PILLAR GUIDE

Compliance & Governance

GDPR, SOC 2, ISO 27001 & More

Table of Contents
GRC Overview GDPR (Data Privacy) SOC 2 ISO 27001 PCI DSS HIPAA Building a GRC Program

GRC Overview

Governance, Risk, and Compliance (GRC) is an integrated approach to ensure an organization aligns IT with business goals, manages risk effectively, and meets compliance requirements.

Key Components

GDPR (General Data Protection Regulation)

EU regulation protecting personal data of EU residents. Applies to any organization processing EU citizen data.

Key Requirements

Penalties: Up to €20M or 4% of global annual revenue

SOC 2

AICPA framework for service organizations. Demonstrates security and privacy controls to customers.

Trust Service Criteria

SecurityProtection against unauthorized access (required)
AvailabilitySystem availability per SLA
Processing IntegrityAccurate and timely processing
ConfidentialityProtection of confidential info
PrivacyPersonal information handling

SOC 2 Type I vs Type II

ISO 27001

International standard for Information Security Management Systems (ISMS).

Implementation Steps

  1. Define ISMS scope
  2. Conduct risk assessment
  3. Select Annex A controls (114 controls in 14 domains)
  4. Implement controls
  5. Internal audit
  6. Certification audit (Stage 1 & 2)
  7. Surveillance audits (annual)

PCI DSS

Payment Card Industry Data Security Standard. Required for any organization handling credit card data.

12 Requirements

  1. Install and maintain firewalls
  2. Change default passwords
  3. Protect stored cardholder data
  4. Encrypt transmission of data
  5. Use and update anti-virus
  6. Develop secure systems
  1. Restrict access on need-to-know
  2. Assign unique IDs
  3. Restrict physical access
  4. Track and monitor access
  5. Regularly test security
  6. Maintain security policy

HIPAA

US regulation protecting health information (PHI). Applies to healthcare providers, insurers, and business associates.

Key HIPAA Rules

Building a GRC Program

  1. Inventory: Map data, systems, and compliance requirements
  2. Gap Analysis: Compare current state to requirements
  3. Roadmap: Prioritize remediation activities
  4. Implementation: Deploy controls and document
  5. Continuous Monitoring: Ongoing compliance validation

Last updated: December 2024