<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[GRC Lab]]></title><description><![CDATA[Be the GRC Practitioner AI can't replace.]]></description><link>https://blog.grclab.com</link><image><url>https://substackcdn.com/image/fetch/$s_!Umlm!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8231fbf2-1e29-4bb1-8777-af10a2f8af05_832x832.png</url><title>GRC Lab</title><link>https://blog.grclab.com</link></image><generator>Substack</generator><lastBuildDate>Mon, 06 Apr 2026 20:24:50 GMT</lastBuildDate><atom:link href="https://blog.grclab.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Lange Advisory GmbH]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[grclab@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[grclab@substack.com]]></itunes:email><itunes:name><![CDATA[Aron Lange]]></itunes:name></itunes:owner><itunes:author><![CDATA[Aron Lange]]></itunes:author><googleplay:owner><![CDATA[grclab@substack.com]]></googleplay:owner><googleplay:email><![CDATA[grclab@substack.com]]></googleplay:email><googleplay:author><![CDATA[Aron Lange]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Major, Minor, or Just an OFI? Test your audit IQ.]]></title><description><![CDATA[You are sitting in a conference room.]]></description><link>https://blog.grclab.com/p/major-minor-or-just-an-ofi-test-your</link><guid isPermaLink="false">https://blog.grclab.com/p/major-minor-or-just-an-ofi-test-your</guid><dc:creator><![CDATA[Aron Lange]]></dc:creator><pubDate>Tue, 03 Mar 2026 21:00:43 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/b3a8ddfd-a2a1-4c8e-a800-e6ac38b0e9aa_1456x1048.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>You are sitting in a conference room. The air is thick with caffeine and nerves. Across from you, the auditor flips through a notebook, clears their throat, and says: &#8220;I&#8217;d like to present my findings.&#8221;</p><p>In that moment, your heart rate spikes. We have been conditioned to see audits as a pass-or-fail exam&#8212;a binary world where you are either a compliant hero or a security villain. But management system auditing under <strong>ISO/IEC 17021-1</strong> is more nuanced than that. It is not a grade; it is a professional mirror. If you want to survive the closing meeting without a panic attack, you need to understand the language they are speaking.</p><div><hr></div><p>This edition of GRC Lab is brought to you by &#8230; <a href="https://www.kertos.io/en/demo-booking-copy?utm_source=affiliate&amp;utm_medium=aron-lange&amp;utm_campaign=aron-lange-2025-en&amp;utm_content=aron-lange-blog">Kertos</a> (Advertisement)</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!hOJv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F324a5245-a16d-41c2-84a4-8abd26ec87fc_1200x628.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!hOJv!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F324a5245-a16d-41c2-84a4-8abd26ec87fc_1200x628.png 424w, https://substackcdn.com/image/fetch/$s_!hOJv!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F324a5245-a16d-41c2-84a4-8abd26ec87fc_1200x628.png 848w, https://substackcdn.com/image/fetch/$s_!hOJv!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F324a5245-a16d-41c2-84a4-8abd26ec87fc_1200x628.png 1272w, https://substackcdn.com/image/fetch/$s_!hOJv!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F324a5245-a16d-41c2-84a4-8abd26ec87fc_1200x628.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!hOJv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F324a5245-a16d-41c2-84a4-8abd26ec87fc_1200x628.png" width="1200" height="628" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/324a5245-a16d-41c2-84a4-8abd26ec87fc_1200x628.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:628,&quot;width&quot;:1200,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:255233,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.grclab.com/i/184520959?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F324a5245-a16d-41c2-84a4-8abd26ec87fc_1200x628.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!hOJv!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F324a5245-a16d-41c2-84a4-8abd26ec87fc_1200x628.png 424w, https://substackcdn.com/image/fetch/$s_!hOJv!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F324a5245-a16d-41c2-84a4-8abd26ec87fc_1200x628.png 848w, https://substackcdn.com/image/fetch/$s_!hOJv!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F324a5245-a16d-41c2-84a4-8abd26ec87fc_1200x628.png 1272w, https://substackcdn.com/image/fetch/$s_!hOJv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F324a5245-a16d-41c2-84a4-8abd26ec87fc_1200x628.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Europes #1 Compliance Platform Kertos, automates your compliance standards, such as ISO 27001, GDPR, SOC 2, or the EU AI Act &#8211; from the initial analysis to the audit and as a sustainable solution far beyond.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.kertos.io/en/demo-booking-copy?utm_source=affiliate&amp;utm_medium=aron-lange&amp;utm_campaign=aron-lange-2025-en&amp;utm_content=aron-lange-blog&quot;,&quot;text&quot;:&quot;Discover Kertos*&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.kertos.io/en/demo-booking-copy?utm_source=affiliate&amp;utm_medium=aron-lange&amp;utm_campaign=aron-lange-2025-en&amp;utm_content=aron-lange-blog"><span>Discover Kertos*</span></a></p><div><hr></div><h2>The Types of Audit Findings</h2><p>In the context of a management system audit, a &#8220;finding&#8221; is not just a random observation. According to the standard, audit findings are used to summarize <strong>conformity</strong> and detail <strong>nonconformity</strong>. These are the data points used to determine if your system is actually doing what it says it is doing.</p><h3>1. Conformity</h3><p>This is the goal. Conformity is the fulfillment of a requirement. It means your processes match the criteria of the standard, they are effectively implemented, and they are capable of achieving your organization&#8217;s stated policy and objectives.</p><h3>2. Nonconformity</h3><p>This is the term that causes the most stress, but its definition is quite clinical. A nonconformity is simply the <strong>&#8220;non-fulfilment of a requirement.&#8221;</strong> It represents a gap between the &#8220;audit criteria&#8221; (the rules) and the &#8220;audit evidence&#8221; (the reality of what is happening). When an auditor records a nonconformity, they must identify the specific requirement that isn&#8217;t being met and provide the objective evidence&#8212;the facts&#8212;that prove the gap exists.</p><h3>3. Opportunities for Improvement (OFI)</h3><p>An OFI is a suggestion where a process is technically meeting the requirement but could be more effective or efficient.</p><p>There is an important &#8220;integrity&#8221; rule here for auditors: an audit finding that is a nonconformity <strong>shall not</strong> be recorded as an opportunity for improvement. This prevents auditors from &#8220;being nice&#8221; and hiding a systemic failure behind a friendly suggestion.</p><h2>Grading the Gaps: Minor vs. Major</h2><p>Not all nonconformities carry the same weight. The distinction isn&#8217;t arbitrary; it depends entirely on a single threshold: does the mistake threaten the &#8220;intended results&#8221; of your management system?</p><h3>The Minor Nonconformity</h3><p>A minor nonconformity is defined as a <strong>&#8220;nonconformity that does not affect the capability of the management system to achieve the intended results.&#8221;</strong></p><p>Think of this as a slip-up. It is usually a single instance or a small, isolated mistake in a process that is otherwise healthy.</p><ul><li><p><strong>Example 1: The Outdated Review.</strong> Your policy says you review your firewall rules every six months. The auditor sees that you did the last three reviews on time, but the most recent one was delayed by two weeks because the admin was on leave. The review happened, but it missed the deadline. This is a non-fulfillment of your rule, but the &#8220;intended result&#8221;&#8212;maintaining secure firewall rules&#8212;is still being met.</p></li><li><p><strong>Example 2: The One-Off Oversight.</strong> You have a fleet of 100 laptops. The auditor samples five and finds that one doesn&#8217;t have the &#8220;Property of [Company]&#8221; sticker required by your asset management policy. However, the laptop is fully encrypted, tracked in your MDM, and has a strong password. The security intent is met; the sticker is an isolated administrative oversight.</p></li></ul><h3>The Major Nonconformity</h3><p>This is a much more serious situation. A major nonconformity is a <strong>&#8220;nonconformity that affects the capability of the management system to achieve the intended results.&#8221;</strong> If you have a Major finding, the auditor is essentially saying your system is broken in a fundamental way.</p><p>Under the standard, a finding is classified as &#8220;Major&#8221; in two primary circumstances:</p><ol><li><p><strong>Significant Doubt:</strong> This occurs when a gap is so large that the auditor can no longer trust your system.</p><ul><li><p><strong>Example:</strong> An auditor asks to see your Risk Assessment&#8212;the foundation of any ISO system. You show them a document from three years ago that hasn&#8217;t been updated to reflect your move to the cloud. Because the foundation is missing or irrelevant, there is &#8220;significant doubt&#8221; that your controls are actually protecting the right things.</p></li></ul></li><li><p><strong>Systemic Failure:</strong> This is when &#8220;a number of minor nonconformities associated with the same requirement or issue&#8221; are found.</p><ul><li><p><strong>Example:</strong> The auditor checks your offboarding process. They find one ex-employee still has email access. Then they find another. Then they find a third. Each one might be a &#8220;minor&#8221; slip-up on its own, but together they prove that your offboarding process is non-existent or ignored. The &#8220;intended result&#8221;&#8212;denying access to former staff&#8212;is not being achieved.</p></li></ul></li></ol><p>Essentially, a Major nonconformity means the auditor cannot recommend you for certification (or maintenance of it) until the root cause is addressed and the fix is verified.</p><h2>What Do You Think? Two Real-World Scenarios</h2><p>To help this sink in, let&#8217;s look at two real-world scenarios.</p><h3>Scenario 1: The Vague Background Check</h3><p>An organization has a clear policy for screening new employees. One requirement is that a criminal records check must be conducted for every candidate. During the audit, the auditor finds that the checks are being done, but there is no written process explaining what happens next. There are no criteria for what kind of record would disqualify someone. For instance, if a candidate has a minor record for speeding, it isn&#8217;t clear if they would still be hired. The HR team says they &#8220;just use their best judgment,&#8221; but nothing is documented.</p><h3>Scenario 2: The MFA Gap</h3><p>A company uses Microsoft 365 for everything&#8212;emails, sensitive spreadsheets, and internal documents. They use Microsoft Entra as their identity provider. Their internal security policy is very specific about password complexity, and the auditor confirms that these rules are strictly enforced. However, you notice that Multi-Factor Authentication (MFA) is not enabled. The organization argues that their passwords are &#8220;complex enough&#8221; and that the standard doesn&#8217;t explicitly name &#8220;MFA&#8221; as a mandatory requirement for their setup.</p><h2>The Verdict</h2><p>Here is how a professional auditor would likely view these cases:</p><h3>Scenario 1: Nonconformity</h3><p>This is a <strong>Nonconformity</strong>. While the organization is performing the check (doing the &#8220;work&#8221;), they have failed the requirement to have a process that produces &#8220;consistent, valid, and comparable results.&#8221; By relying on &#8220;best judgment&#8221; without documented criteria, the screening process is arbitrary. If two different HR managers look at the same criminal record, they might make two different decisions. This lack of a defined process is a clear non-fulfillment of management system requirements.</p><h3>Scenario 2: Opportunity for Improvement (OFI)</h3><p>This is an <strong>Opportunity for Improvement</strong>. While modern security best practices virtually demand MFA, most high-level standards are &#8220;technology neutral.&#8221; If the organization has identified their risks and decided that complex passwords meet their specific security objectives, the auditor cannot immediately issue a nonconformity just because they personally prefer MFA. However, the auditor would record this as an OFI, noting that the &#8220;intended result&#8221; of data protection would be significantly strengthened by adding a second layer of authentication.</p><p>What do you think about these verdicts? Would your team agree, or would the &#8220;best judgment&#8221; argument hold up in your office?</p><div><hr></div><h2><strong>Make yourself irreplaceable, even to AI.</strong></h2><p>Most people think they can &#8220;YouTube&#8221; their way to ISO 27001 certification. They watch 100 videos, read 50 PDFs, and then hit a brick wall the second they try to establish the ISMS in their own company. </p><p>I decided to fix that.</p><p>I&#8217;ve transformed our <strong><a href="https://grclab.com/courses/iso-27001-lead-implementer?utm_source=newsletter&amp;utm_medium=email&amp;utm_campaign=namekurs&amp;utm_term=course">ISO/IEC 27001 Lead Implementer Course</a></strong> into a community-first experience.</p><p>When you join, you&#8217;re not just buying another &#8220;member&#8217;s area&#8221; with a bunch of dusty videos. <strong>You&#8217;re getting me in your corner.</strong></p><div id="youtube2-n0eD7MYT3yM" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;n0eD7MYT3yM&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/n0eD7MYT3yM?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>I&#8217;ve upgraded the entire program so that you have a real partner throughout the process. Stalled on a specific control? Need a second pair of eyes on your documentation before the Stage 1 audit begins? I&#8217;m right there with you.</p><p>Stop playing &#8220;compliance roulette&#8221; with your certification. Work with someone who has been across the finish line hundreds of times and knows exactly where the traps are hidden.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://grclab.com/courses/iso-27001-lead-implementer?utm_source=newsletter&amp;utm_medium=email&amp;utm_campaign=namekurs&amp;utm_term=course&quot;,&quot;text&quot;:&quot;Enroll Today&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://grclab.com/courses/iso-27001-lead-implementer?utm_source=newsletter&amp;utm_medium=email&amp;utm_campaign=namekurs&amp;utm_term=course"><span>Enroll Today</span></a></p><div><hr></div><div class="embedded-publication-wrap" data-attrs="{&quot;id&quot;:6478824,&quot;name&quot;:&quot;GRC Lab&quot;,&quot;logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!Umlm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8231fbf2-1e29-4bb1-8777-af10a2f8af05_832x832.png&quot;,&quot;base_url&quot;:&quot;https://blog.grclab.com&quot;,&quot;hero_text&quot;:&quot;Be the GRC Practitioner AI can't replace.&quot;,&quot;author_name&quot;:&quot;Aron Lange&quot;,&quot;show_subscribe&quot;:true,&quot;logo_bg_color&quot;:&quot;#ffffff&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="EmbeddedPublicationToDOMWithSubscribe"><div class="embedded-publication show-subscribe"><a class="embedded-publication-link-part" native="true" href="https://blog.grclab.com?utm_source=substack&amp;utm_campaign=publication_embed&amp;utm_medium=web"><img class="embedded-publication-logo" src="https://substackcdn.com/image/fetch/$s_!Umlm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8231fbf2-1e29-4bb1-8777-af10a2f8af05_832x832.png" width="56" height="56" style="background-color: rgb(255, 255, 255);"><span class="embedded-publication-name">GRC Lab</span><div class="embedded-publication-hero-text">Be the GRC Practitioner AI can't replace.</div><div class="embedded-publication-author-name">By Aron Lange</div></a><form class="embedded-publication-subscribe" method="GET" action="https://blog.grclab.com/subscribe?"><input type="hidden" name="source" value="publication-embed"><input type="hidden" name="autoSubmit" value="true"><input type="email" class="email-input" name="email" placeholder="Type your email..."><input type="submit" class="button primary" value="Subscribe"></form></div></div><div><hr></div><p><strong>*Affiliate Link:</strong> If you purchase a license through this link, we receive a commission at no additional cost to you.</p>]]></content:encoded></item><item><title><![CDATA[The Hard Truth: Your Certificate ≠ Legal Compliance]]></title><description><![CDATA[Why ISO/IEC 27001 does not prove you are compliant with the law.]]></description><link>https://blog.grclab.com/p/the-hard-truth-your-certificate-legal</link><guid isPermaLink="false">https://blog.grclab.com/p/the-hard-truth-your-certificate-legal</guid><dc:creator><![CDATA[Aron Lange]]></dc:creator><pubDate>Tue, 17 Feb 2026 21:00:24 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/d12a3006-035d-43b8-8d7f-3b912b848837_1456x1048.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>There is a dangerous misunderstanding in the business world. It usually happens during a vendor review. A prospect asks, &#8220;Are you compliant with privacy laws like GDPR or regulations like NIS2?&#8221;</p><p>The response is often a confident, &#8220;Yes, we are ISO 27001 certified.&#8221;</p><p>That answer is misleading.</p><div><hr></div><p>This edition of GRC Lab is brought to you by &#8230; <a href="https://www.kertos.io/en">Kertos</a> (Advertisement)</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!hOJv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F324a5245-a16d-41c2-84a4-8abd26ec87fc_1200x628.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!hOJv!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F324a5245-a16d-41c2-84a4-8abd26ec87fc_1200x628.png 424w, https://substackcdn.com/image/fetch/$s_!hOJv!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F324a5245-a16d-41c2-84a4-8abd26ec87fc_1200x628.png 848w, https://substackcdn.com/image/fetch/$s_!hOJv!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F324a5245-a16d-41c2-84a4-8abd26ec87fc_1200x628.png 1272w, https://substackcdn.com/image/fetch/$s_!hOJv!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F324a5245-a16d-41c2-84a4-8abd26ec87fc_1200x628.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!hOJv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F324a5245-a16d-41c2-84a4-8abd26ec87fc_1200x628.png" width="1200" height="628" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/324a5245-a16d-41c2-84a4-8abd26ec87fc_1200x628.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:628,&quot;width&quot;:1200,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:255233,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.grclab.com/i/184520959?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F324a5245-a16d-41c2-84a4-8abd26ec87fc_1200x628.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!hOJv!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F324a5245-a16d-41c2-84a4-8abd26ec87fc_1200x628.png 424w, https://substackcdn.com/image/fetch/$s_!hOJv!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F324a5245-a16d-41c2-84a4-8abd26ec87fc_1200x628.png 848w, https://substackcdn.com/image/fetch/$s_!hOJv!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F324a5245-a16d-41c2-84a4-8abd26ec87fc_1200x628.png 1272w, https://substackcdn.com/image/fetch/$s_!hOJv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F324a5245-a16d-41c2-84a4-8abd26ec87fc_1200x628.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Europes #1 Compliance Platform Kertos, automates your compliance standards, such as ISO 27001, GDPR, SOC 2, or the EU AI Act &#8211; from the initial analysis to the audit and as a sustainable solution far beyond.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.kertos.io/en/demo-booking-copy?utm_source=affiliate&amp;utm_medium=aron-lange&amp;utm_campaign=aron-lange-2025-en&amp;utm_content=aron-lange-blog&quot;,&quot;text&quot;:&quot;Discover Kertos*&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.kertos.io/en/demo-booking-copy?utm_source=affiliate&amp;utm_medium=aron-lange&amp;utm_campaign=aron-lange-2025-en&amp;utm_content=aron-lange-blog"><span>Discover Kertos*</span></a></p><div><hr></div><p>An ISO 27001 certificate proves exactly one thing: you have a management system that meets the ISO standard. It does not prove you are compliant with the law. It certainly doesn&#8217;t prove you are immune to regulatory fines.</p><p>Here is why you need to stop treating a security certificate as proof of legal compliance.</p><h1>1. The Auditor Is Not Checking the Law</h1><p>To understand the certificate, you have to understand the rules the auditors follow. They don&#8217;t just make things up; they follow a strict standard called <a href="https://www.iso.org/standard/61651.html">ISO/IEC 17021-1</a>.</p><p>This document contains a specific note that ends the debate immediately: </p><div class="pullquote"><p><strong>ISO 17021-1 9.2.1.2 b)<br></strong>&#8220;A management system certification audit is not a legal compliance audit.&#8221;</p></div><p>When an auditor visits your company, they are auditing your <em>management system</em>, not the applicable legal, regulatory and contractual requirements. They shall only look for evidence that you meet requirements of the ISO/IEC 27001 standard. Not more, not less.</p><p>Furthermore, the standard for bodies providing ISMS audits, <a href="https://www.iso.org/standard/82908.html">ISO/IEC 27006-1</a>, explicitly states that while auditors need to know the general legal landscape, this <strong>&#8220;does not imply a profound legal background.&#8221;</strong></p><div class="pullquote"><p><strong>ISO/IEC 27006-1, 7.1.3.1.5</strong><br>Each auditor in an ISMS audit team shall have knowledge of:<br>a) the legal and regulatory requirements in the particular information security field, geography and jurisdiction(s);<br><br>NOTE Knowledge of legal and regulatory requirements does <strong>NOT</strong> imply a profound legal background.</p></div><p>Auditors are not lawyers. They do not have the authority or the training to interpret complex regulations like NIS2. If an auditor tries to certify that you are legally compliant, they are breaking their own rules.</p><h1>2. They Audit the &#8220;Approach,&#8221; Not the Outcome</h1><p>So, what are they actually checking?</p><p>Under <strong>Control 5.31</strong>, the auditor verifies that you have identified legal requirements and documented your <strong>&#8220;approach to meet these requirements.&#8221;</strong></p><p>The key word is &#8220;approach.&#8221;</p><p>The auditor checks if your procedure for identifying laws is sound. They verify that you have a list of laws and a plan to address them. They do not check if that plan would hold up in court.</p><p>If you have a procedure to review compliance, and you follow that procedure, you pass the audit. You can technically pass an ISO 27001 audit while being in breach of a specific regulation, simply because the auditor&#8217;s job is to verify you have a mechanism to <em>manage</em> the risk, not to confirm you have solved it.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.grclab.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.grclab.com/subscribe?"><span>Subscribe now</span></a></p><h1>3. The Standard Allows You to &#8220;Opt-Out&#8221; of Laws</h1><p>This is the most surprising reality for many business leaders. ISO/IEC 27001 gives you the option to choose which requirements you address.</p><p><strong>Clause 4.2</strong> requires you to identify interested parties (like regulators) and their requirements. But it then asks you to decide <strong>&#8220;which of these requirements will be addressed through the information security management system.&#8221;</strong></p><p>This implies a choice. You identify the requirements, and you determine which ones fall within the scope of your system.</p><p>If you list a regulation like NIS2 in your Statement of Applicability (SoA), the auditor checks it for <strong>&#8220;relevance,&#8221;</strong> not conformity. The standards clarify that these references are not used for conformity assessment. You are showing you considered the law, not proving you obey it.</p><h3>The Takeaway</h3><p>An ISO 27001 certificate is a valuable asset. It builds trust and proves you have a rigorous framework for managing risk.</p><p>But it is not a legal shield. If a vendor claims their ISO badge makes them compliant with GDPR or CCPA, they are incorrect. The certificate verifies the system, not the legal result. Keep that distinction clear to maintain a realistic view of your security posture.</p><div><hr></div><h2><strong>Make yourself irreplaceable, even to AI.</strong></h2><p>Watching videos is a great start, but implementing an entire ISMS requires a structured approach combined with advice from those who already did it.</p><p>If you are ready to master the standard and get certified, I invite you to enrol in my <strong><a href="https://grclab.com/courses/iso-27001-lead-implementer">ISO/IEC 27001 Lead Implementer Course</a></strong>.</p><div class="native-video-embed" data-component-name="VideoPlaceholder" data-attrs="{&quot;mediaUploadId&quot;:&quot;952ac843-487f-44a3-baf9-ab35d19d5782&quot;,&quot;duration&quot;:null}"></div><p><strong>New Update:</strong> I have recently upgraded the program. You now have the unique opportunity to <strong>work directly with me</strong> inside the course. Whether you are stuck on risk methodology or need a second pair of eyes on your scope, I&#8217;m here to help you cross the finish line.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://grclab.com/courses/iso-27001-lead-implementer&quot;,&quot;text&quot;:&quot;Enroll Today&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://grclab.com/courses/iso-27001-lead-implementer"><span>Enroll Today</span></a></p><div><hr></div><div class="embedded-publication-wrap" data-attrs="{&quot;id&quot;:6478824,&quot;name&quot;:&quot;GRC Lab&quot;,&quot;logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!Umlm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8231fbf2-1e29-4bb1-8777-af10a2f8af05_832x832.png&quot;,&quot;base_url&quot;:&quot;https://blog.grclab.com&quot;,&quot;hero_text&quot;:&quot;Be the GRC Practitioner AI can't replace.&quot;,&quot;author_name&quot;:&quot;Aron Lange&quot;,&quot;show_subscribe&quot;:true,&quot;logo_bg_color&quot;:&quot;#ffffff&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="EmbeddedPublicationToDOMWithSubscribe"><div class="embedded-publication show-subscribe"><a class="embedded-publication-link-part" native="true" href="https://blog.grclab.com?utm_source=substack&amp;utm_campaign=publication_embed&amp;utm_medium=web"><img class="embedded-publication-logo" src="https://substackcdn.com/image/fetch/$s_!Umlm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8231fbf2-1e29-4bb1-8777-af10a2f8af05_832x832.png" width="56" height="56" style="background-color: rgb(255, 255, 255);"><span class="embedded-publication-name">GRC Lab</span><div class="embedded-publication-hero-text">Be the GRC Practitioner AI can't replace.</div><div class="embedded-publication-author-name">By Aron Lange</div></a><form class="embedded-publication-subscribe" method="GET" action="https://blog.grclab.com/subscribe?"><input type="hidden" name="source" value="publication-embed"><input type="hidden" name="autoSubmit" value="true"><input type="email" class="email-input" name="email" placeholder="Type your email..."><input type="submit" class="button primary" value="Subscribe"></form></div></div><div><hr></div><p><strong>*Affiliate Link:</strong> If you purchase a license through this link, we receive a commission at no additional cost to you.</p><p></p>]]></content:encoded></item><item><title><![CDATA[Qualitative vs. Quantitative: Which Risk Analysis wins?]]></title><description><![CDATA[Plus: What a volcano in Hawaii teaches us about ISO 27001 and risk acceptance criteria.]]></description><link>https://blog.grclab.com/p/qualitative-vs-quantitative-which</link><guid isPermaLink="false">https://blog.grclab.com/p/qualitative-vs-quantitative-which</guid><dc:creator><![CDATA[Aron Lange]]></dc:creator><pubDate>Mon, 26 Jan 2026 21:00:58 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/185815140/209a17e7006c739aae0a90f4a0b29a34.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>Join me as we walk through the requirements for defining and documenting a risk assessment process for ISO 27001 that actually works.