{"id":1674,"date":"2025-01-20T03:47:23","date_gmt":"2025-01-20T03:47:23","guid":{"rendered":"https:\/\/chin4teck.com\/?p=1674"},"modified":"2025-01-20T04:07:55","modified_gmt":"2025-01-20T04:07:55","slug":"compliance-unlocking-its-amazing-secrets","status":"publish","type":"post","link":"https:\/\/chin4teck.com\/index.php\/2025\/01\/20\/compliance-unlocking-its-amazing-secrets\/","title":{"rendered":"Compliance: Unlocking its&#8217; amazing secrets"},"content":{"rendered":"\n<p class=\"has-text-align-center\">Several different regulations, standards and legislation are practiced by various organizations and government agencies. Almost every country has its own national and state-level laws. The laws apply depending on where you live and where your data resides.<\/p>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-9Fzu0N\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<p class=\"has-text-align-center\">Let\u2019s look at some of the regulations and standards.<\/p>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-qgRHvk\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<p class=\"has-text-align-center has-startupzy-primary-color has-text-color has-link-color wp-elements-c44328909a884156960dc99f8bccda51\"><strong><em>General Data Protection Regulation (GDPR)<\/em><\/strong><\/p>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-tKcxNh\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-image guten-element guten-image guten-9hpL0r animated guten-element-hide slower desktop-rotateIn\"><div class=\"guten-image-wrapper\"><img loading=\"lazy\" decoding=\"async\" class=\"gutenverse-image-box-filled\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/GDPR.png\" height=\"1200\" width=\"1600\"\/><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-535iUh\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<p class=\"has-text-align-center\">GDPR is the European Union (EU) directive that replaces the previously existing regulation known as the Data Protection Directive. The key focus of GDPR is to regulate how organizations should protect the data of the EU citizens. GDPR also focuses on the data movement outside the EU.<\/p>\n\n\n\n<p class=\"has-text-align-center\">There are seven principles of GDPR:<\/p>\n\n\n\n<p class=\"has-text-align-center\">Lawfulness, fairness and transparency<\/p>\n\n\n\n<p class=\"has-text-align-center\">Purpose limitation<\/p>\n\n\n\n<p class=\"has-text-align-center\">Data minimization<\/p>\n\n\n\n<p class=\"has-text-align-center\">Accuracy<\/p>\n\n\n\n<p class=\"has-text-align-center\">Storage limitation<\/p>\n\n\n\n<p class=\"has-text-align-center\">Integrity and confidentiality (security)<\/p>\n\n\n\n<p class=\"has-text-align-center\">Accountability<\/p>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-kaKnL4\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<p class=\"has-text-align-center has-startupzy-primary-color has-text-color has-link-color wp-elements-fc2fc87fe44f20703208dd7c0d3b5e5d\"><strong><em>National, Territory, or State Laws<\/em><\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\">Depending on the country you live in, there can be national, territory, or even state laws for security.<\/p>\n\n\n\n<p class=\"has-text-align-center\">For example, the United States has several laws that are applicable at the national level.<\/p>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-pTtMOC\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-image-marque guten-element guten-image-marque horizontal guten-89nUq5 animated guten-element-hide slower desktop-slideInUp guten-data\"><div class=\"marque-wrapper marque-animate-guten-89nUq5\"><div class=\"marque-item marque-index-0\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/hipaa-compliant2648.jpg\"\/><\/div><div class=\"marque-item-description\">HIPPA<\/div><\/div><div class=\"marque-item marque-index-1\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/fisma-logo-copy.png\"\/><\/div><div class=\"marque-item-description\">FISMMA<\/div><\/div><div class=\"marque-item marque-index-2\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/th-2.jpeg\"\/><\/div><div class=\"marque-item-description\">Children&#8217;s Online Privacy Protection ACT<\/div><\/div><\/div><div class=\"marque-wrapper marque-animate-guten-89nUq5\"><div class=\"marque-item marque-index-0\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/hipaa-compliant2648.jpg\"\/><\/div><div class=\"marque-item-description\">HIPPA<\/div><\/div><div class=\"marque-item marque-index-1\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/fisma-logo-copy.png\"\/><\/div><div class=\"marque-item-description\">FISMMA<\/div><\/div><div class=\"marque-item marque-index-2\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/th-2.jpeg\"\/><\/div><div class=\"marque-item-description\">Children&#8217;s Online Privacy Protection ACT<\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-eW8Ljp\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<p class=\"has-text-align-center\">Some of the key ones are:<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>US Privacy Act of 1974<\/strong>: applicable to government agencies for the data they hold.