Avoiding the Pitfalls of Turnkey Compliance Solutions

November 17, 2020
Jake Nix

Artificial intelligence, data analytics, and machine learning have advanced the security and compliance space. These technologies have enabled businesses to better protect information and systems, while helping auditors better understand environments and perform audits more efficiently. That being said, they also have their own challenges.

While these powerful tools have led to tangible improvements, both internally for service organizations and externally for audit firms, they have not replaced the need for thoughtful planning, architecting, implementation, and execution of cybersecurity and compliance programs.

There has been a rise in popularity of turnkey, subscription-based solutions that promise a SOC 2 ready environment in a fraction of the time. While this sounds appealing, the process may not be as easy, or as effective, for your organization as some case studies show.  Before engaging with a platform provider for your compliance program needs, there are six fundamental areas to consider

The platform’s reporting limitations, generic controls, and templates

The processes and environment that you have created are unique to your organization. In fact, they are a part of the competitive advantage you have built by doing things differently.

Compared to a partner firm helping you improve your processes, while achieving a compliant environment and maintaining your culture, automated and accelerated platforms provide  canned templates that often require significant changes to your process, or a deep enough understanding of the standard to be able to modify the templates to fit your process.

Further, the dashboards and reporting capabilities may tell you that you’re noncompliant, but they don’t always help guide you through the right solutions for your environment. Similar to the policies, the solution recommends actions that may not make sense in your environment, or worse, may only help you check the compliance box.  A better, more personalized  solution could have added value, or at least been more cost-effective.

Stand-alone Compliance

Cybersecurity and compliance should be incorporated into the processes and culture of the organization. Creating policies and procedures for the sole purpose of meeting a compliance regulation may help achieve a passing audit, but it will decay quickly. The organization will not recognize any value added outside of the certification or report as part of the process.

Continuous reporting requires governance

Programs that provide continuous reporting on your controls and compliance posture often create additional governance needs or add new risks to the organization. If a dashboard is reporting that controls are out of compliance, and the organization suffers a security incident, downtime, or worse, a data breach, it may lead to claims of negligence.To avoid this, organizations would need to develop governance over the tool and dashboard itself, which would need to include monitoring and remediation requirements. Even then, this poses a greater risk to the organization without any major added benefit.  If a control fails within an audit period, an exception and management response will be required, whether it has been remediated within days, or months.

Scalability

Turnkey platforms are often built to service small and medium businesses. Most organizations tend to grow faster than what some of these solutions can accommodate, so you will need to ensure you’re not investing in a solution that will not be able to scale with you. Most platforms run a single dashboard that will become a greater challenge once your organization grows beyond a certain range of FTEs or business unit complexity.These applications can also include assumptions that the platform developers have baked into their software. Because of these assumptions, at times, the platforms start to deteriorate due to added complexity that was not accounted for, including applications that span multiple accounts, different development teams, and different compliance requirements for different sets of applications. Ultimately, the standardized approach becomes unable to support the complexities that mid-size and enterprise-level organizations face.

Proprietary approach creates a lack of portability

The platforms are meant to stay with you throughout the life of your compliance program. This means that all your work, policies, processes, services are tied to an ongoing subscription. If the company goes out of business, raises their rates, gets acquired (then raises their rates), your compliance program could be in jeopardy, or you may be faced with having to start all over again. This, of course, isn’t a great investment.  

Timelines quoted are best case scenario

While dubbed “turnkey”, these are not plug and play solutions. The marketing materials exhibit best case scenarios, and we have observed that the implementation can be as fast as three months, but it typically is closer to, or in excess of, a year for the platform to be properly configured and begin compiling data properly. Additionally, the platforms lack the relationships and understanding to help you accelerate your compliance journey, and they are often unable to work with all audit firms to ensure you achieve the client requirements or market need you are looking to accomplish.We recommend organizations take a strategic approach to cybersecurity and compliance. This begins with determining both short and long-term market goals and translating those into compliance and certification requirements (i.e. SOC 2, HITRUST, FedRAMP). Once the short and long-term compliance goals have been determined, the organization can evaluate the right technical security, compliance enablement, and audit partners to help achieve their goals. If you’re evaluating your compliance needs, we would love the opportunity to help you develop your strategic roadmap. Contact us with the form below.

Download

Stay Informed, Stay Secure

Subscribe to our newsletter and get the latest cybersecurity insights, updates, and event invitations delivered straight to your inbox. Join our community and empower your security journey with RISCPoint's expert knowledge.

Thank you! We'll keep you up to date!
Oops! Something went wrong while submitting the form.

Join our newsletter for updates. Terms.

TOP