</p><div><hr></div><p>This edition of GRC Lab is brought to you by &#8230; <a href="https://www.kertos.io/en">Kertos</a></p><p>Europes #1 Compliance Platform Kertos, automates your compliance standards, such as ISO 27001, GDPR, SOC 2, or the EU AI Act &#8211; from the initial analysis to the audit and as a sustainable solution far beyond.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.kertos.io/en/demo-booking-copy?utm_source=affiliate&amp;utm_medium=aron-lange&amp;utm_campaign=aron-lange-2025-en&amp;utm_content=aron-lange-blog&quot;,&quot;text&quot;:&quot;Discover Kertos&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.kertos.io/en/demo-booking-copy?utm_source=affiliate&amp;utm_medium=aron-lange&amp;utm_campaign=aron-lange-2025-en&amp;utm_content=aron-lange-blog"><span>Discover Kertos</span></a></p><div><hr></div><p><strong>In this session, we cover:</strong></p><ul><li><p><strong>The &#8220;Planning&#8221; vs. &#8220;Execution&#8221; Trap:</strong> Clarifying the difference between Clauses 6.1.2 and 8.2.</p></li><li><p><strong>The 3 Pillars of Assessment:</strong> A detailed look at Risk Identification, Risk Analysis, and Risk Evaluation.</p></li><li><p><strong>Risk Owners:</strong> Who they actually are (hint: it&#8217;s usually <em>not</em> the IT department).</p></li><li><p><strong>Methodologies Explained:</strong></p><ul><li><p><strong>Qualitative Analysis:</strong> How to use a Risk Matrix (Likelihood vs. Impact).</p></li><li><p><strong>Quantitative Analysis:</strong> How to calculate Single Loss Expectancy (SLE) and Annualized Loss Expectancy (ALE).</p></li></ul></li><li><p><strong>Real-World Scenario:</strong> A practical example involving a Data Center in Hawaii and... a volcano. &#127755;</p></li></ul><h2><strong>Learn ISO 27001 Together with Me</strong></h2><p>Watching videos is a great start, but implementing an entire ISMS requires a structured approach combined with advice from those who already did it.</p><p>If you are ready to master the standard and get certified, I invite you to enroll in my <strong>ISO 27001 Lead Implementer Course</strong>.</p><p><strong>New Update:</strong> I have recently upgraded the program. You now have the unique opportunity to <strong>work directly with me</strong> inside the course. Whether you are stuck on risk methodology or need a second pair of eyes on your scope, I&#8217;m here to help you cross the finish line.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://grclab.com/courses/iso-27001-lead-implementer&quot;,&quot;text&quot;:&quot;Enroll Today&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://grclab.com/courses/iso-27001-lead-implementer"><span>Enroll Today</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[How to get ISO 27000 for FREE (legally)]]></title><description><![CDATA[Most people think you have to pay hundreds of dollars for any official ISO standard.]]></description><link>https://blog.grclab.com/p/how-to-get-iso-27000-for-free-legally</link><guid isPermaLink="false">https://blog.grclab.com/p/how-to-get-iso-27000-for-free-legally</guid><dc:creator><![CDATA[Aron Lange]]></dc:creator><pubDate>Thu, 15 Jan 2026 21:01:32 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/184520971/ddd193018acd4ef2a203237f8d62eb75.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>Most people think you have to pay hundreds of dollars for any official ISO standard. Usually, that is true. But that&#8217;s not the case for all of them. For example ISO/IEC 27000 is available for free.</p><p>But there is a catch. This window is closing very soon. </p><p>Here is how to grab your copy before the rules change.</p><div><hr></div><p>This edition of GRC Lab is brought to you by &#8230; <a href="https://www.kertos.io/en">Kertos</a></p><p>Europes #1 Compliance Platform Kertos, automates your compliance standards, such as ISO 27001, GDPR, SOC 2, or the EU AI Act &#8211; from the initial analysis to the audit and as a sustainable solution far beyond. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.kertos.io/en/demo-booking-copy?utm_source=affiliate&amp;utm_medium=aron-lange&amp;utm_campaign=aron-lange-2025-en&amp;utm_content=aron-lange-blog&quot;,&quot;text&quot;:&quot;Discover Kertos&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.kertos.io/en/demo-booking-copy?utm_source=affiliate&amp;utm_medium=aron-lange&amp;utm_campaign=aron-lange-2025-en&amp;utm_content=aron-lange-blog"><span>Discover Kertos</span></a></p><div><hr></div><p></p><h3>What is ISO 27000?</h3><p>The ISO 27000 family of standards is a set of guidelines developed by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) under the joint ISO and IEC subcommittee, ISO/IEC JTC 1/SC 27. Its purpose? To offer organizations a robust and comprehensive framework for managing and improving their information security.</p><p>The ISO 27000 series is not just one standard but a suite of inter-related standards, each providing guidelines and requirements addressing various aspects of information security. Together, they form a cohesive model for implementing and managing a robust Information Security Management System (ISMS).</p><p>ISO 27000 is the &#8220;root&#8221; of this family. It doesn&#8217;t tell you what to do. Instead, it explains the terms and the big picture. It defines the vocabulary so everyone on your team speaks the same language.</p><h3>The Four Categories</h3><p>The family is split into four main groups:</p><ul><li><p><strong>Terminology:</strong> Standards like ISO 27000 that define words and concepts.</p></li><li><p><strong>Requirements:</strong> These are &#8220;normative&#8221; standards. They are the only ones you can be audited against. ISO 27001 is the most famous example.</p></li><li><p><strong>General Guidelines:</strong> These explain <em>how</em> to meet the requirements. ISO 27002 is a great example of this.</p></li><li><p><strong>Sector-Specific Guidelines:</strong> These are for specific industries, like telecommunications or healthcare.</p></li></ul><h3>Why it is free (for now)</h3><p>ISO typically offers terminology standards for free on their website. Since the current version of ISO 27000 is mostly about definitions, it costs zero dollars.</p><p>But a new version is coming in early 2026. This update will include more than just definitions. It will cover principles and relationships between standards. Because it has more content, ISO will likely start charging for it.</p><h3>How to get it</h3><ol><li><p>Go to <strong>iso.org</strong>.</p></li><li><p>Search for <strong>ISO 27000</strong>.</p></li><li><p>Add the current version to your cart.</p></li><li><p>Check out for free and download the PDF.</p></li></ol><h2>Ready to stop learning in isolation?</h2><p>You&#8217;ve just read about the theory, but implementing GRC in the real world is a different beast. For years, I only offered digital courses where you had to figure out the hard parts alone.</p><p><strong>That changes now.</strong></p><div class="native-video-embed" data-component-name="VideoPlaceholder" data-attrs="{&quot;mediaUploadId&quot;:&quot;76bb9508-b633-4232-a516-c4dbc14ec9d8&quot;,&quot;duration&quot;:null}"></div><p>I have opened the doors to the <strong>GRC Lab</strong>. This is no longer just a library of on-demand videos; it is a direct line to me and a community of peers.</p><p><strong>When you join, you get:</strong></p><ul><li><p><strong>Access to Me:</strong> Weekly live Q&amp;A sessions to solve your specific roadblocks.</p></li><li><p><strong>Expert Workshops:</strong> Deep dives into topics AI can&#8217;t teach you.</p></li><li><p><strong>The Full Course:</strong> My complete ISO 27001 Lead Implementer training.</p></li><li><p>And so much <strong>more</strong>!</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://grclab.com/courses/iso-27001-lead-implementer&quot;,&quot;text&quot;:&quot;Enroll today&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://grclab.com/courses/iso-27001-lead-implementer"><span>Enroll today</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[The All-New C5:2025 Catalogue]]></title><description><![CDATA[A Practical Guide to the New Cloud Security Standard]]></description><link>https://blog.grclab.com/p/the-all-new-c52025-catalogue</link><guid isPermaLink="false">https://blog.grclab.com/p/the-all-new-c52025-catalogue</guid><dc:creator><![CDATA[Aron Lange]]></dc:creator><pubDate>Thu, 11 Dec 2025 21:00:40 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/15dc82d1-673d-498a-94d3-620ba485527c_1456x1048.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Welcome to GRC Lab, a weekly newsletter where we provide actionable advice to help you launch, grow and accelerate your career in Governance, Risk and Compliance.</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.grclab.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.grclab.com/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><p>The German Federal Office for Information Security (BSI) recently released the <a href="https://www.bsi.bund.de/EN/Themen/Unternehmen-und-Organisationen/Informationen-und-Empfehlungen/Empfehlungen-nach-Angriffszielen/Cloud-Computing/Kriterienkatalog-C5/C5_2025/C5_2025_node.html">Community Draft for the 2025 version</a> of the Cloud Computing Compliance Criteria Catalogue&#8212;commonly known as C5.</p><p>For organizations relying on cloud services, C5 has become a primary benchmark for assessing vendor security. It pushes beyond simple checkboxes, requiring providers to prove that their security controls actually work.</p><p>With the 2025 draft, the BSI is updating the framework to address modern realities like Artificial Intelligence in control systems, sustainability reporting, and stricter data sovereignty requirements.</p><p>Here is a detailed look at what C5 is, how the framework functions, and what is changing in this latest version.</p><h2>What is C5?</h2><p>C5 stands for <strong>C</strong>loud <strong>C</strong>omputing <strong>C</strong>ompliance <strong>C</strong>riteria <strong>C</strong>atalogue. It is a government-backed standard that defines a baseline level of information security for cloud service providers (CSPs).</p><p>Unlike a simple certification where a provider passes a test once and receives a badge, C5 acts as a reporting standard. It provides a structured catalog of criteria that an independent auditor uses to evaluate the provider. The output is not a certificate, but a detailed <strong>attestation report</strong>. This report gives customers transparency into the provider&#8217;s internal processes, allowing them to make informed risk assessments.</p><p>While developed in Germany, C5 is recognized internationally and is often used by hyperscalers (like AWS, Microsoft Azure, and Google Cloud) to demonstrate compliance across European markets.</p><h2>How the Framework Works</h2><p>The C5 framework operates on the principle of transparency. It dictates <em>what</em> must be audited, but it relies on international auditing standards for <em>how</em> it is done.</p><h3>The Audit Standard: ISAE 3000</h3><p>C5 audits are conducted according to the <strong>ISAE 3000</strong> standard. This is a rigorous assurance standard used by accountants and auditors. It ensures that the audit is objective and evidence-based.</p><p>There are generally two types of reports a provider can issue:</p><ul><li><p><strong>Type 1:</strong> Confirms that the provider&#8217;s security controls are designed correctly at a specific point in time.</p></li><li><p><strong>Type 2:</strong> Confirms that the controls were not only designed correctly but were also <strong>operating effectively</strong> over a specific period (typically 6 to 12 months). Most mature organizations require a Type 2 report.</p></li></ul><h2>Anatomy of the C5:2025 Criteria</h2><p>The 2025 draft retains the core structure of previous versions but refines the content. The catalog is divided into specific domains and criteria types.</p><h3>1. Basic vs. Additional Criteria</h3><p>The criteria are split into two levels to accommodate different security needs:</p><ul><li><p><strong>Basic Criteria:</strong> These are the mandatory minimums. To state compliance with C5, a cloud provider must meet all basic criteria. These cover standard industry best practices for secure cloud operations.</p></li><li><p><strong>Additional Criteria:</strong> These are context-specific measures. While technically optional for a general C5 report, they are often required for providers aiming to serve government entities or industries with high protection needs. A key focus here is &#8220;Technical Service Sovereignty&#8221;&#8212;ensuring the cloud service can operate independently of non-EU interference.</p></li></ul><h3>2. The Boundary Conditions (BCs)</h3><p>Before getting into the technical controls, C5 requires providers to disclose &#8220;Boundary Conditions.&#8221; These describe the environment in which the cloud service operates.</p><p>The 2025 draft introduces critical updates here:</p><ul><li><p><strong>BC-01 (Jurisdiction &amp; Data Location):</strong> Providers must clearly state applicable law and jurisdiction. Crucially, they must now explicitly list locations for <strong>customer data</strong>, <strong>account data</strong>, and <strong>derived data</strong> (like logs and telemetry). This separation is vital for addressing sovereignty risks, such as foreign support teams accessing sensitive metadata.</p></li><li><p><strong>BC-06 (Sustainability &amp; ESG):</strong> <em>New in 2025.</em> This promotes transparency regarding environmental impact. Providers are encouraged to disclose data on energy efficiency, water usage, and adherence to standards like ISO 14001 or the EU Corporate Sustainability Reporting Directive (CSRD).</p></li><li><p><strong>BC-07 (AI in Internal Controls):</strong> <em>New in 2025.</em> This does not just cover AI as a product sold to customers; it covers AI used <em>by</em> the provider to run their systems. If a provider uses AI models for internal control activities (e.g., anomaly detection in logs), they must disclose whether the model is proprietary or third-party, and how they ensure the model remains secure.</p></li></ul><h3>3. The Domains</h3><p>The criteria themselves are grouped into roughly 17 thematic domains called areas. While the exact count of criteria can fluctuate slightly between drafts, they generally cover:</p><div id="datawrapper-iframe" class="datawrapper-wrap outer" data-attrs="{&quot;url&quot;:&quot;https://datawrapper.dwcdn.net/CMNHR/1/&quot;,&quot;thumbnail_url&quot;:&quot;https://datawrapper.dwcdn.net/CMNHR/plain.png?v=1&quot;,&quot;thumbnail_url_full&quot;:&quot;https://datawrapper.dwcdn.net/CMNHR/full.png?v=1&quot;,&quot;height&quot;:546,&quot;title&quot;:&quot;C5 Criteria&quot;,&quot;description&quot;:&quot;&quot;}" data-component-name="DatawrapperToDOM"><iframe id="iframe-datawrapper" class="datawrapper-iframe" src="https://datawrapper.dwcdn.net/CMNHR/1/" width="730" height="546" frameborder="0" scrolling="no"></iframe><script type="text/javascript">!function(){"use strict";window.addEventListener("message",(function(e){if(void 0!==e.data["datawrapper-height"]){var t=document.querySelectorAll("iframe");for(var a in e.data["datawrapper-height"])for(var r=0;r<t.length;r++){if(t[r].contentWindow===e.source)t[r].style.height=e.data["datawrapper-height"][a]+"px"}}}))}();</script></div><h2>C5 vs. SOC 2: What Are the Differences?</h2><p>While both frameworks are used to prove a cloud provider&#8217;s security, they differ significantly in origin, flexibility, and philosophy.</p><p><strong>1. Origin and Market Focus</strong></p><ul><li><p><strong>SOC 2 (System and Organization Controls 2):</strong> Developed by the AICPA (American Institute of Certified Public Accountants). It is the de facto standard in the US market and is widely recognized globally for SaaS companies.</p></li><li><p><strong>C5:</strong> Developed by the BSI (German Federal Office for Information Security). It is essential for doing business in Germany (especially with the public sector) and is increasingly respected across the EU as a &#8220;higher bar&#8221; for transparency.</p></li></ul><p><strong>2. Principles vs. Criteria</strong></p><ul><li><p><strong>SOC 2 is Principles-based:</strong> It uses &#8220;Trust Services Criteria&#8221; (Security, Availability, Confidentiality, Processing Integrity, Privacy). Only &#8220;Security&#8221; is mandatory; the provider chooses which of the others to include. The provider also defines <em>their own</em> controls to meet these criteria. This offers flexibility but can lead to variability in report quality.</p></li><li><p><strong>C5 is Criteria-based:</strong> It is prescriptive. The BSI defines a specific catalog of &#8220;Basic Criteria&#8221; that <em>must</em> be met. A provider cannot simply &#8220;scope out&#8221; a difficult requirement if it is a Basic criterion. This ensures a consistent minimum baseline across all C5 reports.</p></li></ul><p><strong>3. Depth of Transparency</strong><br>C5 places a heavier emphasis on &#8220;system description&#8221; transparency. The &#8220;Boundary Conditions&#8221; (like the new AI and jurisdiction disclosures) force providers to reveal structural details about their service&#8212;such as data locations and legal subjection&#8212;that might be glossed over in a standard SOC 2 report.</p><p><strong>4. Combined Audits</strong><br>Because both standards use the ISAE 3000 auditing framework, they are often audited simultaneously (&#8221;audit once, report twice&#8221;). A provider can map their internal controls to both the SOC 2 criteria and the C5 catalog, saving time and costs while satisfying both US and EU customers.</p><h2>What Has Changed in the 2025 Draft?</h2><p>The C5:2025 draft represents a significant structural and content modernization, largely driven by alignment with the European Union Cybersecurity Certification Scheme (EUCS).</p><h3>1. Integration of Modern Standards and Feedback</h3><p>The BSI didn&#8217;t work in isolation. The draft incorporates:</p><ul><li><p><strong>Updated Standards:</strong> Alignment with CSA Cloud Controls Matrix v4, ISO/IEC 27001:2022, and the NIS2 Directive.</p></li><li><p><strong>Community Input:</strong> Feedback from cloud providers, auditors, and consultants was directly used to refine existing criteria and address practical hurdles found in C5:2020.</p></li></ul><h3>2. New Technical Focus Areas</h3><p>The catalog has been expanded to address specific modern technologies and challenges:</p><ul><li><p><strong>Emerging Tech:</strong> New criteria cover <strong>Container Management</strong>, <strong>Post-Quantum Cryptography</strong>, and <strong>Confidential Computing</strong>.</p></li><li><p><strong>Supply Chain Security:</strong> Enhanced focus on supply chain management risks.</p></li><li><p><strong>Sovereignty &amp; Separation:</strong> Deeper examination of tenant separation and the technical implementation of data sovereignty.</p></li><li><p><strong>Data Applicability:</strong> Sharpened definitions on how individual criteria apply to different data types.</p></li></ul><h3>3. Structural Overhaul for Clarity</h3><p>The structure has been revamped to make auditing easier and more transparent, mirroring the EUCS approach:</p><ul><li><p><strong>Sub-Criteria:</strong> Criteria are now broken down into distinct sub-criteria. This makes it easier to map controls to internal systems and simplifies the audit process.</p></li><li><p><strong>Sharpen vs. Complement:</strong> &#8220;Additional Criteria&#8221; are now explicitly classified to avoid ambiguity:</p><ul><li><p><em>Additional Sharpen:</em> Stricter requirements that elevate an existing basic criterion.</p></li><li><p><em>Additional Complement:</em> Entirely new requirements that supplement the basics.</p></li></ul></li></ul><h3>4. Machine-Readable Formats</h3><p>While the Community Draft is available in English (PDF and XLSX), the final version will mark a technological shift. It will be published in German and English across <strong>PDF, XLSX, and YAML</strong> formats. This move to machine-readable formats paves the way for automated auditing and continuous compliance monitoring, replacing manual spreadsheets with code.</p><h2>Conclusion</h2><p>C5:2025 represents the evolution of cloud security from purely technical &#8220;firewalls and passwords&#8221; to a broader view of risk. It acknowledges that legal jurisdiction, AI reliance, and environmental impact are now part of the security conversation.</p><p>For cloud customers, this draft indicates that future attestation reports will provide more data points for vendor risk assessment. For cloud providers, it is a signal to prepare for deeper scrutiny regarding their data supply chains and automated control systems.</p><div><hr></div><h2><strong>Cut Implementation Time in Half</strong></h2><p>You know that achieving ISO 27001 certification is a critical milestone for your organization and a major step for your career. But right now, the path forward feels less like a clear roadmap and more like a frustrating maze?</p><p>Then our <a href="https://grclab.com/courses/iso-27001-lead-implementer">ISO/IEC 27001 Lead Implementer</a> Course is exactly what you need!</p><div class="native-video-embed" data-component-name="VideoPlaceholder" data-attrs="{&quot;mediaUploadId&quot;:&quot;530ee4be-a5c0-4ef3-aa92-99f6fae85b9d&quot;,&quot;duration&quot;:null}"></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://grclab.com/courses/iso-27001-lead-implementer&quot;,&quot;text&quot;:&quot;Enroll Now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://grclab.com/courses/iso-27001-lead-implementer"><span>Enroll Now</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[Risk Management for Dummies]]></title><description><![CDATA[I remember sitting in security meetings at the very start of my career, feeling completely lost.]]></description><link>https://blog.grclab.com/p/how-to-solve-the-grc-puzzle-a-roadmap</link><guid isPermaLink="false">https://blog.grclab.com/p/how-to-solve-the-grc-puzzle-a-roadmap</guid><dc:creator><![CDATA[Aron Lange]]></dc:creator><pubDate>Sun, 30 Nov 2025 06:52:18 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/16ebb4b8-0ad1-4af2-9d76-1839597a21c3_1456x1048.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Welcome to GRC Lab, a weekly newsletter where we provide actionable advice to help you launch, grow and accelerate your career in Governance, Risk and Compliance.</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.grclab.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.grclab.com/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><p>I remember sitting in security meetings at the very start of my career, feeling completely lost. Words like &#8216;threat&#8217;, &#8216;vulnerability&#8217;, and &#8216;risk&#8217; were tossed around interchangeably, and it felt like a game where the rules kept changing. I was confused, and honestly, sometimes irritated because what one expert explained to me often contradicted what the next one said.</p><p>It didn&#8217;t happen overnight. It took years of working in GRC and reading countless resources for the fog to lift. Slowly, but surely, I started to see the underlying structure. I realized that risks and controls weren&#8217;t just random components, but gears in a machine. I began to map out the relationships: how a threat needs a vulnerability to cause harm, and how that harm only matters if it touches the assets an organization actually cares about. Once I understood these connections, the noise faded. </p><p>To understand how this machine works, we first need to look at the process that drives it: the <strong>Risk-Based Approach</strong>.</p><h2>The Foundation: Risk Management</h2><p>Information security management is about protecting organizations from potential events that can cause harm to their business. This is the risk-based approach.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!udo1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9451b25-f4c2-4287-b6ef-bbc7c91ad3ee_1456x624.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!udo1!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9451b25-f4c2-4287-b6ef-bbc7c91ad3ee_1456x624.png 424w, https://substackcdn.com/image/fetch/$s_!udo1!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9451b25-f4c2-4287-b6ef-bbc7c91ad3ee_1456x624.png 848w, https://substackcdn.com/image/fetch/$s_!udo1!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9451b25-f4c2-4287-b6ef-bbc7c91ad3ee_1456x624.png 1272w, https://substackcdn.com/image/fetch/$s_!udo1!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9451b25-f4c2-4287-b6ef-bbc7c91ad3ee_1456x624.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!udo1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9451b25-f4c2-4287-b6ef-bbc7c91ad3ee_1456x624.png" width="1456" height="624" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e9451b25-f4c2-4287-b6ef-bbc7c91ad3ee_1456x624.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:624,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!udo1!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9451b25-f4c2-4287-b6ef-bbc7c91ad3ee_1456x624.png 424w, https://substackcdn.com/image/fetch/$s_!udo1!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9451b25-f4c2-4287-b6ef-bbc7c91ad3ee_1456x624.png 848w, https://substackcdn.com/image/fetch/$s_!udo1!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9451b25-f4c2-4287-b6ef-bbc7c91ad3ee_1456x624.png 1272w, https://substackcdn.com/image/fetch/$s_!udo1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9451b25-f4c2-4287-b6ef-bbc7c91ad3ee_1456x624.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Risk management is typically aligned with the following steps.</p><h3><strong>Establish Context</strong></h3><p>Before diving into risk identification or analysis, it&#8217;s crucial to establish the context in which the organization operates. This involves understanding the internal and external factors that can affect the organization&#8217;s assets. Establishing context provides a lens through which risks can be identified and evaluated.</p><h3><strong>Risk Identification</strong></h3><p>This stage involves identifying what could go wrong, how, and why. Similar to spotting the key players and strategies of an opposing team, risk identification is about recognizing the threat sources, threat events, vulnerabilities, and assets at risk. This provides a comprehensive list of risks that need to be further analyzed.</p><h3><strong>Risk Analysis</strong></h3><p>Once the risks are identified, they need to be analyzed to understand their nature, likelihood, and impact. Risk analysis provides a detailed view of each risk, helping the organization to prioritize them. This will help organisations to understand which scenarios are most likely to happen and how damaging they can be if not properly treated.</p><h3><strong>Risk Evaluation</strong></h3><p>Risk evaluation involves comparing the analyzed risks against pre-defined criteria to decide which risks need to be treated. This can be thought of as deciding which opponent&#8217;s plays need the most defensive focus. The evaluation helps in allocating resources more effectively by focusing on the most critical risks.</p><h3><strong>Risk Treatment</strong></h3><p>This stage involves selecting one or more options for modifying the risks and implementing those options. Risk treatment can involve risk avoidance, risk modification, risk sharing, or risk retention. Please note that the impact of risks can not be mitigated to zero. There will always be a residual risk, unless it can be completely avoided.</p><h3><strong>Risk Monitoring</strong></h3><p>Last but not least, risks need to be continuously monitored and reviewed to assess the effectiveness of the risk management process and to identify any changes in the risk landscape. I like to state that risks never retire. For the moment a risk might be properly taken care of, but as soon as a control fails, threats evolve, or new vulnerabilities arise, this risk must return to our attention.</p><h2><strong>Threat Sources: The Starting Point</strong></h2><p>According to the National Institute of Standards and Technology (NIST), <strong>Threat Sources</strong> are defined as the origin of adverse events that could potentially harm an organization&#8217;s assets and operations. These sources can be intentional or unintentional and can come from a variety of places such as nature, individuals, or organizations.</p><p>NIST categorizes Threat Sources into two main types:</p><ol><li><p><strong>Adversarial</strong>: These are intentional actions taken by individuals, groups, or organizations with the motive of causing harm or exploiting vulnerabilities. Adversarial threats include hackers, terrorists, insider threats, and even competitors.</p></li><li><p><strong>Non-Adversarial</strong>: These are unintentional actions or natural events that could potentially harm an organization but lack a targeted intent. Examples include natural disasters like floods or earthquakes, accidental data deletion by an employee, or system failures due to a bug.</p></li></ol><p>By understanding the nature and types of Threat Sources as defined by NIST, organizations can better prepare for, and mitigate, various risks that may affect them.