

Requirement 11: Test Security

11.3: External and internal penetration testing

  • Annually and after significant changes

  • By qualified internal staff or third party

  • Must test CDE and segmentation controls

11.4: Intrusion detection/prevention

  • Deploy IDS/IPS to monitor traffic

  • Alert on suspected compromise

11.5: Change detection

  • File integrity monitoring (FIM) on critical files

  • Alert on unauthorized modifications

PCI-DSS Compliance Process

Self-Assessment Questionnaire (SAQ): For smaller merchants, different SAQs based on environment:

  • SAQ A: Card-not-present, outsourced processing (easiest)

  • SAQ B: Imprint machines or standalone terminals

  • SAQ C: Payment apps connected to internet

  • SAQ D: All other merchants and service providers (most comprehensive)

Attestation of Compliance (AoC): Formal document stating you're compliant

  • Signed by executive

  • Submitted to acquirer/card brand

  • Valid for 1 year

Quarterly Network Scans: By PCI Approved Scanning Vendor (ASV)

  • External vulnerability scans

  • No high/critical vulnerabilities

  • Must pass 4 consecutive quarters

Penalties for Non-Compliance

Card Brand Fines:

  • €5,000 - €100,000 per month

  • Escalate if not remediated

Worst penalty:

  • Loss of ability to accept cards

  • Business-ending for many companies

Additional costs if breached:

  • Reissuing cards: €3-5 per card

  • Forensic investigation: €100k+

  • Brand reputation damage

  • Lawsuits

NIS2 Directive - Network and Information Security

What is NIS2?

Full name: Directive (EU) 2022/2555 on measures for a high common level of cybersecurity across the Union

Purpose:

  • Strengthen cybersecurity requirements across EU

  • Replace original NIS Directive (2016)

  • Harmonize security standards across member states

Key dates:

  • Adopted: December 2022

  • Member states must implement: October 2024

  • Companies must comply: By October 2024

Why NIS2 Matters

Broader scope than GDPR:

  • GDPR: Focuses on personal data

  • NIS2: Focuses on critical infrastructure and services

  • Many companies subject to both

Sector-based approach: Essential and important sectors must comply

Who Must Comply with NIS2?

Size criteria:

  • Medium enterprises: 50-249 employees OR €10-50M turnover

  • Large enterprises: 250+ employees OR €50M+ turnover

  • Some small entities if critical

NIS2 Key Requirements

1. Risk Management Measures

Organizations must implement:

  • Risk analysis and security policies

  • Incident handling procedures

  • Business continuity (backup, DR)

  • Supply chain security (vendor assessment)

  • Security in acquisition and development

  • Vulnerability handling and disclosure

  • Encryption and cryptography

  • Personnel security (training, access control)

  • MFA and secure communication

  • Network security (firewalls, segmentation)

2. Incident Reporting

Must report significant incidents:

  • Early warning: Within 24 hours (initial notification)

  • Incident notification: Within 72 hours (detailed)

  • Final report: Within 1 month

What's a significant incident?

  • Has caused or can cause severe operational disruption

  • Has affected or can affect other EU states

  • Has caused or can cause material losses

3. Management Responsibility

Critical change from NIS1:

  • Management bodies are directly liable

  • Board members can be personally sanctioned

  • Must approve cybersecurity measures

  • Must oversee implementation

  • Must attend cybersecurity training

4. Supply Chain Security

Must assess cybersecurity of suppliers:

  • Due diligence before contracts

  • Security requirements in contracts

  • Regular assessment of supplier risks

  • Especially for ICT services

NIS2 Penalties

Maximum fines:

  • Essential entities: Up to €10M or 2% global annual turnover

  • Important entities: Up to €7M or 1.4% global annual turnover

Personal liability:

  • Management can be temporarily barred from positions

  • Criminal sanctions possible in some member states

Differences: NIS2 vs GDPR

Aspect
GDPR
NIS2

Focus

Personal data protection

Critical infrastructure/services

Scope

Anyone processing personal data

Specific sectors

Penalty

Up to €20M or 4%

Up to €10M or 2%

Reporting

72 hours for data breaches

24-72 hours for incidents

Management

DPO recommended

Board directly responsible

Many companies must comply with BOTH

Practical Example: Energy Company

Company: Electricity distribution company (Essential sector under NIS2)

Must comply with:

