Your business depends on getting through a compliance audit to keep your customers. With our extensive experience in IT compliance and cybersecurity operations, we combine technology architecture with information security and compliance frameworks.
Compliance audits should not be a surprise or a stressful event. With our proven processes and experiences, we guide clients and protect the most valuable asset, your client base.
Compliance Audits Got You Stressed?
We take the stress and worry out of successfully navigating compliance audits. Through our processes and experience, we take the hard work off you and remove the burdens of day to day compliance.
- Long term planning
- Manage vulnerabilities
- Continuous monitoring planning and practices
- Mitigate risk and threats
How Does It Work?
Leveraging our proven processes for successfully navigating compliance, we partner with our clients by becoming a trusted advisor. We are more than just a consultant or a one time project and build lasting relationships with our clients.
- Perform an assessment and gap analysis to see how you stack up
- Create a security plan to address places that are weak to prepare for an audit
- Make suggestions and recommendations on technology
- Generate and create audit evidence over time
- Participate in the audit and take the lead on your behalf
Why Do You Need Us?
Planning and Implementation
Steel Patriot Partners doesn’t just create an individual plan for your organization’s specific needs, we roll up our sleeves and do the work.
Support Mission Priorities
We treat your company’s mission like our own.
Deep Governance Expertise
The Steel Patriot Partners team has completed certifications and improved cyber postures for all types of organizations.
Compliance can be complicated. Steel Patriot Partners knows how to discuss cybersecurity tailored to the audience. This includes high-level practical talk with company leaders and in-the-weeds discussion with techies.
Supported IT Compliance Frameworks
GSA’s FedRAMP Program is a government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services. FedRAMP empowers agencies to use modern cloud technologies, with emphasis on security and protection of federal information, and helps accelerate the adoption of secure, cloud solutions. Our services offerings focus around providing initial and ongoing compliance and operations support to cloud service providers (CSPs) that are mandated to navigate the compliance framework.
Publications in NIST’s Special Publication (SP) 800 series present information of interest to the computer security community. The series comprises guidelines, recommendations, technical specifications, and annual reports of NIST’s cybersecurity activities that organizations should adhere to increase cybersecurity maturity. Our services offerings focus around providing initial and ongoing compliance and operations support to businesses that are trying to increase maturity.
HIPAA compliance has different impacts to different businesses. Our compliance and cybersecurity service offerings focus around providing initial and ongoing support to businesses seeking or mandated to navigate the HIPAA HITECH compliance framework.
PCI DSS stands for Payment Card Industry Data Security Standard. It is a set of actionable security requirements and regulations online business merchants need must adhere with to be in compliance. The regulations are maintained by the Payment Card Industry Security Standards Council, which is formed by the five major credit card companies: Visa, MasterCard, American Express, Discover and JCB.
Statement on Standards for Attestation Engagements 18 (SSAE 18) is a standard from the American Institute of Certified Public Accountants (AICPA). The organization’s Auditing Standards Board (ASB) created these regulations to evaluate service companies and any company that provides outsourced services that affect another company’s financial statements can request an audit. SSAE 18 includes three types of reports that review different aspects of a company’s operations. The Service and Organization Controls (SOC) 2 report focuses on security and privacy.
General Data Protection Regulation (GDPR) places requirements on organizations that process and collect personal data, emphasizing accountability and evidencing compliance, directly or indirectly related to an identifiable person in the EU that is processed by an individual, company or organization. Any small business that processes people’s personal data within the EU is subject to the GDPR, no matter where in the world the business is based.
The California Consumer Privacy Act A.B. 375 gives California residents privacy rights, starting with the right to be informed about what kinds of personal data companies have collected and why it was collected. If an organization is collecting personal information about California residents, you must comply with this act.
Having Trouble Getting Started?
Getting started can be difficult with any certification or compliance process without having the resources you need to guide you. Staring with an assessment of your business against your needed compliance framework will identify where weaknesses are when dealing with sensitive data. We recommend to any business seeking compliance to consider the following areas of their business:
- Physical protection of PII/PHI is often overlooked. Where do you store sensitive data?
- What Technology do you have in place to keep PII/PHI private?
- If you had an Incident or breach, do you have a plan created on what to do?
- Disaster planning such as fire, flood, or theft should be on your list. Is it?
How We Help...
Over the years, we have been directly audited and have helped many other clients successfully complete their attestation of compliance. Our services prepare you to complete the audit process successfully and by using our experience and services, we remove the burden of doing that work yourself when you should be focusing on helping your clients or finding new ones. We use the following high level process to help guide our clients successfully certify their IT compliance.
- Gap Analysis
- Security Plan
- Create Policies and Procedures
- IT System and Architecture
- Security and Compliance Implementation
- Audit Support
- Threat and Vulnerability Management
- Continuous Monitoring
- System Security Plans