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!lNhH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32f89f9a-6ba2-44a2-87af-a922c5e847c4_1288x1156.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!lNhH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32f89f9a-6ba2-44a2-87af-a922c5e847c4_1288x1156.png 424w, https://substackcdn.com/image/fetch/$s_!lNhH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32f89f9a-6ba2-44a2-87af-a922c5e847c4_1288x1156.png 848w, https://substackcdn.com/image/fetch/$s_!lNhH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32f89f9a-6ba2-44a2-87af-a922c5e847c4_1288x1156.png 1272w, https://substackcdn.com/image/fetch/$s_!lNhH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32f89f9a-6ba2-44a2-87af-a922c5e847c4_1288x1156.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!lNhH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32f89f9a-6ba2-44a2-87af-a922c5e847c4_1288x1156.png" width="1288" height="1156" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/32f89f9a-6ba2-44a2-87af-a922c5e847c4_1288x1156.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1156,&quot;width&quot;:1288,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!lNhH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32f89f9a-6ba2-44a2-87af-a922c5e847c4_1288x1156.png 424w, https://substackcdn.com/image/fetch/$s_!lNhH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32f89f9a-6ba2-44a2-87af-a922c5e847c4_1288x1156.png 848w, https://substackcdn.com/image/fetch/$s_!lNhH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32f89f9a-6ba2-44a2-87af-a922c5e847c4_1288x1156.png 1272w, https://substackcdn.com/image/fetch/$s_!lNhH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32f89f9a-6ba2-44a2-87af-a922c5e847c4_1288x1156.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2><strong>From Threat Sources to Threat Events</strong></h2><p>Threat Sources impose <strong>Threat Events</strong>, which are specific actions or incidents that can potentially harm your organization. For example, a hacker (Threat Source) might attempt to break into your network (Threat Event).</p><h2><strong>Vulnerabilities: The Weak Spots</strong></h2><p><strong>Vulnerabilities</strong> are the weak spots in your system where Threat Events can sneak in. These could be outdated software, weak passwords, or even a staff member who&#8217;s not trained in security protocols.</p><h2><strong>Supporting Assets</strong></h2><p>Vulnerabilities often expose <strong>Supporting Assets</strong>, which are the various components of your system that aren&#8217;t core to your business but are still important. These can include:</p><ul><li><p><strong>Hardware</strong>: Servers, computers</p></li><li><p><strong>Software</strong>: Applications, databases</p></li><li><p><strong>Network</strong>: Internet connection, firewalls</p></li><li><p><strong>Personnel</strong>: Employees, contractors</p></li><li><p><strong>Sites</strong>: Physical locations like offices or data centers</p></li></ul><h2><strong>Primary Assets</strong></h2><p><strong>Primary Assets</strong> are what your business absolutely needs to function. These can be your main business processes or crucial pieces of information. Supporting Assets enable these Primary Assets to function. For example, your network (Supporting Asset) enables your online sales platform (Primary Asset).</p><h2><strong>The Chain Reaction: Security Events and Incidents</strong></h2><p>When a Threat Event exploits a vulnerability, it causes a <strong>Security Event</strong>. Not all Security Events are disastrous; some might be easily contained or harmless. However, when a Security Event has a significant negative impact, it is classified as a <strong>Security Incident</strong>. These incidents can compromise your operations and, ultimately, your Primary Assets.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-9sd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F426273bd-181b-4ebd-9c49-31836a15c6d0_2848x2896.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-9sd!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F426273bd-181b-4ebd-9c49-31836a15c6d0_2848x2896.png 424w, https://substackcdn.com/image/fetch/$s_!-9sd!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F426273bd-181b-4ebd-9c49-31836a15c6d0_2848x2896.png 848w, https://substackcdn.com/image/fetch/$s_!-9sd!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F426273bd-181b-4ebd-9c49-31836a15c6d0_2848x2896.png 1272w, https://substackcdn.com/image/fetch/$s_!-9sd!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F426273bd-181b-4ebd-9c49-31836a15c6d0_2848x2896.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-9sd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F426273bd-181b-4ebd-9c49-31836a15c6d0_2848x2896.png" width="1456" height="1481" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/426273bd-181b-4ebd-9c49-31836a15c6d0_2848x2896.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1481,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!-9sd!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F426273bd-181b-4ebd-9c49-31836a15c6d0_2848x2896.png 424w, https://substackcdn.com/image/fetch/$s_!-9sd!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F426273bd-181b-4ebd-9c49-31836a15c6d0_2848x2896.png 848w, https://substackcdn.com/image/fetch/$s_!-9sd!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F426273bd-181b-4ebd-9c49-31836a15c6d0_2848x2896.png 1272w, https://substackcdn.com/image/fetch/$s_!-9sd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F426273bd-181b-4ebd-9c49-31836a15c6d0_2848x2896.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2><strong>Implementing Controls Through Risk Treatment</strong></h2><p>Once you&#8217;ve identified your Threat Sources, analyzed your vulnerabilities, and assessed your risks, the next step is to implement controls to manage these risks effectively. In the realm of information security, controls are safeguards or countermeasures to avoid, detect, counteract, or minimize security risks to physical property, information, computer systems, or other assets.</p><h3><strong>Types of Controls Based on Risk Treatment</strong></h3><p>Controls are generally determined during the Risk Treatment phase and can be categorized into three main types:</p><ol><li><p><strong>Preventive Controls</strong>: These are measures designed to prevent an unwanted or unauthorized activity from occurring. They act as the first line of defense in risk mitigation. For instance, strong user authentication can prevent unauthorized access.</p></li><li><p><strong>Detective Controls</strong>: These controls are aimed at detecting and alerting when an unauthorized or unwanted activity occurs. They don&#8217;t prevent an action but can trigger an alert or initiate corrective measures. An example would be intrusion detection systems that notify administrators about suspicious activities.</p></li><li><p><strong>Corrective Controls</strong>: These come into play after a threat event has occurred, aiming to minimize the impact and bring the system back to its secure state. Data backups and system recovery plans are examples of corrective controls.</p></li></ol><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-lqG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdbad01ee-23a8-4561-8230-87cc7574ae42_2484x2856.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-lqG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdbad01ee-23a8-4561-8230-87cc7574ae42_2484x2856.png 424w, https://substackcdn.com/image/fetch/$s_!-lqG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdbad01ee-23a8-4561-8230-87cc7574ae42_2484x2856.png 848w, https://substackcdn.com/image/fetch/$s_!-lqG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdbad01ee-23a8-4561-8230-87cc7574ae42_2484x2856.png 1272w, https://substackcdn.com/image/fetch/$s_!-lqG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdbad01ee-23a8-4561-8230-87cc7574ae42_2484x2856.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-lqG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdbad01ee-23a8-4561-8230-87cc7574ae42_2484x2856.png" width="1456" height="1674" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/dbad01ee-23a8-4561-8230-87cc7574ae42_2484x2856.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1674,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!-lqG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdbad01ee-23a8-4561-8230-87cc7574ae42_2484x2856.png 424w, https://substackcdn.com/image/fetch/$s_!-lqG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdbad01ee-23a8-4561-8230-87cc7574ae42_2484x2856.png 848w, https://substackcdn.com/image/fetch/$s_!-lqG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdbad01ee-23a8-4561-8230-87cc7574ae42_2484x2856.png 1272w, https://substackcdn.com/image/fetch/$s_!-lqG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdbad01ee-23a8-4561-8230-87cc7574ae42_2484x2856.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>Make yourself irreplaceable, even to AI.</h2><p>Understanding the theory is one thing; building a system that works in the real world is another.</p><div class="native-video-embed" data-component-name="VideoPlaceholder" data-attrs="{&quot;mediaUploadId&quot;:&quot;810845da-30a9-42a2-bafa-8e1002467b14&quot;,&quot;duration&quot;:null}"></div><p>If you want to move beyond the basics and learn how to construct an Information Security Management System from the ground up, my <strong>ISO/IEC 27001 Lead Implementer course</strong> is the perfect next step. We go deep into the practical application of these concepts, turning the &#8220;what&#8221; into the &#8220;how.&#8221;</p><p><strong>November Sale:</strong><br>I am currently running a special sale for the month of November. This is the perfect time to invest in your career and build skills that make you irreplaceable, even to AI. Don&#8217;t miss the chance to grab the course at a discounted rate before the month ends.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.udemy.com/course/information-security-for-beginners/?couponCode=1B7FD10A9A6DD09F6097&quot;,&quot;text&quot;:&quot;Buy Now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.udemy.com/course/information-security-for-beginners/?couponCode=1B7FD10A9A6DD09F6097"><span>Buy Now</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[A Smarter Way to Audit Personnel Security]]></title><description><![CDATA[Why you should audit the employee lifecycle and pull in some IT controls as well.]]></description><link>https://blog.grclab.com/p/a-smarter-way-to-audit-personnel</link><guid isPermaLink="false">https://blog.grclab.com/p/a-smarter-way-to-audit-personnel</guid><dc:creator><![CDATA[Aron Lange]]></dc:creator><pubDate>Fri, 21 Nov 2025 07:50:21 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/62e6e65e-3a12-48be-b81d-b994b6f59c2c_1456x1048.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Welcome to GRC Lab, a weekly newsletter where we provide actionable advice to help you launch, grow and accelerate your career in Governance, Risk and Compliance.</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.grclab.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.grclab.com/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><p>When you look at the ISO/IEC 27001 controls for personnel security, it&#8217;s easy to just go down the list. You start at the top and work your way to the bottom. Most auditors do exactly that.</p><p>It gets the job done, but it misses the bigger picture.</p><p>Here are the standard personnel security controls (A.6.1 &#8211; A.6.8) that you usually face:</p><ul><li><p><strong>A.6.1</strong> Screening</p></li><li><p><strong>A.6.2</strong> Terms and conditions of employment</p></li><li><p><strong>A.6.3</strong> Information security awareness, education and training</p></li><li><p><strong>A.6.4</strong> Disciplinary process</p></li><li><p><strong>A.6.5</strong> Responsibilities after termination or change of employment</p></li><li><p><strong>A.6.6</strong> Confidentiality or non-disclosure agreements</p></li><li><p><strong>A.6.7</strong> Remote working</p></li><li><p><strong>A.6.8</strong> Information security event reporting</p></li></ul><p>Auditing these in numerical order is fine, but it feels disjointed. Real life doesn&#8217;t happen in numerical order. A better approach is to audit the <strong>employee lifecycle</strong>.</p><p>By grouping these controls into &#8220;Before,&#8221; &#8220;During,&#8221; and &#8220;After,&#8221; you follow the actual path of a staff member. It also makes sense to pull in a few controls from outside the A.6 category. HR and IT have to talk to each other for security to work, so your audit should check those connection points too.</p><p>Here is how you could structure such an audit.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!RLgi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faaaba238-f467-450e-9f41-1bc832cf12ee_1456x1048.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!RLgi!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faaaba238-f467-450e-9f41-1bc832cf12ee_1456x1048.png 424w, https://substackcdn.com/image/fetch/$s_!RLgi!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faaaba238-f467-450e-9f41-1bc832cf12ee_1456x1048.png 848w, https://substackcdn.com/image/fetch/$s_!RLgi!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faaaba238-f467-450e-9f41-1bc832cf12ee_1456x1048.png 1272w, https://substackcdn.com/image/fetch/$s_!RLgi!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faaaba238-f467-450e-9f41-1bc832cf12ee_1456x1048.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!RLgi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faaaba238-f467-450e-9f41-1bc832cf12ee_1456x1048.png" width="1456" height="1048" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/aaaba238-f467-450e-9f41-1bc832cf12ee_1456x1048.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1048,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:402277,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.grclab.com/i/176229043?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faaaba238-f467-450e-9f41-1bc832cf12ee_1456x1048.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!RLgi!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faaaba238-f467-450e-9f41-1bc832cf12ee_1456x1048.png 424w, https://substackcdn.com/image/fetch/$s_!RLgi!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faaaba238-f467-450e-9f41-1bc832cf12ee_1456x1048.png 848w, https://substackcdn.com/image/fetch/$s_!RLgi!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faaaba238-f467-450e-9f41-1bc832cf12ee_1456x1048.png 1272w, https://substackcdn.com/image/fetch/$s_!RLgi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faaaba238-f467-450e-9f41-1bc832cf12ee_1456x1048.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>Phase 1: Before Employment (The Onboarding)</h2><p>This is where you check how a person gets into the company. You are looking for the handoff between HR signing the paperwork and IT flipping the switch on access.</p><p>Start with the HR basics. You need to verify <strong>A.6.1 Screening</strong> to ensure background checks happen before the person starts. Then check <strong>A.6.2 Terms and conditions</strong> and <strong>A.6.6 Confidentiality agreements</strong>. These are your legal safety nets.</p><p>But paperwork doesn&#8217;t give a user access to the network. This is where you should bring in the &#8220;A.5&#8221; controls to see if the process actually works.</p><p>Ask how IT finds out a new person is starting (<strong>A.5.16 Identity management</strong>). If HR sends an email or opens a ticket, is it timely? Once IT knows the person exists, how do they know what folders or software to unlock? That&#8217;s <strong>A.5.18 Access rights</strong>. You want to ensure the new hire doesn&#8217;t just get &#8220;admin access&#8221; because it&#8217;s convenient.</p><p>Finally, check the logistics. How does the user get their initial password securely (<strong>A.5.17 Authentication information</strong>)? If they are sent a laptop or phone, track how those assets are assigned to them.</p><p>If you audit these together, you can catch the gaps where HR thinks IT is handling it, and IT thinks HR is handling it.</p><h2>Phase 2: During Employment (The Working Life)</h2><p>Once the employee is settled, the risks change. Now it&#8217;s about behavior.</p><p>Check <strong>A.6.3 Information security awareness</strong>. Are they actually learning anything, or just clicking &#8220;Next&#8221; on a slide deck? Look for evidence of real training.</p><p>You also need to look at <strong>A.6.7 Remote working</strong>. Since hybrid work is normal now, check the policy for working from home. Ensure the security rules apply just as strictly at a kitchen table as they do in the office.</p><p>And if someone breaks those rules? Check <strong>A.6.4 Disciplinary process</strong>. You want to see that there is a formal process for handling security violations, not just a verbal warning.</p><h2>Phase 3: After Employment (The Offboarding)</h2><p>This is usually the riskiest phase. When someone leaves, the clock starts ticking.</p><p>Start with <strong>A.6.5 Responsibilities after termination</strong>. HR should remind the departing employee that their confidentiality obligations don&#8217;t end just because their paycheck did.</p><p>Then, immediately pivot to the technical controls. This is often where the process fails.</p><p>Check <strong>A.5.16 Identity management</strong> and <strong>A.5.18 Access rights</strong>. How fast was the account disabled? Did it happen the minute they walked out the door, or a week later?</p><p>Don&#8217;t forget <strong>A.5.11 Return of assets</strong>. Verify that laptops, keys, and badges were collected and logged.</p><h2>A Note on A.6.8</h2><p>You might notice I left out <strong>A.6.8 Information security event reporting</strong>.</p><p>While it is technically a &#8220;people&#8221; control, it fits much better in an audit of Incident Management. Save it for that session. It makes more sense to discuss how people report bugs or breaches when you are already looking at how the company fixes them.</p><div><hr></div><h2>Cut Implementation Time in Half</h2><p>If you want to learn how to implement ISO 27001 with this kind of practical logic, check out my <strong>ISO/IEC 27001 Lead Implementer course</strong>.</p><div class="native-video-embed" data-component-name="VideoPlaceholder" data-attrs="{&quot;mediaUploadId&quot;:&quot;24b54422-ec22-4826-aca2-a06c3c571925&quot;,&quot;duration&quot;:null}"></div><p>We don&#8217;t just read through the clauses. We look at how to build a security framework that actually fits a real business. You will learn how to interpret the requirements, connect the dots between different controls, and implement a system that passes audits without slowing down operations.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://grclab.com/courses/iso-27001-lead-implementer&quot;,&quot;text&quot;:&quot;Enroll today&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://grclab.com/courses/iso-27001-lead-implementer"><span>Enroll today</span></a></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.grclab.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">GRC Lab is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[It’s Just Paperwork, Right?]]></title><description><![CDATA[How to make sense of policies, standards, and procedures.]]></description><link>https://blog.grclab.com/p/its-just-paperwork-right</link><guid isPermaLink="false">https://blog.grclab.com/p/its-just-paperwork-right</guid><dc:creator><![CDATA[Aron Lange]]></dc:creator><pubDate>Fri, 14 Nov 2025 07:33:23 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/78bf139a-3aa1-4488-93fe-4c62ebfdc62c_1456x1048.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Welcome to GRC Lab, a weekly newsletter where we provide actionable advice to help you launch, grow and accelerate your career in Governance, Risk and Compliance. </em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.grclab.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.grclab.com/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><p>You&#8217;ve just been put in charge of &#8220;cybersecurity documentation.&#8221; Your boss wants policies. The auditors are asking for procedures. The IT team is talking about standards.</p><p>Where do you even begin? It&#8217;s a confusing mess of terms that all sound the same.</p><p>Most people see this as bureaucratic paperwork, digital dust piling up in a shared drive. But it shouldn&#8217;t be that way. A well structured documentation is the single best way to influence how staff and the organization as a whole work towards their objectives.</p><p>The problem is that most people, even inside large companies, don&#8217;t know how to distinguish them and can&#8217;t use them to their fullest potential.</p><p>The policies, standards, and procedures in a cybersecurity documentation follow a top-down hierarchy. Each one answers a simple, specific question. This hierarchy is the backbone of major compliance frameworks, including the ISO/IEC 27000 series, or frameworks by NIST.</p><p>If you understand this structure, you can understand how any company <em>really</em> works&#8212;or build the structure yourself from scratch.</p><p>The structure is simple:</p><ul><li><p><strong>Policies</strong> answer: <strong>&#8220;Why?&#8221;</strong></p></li><li><p><strong>Standards</strong> answer: <strong>&#8220;What?&#8221;</strong></p></li><li><p><strong>Procedures</strong> answer: <strong>&#8220;How?&#8221;</strong></p></li><li><p><strong>Records</strong> prove the above</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!xEKB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F74024e83-016d-43f4-898d-cef6e974337b_1200x1200.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!xEKB!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F74024e83-016d-43f4-898d-cef6e974337b_1200x1200.png 424w, https://substackcdn.com/image/fetch/$s_!xEKB!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F74024e83-016d-43f4-898d-cef6e974337b_1200x1200.png 848w, https://substackcdn.com/image/fetch/$s_!xEKB!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F74024e83-016d-43f4-898d-cef6e974337b_1200x1200.png 1272w, https://substackcdn.com/image/fetch/$s_!xEKB!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F74024e83-016d-43f4-898d-cef6e974337b_1200x1200.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!xEKB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F74024e83-016d-43f4-898d-cef6e974337b_1200x1200.png" width="1200" height="1200" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/74024e83-016d-43f4-898d-cef6e974337b_1200x1200.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1200,&quot;width&quot;:1200,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:158649,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.grclab.com/i/176229501?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F74024e83-016d-43f4-898d-cef6e974337b_1200x1200.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!xEKB!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F74024e83-016d-43f4-898d-cef6e974337b_1200x1200.png 424w, https://substackcdn.com/image/fetch/$s_!xEKB!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F74024e83-016d-43f4-898d-cef6e974337b_1200x1200.png 848w, https://substackcdn.com/image/fetch/$s_!xEKB!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F74024e83-016d-43f4-898d-cef6e974337b_1200x1200.png 1272w, https://substackcdn.com/image/fetch/$s_!xEKB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F74024e83-016d-43f4-898d-cef6e974337b_1200x1200.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>That&#8217;s it. That&#8217;s the entire system.</p><p>To make this clear, we&#8217;ll use one simple example from start to finish: <strong>data backup</strong>.</p><h2><strong>The &#8220;Why&#8221; &#8212; The Policy</strong></h2><p>A policy is the starting point. It is a high-level, mandatory statement from management. It answers the question, &#8220;Why are we even doing this?&#8221;.</p><p>A policy doesn&#8217;t give you technical details. It doesn&#8217;t name software or list server locations. Instead, it states a clear goal and grants the authority to get it done. In the language of compliance, it &#8220;establishes management&#8217;s intent&#8221;.</p><p>This is the document that a Chief Information Security Officer (CISO) uses to get a budget. It&#8217;s the &#8220;because the CEO and the board said so&#8221; document.</p><p>In the context of the ISO 27000 family, policies are the foundation of the entire Information Security Management System (ISMS). They are the top-level directives that all other rules flow from.</p><p>It&#8217;s worth noting that while this &#8220;Why, What, How&#8221; structure is a common hierarchy , different frameworks use different terms. The U.S. National Institute of Standards and Technology (NIST), for example, primarily focuses on &#8216;policies&#8217; and &#8216;procedures&#8217;. In the NIST world, policies themselves are often tiered, broken down by their function, such as mission-level, business-process-level, and system-level policies.</p><h3><strong>Example: The Backup Policy</strong></h3><p>A backup policy is the perfect example. It won&#8217;t tell you <em>how</em> to back up data. It tells you <em>why</em> we back up data. A good one includes two main parts:</p><ol><li><p><strong>Purpose (The &#8220;Why&#8221;):</strong> It states the goal.</p><ul><li><p><em>Real-world example:</em> &#8220;The purpose of this policy is to maintain data integrity and availability... to prevent data loss... and to facilitate the restoration of... business processes&#8221;.</p></li><li><p><em>Or more simply:</em> &#8220;Data backup is an integral part of disaster recovery planning&#8221;.</p></li></ul></li><li><p><strong>Scope (The &#8220;Who&#8221; and &#8220;What&#8221;):</strong> It defines who and what is covered.</p><ul><li><p><em>Real-world example:</em> &#8220;This Data Backup Policy applies to: IT infrastructure... Cloud or Third-Party hosted infrastructure... [and] Information Systems that process or store OU data&#8221;.</p></li><li><p><em>And:</em> &#8220;This policy applies to all employees, contractors, and third-party employees... who... have access to the IT assets of the organization&#8221;.</p></li></ul></li></ol><p>That&#8217;s it. The policy is intentionally broad. It just set the goal: we must protect our data to keep the business running.</p><p>But it&#8217;s not actionable. You can&#8217;t &#8220;audit&#8221; a goal. You need a rule.</p><p>That brings us to the standard.</p><h2><strong>The &#8220;What&#8221; &#8212; The Standard</strong></h2><p>If the policy is the &#8220;why,&#8221; the standard is the &#8220;what.&#8221;</p><p>A standard is the &#8220;what&#8221; that we must do to meet the &#8220;why&#8221;. It translates the policy&#8217;s high-level goal into a mandatory, measurable, and quantifiable rule.</p><p>A quick note on terminology: In the ISO 27001 series, these measurable, granular rules are often referred to as &#8220;topic-specific policies&#8221;. For example, you might not have a &#8220;password standard&#8221; but a &#8220;topic-specific policy for access control&#8221;. Don&#8217;t let the name fool you. If it&#8217;s a mandatory, measurable rule that defines <em>what</em> to do (like encryption types or backup frequency), it&#8217;s acting as a standard.</p><p>This is the bridge from intent to action. It&#8217;s a &#8220;mandatory, specific requirement that defines what is needed to comply with a policy&#8221;.</p><p>A standard helps to enforce the statements of a policy.</p><h3><strong>Example: The Backup Standard</strong></h3><p>Our policy said, &#8220;we must protect our data&#8221;. The standard answers, &#8220;OK. What does &#8216;protect&#8217; actually mean?&#8221;</p><p>The rules look like this:</p><ul><li><p><strong>The 3-2-1 Rule:</strong> This is the most famous data backup standard in the world. It&#8217;s a simple, clear, and measurable rule. As defined by the U.S. Cybersecurity and Infrastructure Security Agency (CISA), the 3-2-1 rule is :</p><ul><li><p><strong>3</strong> &#8211; Keep <strong>three</strong> copies of any important file (one primary and two backups).</p></li><li><p><strong>2</strong> &#8211; Keep the files on <strong>two</strong> different media types (e.g., an internal hard drive and a cloud service).</p></li><li><p><strong>1</strong> &#8211; Store <strong>one</strong> copy off-site (outside your home or business).</p></li></ul></li><li><p><strong>Frequency:</strong> &#8220;Daily backups must be performed for all the components of critical systems&#8221;.</p></li><li><p><strong>Retention:</strong> &#8220;System state backups must be retained for no less than 90 days and no more than one year&#8221;.</p></li><li><p><strong>Testing:</strong> &#8220;Backup media must be tested periodically and at least once a year to ensure it meets... specifications... and functions as intended&#8221;.