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>GRAMM-LEACH-BILLEY ACT (GLBA<\/strong>): focuses on protecting financial non-public information.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Health Insurance Portability and Accountability Act (HIPAA<\/strong>): focuses on protecting healthcare information.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Children\u2019s Online Privacy Protection Act (COPPA<\/strong>): focuses on protecting the personal information of children below the age of 12.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Federal Information Security Management Act (FISMMA<\/strong>): provides the mandates to the federal agencies to protect data.<\/p>\n\n\n\n<p class=\"has-text-align-center\">While the above-listed laws are at the national level in the United States, the other nations also have similar laws in place. For example, here are some national laws from the United Kingdom (UK):<\/p>\n\n\n\n<p class=\"has-text-align-center\">The Computer Misuse Act of 1990<\/p>\n\n\n\n<p class=\"has-text-align-center\">The Data Protection Act 1998<\/p>\n\n\n\n<p class=\"has-text-align-center\">Regulation of Investigatory Powers Act 2000<\/p>\n\n\n\n<p class=\"has-text-align-center\">Fraud Act 2006<\/p>\n\n\n\n<p class=\"has-text-align-center\">Forgery and Counterfeiting Act 1981<\/p>\n\n\n\n<p class=\"has-text-align-center\">Copyright, Design, and Patents Act 1998<\/p>\n\n\n\n<p class=\"has-text-align-center\">Laws can also be specific to a territory or state. For example, the state of California in the United States has implemented the Notice of Security Breach Act. This act states that if an organization maintains the personal information of the California citizens and is a victim of any security breach, the organization must disclose the incident. There is then action taken on the organization. This act intends to ensure that the organizations invest in their security infrastructure to safeguard California citizens&#8217; personal information.<\/p>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-QGsUuH\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<p class=\"has-text-align-center has-startupzy-primary-color has-text-color has-link-color wp-elements-30d60132e71c6161522dbf1b7ec48501\"><strong><em>Payment Card Industry Data Security Standard (PCI-DSS)<\/em><\/strong><\/p>\n\n\n\n<div class=\"wp-block-gutenverse-image guten-element guten-image guten-HWV1OM animated guten-element-hide slower desktop-bounceInRight\"><div class=\"guten-image-wrapper\"><img loading=\"lazy\" decoding=\"async\" class=\"gutenverse-image-box-filled\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/PNG_PCI-e1672262570225.png\" height=\"974\" width=\"1902\"\/><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-z5r3Od\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<p class=\"has-text-align-center\">PCI-DSS is a regulatory framework for organizations that deal with credit or debit card payments on the Internet. This is specific to the credit card industry.<\/p>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-YQXzHl\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-image guten-element guten-image guten-ljWPq0 animated guten-element-hide slower desktop-rotateIn\"><div class=\"guten-image-wrapper\"><img loading=\"lazy\" decoding=\"async\" class=\"gutenverse-image-box-filled\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/636be0f8003170a194adf09d_PCI-DSS-1.png\" height=\"1782\" width=\"2000\"\/><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-fytXwv\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<p class=\"has-text-align-center has-startupzy-primary-color has-text-color has-link-color wp-elements-451e996b5c60f27ec2c5b0e2f68e8273\"><strong>Key Frameworks<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\">A framework, or a security framework, defines a set of processes and procedures to help an organization implement security controls, which are meant to reduce the security risks. A framework can be specific to an industry or generalized to meet more generic requirements. For example, PCI-DSS is a regulatory framework for an organization that deals with credit or debit card payments on the Internet. On the other hand, ISO 27001 is a more general regulatory framework that can help any organization of any size to define an information security management system (ISMS).<\/p>\n\n\n\n<p class=\"has-text-align-center\">The whole intent of a framework is to use the pre-defined guidelines. When you use a specific framework, you do not need to create the basic structure of policies and processes. However, it is important to note that a framework can always be customized to meet an organization\u2019s needs.<\/p>\n\n\n\n<p class=\"has-text-align-center\">There are several frameworks available in the IT industry, and most of them are designed with the security aspect in mind. Broadly categorizing, there are two types of frameworks: prescriptive and risk<strong><em>&#8211;<\/em><\/strong>based.