Navigating Compliance Requirements DCM 6.2 Regs and Codes
24 Slides170.39 KB
Navigating Compliance Requirements DCM 6.2 Regs and Codes linford&co llp
Navigating Compliance Requirements Data centers may choose to comply with many different rules and regulations such as, HIPAA, SSAE 16 (f. SAS 70), ISO, LEED, etc. We will break down the requirements and discuss where overlaps exist, how to leverage work between audits, and how to minimize audit impact.
Myriad of Regulations, Frameworks and Standards HIPAA PCI DSS FISMA SSAE 16 / SOC 1 ISO 27001 SOC 2, SOC 3 LEED
HIPAA Health Insurance Portability and Accountability Act of 1996 Privacy rule Security rule – Three types of safeguards Administrative Physical Technical Required vs. addressable specifications Why would a data center choose to be HIPAA compliant? House ePHI for clients
HIPAA Continued How to demonstrate compliance No HIPAA “certification” Self audit Independent audit Cost of compliance Resource to implement required policies and procedures and perform self assessment Independent audit – 10K to 100K – depending on size and complexity Cost of breach
FISMA Federal Information Security Management Act of 2002 Requirements Categorize information systems according to risk level (FIPS 199) Security controls Risk management System security plan Why would a data center need to be compliant with FISMA? House federal agency clients or contractors to federal agencies
FISMA Continued How to demonstrate compliance No FISMA “certification” Independent audit Cost of compliance Resource to implement required policies and procedures, perform risk assessment, implement controls to remediate gaps Independent audit – 20K to 100K – depending on size and complexity
ISO 27001:2005 Information security standards published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) in 2005 Requirements Specifies a security management system Required Every three years Why might a data center choose to be ISO certified? Data center is located outside of the United States Data center does business with European clients
ISO 27001:2005 Continued How to demonstrate compliance Certification by an ISO Registrar Cost of compliance Readiness assessment and consultations necessary Separate ISO Registrar necessary 50K to 100K Every Triennial
Payment Card Industry Data Security Standard – (PCI DSS) Created by credit card companies to protect cardholder data Requirements 12 PCI DSS requirements Service dependent Why might a data center choose to be PCI certified? Have credit card merchants or PSPs for clients Client requirements
PCI DSS Continued How to demonstrate compliance Self assessment questionnaires (SAQ) PCI Report of Compliance (ROC) Listing on Credit Card Company’s Directory Cost of compliance Only QSAs Can Perform 15K to 100K Per Annum
LEED System LEED - Leadership in Energy and Environmental Design – Designed by the US Green Building Council in 1998. Requirements Voluntary Energy efficiency evaluation Four categories (Certified, Silver, Gold, and Platinum) Why might a data center choose to be LEED certified? Lower operating costs and increased asset value Demonstrate energy efficiency to clients and prospects Qualify for tax rebates, zoning allowances and other incentives
LEED Continued How to demonstrate compliance Project must satisfy LEED prerequisites and earn a minimum of 40 points on a 110 point LEED rating scale Independent, third party verification that a company meets LEED Cost of compliance Implement LEED prerequisites to earn enough points to satisfy desired level of LEED certification – cost varies by project Certifications fees vary by project size, the average cost is 2000
Service Organization Control Audits - SOC 1, 2, 3 SOC 1 / SSAE 16 – (f. SAS 70) – Statement on Standards for Attestation Engagements Internal Controls over Financial Reporting (ICFR) SOC 2 and SOC 3 Security, Availability, Processing Integrity, Confidentiality, or Privacy Detailed vs High-Level Why might a data center choose to obtain a SOC report? Hosting General Ledger or ERP Systems User Auditors’ Requirement
SOC 1, 2, 3 Continued How to demonstrate compliance Internal Controls In Place Design Effectiveness Operating Effectiveness Cost of compliance Only CPA Firms with Specialists Can Perform 15K – 1M Per Annum
Ways to Demonstrate Compliance Internal Testing Independent Audits Various External Audits
Cost of Compliance Expensive Value Judgment How much is the customer or potential customer worth to company? How much are lost or failed opportunities worth? Quality of Audit Firm Reports must be accepted by user organizations Get it right the first time Questions to ask
Framework Overlap Many of the regulations and frameworks overlap How to demonstrate compliance One audit, multiple reports
Framework Overlap HIPAA PCI FISMA SOC 2 X X X X X X X X Physical Access X X X X Encryption X X X X Employee Sanction X Risk Assessment X X X X Antivirus X X X X Logging X X X Information Security Policy Logical Access
Framework Drilldown Risk management is a common theme within many information security standards HIPAA - 164.308(a)(1)(ii)(A) FISMA - §3544(a)(b)(1) ISO 27001 – Clause 4.2.1 SOC 2 – 3.1 within the Security, Availability, Processing Integrity, and Confidentiality Trust Services Principles PCI – 12.2.1
Sample Risk Assessment Scale 1 to 5 2 1 1 1 1 1 1 1 2 2 1 1 2 1 Explosion Burglary/Extortion Vandalism Bomb Threat Terrorism Riots/Civil Disturbance Work Stoppage Data Entry Improper Handling of Sensitive Data Unauthorized Access to Data/Theft Malicious Damage/Destruction of Software/Hardware Unauthorized Physical Access Unauthorized Modification of Software/Hardware Virus/Worm/Malicious code X X X X X X X X X X X X X X X X X Safeguard Availability HUMAN Impact Integrity Likelihood Confidentiality Threat Sources X X User awareness and physical access controls User awareness and physical access controls X Emergency operations procedures User awareness and physical access controls User awareness and physical access controls Emergency operations procedures Error Auditing User awareness training, physical & technical access controls X Physical & technical access controls, firewall, IDS X Physical & technical access controls, firewall, IDS X Physical access controls, user awareness, visitor sign-in procedures X Access control & auditing procedures X Physical & technical access controls, firewall, IDS, Workstation Security
Tips for Successfully Passing an Audit 1. Have one or more established, positive, goals 2. Establish expectations with training 3. Evaluate your strengths, assess your weaknesses, identify your exposures 4. Review prior audit results 5. Practice, practice, practice
Tips for Successfully Passing an Audit – Cont. 6. Copy when you can 7. Be ready to respond as issues arise 8. Coaching staff 9. Document and train on processes 10. Have fun!
Thank You Newel Linford and Robert Pierce [email protected] [email protected] www.linfordco.com linford&co llp