</p></li><li><p><strong>Access:</strong> &#8220;Access... to backups, backup media... and restoration capabilities must be restricted and limited to authorized users only&#8221;.</p></li></ul><p>See the difference? These are rules you can audit. An auditor doesn&#8217;t ask, &#8220;Do you believe in backups?&#8221; (the policy). They ask, &#8220;Show me your 90-day retention logs&#8221; and &#8220;Show me the test results from your last off-site restore&#8221; (the standard).</p><p>This is the document that forces a company to stop talking and start doing.</p><p>But it still doesn&#8217;t tell an employee <em>how</em> to do the test.</p><p>That brings us to the procedure.</p><h2><strong>The &#8220;How&#8221; &#8212; The Procedure</strong></h2><p>If the policy is the &#8220;why&#8221; and the standard is the &#8220;what,&#8221; the procedure is the &#8220;how.&#8221;</p><p>A procedure is the &#8220;how-to&#8221; guide. It is a detailed, step-by-step instruction manual that tells an employee exactly how to follow the standard.</p><p>The definition is beautifully simple. An official ISO glossary defines a procedure as: &#8220;A detailed description of the steps necessary to perform specific operations in conformance with applicable standards&#8221;.</p><p>This is the ground-level document. It&#8217;s the &#8220;recipe&#8221;. It&#8217;s the only document of the three that a non-managerial employee actually <em>uses</em> to do their job.</p><p>And in the event of a crisis, it is the most important document in the company.</p><h3><strong>Example: The Backup Procedure</strong></h3><p>Let&#8217;s follow the chain:</p><ul><li><p><strong>Policy (Why):</strong> &#8220;We must be able to restore business processes&#8221;.</p></li><li><p><strong>Standard (What):</strong> &#8220;We must test our restores at least once a year&#8221;.</p></li><li><p><strong>Procedure (How):</strong> &#8220;Here is the 9-step checklist for IT staff to perform the annual restore test.&#8221;</p></li></ul><p>A real procedure for data restoration, based on university and IT documentation, looks like this :</p><ol><li><p>IT Staff will determine the time and date of the lost data.</p></li><li><p>IT Staff will determine the appropriate backup media to restore the data.</p></li><li><p>IT Staff will insert the backup media into the appropriate server.</p></li><li><p>IT Staff will invoke the Backup/Restore software (e.g., Veritas Backup Exec or Arcserve).</p></li><li><p>IT Staff schedule the restore of the appropriate data within the Backup/Restore software.</p></li><li><p>IT Staff monitor the restore of data.</p></li><li><p>Upon restore, IT Staff evaluate the integrity of the restored data.</p></li><li><p>IT Staff will contact the end-user of the data to finalize restore.</p></li><li><p>Upon approval from the end-user, the restore is considered finished.</p></li></ol><p>This is not a high-level goal. It&#8217;s a checklist. It&#8217;s ground-level, actionable, and vital.</p><p>With procedures we make sure that the rules, defined in our standards are operationalised. </p><h2>The &#8220;Proof&#8221; <strong>&#8212; The Records</strong></h2><p>If the procedure is the &#8220;how-to&#8221; guide, the record is the &#8220;proof of work.&#8221;</p><p>A record is the evidence that a policy was followed, a standard was met, and a procedure was executed. It&#8217;s the log file, the completed checklist, the signed form, or the audit trail that proves an action took place.</p><p>This is the single most important part of an audit. An auditor doesn&#8217;t just read your procedure; they ask for the <em>records</em> to prove you followed it. This documentation provides the &#8220;chronological trail of system activity&#8221; that compliance bodies need to see.</p><p>Let&#8217;s complete our backup chain:</p><ul><li><p><strong>Policy (Why):</strong> &#8220;We must be able to restore business processes&#8221;.</p></li><li><p><strong>Standard (What):</strong> &#8220;We must test our restores at least once a year&#8221;.</p></li><li><p><strong>Procedure (How):</strong> &#8220;Here is the 9-step checklist for IT staff to perform the annual restore test.&#8221;</p></li><li><p><strong>Record (Proof):</strong> &#8220;Here is the completed, backup job, on our backup server.</p></li></ul><p>All together, this is the evidence that creates accountability.</p><h2><strong>Why This Matters to You</strong></h2><p>This hierarchy isn&#8217;t just for auditors. It&#8217;s a diagnostic tool for anyone.</p><p>When you&#8217;re looking at a company (as an employee, an investor, or a customer), you can use this framework to see if they&#8217;re serious about security or just paying lip service.</p><ul><li><p><strong>Policy with no Standard?</strong> This is a &#8220;Culture of Intent.&#8221; Management has &#8220;all talk, no action.&#8221; They&#8217;ve stated a goal but have no measurable rules to make it happen.</p></li><li><p><strong>Standard with no Procedure?</strong> This is a &#8220;Culture of Ticking Boxes.&#8221; The company has a rule, but they&#8217;ve never created a step-by-step guide for anyone to actually follow it. The rule exists for an audit, but it&#8217;s not part of the daily operation.</p></li><li><p><strong>All three are aligned?</strong> That is a &#8220;Culture of Maturity.&#8221; It shows that a high-level goal (the &#8220;why&#8221;) has been successfully translated into a measurable rule (the &#8220;what&#8221;) and a ground-level checklist (the &#8220;how&#8221;).</p></li></ul><p>So, the next time you hear about cybersecurity documentation, don&#8217;t think of it as &#8220;just paperwork.&#8221;</p><p>Think of it as a &#8220;Why, What, How&#8221; chain. It&#8217;s the blueprint of the company&#8217;s true priorities. And now you know how to read it.</p><div><hr></div><h2><strong>Whenever you&#8217;re ready, there are 3 ways how we can help you:</strong></h2><ol><li><p><strong><a href="https://grclab.com/courses/iso-27001-lead-implementer">ISO/IEC 27001 Lead Implementer Course</a></strong>: Learn how to implement, and maintain an ISMS. Leverage ready-to-use templates designed to accelerate your certification journey.</p></li><li><p><strong><a href="https://grclab.com/vouchers">Exam Vouchers</a>: </strong>Prepare and certify with confidence. Purchase exam vouchers and add official, exam-aligned training material. Save 10% compared to official retail prices.</p></li><li><p><strong><a href="https://grclab.com/contact-us">Promote your business</a></strong>: Put your company in front of 7,000+ highly-engaged GRC professionals at a 51% open rate!</p></li></ol><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.grclab.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">GRC Lab is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[What to Do When Auditors Ask for a Document That Isn't Required?]]></title><description><![CDATA[An auditor asks for a piece of paper, and your heart sinks. But what if they're wrong?]]></description><link>https://blog.grclab.com/p/what-to-do-when-auditors-ask-for</link><guid isPermaLink="false">https://blog.grclab.com/p/what-to-do-when-auditors-ask-for</guid><dc:creator><![CDATA[Aron Lange]]></dc:creator><pubDate>Fri, 07 Nov 2025 16:58:40 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/df637921-5901-484a-bda0-845d44d98e62_1456x1048.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The audit is going smoothly. You&#8217;ve showed them your risk register. You&#8217;ve walked them through your access control procedures. You&#8217;re starting to relax.</p><p>And then, the auditor looks up from their notes.</p><p>&#8220;Can you show me your documented list of internal and external issues?&#8221;</p><p>Your stomach drops. You <em>know</em> you talked about those issues. You had a whole workshop. You have notes in a Confluence page somewhere... or maybe they were just on a whiteboard. Is this it? Is this the &#8220;major nonconformity&#8221; that&#8217;s going to fail your audit?</p><p>The auditor helpfully adds, &#8220;You know, for Clause 4.1. Understanding the organization and its context.&#8221;</p><p>You nod, but you&#8217;re already scrambling. </p><p>This happened to all of us. </p><p>But what if I tell you that you don&#8217;t have to have a documented list of internal and external issues? Let&#8217;s dive in.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.grclab.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">GRC Lab is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2><strong>What Many of us Get Wrong</strong></h2><p>According to ISO/IEC 27001:2022, Clause 4.1 requires your organization to <em><strong>determine</strong></em> these issues.</p><p>It does <em><strong>not</strong></em> say you must <em><strong>document</strong></em> them.</p><p>To &#8220;Determine&#8221; means you have to think about them, identify them, and understand them. The <em>activity</em> is what&#8217;s mandatory. An <em>artifact, something like </em>a single, formal, signed-off document, is not.</p><p>So why do auditors ask for it?</p><p>Because it&#8217;s easy. It&#8217;s the simplest way for them to get evidence that the activity happened. Many auditors live by the old saying, &#8220;If it&#8217;s not written down, it didn&#8217;t happen&#8221;. Asking for a document is faster than a 10-minute interview and a lot easier to submit as objective evidence.</p><p>But in this specific case, the standard is on your side. </p><p>Let&#8217;s say one of your internal issues (Clause 4.1) is that you run an old, unsupported legacy system in the basement. This will of course affect multiple aspects of your management system, especially the required competence of IT-administrators. </p><p>Instead of requesting a list of internal and external issues, auditors should look out for whether an organization is taking this into consideration when it comes to hiring new and training existing staff. In this example, the internal and external context would be extremely relevant for Clause 7.2 (Competence).</p><p>So, the problem isn&#8217;t always the standard. It&#8217;s the gap between the standard&#8217;s flexibility and the auditor&#8217;s traditional, document-centric habits.</p><h2><strong>What a &#8220;Nonconformity&#8221; Actually Is (And Isn&#8217;t)</strong></h2><p>Before we go further, we need to agree on what &#8220;failing&#8221; means. When an auditor finds something wrong, they raise a &#8220;nonconformity.&#8221;</p><p>A nonconformity is simply the &#8220;non-fulfilment of a requirement&#8221;.</p><p>This is the most important thing you will read today: In any audit, the auditor is checking for the fulfilment of <strong>two</strong> sets of requirements. Not just one.</p><ol><li><p><strong>ISO 27001 Requirements.</strong> These are the &#8220;shall&#8221; statements in the ISO 27001 standard. For example, Clause 5.2 says you <em>shall</em> establish an information security policy. If you don&#8217;t have one, that&#8217;s a nonconformity. This is the obvious one.</p></li><li><p><strong>Organizational Requirements.</strong> These are the rules, policies, and procedures <em>you write for yourself</em>. If your Information Security Management System (ISMS) says you will do something, the auditor will check that you are, in fact, doing it.</p></li></ol><p>&#128073; An auditor can <strong>only</strong> write a nonconformity if you violate a rule from one of these two sets.</p><p>So, if the standard <em>doesn&#8217;t</em> require a documented list (Set 1) AND your <em>own</em> ISMS policies <em>don&#8217;t</em> promise a documented list (Set 2)... then the absence of that list is <strong>not a nonconformity.</strong></p><h2><strong>The Trap: How You Create Your Own Nonconformities</strong></h2><p>That second set of requirements&#8212;the ones you write yourself&#8212;is the biggest trap in compliance. And most people walk right into it.</p><p>We try to &#8220;over-document&#8221; to look good, but we just give the auditor more ammunition.</p><p>Let&#8217;s use an example. The standard requires you to &#8220;manage information security incidents.&#8221; That&#8217;s flexible. But you, trying to be impressive, write a mandatory company-wide procedure that says, &#8220;All incidents, of any severity, <em>must</em> be reported to the CISO within 15 minutes.&#8221;</p><p>You&#8217;ve just created a new, very specific, and very brittle requirement for yourself.</p><p>What happens when the auditor finds an employee who reported an incident after 30 minutes? You didn&#8217;t violate the <em>standard</em>, but you <em>did</em> violate your <em>own procedure</em>. And that is a 100% valid nonconformity.</p><p>This is the &#8220;Self-Imposed Requirement Trap.&#8221; It&#8217;s born from good intentions but paved with nonconformities. We write aspirational policies that don&#8217;t match our real-world operations.</p><p>This is why Clause 4.1 is such a perfect example. By <em>not</em> documenting it formally, you may <em>reduce</em> your audit risk&#8212;as long as you still did the work and can prove it. If you <em>do</em> document it, you&#8217;ve just created more administrative overhead, and thus, more ways to fail.</p><h2><strong>Why Doesn&#8217;t the Standard Just Tell Me What to Write Down?</strong></h2><p>At this point, you might be thinking, &#8220;This is silly. Why don&#8217;t the ISO people just give us a checklist?&#8221;</p><p>The answer is that modern standards like ISO 27001 are risk-based, not checklists. They are designed to work for a 10-person startup and a 100,000-person bank. The standard <em>cannot</em> know the &#8220;extent of documented information&#8221; you need. Only you can.</p><p>The standard trusts you to be the expert on your own company. It&#8217;s built for <em>effectiveness</em>, not just &#8220;a system of documents&#8221;.</p><p>But the standard isn&#8217;t trying to trick you. In fact, it has a &#8220;secret code&#8221; for when it <em>absolutely, 100%</em> wants you to write something down.</p><p>You just have to know the two magic phrases:</p><ul><li><p><strong>&#8220;Maintain documented information&#8221;</strong>: This is the code for a <em>document</em>. Think of policies, procedures, or the scope of your ISMS. These are &#8220;living&#8221; documents that you must &#8220;maintain&#8221; and keep up-to-date.</p></li><li><p><strong>&#8220;Retain documented information&#8221;</strong>: This is the code for a <em>record</em>. This is evidence, or proof, that something <em>happened</em>. Think of audit results, management review outputs, or logs. You &#8220;retain&#8221; them to prove you did the work.</p></li></ul><p>Now, go back and look at Clause 4.1. Does it say &#8220;maintain&#8221; or &#8220;retain&#8221;?</p><p>It says neither. It just says &#8220;determine.&#8221;</p><p>This is the standard&#8217;s authors <em>explicitly telling you</em> that the format is flexible. When they <em>want</em> a document, they know exactly what to say.</p><h2><strong>What ISO 27001 </strong><em><strong>Actually</strong></em><strong> Requires</strong></h2><p>So, let&#8217;s put this &#8220;secret code&#8221; to work. You don&#8217;t need a 50-page &#8220;Mandatory Documents&#8221; list. The standard is actually very specific. Here is a list of the <em>main</em> things ISO 27001:2022 explicitly requires you to document.</p><p>(And before you start the audit, just look at this list. Notice what <em>isn&#8217;t</em> on it? Clause 4.1.)</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zW95!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1861298c-aa88-4b24-bc35-db86435b46ec_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zW95!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1861298c-aa88-4b24-bc35-db86435b46ec_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!zW95!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1861298c-aa88-4b24-bc35-db86435b46ec_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!zW95!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1861298c-aa88-4b24-bc35-db86435b46ec_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!zW95!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1861298c-aa88-4b24-bc35-db86435b46ec_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zW95!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1861298c-aa88-4b24-bc35-db86435b46ec_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1861298c-aa88-4b24-bc35-db86435b46ec_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:127013,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.grclab.com/i/178283137?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1861298c-aa88-4b24-bc35-db86435b46ec_1280x720.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zW95!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1861298c-aa88-4b24-bc35-db86435b46ec_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!zW95!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1861298c-aa88-4b24-bc35-db86435b46ec_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!zW95!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1861298c-aa88-4b24-bc35-db86435b46ec_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!zW95!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1861298c-aa88-4b24-bc35-db86435b46ec_1280x720.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>This isn&#8217;t <em>everything</em>: The most important one is to be found in clause 7.5: <strong>the documents </strong><em><strong>you</strong></em><strong> decide are necessary</strong>. That&#8217;s the trap from Section 4. Be thoughtful. Keep it simple.</p><h2><strong>The Bottom Line</strong></h2><p>That&#8217;s it. You&#8217;re not at the mercy of an auditor&#8217;s personal checklist. An audit is a verification of your <em>system</em>, not a test of your document library.</p><p>Your job is to build an <em>effective</em> Information Security Management System that <em>actually</em> manages risk. Part of that is having the <em>right</em> documentation&#8212;and not one page more than you need.</p><p>So be polite. Be confident. And most importantly, know the difference between what the standard requires, and what <em>you</em> promise.</p><div><hr></div><h3><strong>Whenever you&#8217;re ready, there are 3 ways how we can help you:</strong></h3><ol><li><p><strong><a href="https://grclab.com/courses/iso-27001-lead-implementer">ISO/IEC 27001 Lead Implementer Course</a></strong>: Learn how to implement, and maintain an ISMS. Leverage ready-to-use templates designed to accelerate your certification journey.</p></li><li><p><strong><a href="https://grclab.com/vouchers">Exam Vouchers</a>: </strong>Prepare and certify with confidence. Purchase exam vouchers and add official, exam-aligned training material. Save 10% compared to official retail prices.</p></li><li><p><strong><a href="https://grclab.com/contact-us">Promote your business</a></strong>: Put your company in front of 7,000+ highly-engaged GRC professionals at a 51% open rate!</p><p></p></li></ol><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.grclab.com/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share&quot;,&quot;text&quot;:&quot;Share GRC Lab&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.grclab.com/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share"><span>Share GRC Lab</span></a></p>]]></content:encoded></item><item><title><![CDATA[Why your SoA is NOT compliant!]]></title><description><![CDATA[As an auditor, I see the same mistake all the time. Here&#8217;s what the standard actually requires.]]></description><link>https://blog.grclab.com/p/why-your-soa-is-not-compliant</link><guid isPermaLink="false">https://blog.grclab.com/p/why-your-soa-is-not-compliant</guid><dc:creator><![CDATA[Aron Lange]]></dc:creator><pubDate>Thu, 30 Oct 2025 16:05:53 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/6afa6bf9-8d95-4c3d-98fd-aa00ae62564f_1456x1048.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In my work as an information security auditor, I&#8217;ve seen a lot of Statements of Applicability (SoA). And honestly, most of them look the same. It doesn&#8217;t matter if it belongs to a multi-billion dollar corporation or a 10-person startup.</p><p>What I usually find is a big spreadsheet that includes a a direct copy-paste of ISO 27001&#8217;s Annex A, with three extra columns added:</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.grclab.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">GRC Lab is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><ol><li><p>Applicable? (Yes/No)</p></li><li><p>Implementation Status (Implemented/Not Implemented)</p></li><li><p>Justification for inclusion/exclusion</p></li></ol><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!OkAx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b4622a7-e822-4ec3-ab3e-b257e3795f95_1602x1136.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!OkAx!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b4622a7-e822-4ec3-ab3e-b257e3795f95_1602x1136.png 424w, https://substackcdn.com/image/fetch/$s_!OkAx!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b4622a7-e822-4ec3-ab3e-b257e3795f95_1602x1136.png 848w, https://substackcdn.com/image/fetch/$s_!OkAx!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b4622a7-e822-4ec3-ab3e-b257e3795f95_1602x1136.png 1272w, https://substackcdn.com/image/fetch/$s_!OkAx!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b4622a7-e822-4ec3-ab3e-b257e3795f95_1602x1136.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!OkAx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b4622a7-e822-4ec3-ab3e-b257e3795f95_1602x1136.png" width="1456" height="1032" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4b4622a7-e822-4ec3-ab3e-b257e3795f95_1602x1136.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1032,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:278058,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.grclab.com/i/177575082?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b4622a7-e822-4ec3-ab3e-b257e3795f95_1602x1136.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!OkAx!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b4622a7-e822-4ec3-ab3e-b257e3795f95_1602x1136.png 424w, https://substackcdn.com/image/fetch/$s_!OkAx!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b4622a7-e822-4ec3-ab3e-b257e3795f95_1602x1136.png 848w, https://substackcdn.com/image/fetch/$s_!OkAx!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b4622a7-e822-4ec3-ab3e-b257e3795f95_1602x1136.png 1272w, https://substackcdn.com/image/fetch/$s_!OkAx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b4622a7-e822-4ec3-ab3e-b257e3795f95_1602x1136.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">What most Statements of Applicability look like&#8230;</figcaption></figure></div><p>But what&#8217;s the point of having a SoA? </p><p>An ISO 27001 certificate proves that an ISMS was established that meets the requirements of the standard and is capable of achieving the defined information security objectives. Given it&#8217;s descriptive nature, being compliant with ISO 27001 doesn&#8217;t provide much information about how secure an organisation actually is.</p><p>The SoA is supposed to be the key document that gives the certificate context. It&#8217;s meant to tell you what&#8217;s <em>really</em> going on inside that certified ISMS. It&#8217;s the one place that should explain <em>how</em> a company is managing its specific security risks and describe what has <em>actually</em> been done to treat them.</p><p>The problem is, most SoAs don&#8217;t.</p><p>I see this document, which should be the beating heart of the ISMS, treated as a simple administrative hurdle.</p><p>This &#8220;compliance-first&#8221; approach, where you just fill out the Annex A spreadsheet, misses the entire point of the SoA, and it&#8217;s probably not compliant with what the standard&#8217;s authors intended.</p><h3>What ISO 27001 Actually Requires</h3><p>Let&#8217;s look at what the standard (in clause 6.1.3) actually requires. It says the organization must:</p><ol><li><p>Determine all controls that are <strong>necessary</strong> to treat its risks.</p></li><li><p><strong>Compare</strong> those necessary controls with the ones in Annex A to verify that no necessary controls have been omitted.</p></li><li><p>Produce a Statement of Applicability that contains the <strong>necessary controls</strong>, the justification for including them, their implementation status, and the justification for excluding any Annex A controls.</p></li></ol><p>The key phrase here is &#8220;necessary controls.&#8221;</p><p>The order here is critical, and it&#8217;s the part most people get backward. The standard explicitly asks you to start with <em>your</em> risks and <em>your</em> controls. The comparison to Annex A comes <em>after</em> you&#8217;ve done that hard work, not before.</p><p>But almost everyone jumps straight to Annex A and works backward, which defeats the entire risk-based purpose of the standard.</p><p>Your SoA is supposed to be a list of <em>your necessary controls</em>, not just a report card for Annex A.</p><h3>Annex A Is Not Your Control Catalog</h3><p>This is the core misunderstanding. People treat Annex A as a comprehensive control catalog. It isn&#8217;t.</p><p>What is Annex A? It&#8217;s a list of 93 <em>reference</em> controls, organized into four themes. Think of it as a safety net, a final checklist to sanity-check your risk assessment and make sure you didn&#8217;t forget an entire category of security.</p><p>It is not a detailed &#8220;how-to&#8221; guide.</p><p>Let&#8217;s use an example. Look at control A.8.5, &#8220;Secure Authentication.&#8221; The standard says:</p><blockquote><p><em>&#8220;Secure authentication technologies and procedures shall be implemented based on information access restrictions and the topic-specific policy on access control.&#8221;</em></p></blockquote><p>That&#8217;s it. It&#8217;s a broad description of a desired state. It doesn&#8217;t tell you <em>what</em> technologies to use, <em>how</em> to configure them, or <em>where</em> to apply them. It&#8217;s merely a high-level goal.</p><p>The standard has to be this way because &#8220;secure authentication&#8221; means something very different for a global bank than it does for a small internal-only manufacturing tool. The <em>risk</em> is different, so the <em>necessary control</em> will be different.</p><p>Annex A is just a prompt. It asks, &#8220;Have you thought about authentication?&#8221; Your risk assessment must provide the detailed answer. You can&#8217;t &#8220;implement&#8221; A.8.5. You implement <em>actual security controls</em> that help you <em>achieve</em> the goal of A.8.5.</p><h3>So, What Are &#8220;Necessary Controls&#8221;?</h3><p>&#8220;Necessary controls&#8221; are the specific measures and technologies you decide to implement to treat your risks.</p><p>The &#8220;necessary&#8221; part is the direct output of your risk treatment plan. If your risk assessment says &#8216;phishing-based account takeover, is unacceptably high,&#8217; your risk treatment plan might be &#8216;Reduce this risk.&#8217; The <em>how</em>&#8212;the specific action you take&#8212;that&#8217;s your necessary control.</p><p>Let&#8217;s stick with the authentication example. Your risk assessment identifies that high risk of account compromise. To treat that risk, you determine a &#8220;necessary control&#8221; is needed.</p><p>That control isn&#8217;t &#8220;A.8.5.&#8221; Your necessary control is something specific and actionable, like:</p><ul><li><p>&#8220;Implement hardware security keys (YubiKey) for all administrator accounts.&#8221;</p></li><li><p>&#8220;Enforce MFA authenticator apps (TOTP) across all cloud services.&#8221;</p></li><li><p>&#8220;Implement SAML-based Single Sign-On (SSO) with session timeouts and IP-based restrictions.&#8221;</p></li><li><p>&#8220;Use certificate-based authentication for all machine-to-machine access.&#8221;</p></li></ul><p>See the difference? These are real, specific, and auditable actions. You can test these. You can verify they are configured correctly. <em>These</em> are your &#8220;necessary controls.&#8221;</p><h3>What Your SoA Should Look Like</h3><p>This changes how your SoA should be structured. The document shouldn&#8217;t just list the 93 Annex A controls. It should list <em>your</em> specific controls and map them back to Annex A.</p><p>Instead of this common (and less useful) approach:</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Q57N!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51ce1e34-9011-4b72-9def-6489e8063bf6_3350x230.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Q57N!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51ce1e34-9011-4b72-9def-6489e8063bf6_3350x230.png 424w, https://substackcdn.com/image/fetch/$s_!Q57N!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51ce1e34-9011-4b72-9def-6489e8063bf6_3350x230.png 848w, https://substackcdn.com/image/fetch/$s_!Q57N!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51ce1e34-9011-4b72-9def-6489e8063bf6_3350x230.png 1272w, https://substackcdn.com/image/fetch/$s_!Q57N!