Cyber Security
SECaaSSIEMNetworkICSComplianceEmailCloud

Security Compliance

Achieve and maintain security compliance

Navigate overlapping attestations, ISO programs, cloud assurance, sector rules, and control baselines—including CIS, CSA STAR, the ISO 27000-series extensions, SOC 1–3, HIPAA, FedRAMP, CMMC, NIST CSF, and NIST SP 800-53 where they apply to your scope.

Frameworks

Standards, attestations, and control programs we align to

Scope and evidence requirements differ by engagement; the list below is a catalog of frameworks clients commonly map to—not a claim that intSignal holds every certification for every service line.

CIS

Benchmarks

Security benchmarks and secure configuration guidance for systems, software, and cloud—often used to harden baselines and supply audit evidence.

ISO/IEC 27001

ISO · ISMS

Information security management system (ISMS)—policy, risk treatment, and Annex A controls as the anchor for many audit programs.

CSA STAR

Cloud assurance

Cloud Security Alliance Security, Trust, Assurance, and Risk registry—levels of assurance for cloud provider security posture.

ISO/IEC 20000-1

ISO · ITSM

IT service management system requirements—useful when security operations and change discipline must align with audited service delivery.

ISO/IEC 20243

ISO · Supply chain

Mitigating maliciously tainted and counterfeit ICT products across the lifecycle—supplier governance and integrity controls.

ISO 22301

ISO · Continuity

Business continuity management system standard—structured recovery when security incidents disrupt operations.

ISO/IEC 27017

ISO · Cloud

Cloud-specific security controls extending ISO/IEC 27002 guidance for public cloud services.

ISO/IEC 27018

ISO · Cloud PII

Protection of personally identifiable information (PII) in public clouds acting as PII processors.

ISO/IEC 27701

ISO · Privacy

Privacy information management extension to ISO/IEC 27001 and 27002 for PIMS and GDPR-aligned programs.

ISO 31000

ISO · Risk

Risk management principles and guidance—often paired with ISMS and enterprise risk registers.

ISO 9001

ISO · Quality

Quality management system (QMS) standard—where security and service quality evidence must sit under one management system.

SOC 1

AICPA · Type I/II

Internal controls over financial reporting (ICFR) at a service organization—relevant when auditors rely on your control environment.

SOC 2

AICPA · Type II

Trust services criteria: security, availability, processing integrity, confidentiality, and privacy—system description and operating effectiveness testing.

SOC 3

AICPA · General use

Public summary of SOC 2–style controls for general distribution when marketing or RFPs need a high-level assurance artifact.

HIPAA

U.S. healthcare

Administrative, physical, and technical safeguards for protected health information (PHI)—Security Rule, Privacy Rule, and breach notification alignment.

FedRAMP

U.S. federal cloud

Standardized security assessment, authorization, and continuous monitoring for cloud products and services used by federal agencies.

CMMC

U.S. defense

Cybersecurity Maturity Model Certification program for the defense industrial base—maturity and practice requirements tied to contract data.

NIST CSF

U.S. NIST

Cybersecurity Framework (Identify, Protect, Detect, Respond, Recover)—common lexicon for program maturity and board-level reporting.

NIST SP 800-53

U.S. NIST · Controls

Security and privacy control catalog used in FedRAMP, FISMA, and many state programs—control selection, tailoring, and overlays.

PCI DSS

Payment card

Payment Card Industry Data Security Standard for organizations that store, process, or transmit cardholder data.

GDPR

EU privacy

General Data Protection Regulation—lawful basis, data subject rights, breach notification, and processor obligations for EU/EEA personal data.

Process

Compliance program development

1

Scope

Define boundaries and requirements

2

Assess

Gap analysis against framework

3

Remediate

Implement controls and policies

4

Document

Evidence collection and policies

5

Audit

Certification or attestation

Capabilities

Compliance services

Gap Assessment

Evaluate current state against target framework and identify gaps.

  • Control mapping
  • Documentation review
  • Technical assessment
  • Remediation roadmap
  • Prioritization

Policy Development

Create and update security policies, standards, and procedures.

  • Policy templates
  • Customization
  • Management approval
  • Employee training
  • Annual review

Control Implementation

Design and implement technical and administrative controls.

  • Technical controls
  • Administrative controls
  • Physical controls
  • Testing and validation
  • Documentation

Audit Preparation

Prepare for external audits with evidence collection and readiness testing.

  • Evidence gathering
  • Control testing
  • Mock audits
  • Auditor liaison
  • Finding remediation

Continuous Compliance

Maintain compliance with ongoing monitoring and management.

  • Continuous monitoring
  • Quarterly reviews
  • Change management
  • Vendor management
  • Training programs

Risk Management

Identify, assess, and manage security risks aligned with compliance.

  • Risk assessments
  • Risk register
  • Treatment plans
  • Risk acceptance
  • Board reporting

Controls

Common control domains

Access Control

User authentication

Asset Management

Inventory and ownership

Cryptography

Encryption standards

Operations Security

Change management

Communications

Network security

Vendor Management

Third-party risk

Incident Response

Security events

Business Continuity

Disaster recovery

Physical Security

Facility access

HR Security

Background checks

Secure Development

SDLC practices

Compliance

Legal requirements

Industries

Industry-specific compliance

Healthcare

HIPAA, HITRUST, state health privacy laws for covered entities and business associates.

Financial Services

PCI DSS, SOX, GLBA, FFIEC, state banking regulations for financial institutions.

Government

FedRAMP, FISMA, NIST 800-53, StateRAMP for federal and state contractors.

Defense

CMMC, DFARS, NIST 800-171, ITAR for defense industrial base contractors.

Technology

Compliance automation tools

GRC Platforms

Centralized governance, risk, and compliance management with workflow automation.

Evidence Collection

Automated evidence gathering from cloud and on-premises systems.

Policy Management

Policy lifecycle management with version control and attestation tracking.

Continuous Monitoring

Real-time compliance monitoring with automated control testing.

Challenges

Compliance challenges we solve

Multiple Frameworks

Rationalize overlapping requirements across frameworks with unified control mapping.

Resource Constraints

Achieve compliance without dedicated compliance staff through managed services.

Evidence Collection

Automate evidence gathering to reduce manual effort and audit fatigue.

Continuous Compliance

Move from point-in-time audits to continuous compliance monitoring.

Our Services

How we help

Compliance Assessment

Gap analysis against target frameworks. Understand your current state and build a roadmap to compliance.

Compliance Program Build

Full program development from policies to controls to documentation. We guide you through certification.

Managed Compliance

Ongoing compliance management including monitoring, evidence collection, and audit support.

Achieve your compliance goals

Free compliance assessment to identify gaps and build your roadmap.