Unit 5
Unit 5
environment complies with governance rules. In other words, when you build a
compliant cloud environment, your environment conforms to one or more specific sets
of security and privacy standards.
The frameworks that affect a given business are determined by factors such as the
jurisdiction in which your business operates, the industry or sector of the business, and
the number of users the business has. For example, the GDPR applies to most
businesses that process data owned by or associated with residents of the E.U.,
regardless of which industry the company operates in or whether the company has a
physical presence in the European Union. In contrast, the PCI DSS standard affects
only companies that process payments.
Each compliance framework contains a unique set of rules. In general, however, the
requirements include mandates such as ensuring “reasonable security” for workloads,
encrypting sensitive data, and demonstrating that your organization performs regular
audits to identify and address potential security issues.
Compliance and governance are a bit more complicated in the cloud than they are on-prem
because public cloud providers operate according to a shared responsibility model. Under this
model, cloud providers are responsible for managing some aspects of security, such as securing
the physical servers that host VM instances and storage buckets. They also usually perform
regular audits of their systems, as required by a variety of government and industry compliance
standards.
That means it’s up to the business to assess compliance requirements and determine
how to translate them into specific tools and processes.
For example, a cloud compliance rule could state that user data must never be stored in
your cloud environment in unencrypted form. Or, you could establish a rule stating that
SSH access will be disabled by default for cloud VMs.
You can do this manually, of course, by evaluating your cloud workload configurations
and determining whether they align with the rules you have established.
But it’s much more efficient to automate compliance by using auditing tools that
automatically scan cloud configuration files, logs, and other data sources to detect
compliance violations based on the rules you have established.
What is GRC?
Governance, Risk, and Compliance (GRC) is a structured way to align IT with business goals while managing risks and meeting all industry and
government regulations. It includes tools and processes to unify an organization's governance and risk management with its technological innovation
and adoption. Companies use GRC to achieve organizational goals reliably, remove uncertainty, and meet compliance requirements.
Governance
Governance is the set of policies, rules, or frameworks that a company uses to achieve its business goals. It defines the responsibilities of key
stakeholders, such as the board of directors and senior management. For example, good corporate governance supports your team in including the
company's social responsibility policy in their plans.
Resource management
Risk management
Businesses face different types of risks, including financial, legal, strategic, and security risks. Proper risk management helps businesses identify these
risks and find ways to remediate any that are found. Companies use an enterprise risk management program to predict potential problems and
minimize losses. For example, you can use risk assessment to find security loopholes in your computer system and apply a fix.
Compliance
Compliance is the act of following rules, laws, and regulations. It applies to legal and regulatory requirements set by industrial bodies and also for
internal corporate policies. In GRC, compliance involves implementing procedures to ensure that business activities comply with the respective
regulations. For example, healthcare organizations must comply with laws like HIPAA that protect patients' privacy.
The following are some benefits of implementing a GRC strategy at your organization.
Data-driven decision-making
You can make data-driven decisions within a shorter time frame by monitoring your resources, setting up rules or frameworks, and using GRC software
and tools.
Responsible operations
GRC streamlines operations around a common culture that promotes ethical values and creates a healthy environment for growth. It guides strong
organizational culture development and ethical decision-making in the organization.
Improved cybersecurity
With an integrated GRC approach, businesses can employ data security measures to protect customer data and private information. Implementing a
GRC strategy is essential for your organization due to increasing cyber risk that threatens users' data and privacy. It helps organizations comply with
data privacy regulations like the General Data Protection Regulation (GDPR). With a GRC IT strategy, you build customer trust and protect your
business from penalties.
Internet connectivity introducing cyber risks that might compromise data storage security
Key stakeholders
GRC requires cross-functional collaboration across different departments that practices governance, risk management, and regulatory compliance.