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51ce1e34-9011-4b72-9def-6489e8063bf6_3350x230.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Q57N!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51ce1e34-9011-4b72-9def-6489e8063bf6_3350x230.png" width="1456" height="100" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/51ce1e34-9011-4b72-9def-6489e8063bf6_3350x230.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:100,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:79435,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.grclab.com/i/177575082?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51ce1e34-9011-4b72-9def-6489e8063bf6_3350x230.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Q57N!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51ce1e34-9011-4b72-9def-6489e8063bf6_3350x230.png 424w, https://substackcdn.com/image/fetch/$s_!Q57N!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51ce1e34-9011-4b72-9def-6489e8063bf6_3350x230.png 848w, https://substackcdn.com/image/fetch/$s_!Q57N!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51ce1e34-9011-4b72-9def-6489e8063bf6_3350x230.png 1272w, https://substackcdn.com/image/fetch/$s_!Q57N!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51ce1e34-9011-4b72-9def-6489e8063bf6_3350x230.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>Your SoA should look more like this, starting with <em>your</em> controls:</p><p><strong>Necessary Control ID: </strong>e.g.<strong> </strong>CTR-001</p><p><strong>Necessary Control: </strong>Access to all critical systems is protected with MFA.</p><p><strong>Justification for Inclusion/Exclusion: </strong>This control has been identified as necessary to treat one or more identified risks</p><p><strong>Status: </strong>Implemented</p><p><strong>Reference: </strong>A.8.5</p><h2>Where to go from here.</h2><p>Your SoA is a living document. When it&#8217;s built this way, it&#8217;s no longer just an audit document. It becomes a central governance tool. It tells an auditor, a customer, or a new CISO <em>exactly</em> what you are doing to manage your risks.</p><p>It&#8217;s what you use to guide internal audits. It&#8217;s what you show new security team members to get them up to speed. It&#8217;s a concrete, detailed summary of your security program that you can use to build trust with customers, far more effectively than just showing them the certificate.</p><p>While most auditors (including myself) accept SoAs with the Annex A copied, doing what the standard actually has in mind, can greatly benefit your organisation and help build the type of trust you seek to establish.</p><p>I think you should consider to upgrade your SoA!</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.grclab.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">GRC Lab is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[The Missing Link in your Documentation]]></title><description><![CDATA[Discover the difference between processes and procedures.]]></description><link>https://blog.grclab.com/p/the-missing-link-in-your-documentation</link><guid isPermaLink="false">https://blog.grclab.com/p/the-missing-link-in-your-documentation</guid><dc:creator><![CDATA[Aron Lange]]></dc:creator><pubDate>Fri, 24 Oct 2025 06:49:56 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/e127cc51-92cb-4650-98b8-9596f54600f3_1456x1048.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>A solid information security program is built on a pyramid of documentation. At the top, you have high-level <strong>policies</strong> that state management&#8217;s intent. Below that are <strong>standards</strong>, which define mandatory rules. At the base, you have detailed, step-by-step <strong>procedures</strong> that tell employees exactly how to perform specific tasks. <strong>Records </strong>provide the evidence that procedures have been followed to meet standards that fulfil an organisation&#8217;s policies.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!pI7p!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe1d61a6-84ae-4fec-b0c3-7d3b3bdc548c_1200x1200.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!pI7p!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe1d61a6-84ae-4fec-b0c3-7d3b3bdc548c_1200x1200.png 424w, https://substackcdn.com/image/fetch/$s_!pI7p!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe1d61a6-84ae-4fec-b0c3-7d3b3bdc548c_1200x1200.png 848w, https://substackcdn.com/image/fetch/$s_!pI7p!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe1d61a6-84ae-4fec-b0c3-7d3b3bdc548c_1200x1200.png 1272w, https://substackcdn.com/image/fetch/$s_!pI7p!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe1d61a6-84ae-4fec-b0c3-7d3b3bdc548c_1200x1200.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!pI7p!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe1d61a6-84ae-4fec-b0c3-7d3b3bdc548c_1200x1200.png" width="1200" height="1200" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fe1d61a6-84ae-4fec-b0c3-7d3b3bdc548c_1200x1200.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1200,&quot;width&quot;:1200,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:158649,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.grclab.com/i/176229267?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe1d61a6-84ae-4fec-b0c3-7d3b3bdc548c_1200x1200.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!pI7p!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe1d61a6-84ae-4fec-b0c3-7d3b3bdc548c_1200x1200.png 424w, https://substackcdn.com/image/fetch/$s_!pI7p!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe1d61a6-84ae-4fec-b0c3-7d3b3bdc548c_1200x1200.png 848w, https://substackcdn.com/image/fetch/$s_!pI7p!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe1d61a6-84ae-4fec-b0c3-7d3b3bdc548c_1200x1200.png 1272w, https://substackcdn.com/image/fetch/$s_!pI7p!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe1d61a6-84ae-4fec-b0c3-7d3b3bdc548c_1200x1200.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>But there&#8217;s often a crucial layer missing from this formal documentation pyramid: the <strong>process</strong>. While procedures are a core component of the pyramid, processes are frequently left undocumented. This isn&#8217;t because they are unimportant; in fact, they are vital for understanding the big picture. The reason they are often omitted is that a process isn&#8217;t a document itself&#8212;it&#8217;s the action, the end-to-end flow of work that delivers a result.</p><p>Let&#8217;s break down why that is, starting with what a process truly represents.</p><h2><strong>What is a Process? The Strategic &#8220;What&#8221; and &#8220;Why&#8221;</strong></h2><p>A process is a high-level series of related activities that transforms an input into a valuable output. It answers the questions, &#8220;What needs to be done?&#8221; and &#8220;Why are we doing it?&#8221;. </p><p>According to <em>ISO 9000:2015</em>, a process is defined as:</p><blockquote><p>&#8220;A set of interrelated or interacting activities that uses or transforms inputs to deliver a result.&#8221;</p></blockquote><p>A process provides the overall framework and direction but doesn&#8217;t get into the granular, step-by-step details. It&#8217;s the strategic roadmap, not the turn-by-turn directions.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!dFwt!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc048661c-d951-49e4-82ab-37f7cdebacc6_1456x379.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!dFwt!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc048661c-d951-49e4-82ab-37f7cdebacc6_1456x379.png 424w, https://substackcdn.com/image/fetch/$s_!dFwt!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc048661c-d951-49e4-82ab-37f7cdebacc6_1456x379.png 848w, https://substackcdn.com/image/fetch/$s_!dFwt!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc048661c-d951-49e4-82ab-37f7cdebacc6_1456x379.png 1272w, https://substackcdn.com/image/fetch/$s_!dFwt!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc048661c-d951-49e4-82ab-37f7cdebacc6_1456x379.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!dFwt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc048661c-d951-49e4-82ab-37f7cdebacc6_1456x379.png" width="1456" height="379" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c048661c-d951-49e4-82ab-37f7cdebacc6_1456x379.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:379,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!dFwt!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc048661c-d951-49e4-82ab-37f7cdebacc6_1456x379.png 424w, https://substackcdn.com/image/fetch/$s_!dFwt!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc048661c-d951-49e4-82ab-37f7cdebacc6_1456x379.png 848w, https://substackcdn.com/image/fetch/$s_!dFwt!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc048661c-d951-49e4-82ab-37f7cdebacc6_1456x379.png 1272w, https://substackcdn.com/image/fetch/$s_!dFwt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc048661c-d951-49e4-82ab-37f7cdebacc6_1456x379.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><strong>Example: The Incident Management Process</strong></h3><p>A perfect example is the <strong>Incident Management Process</strong>. This is the entire lifecycle for handling a security event, from initial alert to final resolution. The goal (the &#8220;why&#8221;) is to minimize damage and restore normal operations as quickly as possible. The process (the &#8220;what&#8221;) is a sequence of high-level activities. According to frameworks from SANS, ISO and NIST, these activities typically include :</p><ol><li><p><strong>Preparation:</strong> Getting ready before an incident occurs.</p></li><li><p><strong>Identification (or Detection &amp; Analysis):</strong> Recognizing that an incident has happened and figuring out its scope.</p></li><li><p><strong>Containment:</strong> Stopping the incident from spreading and causing more damage.</p></li><li><p><strong>Eradication:</strong> Removing the threat from the environment.</p></li><li><p><strong>Recovery:</strong> Restoring affected systems back to normal operation.</p></li><li><p><strong>Lessons Learned (or Post-Incident Activity):</strong> Reviewing the incident to improve for the future.</p></li></ol><p></p><p>This sequence describes the entire flow of work. It tells you what needs to happen, but it doesn&#8217;t tell you exactly how to perform each of these activities. For that, you need procedures.</p><h2><strong>What is a Procedure? The Tactical &#8220;How&#8221;</strong></h2><p>A procedure on the other hand is a detailed, step-by-step set of instructions that explains how to perform a specific activity within a process. It answers the questions, &#8220;Who does what, when, and how?&#8221;. </p><p>According to <em>ISO 30000:2009</em>, a procedure is defined as:</p><blockquote><p>&#8220;A specified way to carry out an activity or a process.&#8221;</p></blockquote><p>Unlike a process, which is flexible, a procedure is intentionally rigid and prescriptive to ensure tasks are performed with consistency and precision every time. You can&#8217;t have a procedure without an underlying process, but a process can exist without a documented procedure.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!FCNo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3a00f99-6f80-4f06-a459-3e5a3d12f620_1456x480.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!FCNo!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3a00f99-6f80-4f06-a459-3e5a3d12f620_1456x480.png 424w, https://substackcdn.com/image/fetch/$s_!FCNo!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3a00f99-6f80-4f06-a459-3e5a3d12f620_1456x480.png 848w, https://substackcdn.com/image/fetch/$s_!FCNo!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3a00f99-6f80-4f06-a459-3e5a3d12f620_1456x480.png 1272w, https://substackcdn.com/image/fetch/$s_!FCNo!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3a00f99-6f80-4f06-a459-3e5a3d12f620_1456x480.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!FCNo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3a00f99-6f80-4f06-a459-3e5a3d12f620_1456x480.png" width="1456" height="480" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b3a00f99-6f80-4f06-a459-3e5a3d12f620_1456x480.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:480,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!FCNo!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3a00f99-6f80-4f06-a459-3e5a3d12f620_1456x480.png 424w, https://substackcdn.com/image/fetch/$s_!FCNo!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3a00f99-6f80-4f06-a459-3e5a3d12f620_1456x480.png 848w, https://substackcdn.com/image/fetch/$s_!FCNo!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3a00f99-6f80-4f06-a459-3e5a3d12f620_1456x480.png 1272w, https://substackcdn.com/image/fetch/$s_!FCNo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3a00f99-6f80-4f06-a459-3e5a3d12f620_1456x480.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><strong>Example: Procedures within the Incident Management Process</strong></h3><p>Let&#8217;s zoom in on our Incident Management Process and see the specific procedures that bring each activity to life.</p><h4><strong>Activity: Identification</strong></h4><ul><li><p><strong>Procedure: End-User Reporting a Phishing Email.</strong> This document would give an employee exact, step-by-step instructions:</p><ol><li><p>Do not click any links or open any attachments in the suspicious email.</p></li><li><p>If you are using Microsoft Outlook, click the &#8220;Report Phishing&#8221; button on the Home ribbon.</p></li><li><p>Alternatively, forward the email as an attachment to <code>abuse@yourcompany.com</code>.</p></li><li><p>If you accidentally clicked a link or entered your password, immediately call the IT Help Desk at extension 5555 and report it.</p></li></ol></li></ul><h4><strong>Activity: Containment</strong></h4><ul><li><p><strong>Procedure: Isolating a Compromised Host from the Network.</strong> This is a technical guide for a security analyst, detailing the precise actions to take once a machine is confirmed to be infected:</p><ol><li><p>Open the Cortex XDR console and locate the compromised endpoint by its hostname.</p></li><li><p>Right-click the endpoint and select &#8220;Isolate Endpoint&#8221; from the action menu.</p></li><li><p>If the endpoint is a Linux server, log in to the firewall administration panel.</p></li><li><p>Create a new rule to block all inbound and outbound traffic for the server&#8217;s IP address, except for connections from the security team&#8217;s designated IP range.</p></li></ol></li></ul><h4><strong>Activity: Lessons Learned</strong></h4><ul><li><p><strong>Procedure: Conducting a Post-Incident Review.</strong> This procedure ensures that every incident review is thorough and consistent. It would instruct the Incident Commander to:</p><ol><li><p>Schedule a post-incident review meeting within 48 hours of the incident&#8217;s resolution.</p></li><li><p>Complete the official &#8220;Post-Incident Review Template&#8221; document.</p></li><li><p>In the &#8220;Incident Timeline&#8221; section, document the key actions taken in chronological order.</p></li><li><p>In the &#8220;Root Cause Analysis&#8221; section, identify the primary cause and any contributing factors.</p></li><li><p>In the &#8220;Action Items&#8221; section, create a task list with assigned owners and due dates for all preventative measures identified.</p></li></ol></li></ul><p>As you can see, the process provides the high-level framework, while the procedures provide the detailed, actionable instructions needed to execute each part of that framework correctly and consistently.</p><h2>Sample Lecture</h2><p>Here is a sample lecture of our ISO/IEC 27001 Lead Implementer course on the fundamentals of documented information in the context of clause 7.5 of ISO/IEC 27001:2025.</p><div id="youtube2-QFD2lhTS38Y" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;QFD2lhTS38Y&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/QFD2lhTS38Y?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h3><strong>Whenever you&#8217;re ready, there are 3 ways how we can help you:</strong></h3><ol><li><p><strong><a href="https://grclab.com/courses/iso-27001-lead-implementer">ISO/IEC 27001 Lead Implementer Course</a></strong>: Learn how to implement, and maintain an ISMS. Leverage ready-to-use templates designed to accelerate your certification journey.</p></li><li><p><strong><a href="https://grclab.com/vouchers">Exam Vouchers</a>: </strong>Prepare and certify with confidence. Purchase exam vouchers and add official, exam-aligned training material. Save 10% compared to official retail prices.</p></li><li><p><strong><a href="https://grclab.com/contact-us">Promote your business</a></strong>: Put your company in front of 7,000+ highly-engaged GRC professionals at a 51% open rate!</p></li></ol><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.grclab.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">GRC Lab is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[The New "Big Three": How ISO 27701:2025 Completes the Modern Governance Playbook]]></title><description><![CDATA[ISO/IEC 27701 was finally released!]]></description><link>https://blog.grclab.com/p/the-new-big-three-how-iso-277012025</link><guid isPermaLink="false">https://blog.grclab.com/p/the-new-big-three-how-iso-277012025</guid><dc:creator><![CDATA[Aron Lange]]></dc:creator><pubDate>Thu, 16 Oct 2025 20:01:18 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/5412ce04-6e63-403d-91af-5c095a165685_1456x1048.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In the summer of 2010, the landscape of professional basketball was fundamentally altered. Three of the league&#8217;s top players&#8212;LeBron James, Dwyane Wade, and Chris Bosh&#8212;all franchise cornerstones and scoring leaders from the same 2003 draft class, decided to join forces on the Miami Heat. </p><p>This was not merely an accumulation of talent; it was the strategic assembly of a &#8220;superteam.&#8221; Each player brought a distinct, elite skill set: Wade, the established champion and explosive scorer; James, the versatile, do-it-all MVP; and Bosh, the adaptable big man who could stretch the floor. Together, they created a synergistic force that dominated the league, reaching the NBA Finals in all four of their seasons together and winning two championships. If it wasn&#8217;t for Dirk Nowitzki, this team could have been the most successful ever assembled. </p><p>Today, in the world of governance, risk, and compliance, a similar &#8220;Big Three&#8221; has emerged. The convergence of data-driven business models, the rapid rise of artificial intelligence, and a complex web of global regulations has created the need for a new kind of strategic alignment.</p><p>Organizations can no longer treat information security, AI governance, and data privacy as separate disciplines. To build and maintain trust in the modern digital economy, they need an integrated playbook. This playbook is defined by a trio of powerful ISO management system standards.</p><h3><strong>The ISO &#8220;Big Three&#8221;</strong></h3><ul><li><p><strong>ISO/IEC 27001:</strong> This is the established champion, the bedrock of the team. As the international standard for an Information Security Management System (ISMS), ISO 27001 provides a comprehensive, risk-based framework for protecting the confidentiality, integrity, and availability of all organizational information. It is not just about IT security; it encompasses people, processes, and technology to manage information risks effectively. </p></li><li><p><strong>ISO/IEC 42001:</strong> This is the versatile, forward-looking standard that adapts to the new reality. ISO 42001 specifies the requirements for an Artificial Intelligence Management System (AIMS), addressing the unique risks and opportunities presented by AI. It provides a structured approach to managing the entire AI lifecycle, from design and development to deployment and decommissioning. The standard focuses on promoting responsible AI use by tackling challenges like ethical considerations, transparency, accountability, and bias mitigation, ensuring that innovation happens within a controlled and trustworthy framework.</p></li><li><p><strong>ISO/IEC 27701:</strong> This is the standard that completes the team. ISO 27701 specifies the requirements for a Privacy Information Management System (PIMS). It takes the robust security foundation of ISO 27001 and applies a specific, rigorous focus on the protection of personally identifiable information (PII). A PIMS provides the blueprint for complying with a growing number of global privacy regulations, most notably the EU&#8217;s General Data Protection Regulation (GDPR).</p></li></ul><p>The assembly of these three standards marks a significant evolution in enterprise risk management. It signals a move away from siloed compliance activities and toward an integrated governance model. The business environment is now defined by the interplay of data operations (requiring security), AI tools (requiring AI governance), and privacy obligations (requiring privacy management). </p><p>These are not separate challenges; they are interconnected facets of a single, overarching question: how can an organization use data and technology responsibly to create value? </p><p>This trio of standards provides the market with a holistic, internationally recognized, and auditable &#8220;Trust Framework.&#8221; Companies are no longer just selling a product or service; they are selling trust. The ISO &#8220;Big Three&#8221; provides the definitive blueprint for demonstrating it. This shift will inevitably drive a convergence of roles within organizations, requiring Chief Information Security Officers, Chief Privacy Officers, and emerging Chief AI Officers to work from a common playbook.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.grclab.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.grclab.com/subscribe?"><span>Subscribe now</span></a></p><h2><strong>Why ISO 27701:2019 Was Sidelined</strong></h2><p>For any championship team to function, its key players must be on the court and in sync. For the past few years, a critical member of the governance &#8220;Big Three&#8221; was effectively stuck on the bench due to a technicality. The 2019 version of ISO 27701, while conceptually powerful, was hampered by a structural dependency that rendered it incompatible with the latest security best practices.</p><p>The original ISO 27701:2019 was designed not as a standalone standard, but as a privacy extension to ISO 27001. Its entire structure was built upon the foundation of an existing Information Security Management System (ISMS). The PIMS it described borrowed its core security controls directly from the Annex A of the then-current version of the security standard, ISO 27001:2013. This tight coupling was its greatest strength and, ultimately, its critical weakness.</p><p>In October 2022, the foundational standard, ISO/IEC 27001, received a major update to its 2022 version. This was not a minor revision. The update completely restructured the heart of the standard: the Annex A security controls. The old framework of 14 domains and 114 controls was replaced with a more modern structure of 4 themes and 93 controls. More importantly, 11 new controls were introduced to address contemporary threats such as insecure cloud configurations, the need for proactive threat intelligence, and the prevention of data leakage.</p><p>This created a technical impasse. ISO 27701:2019 was hardwired to the old, outdated 2013 control set. Its clauses directly referenced control numbers and structures that no longer existed in the new ISO 27001:2022 standard. As a result, organizations that proactively transitioned their ISMS to the new 2022 security standard found themselves in a compliance paradox. While they had a state-of-the-art security program, it was technically impossible for them to obtain an accredited ISO 27701 certification. The two standards were simply out of sync, making a unified audit against both impossible. This wasn&#8217;t a theoretical problem; it created real business friction for companies needing to demonstrate both leading-edge security and privacy compliance in contracts and tenders.</p><p>The delay in resolving this issue was further complicated by a behind-the-scenes dependency. The update to ISO 27701 could not be released until its own supporting standard, ISO/IEC 27706, was also overhauled. ISO 27706 is the standard that defines the requirements for the bodies that audit and certify PIMS. In essence, the rules of the game (27701) could not be updated until the rulebook for the referees (27706) was rewritten to match. </p><p>This multi-year standards logjam left the industry in a state of compliance limbo, highlighting the inherent fragility of a tightly coupled extension model where standards evolve at different paces. The challenges born from this experience have directly informed the more resilient, independent structure of the new 2025 revision.</p><h2><strong>A Deep Dive into the ISO 27701:2025 Update</strong></h2><p>The release of ISO/IEC 27701:2025 resolves the technical misalignment and introduces significant structural improvements that make the standard more flexible, accessible, and relevant to modern business challenges. It is now fully aligned with ISO 27001:2022 and brings a new level of maturity to privacy management.</p><h3><strong>Merged Annexes for Controllers and Processors</strong></h3><p>The 2019 version of the standard separated its privacy-specific controls into two different annexes: one for PII Controllers and another for PII Processors. The 2025 revision merges these into a single, consolidated Annex A, organized into Table A.1 (for PII Controllers) and Table A.2 (for PII Processors).</p><p>This change reflects the complex reality of modern data processing. Many organizations, particularly in the cloud and SaaS industries, operate as both a controller and a processor. They act as a controller for their own employee and direct customer data, while simultaneously acting as a processor for the data their clients upload and manage using their service. The previous structure could lead to duplicative documentation and a more cumbersome audit process. The new, consolidated annex simplifies implementation for these dual-role organizations, allowing for a more streamlined and logical approach to defining and applying privacy controls. Across these two tables, a total of 49 privacy-specific controls remain.</p><h3><strong>Table A.3 and the Standalone PIMS</strong></h3><p>Perhaps the most impactful change in the 2025 version is the introduction of a new Table A.3 in Annex A. This table contains a set of 29 parsed security controls specifically for organizations that do not have an established ISMS certified to ISO 27001.</p><p>This is a fundamental shift. It transforms ISO 27701 from a simple &#8220;add-on&#8221; into a certifiable, standalone management system. Previously, an organization had to endure the significant time and resource investment of a full ISO 27001 implementation before it could even begin the ISO 27701 certification process. Now, an organization whose primary risks and market drivers are centered on privacy can pursue a PIMS certification directly. This makes an internationally recognized privacy certification far more accessible to a wider range of businesses, including startups and small-to-medium-sized enterprises that may have been deterred by the cost and complexity of the prerequisite. This change will likely reshape the privacy certification landscape, creating a new, more attainable entry point and increasing the competitive expectation for all companies handling personal data to seek formal certification.</p><h3><strong>Considering Climate Change in Your Privacy Program</strong></h3><p>In line with the 2021 ISO London Declaration, which commits to incorporating climate science into all international standards, the new ISO 27701 includes a requirement to consider climate change. This is not an abstract environmental pledge; it is a concrete risk management requirement embedded into the core of the management system.</p><p>The amendment adds new text to two key clauses:</p><ul><li><p><strong>Clause 4.1 (Understanding the organization and its context):</strong> &#8220;The organization shall determine whether climate change is a relevant issue.&#8221;</p></li><li><p><strong>Clause 4.2 (Understanding the needs and expectations of interested parties):</strong> A new note clarifies that &#8220;Relevant interested parties can have requirements related to climate change.&#8221;</p></li></ul><p>This forces organizations to analyze how climate change could impact their ability to protect PII.</p><h3><strong>Consistency is Key: What Stays the Same</strong></h3><p>Despite these significant updates, the core philosophy of the standard remains intact. The risk-based approach is still central. Organizations must still use a Statement of Applicability (SoA) to document which controls from Annex A are implemented and to provide a justification for any that are excluded based on the organization&#8217;s role as a PII controller or processor [User Query]. This ensures that the PIMS remains tailored to the specific privacy risks and context of each organization.