  • GDPR: For customer billing data

  • NIS2: For grid operations and cybersecurity

Incident scenarios:

Scenario 1: Customer data breach

  • 10,000 customer records stolen

  • GDPR: Report to DPA within 72 hours, notify customers

  • NIS2: May not be reportable if doesn't affect operations

Scenario 2: Ransomware on control systems

  • Grid monitoring systems encrypted

  • Potential power outage

  • GDPR: Report if personal data compromised

  • NIS2: MUST report within 24 hours (critical infrastructure)

Scenario 3: Supplier compromise

  • SCADA system vendor breached

  • Vendor has access to grid control systems

  • GDPR: Report if customer data affected

  • NIS2: MUST report, supplier risk is in scope

DORA - Digital Operational Resilience Act

What is DORA?

Full name: Regulation (EU) 2022/2554 on digital operational resilience for the financial sector

Purpose:

  • Strengthen ICT security in financial sector

  • Harmonize requirements across EU

  • Address cyber risks specifically for finance

Key dates:

  • Adopted: December 2022

  • Applies from: January 17, 2025

  • Direct regulation (no national implementation needed)

Why DORA Was Created

Problem identified: Financial sector heavily dependent on ICT:

  • Banks

  • Payment institutions

  • Investment firms

  • Insurance companies

  • Crypto-asset service providers

But:

  • Different rules in different EU countries

  • Third-party ICT providers not regulated

  • Operational resilience not standardized

Solution: DORA creates unified ICT risk framework

Who Must Comply with DORA?

Important: Even non-financial companies must comply if they provide critical ICT services to financial sector

DORA Five Pillars

1. ICT Risk Management

Must establish comprehensive ICT risk management framework:

  • Identification and assessment of ICT risks

  • Protection and prevention measures

  • Detection mechanisms

  • Response and recovery capabilities

  • Learning and evolving capabilities

  • Communication plans

Sound familiar? This maps to NIST CSF functions:

  • Identify, Protect, Detect, Respond, Recover

2. Incident Reporting

Tiered reporting system:

Major Incident (within 24 hours):

  • Initial notification to supervisor

  • High impact on operations

Significant Incident (within 72 hours):

  • Intermediate report with analysis

  • Root cause investigation

Final Report (within 1 month):

  • Complete post-incident analysis

  • Lessons learned

  • Preventive measures

3. Digital Operational Resilience Testing

Annual testing program must include:

  • Vulnerability assessments

  • Network security assessments

  • Physical security testing

  • Gap analyses

  • Software reviews

  • Open-source analysis

  • Penetration testing

  • Threat-Led Penetration Testing (TLPT)

TLPT - Advanced testing:

  • Required for largest financial entities

  • Simulates real-world attack scenarios

  • Red team exercises

  • Tests detection AND response capabilities

  • Must be done by certified testers

  • Minimum every 3 years

This is where your red team skills become valuable!

4. ICT Third-Party Risk Management

Critical focus of DORA: Banks don't run their own data centers anymore

  • Cloud providers (AWS, Azure, Google Cloud)

  • Payment processors

  • Core banking software vendors

  • Custody services

Requirements:

  • Pre-contractual risk assessment

  • Contractual arrangements with security clauses

  • Exit strategies - can switch providers if needed

  • Monitoring and testing of third parties

  • Register of third-party arrangements

Critical third-party providers: Designated by regulators, subject to:

  • Direct oversight

  • Regular audits

  • Strict security requirements

5. Information Sharing

Encourage sharing of cyber threat intelligence:

  • Between financial entities

  • With authorities

  • To improve collective defense

Protected information sharing:

  • Legal protections for sharing IOCs

  • No liability for sharing in good faith

DORA vs Other Regulations

Aspect
GDPR
NIS2
DORA

Sector

All

Critical infrastructure

Financial only

Focus

Data protection

Infrastructure security

Operational resilience

Testing

Not specified

Risk-based

Mandatory TLPT

Third parties

Processors

Supply chain

Critical ICT providers

Penalties

Up to €20M/4%

Up to €10M/2%

Up to €10M/2%**

**DORA penalties can be higher for serious breaches

Practical Example: Bank Compliance

Bank: Mid-sized EU bank, 500k customers

Must comply with:

  • GDPR: Customer personal data

  • NIS2: As essential entity (banking sector)

