OBJECTIVE 5.4 Summarize

Summarize elements of effective security compliance

Compliance is meeting the requirements imposed by laws, regulations, industry standards, and contractual obligations. It’s not optional, and penalties for non-compliance can be severe — fines, lawsuits, loss of business, or criminal liability.

Regulatory Frameworks

GDPR (General Data Protection Regulation)

EU regulation governing personal data of EU residents.

  • Applies to any organization processing EU resident data, regardless of where the org is located
  • Key requirements: Lawful basis for processing, data subject rights (access, deletion, portability), 72-hour breach notification, Data Protection Officer (DPO) for certain orgs, privacy by design
  • Penalties: Up to 4% of annual global revenue or €20 million, whichever is greater

HIPAA (Health Insurance Portability and Accountability Act)

US regulation protecting healthcare data (PHI — Protected Health Information).

  • Applies to covered entities (healthcare providers, insurers) and their business associates
  • Security Rule: Technical, physical, and administrative safeguards for ePHI
  • Privacy Rule: How PHI can be used and disclosed
  • Breach Notification Rule: Notification requirements when PHI is compromised

PCI-DSS (Payment Card Industry Data Security Standard)

Industry standard for organizations that handle credit card data.

  • Not a law — contractual requirement from card brands (Visa, Mastercard, etc.)
  • 12 requirements covering network security, data protection, access control, monitoring, testing
  • Quarterly vulnerability scans by Approved Scanning Vendor (ASV)
  • Annual assessment (Self-Assessment Questionnaire for small merchants, on-site audit for large)

SOX (Sarbanes-Oxley Act)

US law requiring internal controls over financial reporting for publicly traded companies.

  • IT controls are in scope because financial data flows through IT systems
  • Section 404: Management must assess and report on internal control effectiveness

GLBA (Gramm-Leach-Bliley Act)

US law requiring financial institutions to protect customer financial information.

  • Safeguards Rule: Risk assessment, employee training, vendor oversight

FERPA (Family Educational Rights and Privacy Act)

US law protecting student education records.

CCPA/CPRA (California Consumer Privacy Act / California Privacy Rights Act)

California privacy regulation — often called “US GDPR.”

  • Consumer rights: know what data is collected, delete data, opt out of sale
  • Applies to businesses meeting revenue/data thresholds

Key Compliance Distinctions

Due Diligence vs. Due Care

CompTIA tests this explicitly. Know the difference cold.

  • Due diligence: The investigation and research before making a decision. Identifying risks, evaluating controls, understanding regulatory requirements. “Did you do your homework?”
  • Due care: The ongoing implementation and maintenance of reasonable protections after you know the risks. “Are you doing what a reasonable person would do?”
ConceptWhenExample
Due diligenceBefore/during planningConducting a risk assessment before adopting a cloud provider
Due careOngoing operationsApplying patches promptly after they’re released

Failure of due diligence = negligence in preparation. Failure of due care = negligence in execution. Both create legal liability.

Attestation vs. Acknowledgement

  • Attestation: A formal declaration that something is true, typically by a qualified third party. An auditor attests that controls are operating effectively. A SOC 2 report is an attestation.
  • Acknowledgement: Confirmation that a person has received and understood information. An employee acknowledging the AUP isn’t attesting to its accuracy — they’re confirming they read it.

Data Roles

RoleResponsibilityExample
Data OwnerBusiness executive who decides classification and access policyVP of Finance owns financial data
Data StewardEnsures data quality, integrity, and proper use within policyDatabase admin who enforces naming conventions, validates data accuracy
Data CustodianImplements technical controls the owner definesSysadmin who configures encryption and backups
Data ControllerDetermines purposes and means of processing (GDPR term)The company collecting customer data
Data ProcessorProcesses data on behalf of the controllerA cloud provider storing that data

Exam trap: Data steward ≠ data custodian. The steward focuses on data quality and governance within business rules. The custodian focuses on technical implementation of protections.

Breach Notification Requirements

Notification timelines vary by regulation. CompTIA expects you to know the key ones:

RegulationNotification DeadlineWho Must Be Notified
GDPR72 hours to supervisory authorityAuthority + affected individuals if high risk
HIPAA60 days to HHS + individualsHHS, affected individuals, media if >500 people
PCI-DSSASAP (no fixed timeline)Card brands, acquiring bank
State breach lawsVaries (30–90 days typical)State AG, affected residents
  • Clock starts when the breach is discovered, not when it occurred
  • “Discovery” means when the org knew or should have known — willful ignorance doesn’t stop the clock
  • Notification must include: what happened, what data was involved, what the org is doing about it, what affected individuals should do

Data Retention and Classification

Retention Periods by Regulation

RegulationRetention PeriodWhat’s Retained
PCI-DSS1 year (audit logs)Cardholder data environment logs
SOX7 yearsFinancial records, audit workpapers
HIPAA6 yearsPHI-related documentation, policies
GDPRNo longer than necessaryPersonal data (purpose limitation)
IRS7 yearsTax-related financial records
  • Retention policies must address both minimum (hold at least this long) and maximum (delete after this long) periods
  • GDPR’s “storage limitation” principle means you can’t keep data indefinitely “just in case”
  • Retention applies to backups too — a backup containing data past its retention period is a compliance violation

Data Inventory and Classification

Data classification is a prerequisite for compliance, not a separate activity:

  1. Inventory: Identify what data you have, where it lives, who accesses it
  2. Classify: Apply labels based on sensitivity (Public, Internal, Confidential, Restricted)
  3. Map to requirements: Which regulations apply to which data categories
  4. Apply controls: Controls proportional to classification level
  5. Monitor: Ongoing verification that classified data is handled according to policy

Without a data inventory, compliance is guesswork. You can’t protect what you don’t know you have.