</p><h2><strong>ISO 27701 and the GDPR Landscape</strong></h2><p>One of the most powerful drivers for adopting ISO 27701 is its close alignment with the requirements of the GDPR. However, it is crucial to understand the distinction between a management system certification and a formal, legal certification under the GDPR itself. Confusing the two can lead to significant misinterpretations of an organization&#8217;s compliance status.</p><p>ISO 27701 serves as an excellent operational framework to help an organization meet its GDPR obligations. The standard&#8217;s annexes provide a direct mapping of its privacy controls to the specific articles of the GDPR, offering a clear and practical roadmap for implementation. Achieving ISO 27701 certification is a powerful way to demonstrate adherence to the GDPR&#8217;s core principle of &#8220;accountability,&#8221; which requires organizations to not only comply with the regulation but also be able to prove it.</p><p>This, however, is not the same as an official GDPR certification as envisioned under Article 42 of the regulation. Article 42 outlines a mechanism for creating approved &#8220;data protection certification mechanisms, seals and marks&#8221;. An Article 42 certification would be issued by an accredited body based on criteria formally approved by a country&#8217;s national Data Protection Authority (DPA). Such a certification would attest that a specific data processing operation&#8212;for example, a particular software product or service&#8212;conforms to the GDPR&#8217;s legal requirements.</p><p>An ISO 27701 certification is different in nature and scope. It is an attestation from an accredited certification body that the organization has successfully implemented and maintains a management system to systematically identify, assess, and treat privacy risks. It is a globally recognized best-practice standard for process maturity, not a legal instrument created under the authority of the GDPR.</p><p>The slow and complex process of establishing official Article 42 certification schemes has meant that very few have been approved across Europe since the GDPR was enacted. This regulatory vacuum has inadvertently elevated the market importance of ISO 27701. In the absence of official GDPR &#8220;seals,&#8221; businesses needed a reliable and internationally understood tool to demonstrate privacy diligence in contracts, RFPs, and vendor assessments. ISO 27701 has filled that role, becoming the de facto global standard and the primary mechanism for organizations to provide assurance about their privacy governance.</p><h2><strong>Your Transition and Next Steps</strong></h2><p>The new ISO/IEC 27701:2025 standard is available for implementation immediately. For organizations looking to adopt it or transition from the previous version, a clear game plan is essential.</p><h3><strong>The Transition Clock</strong></h3><p>For organizations already certified to ISO 27701:2019, a formal transition period is now in effect. Typically, ISO allows up to 36 months for such transitions. However, the definitive deadline will be established by the International Accreditation Forum (IAF) in an official Mandatory Document (MD). Given that the supporting audit standard, ISO 27706, was published in parallel with the main standard, this transition period may be shorter than the typical three years. Regardless of the final date, all certifications to the 2019 version will expire or be withdrawn at the end of this period, making a timely transition mandatory to maintain certification.</p><h3><strong>Actionable Advice for Your Organization</strong></h3><p>The right approach depends on your organization&#8217;s current certification status.</p><ol><li><p><strong>If You Are Currently Certified to ISO 27701:2019:</strong> Your immediate priority is to plan the transition. Begin by conducting a thorough gap analysis to compare your existing PIMS against the new 2025 requirements. Key areas of focus should be the restructured Annex A controls, the integration of the new climate change considerations into your context and risk assessment processes, and any necessary updates to your Statement of Applicability. Contact your certification body to schedule a transition audit, which can often be combined with your next planned surveillance or recertification audit to improve efficiency.</p></li><li><p><strong>If You Are Certified to ISO 27001:2022 and Want to Add Privacy:</strong> You are in an ideal position. The new ISO 27701:2025 is specifically designed to align seamlessly with your existing ISMS. The technical conflicts of the past have been eliminated. You can now extend your current management system to incorporate the PIMS requirements, leveraging your established risk assessment methodologies and security controls as a strong foundation for your privacy program.</p></li><li><p><strong>If You Are New to ISO Privacy Standards:</strong> You now face a strategic choice that did not exist before. You can pursue the new standalone PIMS certification by implementing the core security controls outlined in Table A.3. This is a more direct and potentially less resource-intensive path to a recognized privacy certification. Alternatively, you can pursue the &#8220;gold standard&#8221; approach: implementing a full ISMS according to ISO 27001:2022 first, and then integrating the PIMS via ISO 27701:2025. The best path depends on your organization&#8217;s specific risk profile, resources, market demands, and long-term strategic goals.</p></li></ol><p>Ultimately, the transition to ISO 27701:2025 should be viewed as more than a simple compliance deadline. It presents a strategic opportunity for organizations to re-evaluate and mature their entire privacy program. The mandatory review forced by the transition is a catalyst to ask deeper questions. Is our privacy risk assessment process robust enough to handle emerging threats from AI? Have we adequately considered the resilience of our PII processing against plausible climate-related disruptions? Companies that treat this transition as a strategic review will emerge with a stronger, more resilient, and more valuable privacy program. Those that view it as a purely administrative task may achieve certification but will miss the chance to genuinely improve their posture, leaving them more exposed to the risks of tomorrow.</p><div><hr></div><h3>Whenever you&#8217;re ready, there are 3 ways how we can help you:</h3><ol><li><p><strong><a href="https://grclab.com/courses/iso-27001-lead-implementer">ISO/IEC 27001 Lead Implementer Course</a></strong>: Learn how to implement, and maintain an ISMS. Leverage ready-to-use templates designed to accelerate your certification journey.</p></li><li><p><strong><a href="https://grclab.com/vouchers">Exam Vouchers</a>:</strong></p><p>Prepare and certify with confidence. Purchase exam vouchers and add official, exam-aligned training material. Save 10% compared to official retail prices. </p></li><li><p><strong><a href="https://grclab.com/contact-us">Promote your business</a></strong>: Put your company in front of 7,000+ highly-engaged GRC professionals at a 51% open rate!</p></li></ol>]]></content:encoded></item><item><title><![CDATA[CMMC is Here - What's Next?]]></title><description><![CDATA[A guest article by Jacob Hill.]]></description><link>https://blog.grclab.com/p/cmmc-is-here-whats-next</link><guid isPermaLink="false">https://blog.grclab.com/p/cmmc-is-here-whats-next</guid><dc:creator><![CDATA[Aron Lange]]></dc:creator><pubDate>Tue, 07 Oct 2025 05:43:25 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/49b2666e-0d65-4e87-9c53-6c3789b2c865_1456x1048.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>This week, I&#8217;m thrilled to welcome <a href="https://www.linkedin.com/in/jacobrhill/">Jacob Hill</a>,<strong> Director of Cybersecurity </strong>at <strong>Summit 7</strong>, as a guest author.</p><p>Some of you might remember Jacob from his GRC Academy Podcast, which was the very first podcast I was invited to join. He&#8217;s an excellent educator, and I&#8217;m very happy that he has agreed to write this guest edition of GRC Lab.</p><p>In the article below, Jacob shares his insights on <strong>CMMC</strong> and its impact on organizations today.</p><p>&#8212;</p><p>After so many years of waiting CMMC is finally here!</p><p>The United States Department of War (DoW) released the <strong><a href="https://www.federalregister.gov/documents/2025/09/10/2025-17359/defense-federal-acquisition-regulation-supplement-assessing-contractor-implementation-of">Cybersecurity Maturity Model Certification (CMMC) final acquisition rule</a></strong> on September 10, 2025 and it becomes effective on November 10, 2025.</p><p>Let&#8217;s dive into what CMMC is and what happens next!</p><h2>How did we get here?</h2><p>Foreign adversaries have been compromising DoW contractor networks and stealing information about critical DoW programs for years.</p><p>The department responded by creating contractual clauses focused on the implementation of NIST 800-171&#8217;s security controls. NIST 800-171 outlines the controls necessary to protect Controlled Unclassified Information (CUI) on non-government systems.</p><p><strong><a href="https://www.acquisition.gov/dfars/252.204-7012-safeguarding-covered-defense-information-and-cyber-incident-reporting.">DFARS 252.204-7012</a></strong> required contractors to:</p><ul><li><p>Implement NIST 800-171 no later than December 31, 2017</p></li><li><p>Report cyber incidents within 72 hours</p></li><li><p>Use FedRAMP moderate &#8220;equivalent&#8221; cloud service providers when they hold CUI</p></li></ul><p>The DoW soon discovered that contractors were still not implementing the security controls, so the DoW created provision DFARS 252.204-7019 and contract clause DFARS 252.204-7020.</p><p><strong><a href="https://www.acquisition.gov/dfars/252.204-7019-notice-nistsp-800-171-dod-assessment-requirements.">DFARS 252.204-7019</a></strong> requires the contractor to submit a NIST 800-171 self-assessment score to DoW to be eligible for contract award.</p><p><strong><a href="https://www.acquisition.gov/dfars/252.204-7020-nist-sp-800-171dod-assessment-requirements.">DFARS 252.204-7020</a></strong> requires the contractor to allow the government to perform third-party cyber assessments of the contractor&#8217;s covered network.</p><p>The government has been assessing contractor networks for years under DFARS 7020, and contractors have continued to demonstrate that self-attestation of cyber compliance does not work.</p><h2>How does CMMC fit into the picture?</h2><p>CMMC has three levels, and the requirements vary per level:</p><h3><strong>CMMC Level 1</strong></h3><ul><li><p>Implement 15 controls</p></li><li><p>Required for contracts with only Federal Contract Information (FCI) (no CUI)</p></li><li><p>Contractor is required to perform a self-assessment &#8211; no 3rd-party assessment is required</p></li></ul><h3><strong>CMMC Level 2</strong></h3><ul><li><p>Implement 110 controls</p></li><li><p>Required for contracts with CUI</p></li><li><p>Many contracts will require a CMMC level 2 certification via a 3rd-party assessment by a C3PAO</p></li></ul><h3><strong>CMMC Level 3</strong></h3><ul><li><p>Implement 24 additional enhanced security controls</p></li><li><p>Required for DoW&#8217;s most critical CUI programs</p></li><li><p>All contracts will require a 3rd-party assessment by DIBCAC resulting in CMMC certification</p><ul><li><p>CMMC level 2 certification is a prerequisite</p></li></ul></li></ul><p>Contracts/solicitations will require compliance or certification at a specific CMMC level and the government will not award a contract to a company that isn&#8217;t compliant.</p><p>The acquisition rule modifies a contractual clause called DFARS 252.204-7021 which is the contractual clause that will require either CMMC compliance or certification at a specified CMMC level.</p><p>It is estimated there are 80,000 and 300,000 companies in the Defense Industrial Base (DIB). It is impossible for the government to assess that number of companies.</p><p>CMMC expands the capacity to perform independent assessments and establishes an ecosystem of independent assessors called CMMC Third-Party Assessor Organizations (C3PAOs).</p><p>From the beginning, the DoW has been focused on protecting their information. Similar to health data in a HIPAA context, or PII in a privacy law context, FCI and CUI are the regulated information that is in scope.</p><h2>What&#8217;s next?</h2><p>CMMC certification assessments have been occurring since the CMMC final program rule became effective back in December of 2024. When the CMMC acquisition final rule is effective in November of 2025, the CMMC phase-in begins.</p><h2>The CMMC timeline</h2><p>Each phase of the CMMC rollout introduces progressively higher certification requirements, ultimately leading to full implementation by phase 4. Here&#8217;s a breakdown of the timeline:</p><h3><strong>Phase 1: Initial Requirements</strong></h3><ul><li><p>Start Date: November 10, 2025</p></li><li><p>Requirements: contractors handling FCI and CUI will need to self-assess that they meet either CMMC level 1 or CMMC level 2 to qualify for applicable DoW contracts.</p></li><li><p>Optional: The DoW may require CMMC level 2 certification for specific contracts or option periods.</p></li></ul><h3><strong>Phase 2: CMMC Level 2 Third-Party Assessments</strong></h3><ul><li><p>Start Date: November 2026</p></li><li><p>Requirements: DoW will mandate CMMC level 2 certification requirements for contract awards, with the flexibility to require it only during option periods.</p></li><li><p>Optional: The DoW may begin to include CMMC level 3 certification requirements for contracts with higher security needs.</p></li></ul><h3><strong>Phase 3: CMMC Level 3 Third-Party Assessments</strong></h3><ul><li><p>Start Date: November 2027</p></li><li><p>Requirements: Both CMMC level 2 and CMMC level 3 certification will be required as conditions for new contracts and option periods.</p></li><li><p>Optional: The DoW may delay CMMC level 3 requirements to option periods for some contracts.</p></li></ul><h3><strong>Phase 4: Full Implementation</strong></h3><ul><li><p>Start Date: November 2028</p></li><li><p>Requirements: At this final phase, CMMC requirements will apply to all applicable contracts, including those awarded prior to Phase 4.</p></li></ul><h2>What contractors should do now</h2><p>If your company hasn&#8217;t started working on NIST 800-171 and CMMC compliance, it is time to dive in before it is too late!</p><p>Large primes are applying more pressure on their subcontractors to become certified because they will be accountable for their subcontractors&#8217; compliance &#8211; at all tiers.</p><p>Becoming CMMC certified early in the CMMC phase in period will be a competitive advantage, but over time it will become &#8220;the norm.&#8221;</p><h2>Here are a few steps you should prioritize right now</h2><h3><strong>1. Determine Your Certification Level</strong></h3><p>Identify which CMMC level your organization needs based on the type of information you handle.</p><p>This step will determine the CMMC level of assessment and resources required. Plan ahead and think of the contracts you want to go after in the next three years, because CMMC level 1 will be limiting. C3PAOs can be found on the <a href="https://cyberab.org/Catalog#!/c/s/Results/Format/list/Page/1/Size/9/Sort/NameAscending?typeId=7">CyberAB marketplace</a>.</p><h3><strong>2. To insource or outsource?</strong></h3><p>Does your team have the technical and cybersecurity skills to address the security controls?</p><p>If not, consider hiring a Managed Service Provider (MSP) like <a href="https://www.summit7.us/">Summit 7</a> to manage your IT environment. Most MSPs are not focused on CMMC and unfortunately will be the cause of many failed CMMC assessments, so choosing the right MSP is critical!</p><h3><strong>3. Begin preparing ASAP</strong></h3><p>Estimates on how long it takes to go from 0% to 100% CMMC compliance range from 6 &#8211; 18 months. The duration varies based on the size and complexity of your organization and systems.</p><h3><strong>4. Engage with a C3PAO Early</strong></h3><p>If CMMC certification is in your future, reserve your assessment spot with a C3PAO as soon as you can. There are only 82 C3PAOs as of the time of this writing, and many of them are already booked into 2026.</p><h3><strong>5. Develop an Ongoing Compliance Strategy</strong></h3><p>CMMC certification requires annual affirmations of compliance. Set up regular reviews and training to ensure ongoing compliance.</p><h2>Closing Thoughts</h2><p>NIST 800-171 is the US federal standard to protect CUI.</p><p>Soon there will be a contractual clause in the FAR requiring the implementation of NIST 800-171 for federal (non-DoW) contracts. If you want to support the federal government, you will not be able to get away from these security controls.</p><p>For the sake of our nation&#8217;s security and your business&#8217;s survival, the time to comply is now.</p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.grclab.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Join 7K+ readers for exclusive weekly insights and free resources.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Farewell RMF, Hello CSRMC!]]></title><description><![CDATA[Today the U.S. Department of War (DoW) surprised us all.]]></description><link>https://blog.grclab.com/p/farewell-rmf-hello-csrmc</link><guid isPermaLink="false">https://blog.grclab.com/p/farewell-rmf-hello-csrmc</guid><dc:creator><![CDATA[Aron Lange]]></dc:creator><pubDate>Thu, 25 Sep 2025 06:13:24 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/69c5ae2a-5508-438c-aaf5-64ba45aff035_1456x1048.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>Inside this Edition</h2><p>Here&#8217;s what we got for you today:</p><ul><li><p>Next-Gen Cyber Defense: DoW Unveils New Cybersecurity Risk Management Construct</p></li><li><p>Links to some of our most popular articles.</p></li></ul><div><hr></div><h3>GRC Spotlight</h3><h2>Next-Gen Cyber Defense: DoW Unveils New Cybersecurity Risk Management Construct</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mpTH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6079968d-3448-40de-96af-60589e48cbcb_1920x1242.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mpTH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6079968d-3448-40de-96af-60589e48cbcb_1920x1242.png 424w, https://substackcdn.com/image/fetch/$s_!mpTH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6079968d-3448-40de-96af-60589e48cbcb_1920x1242.png 848w, https://substackcdn.com/image/fetch/$s_!mpTH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6079968d-3448-40de-96af-60589e48cbcb_1920x1242.png 1272w, https://substackcdn.com/image/fetch/$s_!mpTH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6079968d-3448-40de-96af-60589e48cbcb_1920x1242.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mpTH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6079968d-3448-40de-96af-60589e48cbcb_1920x1242.png" width="728" height="470.925" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6079968d-3448-40de-96af-60589e48cbcb_1920x1242.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1242,&quot;width&quot;:1920,&quot;resizeWidth&quot;:728,&quot;bytes&quot;:1241277,&quot;alt&quot;:&quot;CYBER SECURITY RISK MANAGEMENT CONSTRUCT&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="CYBER SECURITY RISK MANAGEMENT CONSTRUCT" title="CYBER SECURITY RISK MANAGEMENT CONSTRUCT" srcset="https://substackcdn.com/image/fetch/$s_!mpTH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6079968d-3448-40de-96af-60589e48cbcb_1920x1242.png 424w, https://substackcdn.com/image/fetch/$s_!mpTH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6079968d-3448-40de-96af-60589e48cbcb_1920x1242.png 848w, https://substackcdn.com/image/fetch/$s_!mpTH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6079968d-3448-40de-96af-60589e48cbcb_1920x1242.png 1272w, https://substackcdn.com/image/fetch/$s_!mpTH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6079968d-3448-40de-96af-60589e48cbcb_1920x1242.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The Department of War (DoW) has announced a significant evolution in its approach to cybersecurity with the introduction of the new Cybersecurity Risk Management Construct (CSRMC). This move marks a departure from the long-standing NIST Risk Management Framework (RMF), signaling a shift towards a more dynamic and automated approach to cyber defense. </p><p>You can read the full announcement <a href="https://www.war.gov/News/Releases/Release/Article/4314411/department-of-war-announces-new-cybersecurity-risk-management-construct/">here</a>.</p><div><hr></div><p>The DoW states the RMF has become "overly reliant on static checklists and manual processes that failed to account for operational needs and cyber survivability requirements." The CSRMC, in contrast, aims to enable "cyber defense at the speed of relevance required for modern warfare" by focusing on automation, critical controls, and continuous monitoring.</p><h2>The New 5-Phase Lifecycle</h2><p>At the heart of the CSRMC is a five-phase lifecycle that aligns with system development and operations:</p><ul><li><p><strong>Design Phase:</strong> Security is embedded at the outset, ensuring resilience is built into the system architecture.</p></li><li><p><strong>Build Phase:</strong> Secure designs are implemented as systems achieve Initial Operating Capability (IOC).</p></li><li><p><strong>Test Phase:</strong> Comprehensive validation and stress testing are performed prior to Full Operating Capability (FOC).</p></li><li><p><strong>Onboard Phase:</strong> Automated continuous monitoring is activated at deployment to sustain system visibility.</p></li><li><p><strong>Operations Phase:</strong> Real-time dashboards and alerting mechanisms provide immediate threat detection and rapid response.</p></li></ul><h2>From 7 Steps to 5 Phases: A Paradigm Shift</h2><p>The CSRMC's five phases represent a streamlined and more integrated approach compared to the seven steps of the NIST RMF:</p><p>RMF Steps</p><p>CSRMC Phase</p><p>1. Prepare</p><p>Phase 1: Design</p><p>2. Categorize</p><p>Phase 1: Design</p><p>3. Select</p><p>Phase 1: Design</p><p>4. Implement</p><p>Phase 2: Build</p><p>5. Assess</p><p>Phase 3: Test</p><p>6. Authorize</p><p>Phase 4: Onboard</p><p>7. Monitor</p><p>Phase 5: Operations</p><h2>Key Takeaways</h2><p>The introduction of the CSRMC signifies a major shift in the DoW's cybersecurity strategy, with a clear emphasis on:</p><ul><li><p><strong>Automation:</strong> To increase the speed and efficiency of risk management.</p></li><li><p><strong>Continuous Monitoring:</strong> To achieve real-time situational awareness and a constant state of authorization.</p></li><li><p><strong>Integration:</strong> Embedding security into the development lifecycle from the very beginning (DevSecOps).</p></li><li><p><strong>Cyber Survivability:</strong> Enabling operations to continue even in contested cyber environments.</p></li></ul><p>This new construct is not just a replacement for the RMF; it's a fundamental change in mindset, moving from a compliance-based approach to a risk-based, operational, and data-centric model. As the DoW rolls out the CSRMC, contractors and stakeholders can expect a greater emphasis on automated security solutions, real-time data, and a more agile and responsive approach to cybersecurity.</p><h2>Test your Knowledge</h2><p>Today&#8217;s question is from the CISM curriculum:</p><p>Which of the following is <strong>MOST</strong> important for ensuring data integrity during a disaster recovery process?</p><p><strong>A)</strong> Encryption<br><strong>B)</strong> Data validation checks<br><strong>C)</strong> Backup frequency<br><strong>D)</strong> Physical security measures</p><p>&#128073; Think you know the answer? Scroll <strong>down</strong> for the solution!</p><div><hr></div><p><strong>Answer:</strong> The correct answer is B.</p><p>A) Encryption is important for security but not directly related to data integrity during recovery.<br><strong>B) Data validation checks ensure that the data being restored is accurate.</strong><br>C) Backup frequency is important but secondary to data validation. <br>D) Physical security measures are important but not directly related to data integrity during recovery.</p>]]></content:encoded></item><item><title><![CDATA[Requirements vs. Controls]]></title><description><![CDATA[Discover the critical difference between requirements and controls in GRC, and learn how to avoid costly audit mistakes that could impact your compliance strategy.]]></description><link>https://blog.grclab.com/p/requirements-vs-controls-the-grc-mistake-that-could-cost-you-an-audit</link><guid isPermaLink="false">https://blog.grclab.com/p/requirements-vs-controls-the-grc-mistake-that-could-cost-you-an-audit</guid><dc:creator><![CDATA[Aron Lange]]></dc:creator><pubDate>Sun, 21 Sep 2025 20:00:00 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/9fe8b8a1-a76c-4779-a08b-c154088c88c3_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>Inside this Edition</h2><p>Here&#8217;s what we got for you today:</p><ul><li><p>Many professionals mistake requirements for controls when referring to the mandates found within compliance frameworks. Learn about the real difference between them.</p></li><li><p>Our partner Kertos has secured an impressive series of 14 million Euros for redefining AI-native compliance in Europe.</p></li></ul><h3><strong>GRC Spotlight</strong></h3><h2>Kertos raised a &#8364;14 Million Series A!</h2><p>Last year, shortly after leaving my 9 to 5, and launching my own business, I entered a strategic partnership with Kertos. Fast forward to today, Kertos has not only become my favourite client, but also an all-in-one compliance suite built for European SMEs and scaleups.</p><p>I am very proud to tell you that we have raised &#8364;14 million in a Series A funding round. The investment was spearheaded by global fintech investor Portage, with continued support from existing backers Pi Labs, Redstone, 10x Founders, and Seed + Speed Ventures.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.kertos.io/en/demo-booking-copy?utm_source=affiliate&amp;utm_medium=aron-lange&amp;utm_campaign=aron-lange-2025-en&amp;utm_content=aron-lange-blog&quot;,&quot;text&quot;:&quot;Book a demo&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.kertos.io/en/demo-booking-copy?utm_source=affiliate&amp;utm_medium=aron-lange&amp;utm_campaign=aron-lange-2025-en&amp;utm_content=aron-lange-blog"><span>Book a demo</span></a></p><p></p><div><hr></div><p>Earlier this week, I posted on LinkedIn about a topic that seems to trip up even seasoned GRC professionals: the difference between a "requirement" and a "control." The post went unexpectedly viral, flooded with comments and questions that highlighted just how much confusion surrounds these fundamental terms. It&#8217;s clear this is a conversation we need to have.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!J7qc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd679a811-486b-4fae-a4f4-2ce644fd5af7_890x1258.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!J7qc!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd679a811-486b-4fae-a4f4-2ce644fd5af7_890x1258.png 424w, https://substackcdn.com/image/fetch/$s_!J7qc!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd679a811-486b-4fae-a4f4-2ce644fd5af7_890x1258.png 848w, https://substackcdn.com/image/fetch/$s_!J7qc!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd679a811-486b-4fae-a4f4-2ce644fd5af7_890x1258.png 1272w, https://substackcdn.com/image/fetch/$s_!J7qc!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd679a811-486b-4fae-a4f4-2ce644fd5af7_890x1258.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!J7qc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd679a811-486b-4fae-a4f4-2ce644fd5af7_890x1258.png" width="384" height="542.7775280898876" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d679a811-486b-4fae-a4f4-2ce644fd5af7_890x1258.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1258,&quot;width&quot;:890,&quot;resizeWidth&quot;:384,&quot;bytes&quot;:435185,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!J7qc!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd679a811-486b-4fae-a4f4-2ce644fd5af7_890x1258.png 424w, https://substackcdn.com/image/fetch/$s_!J7qc!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd679a811-486b-4fae-a4f4-2ce644fd5af7_890x1258.png 848w, https://substackcdn.com/image/fetch/$s_!J7qc!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd679a811-486b-4fae-a4f4-2ce644fd5af7_890x1258.png 1272w, https://substackcdn.com/image/fetch/$s_!J7qc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd679a811-486b-4fae-a4f4-2ce644fd5af7_890x1258.