<\/p>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-V5FlNs\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<p class=\"has-text-align-center has-startupzy-primary-color has-text-color has-link-color wp-elements-b2e957e378493a22355f5981b619c9dd\"><strong><em>Center for Internet Security (CIS)<\/em><\/strong><\/p>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-inHssf\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-image guten-element guten-image guten-RNUmOl animated guten-element-hide slower desktop-wobble\"><div class=\"guten-image-wrapper\"><img loading=\"lazy\" decoding=\"async\" class=\"gutenverse-image-box-filled\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/cis-letter-logo-design-on-white-background-cis-creative-initials-letter-logo-concept-cis-letter-design-vector.jpg\" height=\"1920\" width=\"1920\"\/><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-3LuEIM\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<p class=\"has-text-align-center\">CIS is a non-profit organization that works in the area of Internet security. It has developed various benchmarks and guidelines for securing devices, platforms, and applications. There are CIS controls, which contain the following 20 security measures:<\/p>\n\n\n\n<p class=\"has-text-align-center\">Inventory of Authorized and Unauthorized Devices<\/p>\n\n\n\n<p class=\"has-text-align-center\">Inventory of Authorized and Unauthorized Software<\/p>\n\n\n\n<p class=\"has-text-align-center\">Secure Configurations for Hardware and Software on Mobile, Laptops, Workstations, and Servers<\/p>\n\n\n\n<p class=\"has-text-align-center\">Continuous Vulnerability Assessment and Remediation<\/p>\n\n\n\n<p class=\"has-text-align-center\">Controlled Use of Administrative Privileges<\/p>\n\n\n\n<p class=\"has-text-align-center\">Maintenance, Monitoring, and Analysis of Audit Logs<\/p>\n\n\n\n<p class=\"has-text-align-center\">Email and Web Browser Protection<\/p>\n\n\n\n<p class=\"has-text-align-center\">Malware Defenses<\/p>\n\n\n\n<p class=\"has-text-align-center\">Limitation and Control of Network Ports, Protocols, and Services<\/p>\n\n\n\n<p class=\"has-text-align-center\">Data Recovery Capability<\/p>\n\n\n\n<p class=\"has-text-align-center\">Secure Configurations for Network Devices such as Firewalls, Routers, and Switches<\/p>\n\n\n\n<p class=\"has-text-align-center\">Boundary Defense<\/p>\n\n\n\n<p class=\"has-text-align-center\">Data Protection<\/p>\n\n\n\n<p class=\"has-text-align-center\">Controlled Access Based on the Need to Know<\/p>\n\n\n\n<p class=\"has-text-align-center\">Wireless Access Control<\/p>\n\n\n\n<p class=\"has-text-align-center\">Account Monitoring and Control<\/p>\n\n\n\n<p class=\"has-text-align-center\">Security Skills Assessment and Appropriate Training to Fill Gaps<\/p>\n\n\n\n<p class=\"has-text-align-center\">Application Software Security<\/p>\n\n\n\n<p class=\"has-text-align-center\">Incident Response and Management<\/p>\n\n\n\n<p class=\"has-text-align-center\">Penetration Tests and Red Team Exercises<\/p>\n\n\n\n<p class=\"has-text-align-center has-startupzy-primary-color has-text-color has-link-color wp-elements-23a8432c18b07c273a8693ef00b88a2e\"><strong><em>National Institute of Standards and Technology (NIST) RMF\/CSF<\/em><\/strong><\/p>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-6mYR3j\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-image guten-element guten-image guten-SNmVx7 animated guten-element-hide desktop-bounceInUp\"><div class=\"guten-image-wrapper\"><img loading=\"lazy\" decoding=\"async\" class=\"gutenverse-image-box-filled\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/f_nist-logo-brand-black.png\" height=\"357\" width=\"1500\"\/><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-dfSC6L\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<p class=\"has-text-align-center\"><strong>RMF&nbsp;<\/strong>stands for Risk Management Framework that can help organizations assess and manage risks.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>CSF&nbsp;<\/strong>stands for Cyber Security Framework that has several steps that need to be implemented. These steps and their tasks include:<\/p>\n\n\n\n<p class=\"has-text-align-center\">1.&nbsp;<strong>Prepare<\/strong>: Organizational communication, development of control baselines, enterprise architecture, and alignment with RMF.<\/p>\n\n\n\n<p class=\"has-text-align-center\">2.&nbsp;<strong>Identify<\/strong>: Asset management, business environment, governance, risk assessment, and risk management strategy.<\/p>\n\n\n\n<p class=\"has-text-align-center\">3.&nbsp;<strong>Protect<\/strong>: Access control, awareness and training, data security, information protection processes and procedures, maintenance, and protective technology.<\/p>\n\n\n\n<p class=\"has-text-align-center\">4.&nbsp;<strong>Detect<\/strong>: Anomalies and events, continuous security monitoring, and detection processes.<\/p>\n\n\n\n<p class=\"has-text-align-center\">5.&nbsp;<strong>Respond<\/strong>: Response planning, communications, analysis, mitigation, and improvements.<\/p>\n\n\n\n<p class=\"has-text-align-center\">6.&nbsp;<strong>Recover<\/strong>: Recovery planning, improvements, and communications.