  • DORA: As financial entity

  • PCI-DSS: For payment cards

  • National banking regulations

Overlapping requirements:

Incident Response:

  • GDPR: 72-hour breach notification (if personal data)

  • NIS2: 24-72 hour incident notification (if operational disruption)

  • DORA: Tiered reporting (24h/72h/30d) for ICT incidents

Solution: Single incident response process that meets all three

Third-Party Management:

  • NIS2: Supply chain security

  • DORA: ICT third-party risk management

  • GDPR: Processor agreements

Solution: Comprehensive vendor assessment program

Testing:

  • DORA: Annual testing, TLPT every 3 years

  • PCI-DSS: Annual pentest, quarterly scans

  • Best practice: Integrated testing schedule

ISO 27001 - Information Security Management

What is ISO 27001?

Full name: ISO/IEC 27001:2022 - Information security management systems (ISMS)

Type: International standard (not law)

Purpose:

  • Establish, implement, maintain information security management system

  • Certification available

Why Organizations Choose ISO 27001

Not legally required, but:

  • Often required by customers (B2B contracts)

  • Required for government tenders

  • Insurance discounts

  • Demonstrates security maturity

  • Provides structure for security program

The ISMS Approach

ISMS = Information Security Management System

Not just technical controls, but complete management system:

  • Policies and procedures

  • Risk management

  • Continuous improvement

  • Management responsibility

Based on PDCA cycle:

ISO 27001 Structure

Clauses 1-3: Introduction, scope, terms Clauses 4-10: Requirements (mandatory for certification) Annex A: 93 control objectives (select based on risk)

The 93 Controls (Annex A)

Organized into 4 themes:

Organizational Controls (37 controls)

  • Policies

  • Information security roles

  • Supplier relationships

  • Information security management

People Controls (8 controls)

  • Screening

  • Terms and conditions of employment

  • Information security awareness

  • Disciplinary process

Physical Controls (14 controls)

  • Physical security perimeter

  • Entry controls

  • Securing offices and facilities

  • Equipment security

Technological Controls (34 controls)

  • User access management

  • Access rights

  • Information backup

  • Logging and monitoring

  • Cryptography

  • Secure development

  • Vulnerability management

ISO 27001 Certification Process

Stage 1: Documentation Review Auditor reviews:

  • ISMS documentation

  • Risk assessment

  • Statement of Applicability (SoA)

  • Policies and procedures

Stage 2: Implementation Audit Auditor verifies:

  • Controls actually implemented

  • Controls operating effectively

  • Evidence collected

Certification:

  • Valid for 3 years

  • Annual surveillance audits

  • Recertification after 3 years

Cost:

  • Small organization: €10k-30k

  • Large organization: €50k-150k+

  • Annual maintenance: €5k-20k

ISO 27001 vs NIST CSF

Both are security frameworks, but different approaches:

Aspect
ISO 27001
NIST CSF

Type

Certifiable standard

Voluntary framework

Origin

International (ISO)

US (NIST)

Approach

Process-focused (ISMS)

Outcome-focused (functions)

Certification

Yes, by accredited bodies

No

Cost

High (audit costs)

Free to use

Flexibility

Prescriptive process

Highly flexible

Best for

Demonstrating compliance

Building security program

Many organizations use both:

  • CSF for program structure

  • ISO 27001 for certification/proof

SOC 2 - Service Organization Control

What is SOC 2?

Origin: AICPA (American Institute of CPAs) Type: Audit framework for service providers Purpose: Demonstrate security to customers

Who Needs SOC 2?

Service providers, especially:

  • SaaS companies

  • Cloud providers

  • Data centers

  • Managed service providers

Why? Customers ask: "How do we know you're secure?"

  • Can't audit every vendor yourself

  • Independent third-party audit provides assurance

SOC 2 Trust Service Criteria

Based on 5 criteria:

1. Security (Required) Protection against unauthorized access

2. Availability (Optional) System available for operation and use

3. Processing Integrity (Optional) System processing is complete, valid, accurate

4. Confidentiality (Optional) Information designated confidential is protected

5. Privacy (Optional) Personal information collected, used, retained, disclosed properly

SOC 2 Types

Type I:

  • Point-in-time assessment

  • "Controls are designed appropriately"

  • Faster, cheaper

  • Less valuable

Type II:

  • Assessment over period (6-12 months)

  • "Controls operated effectively over time"