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>So, let's do a deep dive. Understanding this distinction isn't just academic&#8212;it's the foundation of building an effective, efficient, and auditable compliance program.</p><h2>Requirements: The "What"</h2><p>Let's start with the basics. As per ISO 27000 a <strong>requirement</strong> is a "need or expectation that is stated, generally implied or obligatory." Frameworks like NIST CSF, ISO 27001, SOC 2, C5, and regulations like GDPR are collections of requirements. They tell you <em>what</em> you need to do and <em>why</em> it's important, but they rarely tell you <em>how</em> to do it.</p><p>A key concept here is that these frameworks are <strong>descriptive, not prescriptive</strong>. They describe a desired outcome (e.g., "protect data from unauthorized access") rather than prescribing the exact tool or process every organization must use. This is on purpose and by design. Descriptive frameworks, allow a five-person startup and a 50,000-person enterprise to comply with the same requirements in ways that fit their unique environments.</p><h2>Controls: The "How"</h2><p>If a requirement is the "what," a <strong>control</strong> is the "how." A control is the specific policy, procedure, technical safeguard, or action you implement to meet a requirement and modify risk. Controls are the concrete steps you take to get to the destination defined by the requirement.</p><blockquote><p><strong>control</strong><br>&#8220;Any action taken by management, the board, and other parties to manage risk and increase the likelihood that established objectives and goals will be achieved&#8221;</p></blockquote><h2>A Quick History: From Accounting to Cybersecurity</h2><p>To understand controls, it helps to know where the term came from. It didn't originate in IT or cybersecurity, but in finance and accounting. The word "control" comes from the Medieval Latin &#8216;<em>contrarotulus&#8217;</em>, which means "counter-roll." This was a duplicate ledger used in the Middle Ages to check the accuracy of the primary financial records&#8212;a literal act of checking one roll against another. &nbsp;</p><p>For centuries, this was the essence of control: a manual, detective action to verify financial accuracy. The concept evolved with the Industrial Revolution, as owners became separated from the day-to-day management of their companies and needed systems to ensure operations were running correctly. The modern era of control was forged after the massive accounting scandals of the early 2000s, like Enron and WorldCom. These events led to legislation like the Sarbanes-Oxley Act (SOX), which legally mandated that corporate management be held personally responsible for the effectiveness of their internal controls over financial reporting. &nbsp;</p><p>This history is important because it shows that controls have always been about providing assurance that objectives are being met and that records are accurate&#8212;a principle that has been directly inherited by the world of information- and cybersecurity.</p><h2>Defining Controls in GRC</h2><p>In GRC, controls are the specific safeguards implemented to meet requirements. They can be categorized in several ways:</p><ul><li><p><strong>Preventive:</strong> To prevent an incident from happening (e.g., a firewall).</p></li><li><p><strong>Detective:</strong> To identify an incident after it has occurred (e.g., log reviews).</p></li><li><p><strong>Corrective: </strong>To recover from an incident after it has occured (e.g. backups).</p></li><li><p><strong>Administrative:</strong> Policies, procedures, and training (e.g., a security awareness program).</p></li><li><p><strong>Technical:</strong> Safeguards implemented in software or hardware (e.g., encryption).</p></li><li><p><strong>Physical:</strong> Mechanisms that protect physical access (e.g., locks, security guards).</p></li></ul><h2>The Real Difference between Requirements and Controls</h2><p>Let's make this concrete. Consider a common requirement from SOC 2's Trust Services Criteria.</p><p><strong>The Requirement (The "What"):</strong> SOC 2 Common Criteria 6.1 states that the entity must implement logical access security measures to protect information assets from security events.</p><p>This is the high-level objective. It doesn't mention passwords, MFA, or hardware keys. It just says, "protect against unauthorized access."</p><p><strong>The Controls (The "How"):</strong> An organization can't just "do" CC6.1. It must implement a <em>system of controls</em> to meet this requirement. Here&#8217;s how that breaks down, using hardware security keys as an example:</p><h3><strong>Control 1: Access Control Policy (Administrative - Preventive)</strong></h3><ul><li><p><strong>What it is:</strong> A high-level document approved by management.</p></li><li><p><strong>What it does:</strong> It formally states the rules. For example: "Access to sensitive systems must be granted based on the principle of least privilege and authenticated using multi-factor authentication (MFA)." This policy is the foundation.</p></li></ul><h3><strong>Control 2: MFA with Hardware Keys (Technical - Preventive)</strong></h3><ul><li><p><strong>What it is:</strong> The technology chosen to enforce the policy.</p></li><li><p><strong>What it does:</strong> The organization configures its identity provider (like Okta or Azure AD) to require a FIDO2-compliant hardware security key (e.g., a YubiKey) in addition to a password for every login to a critical system. This is a powerful technical control. But the technology alone is not enough.</p></li></ul><h3><strong>Control 3: Hardware Key Lifecycle Management (Administrative - Preventive)</strong></h3><ul><li><p><strong>What it is:</strong> The documented processes for managing the physical keys. This is where many companies fall short.</p></li><li><p><strong>What it does:</strong> This control is actually a set of procedures:</p><ul><li><p><strong>Issuance Process:</strong> When a new employee starts, HR triggers a ticket. IT meets with the employee, verifies their identity against government ID, issues them a new key from a secure inventory, and records the key's serial number in an asset management system tied to that employee's identity.</p></li><li><p><strong>Revocation Process:</strong> When an employee leaves, the offboarding checklist includes a step for IT to immediately de-register their key from all systems. The physical key is collected and securely destroyed. &nbsp;</p></li><li><p><strong>Loss/Theft Process:</strong> A procedure for an employee to report a lost key, for IT to immediately revoke it, and for a new one to be issued after identity verification.</p></li></ul></li></ul><h3><strong>Control 4: Quarterly User Access Reviews (Administrative - Detective)</strong></h3><ul><li><p><strong>What it is:</strong> A periodic check to catch errors or unauthorized access.</p></li><li><p><strong>What it does:</strong> Every three months, an automated report is generated showing every user and their access levels to critical systems. This report is sent to the user's manager, who must review and formally approve that the access is still required for their job role. This detective control verifies that the preventive controls are working correctly over time.</p></li></ul><p>As you can see, one high-level requirement spawned a whole ecosystem of interconnected controls&#8212;administrative and technological&#8212;that work together to achieve the objective of the requirement.</p><h2>The Bottom Line</h2><p>The bottom line is simple: Requirements set the objectives; controls are the specific actions you take to get there. A mature GRC program is built on a clear understanding of this dynamic, translating high-level objectives into the real-world policies, processes, and technologies that keep an organization secure and compliant.</p><h2>Test your Knowledge</h2><p>Today&#8217;s question is from the CISM curriculum:</p><p>What is the <strong>MAIN</strong> reason for implementing multi-factor authentication?</p><p><strong>A)</strong> To increase user convenience<br><strong>B)</strong> To meet compliance requirements<br><strong>C)</strong> To enhance security<br><strong>D)</strong> To reduce costs</p><p>&#128073; Think you know the answer? Scroll <strong>down</strong> for the solution!</p><div><hr></div><p><strong>Answer:</strong> The correct answer is C.</p><p>A) Multi-factor authentication may actually reduce user convenience. <br>B) Compliance may require it, but the main reason is to enhance security. <br><strong>C) Multi-factor authentication provides multiple layers of security. </strong><br>D) It may actually increase costs due to the need for additional hardware or software.</p>]]></content:encoded></item><item><title><![CDATA[Launch Alert: Free ISO 27001 Docs Now Live at GRC Lab!]]></title><description><![CDATA[Inside this Edition]]></description><link>https://blog.grclab.com/p/launch-alert-free-iso-27001-docs-now-live-at-grc-lab</link><guid isPermaLink="false">https://blog.grclab.com/p/launch-alert-free-iso-27001-docs-now-live-at-grc-lab</guid><dc:creator><![CDATA[Aron Lange]]></dc:creator><pubDate>Thu, 11 Sep 2025 20:00:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!dlzE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40a1d723-4ab6-442b-9f72-b2b82dd78c9e_1456x1048.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>Inside this Edition</h2><p>Here&#8217;s what we got for you today:</p><ul><li><p>CISA's ticking clock, U.S. Congress is racing to revive an expiring law.</p></li><li><p>Discover our new ISO 27001 DOCS section, designed as a reference guide for learners and professionals.</p></li></ul><h3><strong>GRC Spotlight</strong></h3><h2>CISA's Ticking Clock &#8211; Congress Races to Extend Cyber Defense</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!JZbX!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf86cad3-c8fb-4333-bbab-30d6d564a000_768x576.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!JZbX!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf86cad3-c8fb-4333-bbab-30d6d564a000_768x576.jpeg 424w, https://substackcdn.com/image/fetch/$s_!JZbX!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf86cad3-c8fb-4333-bbab-30d6d564a000_768x576.jpeg 848w, https://substackcdn.com/image/fetch/$s_!JZbX!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf86cad3-c8fb-4333-bbab-30d6d564a000_768x576.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!JZbX!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf86cad3-c8fb-4333-bbab-30d6d564a000_768x576.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!JZbX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf86cad3-c8fb-4333-bbab-30d6d564a000_768x576.jpeg" width="768" height="576" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/af86cad3-c8fb-4333-bbab-30d6d564a000_768x576.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:576,&quot;width&quot;:768,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:99480,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!JZbX!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf86cad3-c8fb-4333-bbab-30d6d564a000_768x576.jpeg 424w, https://substackcdn.com/image/fetch/$s_!JZbX!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf86cad3-c8fb-4333-bbab-30d6d564a000_768x576.jpeg 848w, https://substackcdn.com/image/fetch/$s_!JZbX!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf86cad3-c8fb-4333-bbab-30d6d564a000_768x576.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!JZbX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf86cad3-c8fb-4333-bbab-30d6d564a000_768x576.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>As the September 30, 2025, deadline nears for the Cybersecurity Information Sharing Act (CISA), experts warn its expiration could weaken defenses by reducing threat intelligence sharing, risking hacker exploitation. The House has advanced a revised bill, Wimwag, extending protections to 2035 with updated threats and privacy safeguards. Senate Chair Rand Paul&#8217;s push to prevent alleged censorship adds hurdles, while leaders stress collaboration benefits despite critiques of slow intel delivery, calling for <a href="https://www.wsj.com/articles/federal-cyber-information-sharing-bill-renewal-inches-forward-472b16d7">better trust in partnerships</a>.</p><div><hr></div><p>Dear Subscribers,</p><p>We are excited to announce the launch of our brand-new <a href="https://grclab.com/iso27001-docs/fundamentals">ISO 27001 Docs</a> section at GRC Lab! Now, you can access a wealth of free documentation to kickstart your journey toward ISO 27001 compliance.</p><p>Designed for learners, professionals, and organizations alike, this resource hub shall evolve to become your go-to reference for mastering information security management systems.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!dlzE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40a1d723-4ab6-442b-9f72-b2b82dd78c9e_1456x1048.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!dlzE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40a1d723-4ab6-442b-9f72-b2b82dd78c9e_1456x1048.png 424w, https://substackcdn.com/image/fetch/$s_!dlzE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40a1d723-4ab6-442b-9f72-b2b82dd78c9e_1456x1048.png 848w, https://substackcdn.com/image/fetch/$s_!dlzE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40a1d723-4ab6-442b-9f72-b2b82dd78c9e_1456x1048.png 1272w, https://substackcdn.com/image/fetch/$s_!dlzE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40a1d723-4ab6-442b-9f72-b2b82dd78c9e_1456x1048.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!dlzE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40a1d723-4ab6-442b-9f72-b2b82dd78c9e_1456x1048.png" width="1456" height="1048" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/40a1d723-4ab6-442b-9f72-b2b82dd78c9e_1456x1048.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1048,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:631663,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.grclab.com/i/175596153?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40a1d723-4ab6-442b-9f72-b2b82dd78c9e_1456x1048.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!dlzE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40a1d723-4ab6-442b-9f72-b2b82dd78c9e_1456x1048.png 424w, https://substackcdn.com/image/fetch/$s_!dlzE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40a1d723-4ab6-442b-9f72-b2b82dd78c9e_1456x1048.png 848w, https://substackcdn.com/image/fetch/$s_!dlzE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40a1d723-4ab6-442b-9f72-b2b82dd78c9e_1456x1048.png 1272w, https://substackcdn.com/image/fetch/$s_!dlzE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40a1d723-4ab6-442b-9f72-b2b82dd78c9e_1456x1048.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>What&#8217;s Inside the ISO 27001 Docs Section?</h2><p>Our docs cover everything you need to know to get started in the world of Information Security Management Systems. Check out these key areas:</p><ul><li><p><strong>Information Security Fundamentals</strong>: Learn the basics of protecting information, and management systems, all grounded in the CIA triad (Confidentiality, Integrity, Availability).</p></li><li><p><strong>Implementation Project</strong>: Get step-by-step guidance to roll out ISO 27001 in your organization.</p></li><li><p><strong>Annex A</strong>: Explore security controls to safeguard your information assets.</p></li><li><p><strong>Certification Process</strong>: Understand the path to achieving and maintaining ISO 27001 certification.</p></li><li><p><strong>Career</strong>: Discover professional certifications like Lead Implementer and Lead Auditor, to take your career to the next level.</p></li></ul><h2>Why Choose Our Docs?</h2><p>You can find a ton of information about ISO 27001 online, but it&#8217;s often fragmented and time-consuming to piece together. Our new section consolidates everything in one place, saving you effort while delivering clear, actionable insights to simplify your compliance journey.</p><p><a href="https://grclab.com/iso27001-docs/fundamentals">Check it out</a></p><h2>New YouTube Video</h2><p>Most of our learners prefer video content over static texts. Our latest explanatory video is about the CIA triad, clear, concise and (hopefully) visually appealing. Feel free to have a look and subscribe to our <a href="https://www.youtube.com/channel/UC5slm6aFRwZjNct0JwyXPzw">channel</a>.</p><div id="youtube2-eN-oFSTqMx8" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;eN-oFSTqMx8&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/eN-oFSTqMx8?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><h2>Test your Knowledge</h2><p>Today&#8217;s question is from the [CISM] curriculum:</p><p>When is it <strong>MOST</strong> appropriate to use a risk avoidance strategy?</p><p><strong>A)</strong> When the risk is low frequency and low impact<br><strong>B)</strong> When the risk is high frequency but low impact<br><strong>C)</strong> When the risk is low frequency but high impact<br><strong>D)</strong> When the risk is high frequency and high impact</p><p>&#128073; Think you know the answer? Scroll <strong>down</strong> for the solution!</p><div><hr></div><p><strong>Answer:</strong> The correct answer is D.</p><p><strong>A)</strong> For low frequency and low impact risks, avoidance might be an unnecessary overreaction.<br><strong>B)</strong> For high frequency but low impact risks, risk acceptance or mitigation might be more suitable. <br><strong>C)</strong> For low frequency but high impact risks, risk transfer might be more appropriate.<br><strong>D)</strong> <strong>For high frequency and high impact risks, avoiding the activity causing the risk is often the best course of action to protect the enterprise.</strong></p>]]></content:encoded></item><item><title><![CDATA[How to Stand Out by Combining ISO 27001 with Sector Specific Standards.]]></title><description><![CDATA[Discover how to elevate your information security strategy by strategically combining ISO 27001 with sector-specific standards to differentiate your organization and enhance compliance.]]></description><link>https://blog.grclab.com/p/how-to-stand-out-by-combining-iso-27001-with-sector-specific-standards</link><guid isPermaLink="false">https://blog.grclab.com/p/how-to-stand-out-by-combining-iso-27001-with-sector-specific-standards</guid><dc:creator><![CDATA[Aron Lange]]></dc:creator><pubDate>Thu, 04 Sep 2025 20:00:00 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/32d50bfe-36cc-4add-b536-977317175920_1456x1048.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>Inside this Edition</h2><p>Here&#8217;s what we got for you today:</p><ul><li><p>Revision 5.2.0 of NIST SP 800-53 has added three new controls and enhancements to our beloved control catalogue.</p></li><li><p>How to stand out by combining ISO 27001 with sector specific standards.</p></li></ul><h2>GRC Spotlight</h2><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!gsJP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00c9d9b0-e0e5-440a-a9bc-ca5670203c18_1920x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gsJP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00c9d9b0-e0e5-440a-a9bc-ca5670203c18_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!gsJP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00c9d9b0-e0e5-440a-a9bc-ca5670203c18_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!gsJP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00c9d9b0-e0e5-440a-a9bc-ca5670203c18_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!gsJP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00c9d9b0-e0e5-440a-a9bc-ca5670203c18_1920x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gsJP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00c9d9b0-e0e5-440a-a9bc-ca5670203c18_1920x1080.png" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/00c9d9b0-e0e5-440a-a9bc-ca5670203c18_1920x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!gsJP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00c9d9b0-e0e5-440a-a9bc-ca5670203c18_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!gsJP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00c9d9b0-e0e5-440a-a9bc-ca5670203c18_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!gsJP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00c9d9b0-e0e5-440a-a9bc-ca5670203c18_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!gsJP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00c9d9b0-e0e5-440a-a9bc-ca5670203c18_1920x1080.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p>Last week NIST provided us with another update of <strong>NIST SP 800-53</strong>. As part of revision 5.2.0, three new controls were added to the control catalogue.</p><ul><li><p>SA-15 - Logging Syntax</p></li><li><p>SI-02(07) - Root Cause Analysis</p></li><li><p>SA-24 - Design for Cyber Resiliency</p></li></ul><p>You can find the official summary of changes <a href="https://csrc.nist.gov/files/projects/Risk-Management/800-53%20Comment%20Site/SP800-53-r5.2.0-changes.pdf">here</a>.</p><div><hr></div><p>Hey GRC Lab readers! &#128075;</p><p>Imagine a security framework that works for&nbsp;<em>any</em>&nbsp;organization&#8212;big or small, tech or healthcare, startup or enterprise. That&#8217;s ISO/IEC 27001, the gold standard for building an&nbsp;Information Security Management System (ISMS).</p><p>While the ISO 27001 standard provides a solid backbone for an ISMS, its high-level nature means it cannot address every technical or operational nuance of a specialized industry. This is not a failure of the standard, but a deliberate design choice that allows for its broad applicability. The true power of the ISO 27k series lies in its ability to be extended. To better suit their industry and address unique, high-impact risks, organizations can decide to select additional controls that are not part of Annex A. While this might sound like quite a challenge, rest assured you are not on your own on this.</p><p>The following ISO standards function as extensions to the controls of Annex A, and address a variety of different industries and use cases.</p><ul><li><p>ISO/IEC 27011</p></li><li><p>ISO/IEC 27017</p></li><li><p>ISO/IEC 27018</p></li><li><p>ISO/IEC 27019</p></li></ul><h2><strong>Overview of sector specific standards</strong></h2><p>Here is a brief overview about each of these standards, explaining who they are tailored to and what types of controls are suggested by them.</p><h3><strong>ISO/IEC 27011: Building a Resilient Telecom Backbone</strong></h3><p><strong>Description:</strong> Telecommunications organizations operate in a unique and critical domain, managing vast volumes of sensitive user data and networks that constitute national infrastructure. While a general ISMS is helpful, it is insufficient to address the specific threats faced by this industry, such as interconnection fraud, SIM card cloning, transmission snooping, and the manipulation of signaling protocols like SS7, SIP, or Diameter. ISO 27011 is a sector-specific standard that adapts and extends the controls from ISO 27002 to match the complex risks and technological requirements of the telecommunications industry. It provides tailored security controls that support the need for network stability, continuous service availability, and the confidentiality and integrity of communications across complex and distributed infrastructures.</p><p><strong>Added Controls and Guidance:</strong></p><ul><li><p>Apply access control policies specific to network elements and subscriber data.</p></li><li><p>Secure the signaling systems (e.g., SS7, SIP, or Diameter) from external manipulation.</p></li><li><p>Protect physical telecom infrastructure, including towers and switches.</p></li><li><p>Implement audit logging and regular event correlation for telecom services.</p></li><li><p>Restrict administrative privileges and enforce role-based access to critical systems.</p></li><li><p>Ensure resilience of telecom services against denial-of-service and other disruptions.</p></li><li><p>Control changes to telecom hardware and firmware, especially in live environments.</p></li><li><p>Address security responsibilities prior to, during, and after employment for critical roles.</p></li></ul><h3><strong>ISO/IEC 27017: Navigating the Cloud Shared Responsibility Model</strong></h3><p><strong>Description:</strong> The cloud&#8217;s &#8220;shared responsibility model&#8221; is often a source of significant ambiguity, leaving high-impact weaknesses exposed. Generic ISMS frameworks are outpaced by the dynamic, multi-tenant nature of cloud environments and their fragmentation. ISO 27017 was created to clarify this ambiguity, providing cloud-specific security controls and implementation guidance for both cloud service providers (CSPs) and customers, forcing clarity through naming, assignment, and secure accountability. The standard shifts the security focus from a static, periodic model to one that is dynamic and automation-driven, addressing risks in virtual asset management, automated auditability, and lifecycle provisioning.</p><p><strong>Added Controls and Guidance:</strong></p><ul><li><p>A control for the allocation of responsibilities between the cloud service provider (CSP) and the customer.</p></li><li><p>A control for the removal or return of assets when a contract is terminated.</p></li><li><p>A control for the protection and separation of a customer&#8217;s virtual environment.</p></li><li><p>A control for virtual machine configuration.</p></li><li><p>A control for administrative operations and procedures associated with the cloud environment.</p></li><li><p>Guidance on cloud customer monitoring of activity.</p></li><li><p>Guidance on virtual and cloud network environment alignment.</p></li></ul><h3><strong>ISO/IEC 27018: A Privacy-First Approach for PII in the Cloud</strong></h3><p><strong>Description:</strong> Generic ISO 27001 controls, while strong on information security, are often insufficient for protecting Personally Identifiable Information (PII) in public cloud environments. They fail to address the critical nuances of privacy principles, such as explicit consent management, data minimization, and the legally distinct roles of data controllers and processors. ISO 27018 was developed to close this gap by adding specific, auditable controls for public cloud providers acting as PII processors. The standard transforms data protection from an abstract intention into "daily, granular accountability."</p><p><strong>Added Controls and Guidance:</strong></p><ul><li><p><strong>Consent Management:</strong> Dynamic, always trackable, explicit, and logged.</p></li><li><p><strong>Processor-Controller Split:</strong> Mandatory, with an audit trail that can be cited.</p></li><li><p><strong>Data Deletion/Erasure:</strong> Technical, monitored, and regular.</p></li><li><p><strong>Cross-Vendor Proof:</strong> API/event-based and audit-ready.</p></li><li><p><strong>Role Assurance:</strong> Contractually enforced and mapped.</p></li><li><p><strong>Transparency:</strong> Mandatory notification to affected partners and clients.</p></li></ul><h3><strong>ISO/IEC 27019: Defending the Grid from the Inside Out</strong></h3><p><strong>Description:</strong> The energy utility industry relies on a distinct class of systems known as Operational Technology (OT), including industrial control systems (ICS) like SCADA and Programmable Logic Controllers (PLCs). These systems are uniquely vulnerable due to their physical exposure and distributed nature. A security failure in this domain can lead to a physical event, such as a grid blackout. Traditional IT security frameworks ignore this "civilian blind spot." ISO 27019 provides a specialized playbook for securing OT environments, offering a security standard that makes sector-specific risk visible and actionable.</p><p><strong>Added Controls and Guidance:</strong></p><h2>Implications for External Audits and Certificates</h2><p>Now the question is what about the certification process? Is it possible to get a real certificate for each of the standards we discussed?</p><p>The short answer is, no you can&#8217;t. Since codes of practice cannot be certified on their own the certification is always granted to the management system standard, which is ISO 27001. However, your certificate will reflect the successful integration of the other standards in the scope statement.</p><p>In summary, you will get an ISO 27001 certificate with a statement referring to the additional standards that have been considered when auditing the ISMS.</p><p><strong>My personal opinion: </strong>Most companies implement ISO 27001 because their customers require them to. It&#8217;s a means to stay in business with them. The truth is, most customers do not know about or require any of the standards we discussed in this edition. So, the effort it would take to add another set of requirements should be well considered. Nevertheless if your objective is to make your organisation more secure, tailoring your controls to the unique circumstances should be a no brainer.