<\/p>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-wZiSWl\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<p class=\"has-text-align-center has-startupzy-primary-color has-text-color has-link-color wp-elements-64dd9abccc3a7a062dd0646d2a8ac7c2\"><strong><em>International Organization for Standardization (ISO) 27001\/27002\/27701\/31000<\/em><\/strong><\/p>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-q9aRus\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-image guten-element guten-image guten-hdWqDd animated guten-element-hide slower desktop-rotateIn\"><div class=\"guten-image-wrapper\"><img loading=\"lazy\" decoding=\"async\" class=\"gutenverse-image-box-filled\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/th-1.jpeg\" height=\"433\" width=\"474\"\/><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-SASHWj\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<p class=\"has-text-align-center\">ISO is an independent organization that develops standards and frameworks that are deployed internationally. ISO has standards across various domains, such as:<\/p>\n\n\n\n<p class=\"has-text-align-center\">Environmental<\/p>\n\n\n\n<p class=\"has-text-align-center\">Food Safety<\/p>\n\n\n\n<p class=\"has-text-align-center\">Health and Safety<\/p>\n\n\n\n<p class=\"has-text-align-center\">IT Security<\/p>\n\n\n\n<p class=\"has-text-align-center\">In the IT Security domain, ISO has various standards. Some of the key ones are:<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>27001<\/strong>: provides the requirements for an information security management system. ISO 27001 is a more of a general regulatory framework that can help any organization of any size. It helps an organization to define an information security management system (ISMS).<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>27002<\/strong>: focuses on security techniques and codes of practice for information security controls.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>27701<\/strong>: is an extension to 27001 and 27002. It provides various guidelines for privacy information management.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>31000<\/strong>: focuses on risk management. It provides various guidelines for managing risks within the organization.<\/p>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-pXnnsT\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<p class=\"has-text-align-center has-startupzy-primary-color has-text-color has-link-color wp-elements-57550e312382ad1694dda12d41491f9b\"><strong><em>SSAE SOC 2 Type II\/III<\/em><\/strong><\/p>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-UOWTfa\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-image guten-element guten-image guten-ohSPc6 animated guten-element-hide slower desktop-tada\"><div class=\"guten-image-wrapper\"><img loading=\"lazy\" decoding=\"async\" class=\"gutenverse-image-box-filled\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/soc-letter-logo-design-on-black-background-soc-creative-initials-letter-logo-concept-soc-letter-design-vector.jpg\" height=\"1920\" width=\"1920\"\/><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-oN5Cl4\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<p>SSAE stands for Statements on Standards for Attestation Engagements. SOC stands for Service Organization Control. There are SOC 1, 2, and 3 reports.<\/p>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-FOCYCM\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<p class=\"has-text-align-center\"><strong>SOC 1<\/strong>: focuses on internal controls over financial reporting.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>SOC 2<\/strong>: focuses on various controls, such as security, privacy, availability, and integrity. This report is available to regulators and those who sign the Non-Disclosure Agreement (NDA).<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>SOC 3<\/strong>: focuses on various controls, such as security, privacy, availability, and integrity. This report is available to the general public.<\/p>\n\n\n\n<p class=\"has-text-align-center\">To find out more about SOC centers, click the button below!<\/p>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-cnON0a\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<div class=\"guten-element guten-advance-button-wrapper guten-cWwB1e\"><a class=\"guten-advance-button guten-advance-button-sm guten-advance-button-wrap\" href=\"https:\/\/chin4teck.com\/index.php\/2023\/11\/07\/theres-never-a-time-to-operate-without-security\/\" target=\"_blank\" rel=\"noreferrer noopener\" data-particle-count=\"20\" data-particle-distance=\"250\" data-particle-fade-duration=\"0.5\" data-particle-duration=\"4\" data-element-id=\"guten-cWwB1e\"><span class=\"advance-button-icon-wrapper \"><i class=\"fa-lg fas fa-chart-area\"><\/i><\/span><span class=\"advance-button-text \">Security Operations Center<\/span><\/a><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-lgB7G9\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<p class=\"has-text-align-center has-startupzy-primary-color has-text-color has-link-color wp-elements-133d7ac433597ca3644aec65a1e188a6\"><strong><em>Cloud Security