Some examples include the following:
GRC framework
A GRC framework is a model for managing governance and compliance risk in a company. It involves identifying the key policies that can drive the
company toward its goals. By adopting a GRC framework, you can take a proactive approach to mitigating risks, making well-informed decisions, and
ensuring business continuity.
Companies implement GRC by adopting GRC frameworks that contain key policies that align with the organization's strategic objectives. Key
stakeholders base their work on a shared understanding from the GRC framework as they devise policies, structure workflows, and govern the
company. Companies might use software and tools to coordinate and monitor the success of the GRC framework.
GRC maturity
GRC maturity is the level of integration of governance, risk assessment, and compliance within an organization. You achieve a high level of GRC
maturity when a well-planned GRC strategy results in cost efficiency, productivity, and effectiveness in risk mitigation. Meanwhile, a low level of GRC
maturity is unproductive and keeps business units working in silos.
Learn
You learn about the context, values, and culture of your company so you can define strategies and actions that reliably achieve objectives.
Align
Ensure that your strategy, actions, and objectives are in alignment. You do so by considering opportunities, threats, values, and requirements when
making decisions.
Perform
GRC encourages you to take actions that bring results, avoid those that hinder goals, and monitor your operations to detect sudden changes.
Review
You revisit your strategy and actions to ensure they align with the business goals. For example, regulatory changes could require a change of
approach.
Stay updated about various regulatory changes that affect the business
User management
You can give various stakeholders the right to access company resources with user management software. This software supports granular
authorization, so you can precisely control who has access to what information. User management ensures that everyone can securely access the
resources they need to get their work done.
Auditing
You can use auditing tools like AWS Audit Manager to evaluate the results of integrated GRC activities in your company. By running internal audits,
you can compare actual performance with GRC goals. You can then decide if the GRC framework is effective and make necessary improvements.
Change management
GRC reports provide insights that guide businesses to make accurate decisions, which helps in a fast-changing business environment. However,
companies need to invest in a change management program to act quickly based on GRC insights.
Data management
Companies have long been operating by keeping departmental functions separated. Each department generates and stores its own data. GRC works
by combining all the data within an organization. This results in duplicate data and introduces challenges in managing information.
Clarity in communication
The success of GRC implementation depends on seamless communication. Information sharing must be transparent between GRC compliance teams,
stakeholders, and employees. This makes activities like creating policies, planning, and decision-making easier.
For example, with AWS Cloud Operations, you can perform the following tasks:
This form of regulation can often overlap with the others. Compliance usually
includes financial, IT, reporting, and audit logging requirements in many cases.
Covered
Protecting
entities
Health Private
(hospitals, Department of
Insurance Health Cybersecurity controls;
doctors, Health and
Portability and Information physical and administrative
insurance Human Services
Accountability (PHI) from privacy controls
companies) and (HHS)
Act (HIPAA) unauthorized
their business
disclosure
associates
Federal Risk Cloud service The Joint Securing CSPs must implement NIST
and providers Authorization cloud 800-53 and other controls to
Authorization working with Board (JAB) and systems used meet minimum standards
Management federal Program by federal
Program agencies Management agencies
(FedRAMP) Office (PMO) through third-
party vendors
Digital Securing
Cybersecurity contractors defense- Contractors must implement
Maturity Model working with The Department related IT NIST 900-171 and NIST 800-
Certification Department of of Defense systems in 172 controls to work in the
(CMMC) Defense the DoD supply chain
agencies supply chain
* As of January 1, 2023, the CCPA was amended into the California Privacy Rights Act
(CPRA) with expanded regulations and controls.
Additionally, several standards are not required or governed by law but apply
specifically to either industry practices or optional adoption by a company:
Payment Card
Industry Payment processors and
Payment Card Retailers and
(including credit merchants must
Industry Data merchants Credit card
card companies implement security
Security accepting and payment
like Visa, practices to secure
Standard (PCI credit card information
Mastercard, payment information
DSS) payments
American from theft
Express, etc.)