</p><h2>Test your Knowledge</h2><p>Today&#8217;s question is from the CISM curriculum:</p><p>What is the <strong>primary</strong> purpose of a Data Loss Prevention (DLP) system?</p><p><strong>A)</strong> Intrusion Detection<br><strong>B)</strong> Data Backup<br><strong>C)</strong> Prevent Unauthorized Data Exfiltration<br><strong>D)</strong> Firewall Management</p><p>&#128073; Think you know the answer? Scroll <strong>down</strong> for the solution!</p><div><hr></div><p><strong>Answer:</strong> The correct answer is C.</p><p><strong>A)</strong> Intrusion Detection is not the primary purpose of DLP. <br><strong>B)</strong> Data Backup is not the primary purpose of DLP. <br><strong>C)</strong> <strong>DLP is primarily used to prevent unauthorized data exfiltration.</strong><br><strong>D)</strong> Firewall Management is not the primary purpose of DLP.</p>]]></content:encoded></item><item><title><![CDATA[Why you shouldn't use Annex A]]></title><description><![CDATA[And Why NIST SP 800-53 Is The Ideal Companion]]></description><link>https://blog.grclab.com/p/why-you-shouldn-t-use-annex-a-c152c5e47b0668cc</link><guid isPermaLink="false">https://blog.grclab.com/p/why-you-shouldn-t-use-annex-a-c152c5e47b0668cc</guid><dc:creator><![CDATA[Aron Lange]]></dc:creator><pubDate>Thu, 28 Aug 2025 20:00:00 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/1141005f-394a-4b14-b625-09c88bff7438_1456x1048.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>Inside this Edition</h2><p>Here&#8217;s what we got for you today:</p><ul><li><p>Learn why and how to combine NIST SP 800-53 with ISO/IEC 27001 to take your GRC program to the next level.</p></li><li><p>Be among the first to hear about our upcoming GRC bootcamps.</p></li></ul><h2>Why you shouldn&#8217;t use Annex A</h2><p>Ever poured hours into mapping out security controls from ISO 27001's Annex A, only to realize they feel more like vague suggestions than actionable steps? You're not alone, this is a common pitfall that leaves many GRC teams scratching their heads.</p><p>But what if I told you Annex A isn't meant to be your control catalogue at all? Let's unpack this misconception and explore why NIST SP 800-53 might be the upgrade your compliance program needs.</p><h2>The Role of Annex A in ISO 27001</h2><p>Annex A in ISO 27001 is frequently misunderstood as a complete control catalog. In reality, it&#8217;s more of a checklist to ensure that no important controls have been overlocked or ommitted.</p><p><strong>What It Is</strong>: Annex A contains 93 information security reference controls across 4 themes, that shall be compared against the controls that have been determined as necessary to treat identified risks.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!del3!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc32ea051-1087-4300-b938-b4e5785a78ed_1920x1084.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!del3!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc32ea051-1087-4300-b938-b4e5785a78ed_1920x1084.png 424w, https://substackcdn.com/image/fetch/$s_!del3!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc32ea051-1087-4300-b938-b4e5785a78ed_1920x1084.png 848w, https://substackcdn.com/image/fetch/$s_!del3!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc32ea051-1087-4300-b938-b4e5785a78ed_1920x1084.png 1272w, https://substackcdn.com/image/fetch/$s_!del3!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc32ea051-1087-4300-b938-b4e5785a78ed_1920x1084.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!del3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc32ea051-1087-4300-b938-b4e5785a78ed_1920x1084.png" width="1920" height="1084" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c32ea051-1087-4300-b938-b4e5785a78ed_1920x1084.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1084,&quot;width&quot;:1920,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:194135,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!del3!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc32ea051-1087-4300-b938-b4e5785a78ed_1920x1084.png 424w, https://substackcdn.com/image/fetch/$s_!del3!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc32ea051-1087-4300-b938-b4e5785a78ed_1920x1084.png 848w, https://substackcdn.com/image/fetch/$s_!del3!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc32ea051-1087-4300-b938-b4e5785a78ed_1920x1084.png 1272w, https://substackcdn.com/image/fetch/$s_!del3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc32ea051-1087-4300-b938-b4e5785a78ed_1920x1084.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Control themes</figcaption></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!CTbS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c6f49f5-8c1d-4940-9253-39fab7b047d5_1920x884.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!CTbS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c6f49f5-8c1d-4940-9253-39fab7b047d5_1920x884.png 424w, https://substackcdn.com/image/fetch/$s_!CTbS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c6f49f5-8c1d-4940-9253-39fab7b047d5_1920x884.png 848w, https://substackcdn.com/image/fetch/$s_!CTbS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c6f49f5-8c1d-4940-9253-39fab7b047d5_1920x884.png 1272w, https://substackcdn.com/image/fetch/$s_!CTbS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c6f49f5-8c1d-4940-9253-39fab7b047d5_1920x884.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!CTbS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c6f49f5-8c1d-4940-9253-39fab7b047d5_1920x884.png" width="1920" height="884" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8c6f49f5-8c1d-4940-9253-39fab7b047d5_1920x884.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:884,&quot;width&quot;:1920,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:702767,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!CTbS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c6f49f5-8c1d-4940-9253-39fab7b047d5_1920x884.png 424w, https://substackcdn.com/image/fetch/$s_!CTbS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c6f49f5-8c1d-4940-9253-39fab7b047d5_1920x884.png 848w, https://substackcdn.com/image/fetch/$s_!CTbS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c6f49f5-8c1d-4940-9253-39fab7b047d5_1920x884.png 1272w, https://substackcdn.com/image/fetch/$s_!CTbS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c6f49f5-8c1d-4940-9253-39fab7b047d5_1920x884.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Annex A of ISO/IEC 27001:2022</figcaption></figure></div><p><strong>What It Isn&#8217;t</strong>: It&#8217;s not a detailed control catalogue, describing what must be done.<br>Let&#8217;s look at an example to better understand the difference between the reference controls of Annex A and actual security controls. What about Control A.8.5 Secure Authentication.</p><div class="pullquote"><p><strong>A.8.5 Secure Authentication<br></strong>&#8220;Secure authentication technologies and procedures shall be implemented based on information access restrictions and the topic-specific policy on access control.&#8221;</p></div><p>As you can tell the example control from Annex A is broad and lacks specifics, such as which technologies to use or how to configure them. It&#8217;s merely a description of a desired state but doesn&#8217;t go into the specifics. The idea is the following: First, the standard wants you to determine controls that are able to treat your identified risks. Then you must compare them with those listed in Annex A. So, if your organization is facilitating hardware security keys, then obviously those are a form of secure authentication technologies. Therefore control A.8.5 would be necessary, or often expressed as, applicable.</p><p>So without actual controls, there is no way to implement A.8.5. What you need are real specific, risk-based controls. Here are practical examples:</p><ul><li><p><strong>Hardware Security Keys</strong>: Deploy devices like YubiKey for phishing-resistant authentication, requiring physical interaction for access.</p></li><li><p><strong>MFA Authenticator Apps</strong>: Use apps like Authy for time-based one-time passwords (TOTPs), enforced across all accounts and integrated with identity providers.</p></li><li><p><strong>Single Sign-On (SSO)</strong>: Implement SAML-based SSO with providers like Okta, including session timeouts and IP-based restrictions.</p></li><li><p><strong>Biometric Authentication</strong>: Add fingerprint or facial recognition for sensitive systems, paired with liveness detection to prevent spoofing.</p></li><li><p><strong>Certificate-Based Authentication</strong>: Use digital certificates for machine-to-machine access, with automated revocation for expired credentials.</p></li></ul><p>These turn A.8.5 into something tangible, but Annex A doesn&#8217;t provide this level of detail. That&#8217;s where NIST SP 800-53, or ISO/IEC 27002 comes in.</p><h2>Why NIST SP 800-53 is a great Companion</h2><p>NIST SP 800-53 is a comprehensive control catalog with over 1,000 controls across 20 families, designed for federal agencies but adaptable for any organization. Unlike Annex A, it provides actionable, detailed guidance.</p><ul><li><p><strong>Granular Structure</strong>: Controls are organized into families like Access Control (AC) and Identification and Authentication (IA), with baselines (low, moderate, high) and enhancements for customization.</p></li><li><p><strong>Detailed Instructions</strong>: For authentication, IA-2 mandates MFA for privileged users, while AC-7 specifies lockout thresholds (e.g., 5 failed attempts in 15 minutes).</p></li><li><p><strong>ISO Compatibility</strong>: NIST controls can map to Annex A, ensuring compliance while strengthening security.</p></li><li><p><strong>Future-Proofing</strong>: Covers modern threats like zero-trust architectures and supply chain risks, with regular updates.</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!_SI-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdddf725a-54e6-4929-bd5d-5ffadea96698_1200x1500.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_SI-!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdddf725a-54e6-4929-bd5d-5ffadea96698_1200x1500.jpeg 424w, https://substackcdn.com/image/fetch/$s_!_SI-!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdddf725a-54e6-4929-bd5d-5ffadea96698_1200x1500.jpeg 848w, https://substackcdn.com/image/fetch/$s_!_SI-!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdddf725a-54e6-4929-bd5d-5ffadea96698_1200x1500.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!_SI-!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdddf725a-54e6-4929-bd5d-5ffadea96698_1200x1500.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_SI-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdddf725a-54e6-4929-bd5d-5ffadea96698_1200x1500.jpeg" width="434" height="542.5" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/dddf725a-54e6-4929-bd5d-5ffadea96698_1200x1500.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1500,&quot;width&quot;:1200,&quot;resizeWidth&quot;:434,&quot;bytes&quot;:218947,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!_SI-!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdddf725a-54e6-4929-bd5d-5ffadea96698_1200x1500.jpeg 424w, https://substackcdn.com/image/fetch/$s_!_SI-!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdddf725a-54e6-4929-bd5d-5ffadea96698_1200x1500.jpeg 848w, https://substackcdn.com/image/fetch/$s_!_SI-!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdddf725a-54e6-4929-bd5d-5ffadea96698_1200x1500.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!_SI-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdddf725a-54e6-4929-bd5d-5ffadea96698_1200x1500.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">NIST SP 800-53 control families overview</figcaption></figure></div><h3>NIST Control Families</h3><ul><li><p>Access Control (AC)</p></li><li><p>Awareness and Training (AT)</p></li><li><p>Audit and Accountability (AU)</p></li><li><p>Assessment, Authorization, and Monitoring (CA)</p></li><li><p>Configuration Management (CM)</p></li><li><p>Contingency Planning (CP)</p></li><li><p>Identification and Authentication (IA)</p></li><li><p>Incident Response (IR)</p></li><li><p>Maintenance (MA)</p></li><li><p>Media Protection (MP)</p></li><li><p>Physical and Environmental Protection (PE)</p></li><li><p>Planning (PL)</p></li><li><p>Program Management (PM)</p></li><li><p>Personnel Security (PS)</p></li><li><p>PII Processing and Transparency (PT)</p></li><li><p>Risk Assessment (RA)</p></li><li><p>System and Services Acquisition (SA)</p></li><li><p>System and Communications Protection (SC)</p></li><li><p>System and Information Integrity (SI)</p></li><li><p>Supply Chain Risk Management (SR)</p></li></ul><p>You can find all controls right here: <a href="https://csrc.nist.gov/projects/cprt/catalog#/cprt/framework/version/SP_800_53_5_1_0/home">CSRC</a></p><h2>Transitioning to NIST: A Step-by-Step Guide</h2><p>Here&#8217;s how to enhance your ISMS with NIST SP 800-53:</p><ol><li><p><strong>Evaluate Current Controls</strong>: Review your Statement of Applicability (SoA) to identify weak Annex A implementations. Use a gap analysis to assess maturity (e.g., is A.8.5 just a policy or fully enforced?).</p></li><li><p><strong>Map to NIST</strong>: Align Annex A objectives with NIST controls using NIST&#8217;s mapping tools or a custom spreadsheet. Pair A.8.5 with for example IA-2 (MFA) and IA-5 (authenticator management).</p></li><li><p><strong>Customize Controls</strong>: Select NIST controls based on your risk profile. For example, define standards for hardware keys or integrate SSO with your directory service.</p></li><li><p><strong>Implement in Phases</strong>: Start with pilot deployments (e.g., MFA for admins), then scale enterprise-wide. Update your SoA to reflect NIST enhancements.</p></li><li><p><strong>Test and Validate</strong>: Conduct penetration tests or audits to verify controls. Monitor metrics like failed logins and adjust as needed (e.g., add training from NIST&#8217;s AT family).</p></li><li><p><strong>Maintain and Update</strong>: Review annually to incorporate NIST updates, ensuring alignment with new threats.</p></li></ol><h2>Key Takeaways</h2><p>Here is what to remember from this article:</p><ul><li><p>Annex A is a reference for comparison, not a detailed implementation guide.</p></li><li><p>NIST SP 800-53 provides over 1,000 actionable controls, making it ideal for mature security programs.</p></li><li><p>Combining NIST SP 800-53 is possible and explicitly allowed by ISO/IEC 27001.</p></li></ul><h2>Test your Knowledge</h2><p>Today&#8217;s question is from the CGEIT curriculum:</p><p>What is the <strong>MAIN</strong> benefit of aligning IT performance metrics with business performance metrics?</p><p><strong>A)</strong> Easier tracking of IT performance<br><strong>B)</strong> Better decision-making for IT investments<br><strong>C)</strong> Increased IT operational efficiency<br><strong>D)</strong> Higher IT team morale</p><p>&#128073; Think you know the answer? Scroll <strong>down</strong> for the solution!</p><div><hr></div><p><strong>Answer:</strong> The correct answer is B.</p><p><strong>A)</strong> While tracking may become easier, it's not the main benefit of alignment.<br><strong>B) Aligning IT metrics with business metrics ensures that IT investments are directly contributing to business goals, facilitating better decision-making.</strong><br><strong>C)</strong> Operational efficiency is important but is a secondary benefit of such alignment.<br><strong>D)</strong> Team morale is important but not the primary reason for aligning IT and business metrics.</p>]]></content:encoded></item><item><title><![CDATA[Ditch the PDFs: NIST's CPRT is Changing How GRC Pros Handle Cybersecurity Resources]]></title><description><![CDATA[Inside this Edition]]></description><link>https://blog.grclab.com/p/ditch-the-pdfs-nist-s-cprt-is-changing-how-grc-pros-handle-cybersecurity-resources-799879c131155afa</link><guid isPermaLink="false">https://blog.grclab.com/p/ditch-the-pdfs-nist-s-cprt-is-changing-how-grc-pros-handle-cybersecurity-resources-799879c131155afa</guid><dc:creator><![CDATA[Aron Lange]]></dc:creator><pubDate>Fri, 15 Aug 2025 14:00:00 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/cbb1de95-db24-431e-8031-d840613f2c92_1200x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>Inside this Edition</h2><p>Here&#8217;s what we got for you today:</p><ul><li><p>Discover how the NIST Cybersecurity and Privacy Reference Tool is changing how GRC professionals interact with authoritative resources.</p></li><li><p>Don&#8217;t miss our latest YouTube video, &#8220;From Threats to Controls&#8221;.</p></li></ul><div><hr></div><p>Ever found yourself buried in a 200-page NIST PDF, Ctrl+F-ing your way through controls and guidelines, only to lose track halfway?</p><p>If that's your daily grind as a GRC practitioner, it's time for an upgrade. Enter NIST's Cybersecurity and Privacy Reference Tool (CPRT)&#8212;a game-changer that's making static documents feel like ancient history.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!IZ4b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50463ec5-20ed-4059-9065-aa6c1d5b13bb_1920x1125.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!IZ4b!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50463ec5-20ed-4059-9065-aa6c1d5b13bb_1920x1125.png 424w, https://substackcdn.com/image/fetch/$s_!IZ4b!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50463ec5-20ed-4059-9065-aa6c1d5b13bb_1920x1125.png 848w, https://substackcdn.com/image/fetch/$s_!IZ4b!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50463ec5-20ed-4059-9065-aa6c1d5b13bb_1920x1125.png 1272w, https://substackcdn.com/image/fetch/$s_!IZ4b!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50463ec5-20ed-4059-9065-aa6c1d5b13bb_1920x1125.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!IZ4b!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50463ec5-20ed-4059-9065-aa6c1d5b13bb_1920x1125.png" width="1920" height="1125" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/50463ec5-20ed-4059-9065-aa6c1d5b13bb_1920x1125.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1125,&quot;width&quot;:1920,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:639978,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!IZ4b!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50463ec5-20ed-4059-9065-aa6c1d5b13bb_1920x1125.png 424w, https://substackcdn.com/image/fetch/$s_!IZ4b!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50463ec5-20ed-4059-9065-aa6c1d5b13bb_1920x1125.png 848w, https://substackcdn.com/image/fetch/$s_!IZ4b!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50463ec5-20ed-4059-9065-aa6c1d5b13bb_1920x1125.png 1272w, https://substackcdn.com/image/fetch/$s_!IZ4b!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50463ec5-20ed-4059-9065-aa6c1d5b13bb_1920x1125.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">NIST Computer Security Resource Center (CSRC)</figcaption></figure></div><h2>What is the CPRT?</h2><p>The CPRT, hosted by NIST's Computer Security Resource Center (CSRC), is an online platform that centralizes and digitizes key cybersecurity and privacy resources. Think of it as a smart library for NIST's flagship publications, like the Cybersecurity Framework (CSF) 2.0, SP 800-53 (Security and Privacy Controls), and SP 800-171 (Protecting Controlled Unclassified Information). Instead of downloading hefty PDFs, you get interactive access to reference data&#8212;controls, guidelines, and frameworks&#8212;in a structured, user-friendly format.</p><p>Launched to modernize how we interact with these resources, the CPRT turns complex docs into searchable, exportable datasets that make their content more accessible and easier to digest.</p><h2>How CPRT Beats Traditional PDF Reading</h2><p>Remember the frustration of cross-referencing multiple PDFs during a compliance audit? CPRT flips the script with features designed for real-world use:</p><ul><li><p><strong>Browsing Made Easy</strong>: Navigate through catalogs of publications like a digital bookshelf. Drill down into specific controls or sections without opening a single file.</p></li><li><p><strong>Powerful Search</strong>: Use keywords to pinpoint exact references across documents. For example, search "data encryption" and get hits from CSF, SP 800-53, and more&#8212;in seconds.</p></li><li><p><strong>Compare and Export</strong>: Side-by-side comparisons of controls from different frameworks? Check. Export data in machine-readable formats like CSV or JSON for integration into your GRC tools.</p></li></ul><h2>Real-World Wins for GRC Practitioners</h2><p>Imagine ensuring your organization complies with NIST SP 800-53's Media Protection controls for a system handling sensitive data. Traditionally, you'd juggle three PDFs: SP 800-53 for the control details, SP 800-53B for the control baselines (Low, Moderate, High), and SP 800-53A for assessment procedures. Tedious and error-prone.</p><p>With CPRT, it's really a breeze:</p><p>Navigate to the SP 800-53 catalog and select the "Media Protection" (MP) family from the 20 control families.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!1ztF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F35ca1e55-dab1-4a41-b09a-9e32d24e9456_1920x1256.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!1ztF!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F35ca1e55-dab1-4a41-b09a-9e32d24e9456_1920x1256.png 424w, https://substackcdn.com/image/fetch/$s_!1ztF!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F35ca1e55-dab1-4a41-b09a-9e32d24e9456_1920x1256.png 848w, https://substackcdn.com/image/fetch/$s_!1ztF!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F35ca1e55-dab1-4a41-b09a-9e32d24e9456_1920x1256.png 1272w, https://substackcdn.com/image/fetch/$s_!1ztF!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F35ca1e55-dab1-4a41-b09a-9e32d24e9456_1920x1256.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!1ztF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F35ca1e55-dab1-4a41-b09a-9e32d24e9456_1920x1256.png" width="1920" height="1256" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/35ca1e55-dab1-4a41-b09a-9e32d24e9456_1920x1256.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1256,&quot;width&quot;:1920,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:300862,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!1ztF!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F35ca1e55-dab1-4a41-b09a-9e32d24e9456_1920x1256.png 424w, https://substackcdn.com/image/fetch/$s_!1ztF!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F35ca1e55-dab1-4a41-b09a-9e32d24e9456_1920x1256.png 848w, https://substackcdn.com/image/fetch/$s_!1ztF!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F35ca1e55-dab1-4a41-b09a-9e32d24e9456_1920x1256.png 1272w, https://substackcdn.com/image/fetch/$s_!1ztF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F35ca1e55-dab1-4a41-b09a-9e32d24e9456_1920x1256.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Click on MP-06 (Media Sanitization) to view its full details in one place.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!knOo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F33e01d69-9577-45f7-9c27-edc346810a03_1920x562.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!knOo!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F33e01d69-9577-45f7-9c27-edc346810a03_1920x562.png 424w, https://substackcdn.com/image/fetch/$s_!knOo!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F33e01d69-9577-45f7-9c27-edc346810a03_1920x562.png 848w, https://substackcdn.com/image/fetch/$s_!knOo!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F33e01d69-9577-45f7-9c27-edc346810a03_1920x562.png 1272w, https://substackcdn.com/image/fetch/$s_!knOo!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F33e01d69-9577-45f7-9c27-edc346810a03_1920x562.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!knOo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F33e01d69-9577-45f7-9c27-edc346810a03_1920x562.png" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/33e01d69-9577-45f7-9c27-edc346810a03_1920x562.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!knOo!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F33e01d69-9577-45f7-9c27-edc346810a03_1920x562.png 424w, https://substackcdn.com/image/fetch/$s_!knOo!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F33e01d69-9577-45f7-9c27-edc346810a03_1920x562.png 848w, https://substackcdn.com/image/fetch/$s_!knOo!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F33e01d69-9577-45f7-9c27-edc346810a03_1920x562.png 1272w, https://substackcdn.com/image/fetch/$s_!knOo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F33e01d69-9577-45f7-9c27-edc346810a03_1920x562.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>See the control's requirements (from SP 800-53), its baseline assignments (from SP 800-53B, e.g., included in Moderate and High baselines), and assessment procedures (from SP 800-53A) seamlessly combined.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5Vpd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F928a88ca-c727-4a8f-aeb7-9bf5c4f4b95b_1920x1407.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5Vpd!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F928a88ca-c727-4a8f-aeb7-9bf5c4f4b95b_1920x1407.png 424w, https://substackcdn.com/image/fetch/$s_!5Vpd!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F928a88ca-c727-4a8f-aeb7-9bf5c4f4b95b_1920x1407.png 848w, https://substackcdn.com/image/fetch/$s_!5Vpd!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F928a88ca-c727-4a8f-aeb7-9bf5c4f4b95b_1920x1407.png 1272w, https://substackcdn.com/image/fetch/$s_!5Vpd!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F928a88ca-c727-4a8f-aeb7-9bf5c4f4b95b_1920x1407.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5Vpd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F928a88ca-c727-4a8f-aeb7-9bf5c4f4b95b_1920x1407.png" width="1920" height="1407" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/928a88ca-c727-4a8f-aeb7-9bf5c4f4b95b_1920x1407.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1407,&quot;width&quot;:1920,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:482133,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!5Vpd!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F928a88ca-c727-4a8f-aeb7-9bf5c4f4b95b_1920x1407.png 424w, https://substackcdn.com/image/fetch/$s_!5Vpd!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F928a88ca-c727-4a8f-aeb7-9bf5c4f4b95b_1920x1407.png 848w, https://substackcdn.com/image/fetch/$s_!5Vpd!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F928a88ca-c727-4a8f-aeb7-9bf5c4f4b95b_1920x1407.png 1272w, https://substackcdn.com/image/fetch/$s_!5Vpd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F928a88ca-c727-4a8f-aeb7-9bf5c4f4b95b_1920x1407.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>This unified view saves hours of cross-referencing. For example, MP-06 requires sanitizing media before disposal or reuse, and CPRT shows you the exact methods (e.g., clear, purge, destroy), baseline applicability, and how to assess compliance&#8212;all in one interface. Early adopters report cutting research time by half, letting them focus on high-impact areas like emerging threats.</p><p>Ready to level up your GRC game? Check out the CPRT and explore a new way of working with their resources.</p><p><a href="https://csrc.nist.gov/projects/cprt/catalog#/cprt/home">Cybersecurity and Privacy Reference Tool | CSRC</a></p><h2>Our latest Video on YouTube</h2><p>Have you ever wondered how threats, vulnerabilities and controls are related? If so, then our latest YouTube might have the answers to your questions. &#8595;</p><div id="youtube2-6IjtM7uhP3s" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;6IjtM7uhP3s&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/6IjtM7uhP3s?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><h2>Test your Knowledge</h2><p>Today&#8217;s question is from the CISM curriculum:</p><p>Which of the following metrics is <strong>MOST</strong> useful in evaluating the effectiveness of a security awareness program?</p><p><strong>A)</strong> Number of training sessions conducted.<br><strong>B)</strong> Employee feedback on training content.<br><strong>C)</strong> Reduction in security incidents post-training.<br><strong>D)</strong> Attendance rate for training sessions.</p><p>&#128073; Think you know the answer? Scroll <strong>down</strong> for the solution!</p><div><hr></div><p><strong>Answer:</strong> The correct answer is C.</p><p><strong>A)</strong> The number of sessions does not indicate effectiveness.<br><strong>B)</strong> Feedback is useful but not a direct measure of effectiveness.<br><strong>C)</strong> <strong>A reduction in security incidents directly indicates the program's effectiveness.</strong><br><strong>D)</strong> Attendance rate shows interest but not effectiveness.</p>]]></content:encoded></item></channel></rss>