Alliance<\/em><\/strong><\/p>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-7t7P82\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-image guten-element guten-image guten-3A0Exc animated guten-element-hide desktop-bounceInLeft\"><div class=\"guten-image-wrapper\"><img loading=\"lazy\" decoding=\"async\" class=\"gutenverse-image-box-filled\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/csa-logo-7.jpg\" height=\"1023\" width=\"1212\"\/><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-RhXRzg\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<p class=\"has-text-align-center\">Cloud Control Matrix (CCM) is a set of guidelines developed by the Cloud Security Alliance (CSA). CCM is intended to help the cloud service providers assess their security. It is also largely used by cloud consumers to assess security risks that may be associated with a specific cloud service provider.<\/p>\n\n\n\n<p class=\"has-text-align-center\">Some of the key highlights of CCM are:<\/p>\n\n\n\n<p class=\"has-text-align-center\">It contains 16 domains split across 133 control objectives.<\/p>\n\n\n\n<p class=\"has-text-align-center\">It is considered a de-facto standard for cloud security compliance.<\/p>\n\n\n\n<p class=\"has-text-align-center\">It focuses on various other security frameworks, such as ISO 27001, PCI-DSS, and NIST.<\/p>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-JzsNIH\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<p class=\"has-text-align-center has-startupzy-primary-color has-text-color has-link-color wp-elements-b770b68d9815ca8207c2debadf7d9d18\"><strong>Benchmarks\/Secure Configuration Guides<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\">Each system that exists and connects to the network or the Internet needs to be secured. While different organizations have different standards that they follow, it is easy to follow the secure configuration guides, which offer a standardized way of configuring systems with an optimal security level. One good example of secure configuration guides is from the Center for Internet Security (CIS), which provides specific security benchmarks.<\/p>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-SJF3UU\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<p class=\"has-text-align-center has-startupzy-primary-color has-text-color has-link-color wp-elements-a247c0923934877fb3ca1717ba5965c0\"><strong><em>Platform\/Vendor-Specific Guides&nbsp;&nbsp;<\/em><\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\">Vendors who develop applications or platforms also offer guides for installation and configuration. The guides also include the best practices for installation, configuration, and operational activities, which should be followed by the users. The vendor must provide the best practices to safeguard their products and the customers\u2019 data that resides on their applications and platforms.<\/p>\n\n\n\n<p class=\"has-text-align-center\">Some of the key products that require a high level of security are:<\/p>\n\n\n\n<p class=\"has-text-align-center\">Web Servers<\/p>\n\n\n\n<p class=\"has-text-align-center\">Operating Systems (OS)<\/p>\n\n\n\n<p class=\"has-text-align-center\">Application servers<\/p>\n\n\n\n<p class=\"has-text-align-center\">Network infrastructure devices<\/p>\n\n\n\n<p class=\"has-text-align-center\">Let\u2019s look at each one of them in detail.<\/p>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-nlAC7u\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<p class=\"has-text-align-center has-startupzy-primary-color has-text-color has-link-color wp-elements-05b43b20e8eb0d44a8767886a606294f\"><strong>Web Server<\/strong><\/p>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-k5PBbx\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-image guten-element guten-image guten-elhCAS animated guten-element-hide slower desktop-rotateInUpRight\"><div class=\"guten-image-wrapper\"><img loading=\"lazy\" decoding=\"async\" class=\"gutenverse-image-box-filled\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/Server-room-or-server-computer.jpg\" height=\"1263\" width=\"2000\"\/><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-xfcfHS\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<p class=\"has-text-align-center\">A Web server is mostly Internet-facing and, therefore, considered to be vulnerable. If an organization is hosting a Web application used by customers and internal users, it is important to harden the Web server so that it is secured with optimal security.<\/p>\n\n\n\n<p class=\"has-text-align-center\">There are a variety of Web servers that are available. Some of the prominent ones are:<\/p>\n\n\n\n<p class=\"has-text-align-center\">Apache<\/p>\n\n\n\n<p class=\"has-text-align-center\">Microsoft Internet Information Services (IIS)<\/p>\n\n\n\n<p class=\"has-text-align-center\">Nginx<\/p>\n\n\n\n<p class=\"has-text-align-center\">CIS provides the set of hardening guidelines for IIS, which cover virtually all aspects of security<\/p>\n\n\n\n<p class=\"has-text-align-center\">set of CIS guidelines for IIS 10.0:<\/p>\n\n\n\n<p class=\"has-text-align-center\">1.