  • More rigorous

  • Preferred by customers

SOC 2 Report Structure

Section 1: Management's description of system Section 2: Auditor's opinion Section 3: Details of tests performed Section 4: Any exceptions/issues found

Important:

  • Reports are confidential

  • Shared under NDA with customers

  • Not public (unlike ISO 27001 certificate)

Other Important Standards and Regulations

HIPAA (Health Insurance Portability and Accountability Act)

Jurisdiction: United States Sector: Healthcare Protects: Protected Health Information (PHI)

Key requirements:

  • Administrative safeguards (policies, training)

  • Physical safeguards (facility access)

  • Technical safeguards (encryption, access control)

  • Breach notification (60 days)

Penalties:

  • Willful neglect: Up to $1.5M per violation

  • Criminal charges possible

Relevance for EU companies: If you provide services to US healthcare, HIPAA applies

CCPA/CPRA (California Privacy Laws)

Jurisdiction: California, US Type: State privacy law (like GDPR for California) Protects: California residents

Key rights:

  • Right to know what data collected

  • Right to deletion

  • Right to opt-out of sale

  • Right to non-discrimination

Relevance: If you have California customers, CCPA applies (extraterritorial like GDPR)

TISAX (Trusted Information Security Assessment Exchange)

Sector: Automotive industry Origin: Germany (VDA - German Association of Automotive Industry) Purpose: Information security assessment for suppliers

Why it exists:

  • Automotive supply chain is complex

  • Car manufacturers demand security from suppliers

  • Common assessment standard prevents duplicate audits

Based on: ISO 27001 + industry-specific requirements

Levels:

  • AL1: Low protection needs

  • AL2: Normal protection needs

  • AL3: High protection needs (prototypes, sensitive designs)

Compliance Mapping and Integration

The Challenge: Multiple Compliance Frameworks

Modern companies face multiple requirements:

Example: EU FinTech Company

  • GDPR (personal data)

  • PCI-DSS (payment cards)

  • NIS2 (financial critical infrastructure)

  • DORA (financial digital resilience)

  • ISO 27001 (customer requirement)

  • SOC 2 (US customers)

Nightmare scenario: Treat each separately

  • 6 separate programs

  • Duplicate effort

  • Conflicting requirements

  • Unsustainable

The Solution: Unified Compliance Mapping

Map controls across frameworks:

Example: Multi-Factor Authentication

Framework
Requirement

NIST CSF

PR.AC-07: Users are authenticated

PCI-DSS

Req 8.3: MFA for all remote access

ISO 27001

A.9.4.2: Access control to systems

GDPR

Art 32: Appropriate security measures

NIS2

Art 21: MFA implementation

DORA

Art 9: Strong authentication

Single implementation satisfies multiple requirements

Creating a Unified Control Framework

Practical Unified Compliance Example

Control: Encryption of Sensitive Data

Mapped to:

  • GDPR Article 32: Pseudonymization and encryption

  • PCI-DSS Req 3.4: Render PAN unreadable

  • NIS2 Article 21: Encryption and cryptography

  • DORA Article 9: Protection of data at rest and in transit

  • ISO 27001 A.8.24: Use of cryptography

  • SOC 2 CC6.7: Encryption in transit and at rest

Single policy: "All sensitive data must be encrypted using industry-standard algorithms (AES-256 for data at rest, TLS 1.2+ for data in transit)"

Single implementation:

  • Database encryption: Satisfies all frameworks

  • TLS on all web servers: Satisfies all frameworks

Single audit:

  • Verify encryption is enabled

  • Evidence used for all compliance reports

Benefits:

  • 80% less duplicate work

  • Consistent security posture

  • Easier to maintain

  • Lower audit costs

Frameworks in Action

Building a Security Program: The Practical Approach

Let's walk through building a security program for a realistic company.