Compliance Monitoring

Automated vs. Periodic Monitoring

  • Automated/continuous: Real-time compliance checking via tools (CSPM for cloud, SIEM for log retention, configuration management for baselines). Catches drift immediately.
  • Periodic: Scheduled reviews — quarterly access reviews, annual policy reviews, monthly control testing. Catches issues on a cadence.
  • Best practice is both: automated monitoring for technical controls, periodic reviews for procedural and administrative controls.

Gap Remediation Tracking

  • Gaps identified during audits or monitoring must be tracked to closure
  • Plan of Action and Milestones (POA&M): Formal document listing each gap, remediation steps, responsible party, and deadline
  • Compensating controls may be acceptable while permanent fixes are implemented
  • Regulators and auditors want to see progress, not perfection — but they want to see documented progress

Master Regulatory Comparison

One table to rule them all. CompTIA loves “which regulation applies?” questions.

RegulationApplies ToProtectsKey RequirementsPenaltiesRetentionBreach Notification
GDPRAny org processing EU resident dataPersonal data of EU residentsLawful basis, DPO, privacy by design, data subject rightsUp to 4% global revenue or €20MNo longer than necessary72 hours to authority
HIPAAHealthcare providers, insurers, business associatesPHI (Protected Health Information)Technical/admin/physical safeguards, BAAs, minimum necessaryUp to $1.5M per violation category/year6 years (documentation)60 days to HHS + individuals
PCI-DSSAny org handling payment card dataCardholder data12 requirements, quarterly ASV scans, annual assessmentContract penalties, increased fees, loss of card processing1 year (audit logs)ASAP to card brands + acquirer
SOXUS publicly traded companiesFinancial reporting integritySection 404 internal controls, audit trailsFines, prison (up to 20 years for willful violation)7 yearsN/A (SEC filings)
GLBAUS financial institutionsCustomer financial informationSafeguards Rule, privacy notices, vendor oversightFines per violationVariesState-specific
FERPAEducational institutions receiving federal fundingStudent education recordsConsent for disclosure, access rights, amendment rightsLoss of federal fundingVaries by record typeNo federal requirement
CCPA/CPRABusinesses meeting CA revenue/data thresholdsCA consumer personal informationRight to know, delete, opt-out of sale, correct$2,500/violation, $7,500/intentionalReasonable periodNo specific timeline
SOC 2Service organizations (voluntary)Customer data (Trust Services Criteria)Security, availability, processing integrity, confidentiality, privacyN/A (market consequence)Per engagementPer contract

Exam decision logic:

  • Healthcare data → HIPAA
  • EU personal data → GDPR
  • Credit card numbers → PCI-DSS
  • Student records → FERPA
  • Financial reporting → SOX
  • California residents → CCPA/CPRA
  • Customer financial data → GLBA
  • “Which has the shortest breach notification?” → GDPR (72 hours)
  • “Which has the highest penalties?” → GDPR (percentage of global revenue)

Compliance vs. Security

Compliance ≠ Security. An organization can be compliant and insecure, or secure and non-compliant.

  • Compliance is the minimum baseline — the floor, not the ceiling
  • Compliance frameworks can lag behind current threats
  • Checkbox compliance without genuine security investment creates a false sense of safety
  • However, compliance drives accountability and funding that might not otherwise exist

Compliance Elements

Policies and Procedures

Documented controls that demonstrate how requirements are met.

  • Must be current, approved, and distributed to relevant personnel

Evidence Collection

Proof that controls are implemented and operating effectively.

  • Logs, configurations, screenshots, tickets, training records
  • Must be maintained for the retention period required by the standard

Internal Monitoring

Continuous or periodic self-assessment to verify compliance is maintained.

  • Automated compliance monitoring tools
  • Regular control testing and validation
  • Gap remediation tracking

Reporting

Demonstrating compliance to regulators, auditors, or business partners.

  • Compliance reports, attestation letters, certification documents
  • Incident reporting within required timeframes (GDPR 72-hour requirement)

Data Privacy

Key Concepts

  • PII (Personally Identifiable Information): Data that can identify an individual (name, SSN, email, IP address in some jurisdictions)
  • PHI (Protected Health Information): Health-related PII under HIPAA
  • Data sovereignty: Legal requirement that data is subject to the laws of the country where it’s stored
  • Data localization: Requirement that data must be stored within specific geographic boundaries
  • Privacy Impact Assessment (PIA): Evaluation of how a project or system affects individual privacy

Data Subject Rights (GDPR model)

  • Right of access: See what data is held about you
  • Right to rectification: Correct inaccurate data
  • Right to erasure (“right to be forgotten”): Request deletion of personal data
  • Right to portability: Receive your data in a portable format
  • Right to object: Opt out of certain data processing
  • Must be freely given, specific, informed, and unambiguous
  • Pre-checked boxes are not valid consent under GDPR
  • Must be as easy to withdraw as to give

Consequences of Non-Compliance

  • Financial: Fines (GDPR fines regularly in millions), contract penalties
  • Legal: Lawsuits, regulatory action, criminal charges for willful negligence
  • Reputational: Loss of customer trust, public disclosure of failures
  • Operational: Loss of ability to process payments (PCI-DSS), loss of government contracts

Offensive Context

Compliance frameworks exist because organizations historically failed to implement basic security without external pressure. From the offensive side, compliance documentation is reconnaissance gold — it tells the attacker what controls are supposedly in place. The gap between documented compliance and actual implementation is where attackers find opportunity. “We’re PCI compliant” means nothing if the controls are poorly implemented or scope is minimized to pass the audit rather than genuinely protect cardholder data.