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Basic Configurations<\/p>\n\n\n\n<p class=\"has-text-align-center\">&nbsp;&nbsp; 1.1.&nbsp;&nbsp;&nbsp; Ensure web content is on non-system partition<\/p>\n\n\n\n<p class=\"has-text-align-center\">&nbsp;&nbsp; 1.2.&nbsp;&nbsp;&nbsp; Ensure &#8216;host headers&#8217; are on all sites<\/p>\n\n\n\n<p class=\"has-text-align-center\">&nbsp;&nbsp; 1.3.&nbsp;&nbsp;&nbsp; Ensure &#8216;directory browsing&#8217; is set to disable<\/p>\n\n\n\n<p class=\"has-text-align-center\">&nbsp;&nbsp; 1.4.&nbsp;&nbsp;&nbsp; Ensure &#8216;Application pool identity&#8217; is configured for all application pools<\/p>\n\n\n\n<p class=\"has-text-align-center\">&nbsp;&nbsp; 1.5.&nbsp;&nbsp;&nbsp; Ensure &#8216;unique application pools&#8217; is set for sites<\/p>\n\n\n\n<p class=\"has-text-align-center\">&nbsp;&nbsp; 1.6.&nbsp;&nbsp;&nbsp; Ensure &#8216;application pool identity&#8217; is configured for anonymous user&nbsp; identity<\/p>\n\n\n\n<p class=\"has-text-align-center\">&nbsp;&nbsp; 1.7.&nbsp;&nbsp;&nbsp; Ensure WebDav feature is disabled<\/p>\n\n\n\n<p class=\"has-text-align-center\">Other than the CIS guidelines, you may also want to explore guidelines from the Open Source Foundation for Application Security (OWASP) and the application vendor. For example, in the case of IIS, you may want to check the Microsoft Website, which has sufficient guidelines and best practices for hardening and securing IIS.<\/p>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-FKHywW\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<p class=\"has-text-align-center has-startupzy-primary-color has-text-color has-link-color wp-elements-d1443556d3f654662695c467f703fbb5\"><strong>Operating System (OS)<\/strong><\/p>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-6uRe75\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-image-marque guten-element guten-image-marque horizontal guten-Jv0ydI animated guten-element-hide slower desktop-pulse reverse\"><div class=\"marque-wrapper marque-animate-guten-Jv0ydI\"><div class=\"marque-item marque-index-0\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/apple-ios-logo-png-ios-bug-can-force-apple-iphones-to-call-911-repeatedly-1649.png\"\/><\/div><div class=\"marque-item-description\">Mac Os<\/div><\/div><div class=\"marque-item marque-index-1\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/th-7.jpeg\"\/><\/div><div class=\"marque-item-description\">RedHat<\/div><\/div><div class=\"marque-item marque-index-2\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/th-6.jpeg\"\/><\/div><div class=\"marque-item-description\">Microsoft, Windows<\/div><\/div><div class=\"marque-item marque-index-3\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/Ubuntu.png\" alt=\"\"\/><\/div><div class=\"marque-item-description\">Ubuntu<\/div><\/div><div class=\"marque-item marque-index-4\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/481906-Fedora-Linux-open-source-open_source-operating_system-logo-Red_Hat-scaled.jpg\" alt=\"\"\/><\/div><div class=\"marque-item-description\">Fedora<\/div><\/div><div class=\"marque-item marque-index-5\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/linux-gnu-debian-logo-wallpaper.jpg\"\/><\/div><div class=\"marque-item-description\">Debian Linux<\/div><\/div><div class=\"marque-item marque-index-6\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/android_logo_PNG12.png\"\/><\/div><div class=\"marque-item-description\">Android<\/div><\/div><\/div><div class=\"marque-wrapper marque-animate-guten-Jv0ydI\"><div class=\"marque-item marque-index-0\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/apple-ios-logo-png-ios-bug-can-force-apple-iphones-to-call-911-repeatedly-1649.png\"\/><\/div><div class=\"marque-item-description\">Mac Os<\/div><\/div><div class=\"marque-item marque-index-1\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/th-7.jpeg\"\/><\/div><div class=\"marque-item-description\">RedHat<\/div><\/div><div class=\"marque-item marque-index-2\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/th-6.jpeg\"\/><\/div><div class=\"marque-item-description\">Microsoft, Windows<\/div><\/div><div class=\"marque-item marque-index-3\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/Ubuntu.png\" alt=\"\"\/><\/div><div class=\"marque-item-description\">Ubuntu<\/div><\/div><div class=\"marque-item marque-index-4\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/481906-Fedora-Linux-open-source-open_source-operating_system-logo-Red_Hat-scaled.jpg\" alt=\"\"\/><\/div><div class=\"marque-item-description\">Fedora<\/div><\/div><div class=\"marque-item marque-index-5\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/linux-gnu-debian-logo-wallpaper.jpg\"\/><\/div><div class=\"marque-item-description\">Debian Linux<\/div><\/div><div class=\"marque-item marque-index-6\"><div class=\"marque-item-image\"><img decoding=\"async\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/android_logo_PNG12.png\"\/><\/div><div class=\"marque-item-description\">Android<\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-VbsIS7\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<p class=\"has-text-align-center\">An operating system is the base platform on which applications run. Even if the applications are secure, if there are security loopholes in the operating system security, they are at a higher risk of exploitation. Therefore, you need to ensure that you secure the operating system before you secure anything else running on it. This is one of the key reasons for several recommendations and guidelines that state that the operating system must be hardened immediately after the installation.