Company Profile:

  • Name: "SecurePay Solutions"

  • Type: Payment processing company

  • Size: 150 employees

  • Revenue: €50M

  • Customers: EU and US merchants

  • Location: Poland (EU)

Step 1: Identify Applicable Requirements

Mandatory:

  • GDPR: Processing customer personal data

  • PCI-DSS: Processing payment card data

  • NIS2: Payment services = essential sector

  • Polish national banking regulations

Customer-driven:

  • ISO 27001: Required by enterprise customers

  • SOC 2 Type II: Required by US customers

Framework for structure:

  • NIST CSF: Internally for organizing security program

Step 2: Governance Structure

Establish roles:

CISO responsibilities:

  • Overall security strategy

  • Risk management

  • Compliance oversight

  • Security budget

  • Report to Board quarterly

DPO (separate from CISO for independence):

  • GDPR compliance

  • Privacy impact assessments

  • Data subject requests

  • Regulatory liaison

Security Governance Committee:

  • Meets monthly

  • Reviews and approves policies

  • Prioritizes security projects

  • Risk acceptance decisions

Step 3: Risk Assessment

Asset identification:

Asset
Value
Confidentiality
Integrity
Availability

Customer PII database

€20M

HIGH

HIGH

HIGH

Payment card data (encrypted)

€50M

CRITICAL

CRITICAL

CRITICAL

Transaction processing system

€5M/day

MEDIUM

CRITICAL

CRITICAL

Corporate email

€100k

MEDIUM

MEDIUM

MEDIUM

Website

€10k

LOW

MEDIUM

HIGH

Risk assessment results:

Critical Risks:

  1. Payment system breach (PCI-DSS violation, business shutdown)

  2. Ransomware on processing infrastructure (availability impact)

  3. Insider threat with access to card data

High Risks: 4. DDoS attack on website 5. Third-party vendor breach (payment gateway provider) 6. Unpatched vulnerabilities in web applications

Medium Risks: 7. Phishing attacks on employees 8. Physical theft of laptops 9. Insufficient logging/monitoring

Step 4: Policy Hierarchy Development

Top-level policy: Information Security Policy

  • Approved by Board

  • Defines security strategy and principles

  • Updated annually

Supporting policies:

  • Acceptable Use Policy

  • Access Control Policy

  • Data Classification and Protection Policy

  • Incident Response Policy

  • Business Continuity and DR Policy

  • Third-Party Security Policy

Standards:

  • Password Standard (12 chars, complexity, MFA)

  • Encryption Standard (AES-256, TLS 1.2+)

  • Logging Standard (90-day retention, specific events)

  • Patch Management Standard (Critical patches: 72 hours)

Procedures:

  • How to configure MFA in Azure AD

  • How to classify data

  • How to report security incident

  • How to onboard new vendor

Guidelines:

  • Password manager recommendations

  • Secure coding practices

  • Phishing awareness tips

Step 5: Control Implementation (NIST CSF Mapping)

GOVERN:

  • ✓ Security strategy approved by Board

  • ✓ CISO role established with authority and budget

  • ✓ Security Governance Committee operational

  • ✓ Risk management framework implemented

IDENTIFY:

  • ✓ Asset inventory maintained (CMDB)

  • ✓ Data classification scheme implemented

  • ✓ Risk assessment completed annually

  • ✓ Vendor inventory and risk ratings

PROTECT:

  • ✓ Network segmentation (CDE isolated)

  • ✓ Firewall rules (DMZ, internal zones)

  • ✓ MFA on all systems (Azure AD + Duo)

  • ✓ Endpoint protection (CrowdStrike EDR)

  • ✓ Encryption (Database TDE, disk encryption)

  • ✓ Security awareness training (monthly)

  • ✓ Vulnerability management (Tenable)

DETECT:

  • ✓ SIEM deployed (Splunk)

  • ✓ IDS/IPS (Suricata)

  • ✓ File integrity monitoring (Tripwire)

  • ✓ Security monitoring 24/7 (SOC team)

RESPOND:

  • ✓ Incident response plan documented

  • ✓ IR team identified and trained

  • ✓ Tabletop exercises quarterly

  • ✓ Communication templates prepared

RECOVER:

  • ✓ Backup strategy (3-2-1 rule)

  • ✓ DR site established

  • ✓ DR testing twice yearly

  • ✓ RTO: 4 hours for critical systems

  • ✓ RPO: 1 hour

Step 6: Compliance Evidence Collection

GDPR:

  • Records of processing activities ✓

  • Privacy policy ✓

  • Data subject request procedures ✓

  • DPO appointment ✓

  • Breach notification procedure ✓

PCI-DSS:

  • SAQ D completed ✓

  • ASV scans quarterly (all pass) ✓

  • Internal pentest annually ✓

  • Compensating controls documented ✓

NIS2:

