Abstract
Organizations must approach regulatory compliance requirements with sustainability in mind if they are to manage their risk effectively. This is a security-driven compliance approach, and if we are compliant, we are secure. Security must be sustained in order to be secure. If you do nothing more than what’s necessary to pass a SOX or FISMA audit, you are not likely to address your logical access risks or security requirements. Effectively managing user access risk requires meaningful diligence above and beyond “checkbox” compliance. Achieving a sustainable level of transparency and risk management to protect against the very real security threats that exist inside the organization should be the target goal.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2020 Morey J. Haber, Darran Rolls
About this chapter
Cite this chapter
Haber, M.J., Rolls, D. (2020). Meeting Regulatory Compliance Mandates. In: Identity Attack Vectors. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-5165-2_8
Download citation
DOI: https://doi.org/10.1007/978-1-4842-5165-2_8
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-5164-5
Online ISBN: 978-1-4842-5165-2
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)