<\/p>\n\n\n\n<p class=\"has-text-align-center\">There are several guidelines and recommendations available from the following:<\/p>\n\n\n\n<p class=\"has-text-align-center\">CIS<\/p>\n\n\n\n<p class=\"has-text-align-center\">Department of Defense (DoD) Defense Information Systems Agency (DISA)<\/p>\n\n\n\n<p class=\"has-text-align-center\">Platform vendors<\/p>\n\n\n\n<p class=\"has-text-align-center\">This is an example of recommendation on password setting from CIS:<\/p>\n\n\n\n<p class=\"has-text-align-center\">1 Account Policies<\/p>\n\n\n\n<p class=\"has-text-align-center\">This section contains recommendations for account policies.<\/p>\n\n\n\n<p class=\"has-text-align-center\">1.1 Password Policy<\/p>\n\n\n\n<p class=\"has-text-align-center\">This section contains recommendations for password policy.<\/p>\n\n\n\n<p class=\"has-text-align-center\">1.1.1 (L1) Ensure &#8216;Enforce password history&#8217; is set to &#8217;24 or more password(s)&#8217; (Scored)<\/p>\n\n\n\n<p class=\"has-text-align-center\">Profile Applicability:<\/p>\n\n\n\n<p class=\"has-text-align-center\">Level 1<\/p>\n\n\n\n<p class=\"has-text-align-center\">Level 1 + BitLocker<\/p>\n\n\n\n<p class=\"has-text-align-center\">Description:<\/p>\n\n\n\n<p class=\"has-text-align-center\">This policy setting determines the number of renewed, unique passwords that have to be associated with a user account before you can reuse an old password. The value for this policy setting must be between 0 and 24 passwords. The default value for Windows Vista is 0 passwords, but the default setting in a domain is 24 passwords. To maintain the effectiveness of this policy setting, use the Minimum password age setting to prevent users from repeatedly changing their password.<\/p>\n\n\n\n<p class=\"has-text-align-center\">The recommended state for this setting is: 24 or more password(s).<\/p>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-1TCyac\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<p class=\"has-text-align-center has-startupzy-primary-color has-text-color has-link-color wp-elements-49a8d4343bfb6ea69789d52b244a8436\"><strong>Application Server<\/strong><\/p>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-IS4lTE\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-image guten-element guten-image guten-GMqhjy animated guten-element-hide slower desktop-rotateInDownLeft\"><div class=\"guten-image-wrapper\"><img loading=\"lazy\" decoding=\"async\" class=\"gutenverse-image-box-filled\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/illuminated-server-room-panel-660495303-5a386d157bb283003734354e-scaled.jpg\" height=\"1706\" width=\"2560\"\/><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-009DMz\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<p class=\"has-text-align-center\">Application servers are installed and configured to provide certain services. For example, an application server can be configured with a messaging application to manage the flow of emails for an organization. These application servers need to be secured based on CIS&#8217;s recommendations and the vendors, such as Microsoft.<\/p>\n\n\n\n<p class=\"has-text-align-center\">An example for Microsoft Exchange Server 2016:<\/p>\n\n\n\n<p class=\"has-text-align-center\">1 Transport<\/p>\n\n\n\n<p class=\"has-text-align-center\">This section contains recommendations that impact messages while they are in transit. The following PowerShell Cmdlet are covered in this section:<\/p>\n\n\n\n<p class=\"has-text-align-center\">Set-SendConnector<\/p>\n\n\n\n<p class=\"has-text-align-center\">Set-SenderFilterConfig<\/p>\n\n\n\n<p class=\"has-text-align-center\">Set-SenderReputationConfig<\/p>\n\n\n\n<p class=\"has-text-align-center\">Set-ReceiveConnector<\/p>\n\n\n\n<p class=\"has-text-align-center\">Set-TransportServer<\/p>\n\n\n\n<p class=\"has-text-align-center\">Set-TransportService<\/p>\n\n\n\n<p class=\"has-text-align-center\">Set-TransportConfig<\/p>\n\n\n\n<p class=\"has-text-align-center\">Set-PopSettings<\/p>\n\n\n\n<p class=\"has-text-align-center\">Set-ImapSettings<\/p>\n\n\n\n<p class=\"has-text-align-center\">1.1 Set &#8216;Maximum send size &#8211; connector level&#8217; to &#8216;10240&#8217; (Not Scored)<\/p>\n\n\n\n<p class=\"has-text-align-center\">Profile Applicability:<\/p>\n\n\n\n<p class=\"has-text-align-center\">Level 1 &#8211; Edge Services Security<\/p>\n\n\n\n<p class=\"has-text-align-center\">Description:<\/p>\n\n\n\n<p class=\"has-text-align-center\">This setting limits the total size of messages at the connector level. This includes the message header, the message body, and any attachments. For internal message flow, Exchange Server uses the custom X-MS-Exchange-Organization-Original Size message header to record the original message size of the message as it enters the Exchange Server organization. Whenever the message is checked against the specified message size limits, the lower value of the current message size or the original message size header is used. The size of the message can change because of content conversion, encoding, and agent processing.