  • Risk management framework ✓

  • Incident reporting procedure (24h) ✓

  • Supply chain security assessment ✓

  • Management oversight documented ✓

ISO 27001:

  • ISMS documentation ✓

  • Risk treatment plan ✓

  • Statement of Applicability (SoA) ✓

  • Internal audits completed ✓

  • External certification audit: Passed ✓

Step 7: Continuous Monitoring and Improvement

Monthly metrics:

  • Critical vulnerabilities: 0 (target)

  • Mean time to patch critical: 48 hours (target: 72h)

  • Security incidents: 3 (low severity)

  • MFA adoption: 100%

  • Training completion: 97%

Quarterly review:

  • Security Governance Committee reviews metrics

  • Risk register updated

  • Policy effectiveness reviewed

  • Budget adjustments

Annual:

  • Full risk assessment

  • Policy review and updates

  • Penetration test

  • DR test

  • Management review of ISMS

The Integrated Compliance Dashboard

Single view of compliance status:

Framework
Status
Last Audit
Next Due
Open Findings

GDPR

✓ Compliant

Jun 2024

Jun 2025

0

PCI-DSS

✓ Compliant

Mar 2024

Mar 2025

2 (low)

NIS2

✓ Compliant

Oct 2024

Oct 2025

0

ISO 27001

✓ Certified

Jan 2024

Jan 2025

3 (obs)

SOC 2 Type II

✓ Clean

Apr 2024

Apr 2025

0

Benefits of unified approach:

  • One security program satisfies all

  • Single set of evidence

  • Consistent reporting

  • Lower audit costs

  • Better security outcomes

Bringing It All Together: The Big Picture

The GRC Lifecycle in Practice

Why This Matters for Your Career

As cybersecurity professionals, you might think GRC is "boring" compared to pentesting or incident response. This is wrong thinking.

Reality:

  • Pentesting finds vulnerabilities

  • GRC ensures they get fixed

  • Blue team detects incidents

  • GRC ensures proper response and prevention

  • You discover a critical issue

  • GRC provides authority and budget to address it

Career impact:

  • Entry-level: Technical security roles (pentester, SOC analyst)

  • Mid-level: Senior technical + some GRC (risk assessments, compliance)

  • Senior-level: Security architect, security manager - heavy GRC focus

  • Executive-level: CISO - GRC is 80% of the job

Why? Business leaders understand risk and compliance. They don't always understand technical details.

The Complete Security Professional

Technical skills (what you've learned in red team/blue team):

  • Exploitation techniques

  • Malware analysis

  • Network security

  • Incident response

  • DFIR

GRC skills (what this module teaches):

  • Risk assessment and quantification

  • Policy development

  • Compliance management

  • Security governance

  • Business communication

Combined = powerful professional:

  • You understand what's technically possible (red team)

  • You can detect and respond (blue team)

  • You can quantify risk for business (GRC)

  • You can justify security spending (GRC)

  • You can ensure compliance (GRC)

Common Career Paths

Path 1: Technical → GRC Specialist

  1. Start: SOC Analyst / Pentester

  2. Move: Security Engineer with compliance focus

  3. Move: Compliance Manager / Risk Manager

  4. Senior: Chief Risk Officer / Chief Compliance Officer

Path 2: Technical → Leadership

  1. Start: SOC Analyst / Pentester

  2. Move: Senior Security Engineer

  3. Move: Security Architect (technical + GRC)

  4. Move: Security Manager (people + GRC)

  5. Senior: CISO

Path 3: Specialized Consultant

  1. Start: Technical security role

  2. Develop: GRC expertise (certifications)

  3. Move: Security consultant

  4. Specialize: GDPR consultant, PCI-DSS assessor, ISO 27001 auditor

  5. Senior: Independent consultant / Partner at consulting firm

The Most Important Takeaway

GRC is not separate from security - it IS security at the organizational level.

Every technical control you implement should trace back to:

  • A business need (governance)

  • A risk that was assessed (risk management)

  • A requirement that must be met (compliance)

Without GRC:

  • Security is random and reactive

  • Budget is impossible to justify

  • Controls are inconsistent

  • Incidents are handled poorly

  • The organization is exposed to legal and financial risk

With GRC:

  • Security is strategic and proactive

  • Investments are justified by risk and ROI

  • Controls are consistent and effective

  • Incidents are handled systematically

  • The organization is protected legally and financially

This is why GRC matters.

Last updated