<\/p>\n\n\n\n<p class=\"has-text-align-center\">Rationale:<\/p>\n\n\n\n<p class=\"has-text-align-center\">This setting somewhat limits the impact a malicious user or a computer with malware can have on the Exchange infrastructure by restricting the size of incoming messages.<\/p>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-L2JwGg\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<p class=\"has-text-align-center has-startupzy-primary-color has-text-color has-link-color wp-elements-61f73e7dc5c7d80690797160b0050199\"><strong>Network Infrastructure Devices<\/strong><\/p>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-zfCwKm\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-image guten-element guten-image guten-XlVWUC animated guten-element-hide slower desktop-rollIn\"><div class=\"guten-image-wrapper\"><img loading=\"lazy\" decoding=\"async\" class=\"gutenverse-image-box-filled\" src=\"https:\/\/chin4teck.com\/wp-content\/uploads\/2025\/01\/image.png\" height=\"1009\" width=\"845\"\/><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-Xvn3rn\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<p class=\"has-text-align-center\">A network can host a variety of devices, such as routers, firewalls, and switches. Each of these devices must be hardened with proper configuration. For example, most organizations deploy a firewall on the edge of their network, then the traffic is routed through the firewall. If the firewall itself is not hardened, this can be a big security lapse, potentially exposing the entire network to outside users.<\/p>\n\n\n\n<p class=\"has-text-align-center\">It is important to note that network devices also have software for their functionality, but these can have vulnerabilities. In several cases, these are exploited. The vendor may detect the vulnerabilities and release a patch to be deployed urgently.<\/p>\n\n\n\n<p class=\"has-text-align-center\">Another major aspect is the manual configuration, which is performed by the administrators. Most often, the manual configuration itself is flawed. For example, the administrator may leave ports open.<\/p>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-g5Z8im\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<p class=\"has-text-align-center\">Two major entities that have the security guidelines for network infrastructure devices are:<\/p>\n\n\n\n<p class=\"has-text-align-center\">CIS<\/p>\n\n\n\n<p class=\"has-text-align-center\">DoD DISA<\/p>\n\n\n\n<div class=\"wp-block-gutenverse-divider guten-element guten-divider guten-jDfgSi\"><div class=\"guten-divider-wrapper\"><div class=\"guten-divider-default guten-divider-line guten-divider-regular\"><\/div><\/div><\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Several different regulations, standards and legislation are practiced by various organizations and government agencies. Almost every country has its own national and state-level laws. The laws apply depending on where you live and where your data resides. Let\u2019s look at some of the regulations and standards. General Data Protection Regulation (GDPR) GDPR is the European Union (EU) directive that replaces the previously existing regulation known as the Data Protection Directive. The key focus of GDPR is to regulate how organizations should protect the data of the EU citizens. GDPR also focuses on the data movement outside the EU. There are<\/p>\n","protected":false},"author":1,"featured_media":1353,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1674","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-chin4teck-com"],"_links":{"self":[{"href":"https:\/\/chin4teck.com\/index.php\/wp-json\/wp\/v2\/posts\/1674","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/chin4teck.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/chin4teck.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/chin4teck.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/chin4teck.com\/index.php\/wp-json\/wp\/v2\/comments?post=1674"}],"version-history":[{"count":18,"href":"https:\/\/chin4teck.com\/index.php\/wp-json\/wp\/v2\/posts\/1674\/revisions"}],"predecessor-version":[{"id":1755,"href":"https:\/\/chin4teck.com\/index.php\/wp-json\/wp\/v2\/posts\/1674\/revisions\/1755"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/chin4teck.com\/index.php\/wp-json\/wp\/v2\/media\/1353"}],"wp:attachment":[{"href":"https:\/\/chin4teck.com\/index.php\/wp-json\/wp\/v2\/media?parent=1674"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/chin4teck.com\/index.php\/wp-json\/wp\/v2\/categories?post=1674"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/chin4teck.com\/index.php\/wp-json\/wp\/v2\/tags?post=1674"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}