{"id":56706,"date":"2025-03-24T07:14:35","date_gmt":"2025-03-24T11:14:35","guid":{"rendered":"https:\/\/centricconsulting.com\/?p=56706"},"modified":"2025-06-16T12:27:00","modified_gmt":"2025-06-16T16:27:00","slug":"how-to-test-your-current-compliance-controls_cyber","status":"publish","type":"post","link":"https:\/\/centricconsulting.com\/blog\/how-to-test-your-current-compliance-controls_cyber\/","title":{"rendered":"How to Test Your Current Compliance Controls to Identify Hidden Risks"},"content":{"rendered":"<h2 style=\"font-weight: 400; text-align: center;\">Regularly testing compliance controls helps you identify security gaps before they lead to breaches. Learn how checkbox compliance fails against modern threats along with practical methods for validating security measures through continuous monitoring and real-world testing scenarios.<\/h2>\n<hr \/>\n<p style=\"font-weight: 400;\">You have a list of compliance requirements, so you go through it and check the boxes. All set? No. Merely checking the boxes gives you the illusion of covering all of your bases, but in many cases, it\u2019s merely the beginning. You need a systematic, deep testing system that proactively identifies issues to bolster your compliance. You then use this information to take definitive steps to reduce your compliance risks. <strong>But what\u2019s involved in testing your compliance controls, and is it really worth the time?<\/strong><\/p>\n<p style=\"font-weight: 400;\">Let\u2019s dig in to answer these and other common questions about testing compliance control mechanisms.<\/p>\n<h2 style=\"font-weight: 400;\">How Attackers Exploit Compliance Controls<\/h2>\n<p style=\"font-weight: 400;\">Compliance controls are easy for a crafty attacker to exploit. Often, you may go to long lengths to adhere to compliance standards but neglect a key vulnerability.<\/p>\n<p style=\"font-weight: 400;\">For example, suppose you run compliance for a healthcare organization. <strong>You go above and beyond to make sure all patient data gets stored properly, use multifactor authentication (MFA) systems across your environment, and have airtight role-based <a href=\"https:\/\/centricconsulting.com\/blog\/why-you-need-identity-management-and-access-controls-now_cyber\/\">access controls<\/a><\/strong>. You\u2019re checking all of the necessary <a href=\"https:\/\/www.cdc.gov\/phlp\/php\/resources\/health-insurance-portability-and-accountability-act-of-1996-hipaa.html\" target=\"_blank\" rel=\"noopener\">HIPAA<\/a> boxes.<\/p>\n<p style=\"font-weight: 400;\">But one day, you allow a third-party vendor to access patient records for a project. They complete the project, you pay them, and it\u2019s back to business as usual.<\/p>\n<p style=\"font-weight: 400;\">However, your <a href=\"https:\/\/www.hipaajournal.com\/hipaa-compliance-checklist\/\" target=\"_blank\" rel=\"noopener\">HIPAA compliance controls and systems<\/a> do not incorporate a measure to automatically revoke third-party access once it\u2019s no longer needed.<\/p>\n<p style=\"font-weight: 400;\">While your employee satisfaction rates are high, the same can\u2019t be said for the vendor. One day, an angry former employee decides to use their access credentials \u2014 the ones that should\u2019ve been revoked \u2014 to steal sensitive data and sell it to a hacker.<\/p>\n<p style=\"font-weight: 400;\">The breach goes undetected for weeks. When it finally comes to the surface, it\u2019s too late. You get hit with penalties, and the reputational damage extends for many months.<\/p>\n<p style=\"font-weight: 400;\">Now, if you had performed a compliance audit to ensure you have implemented the proper <a href=\"https:\/\/centricconsulting.com\/blog\/when-to-engage-regulatory-compliance-consulting_cyber\/\">regulatory compliance controls<\/a>, you may not have detected this vulnerability. A well-segmented network and adequate access controls can\u2019t stop an attacker armed with legitimate credentials. This is why it\u2019s important to understand the common weaknesses in compliance controls sooner rather than later.<\/p>\n<h2 style=\"font-weight: 400;\">Common Weaknesses in Compliance Controls<\/h2>\n<p style=\"font-weight: 400;\">While everyone\u2019s compliance measures are different, here are some weaknesses that impact many organizations:<\/p>\n<ul>\n<li style=\"font-weight: 400;\"><strong>Policies don\u2019t address emerging threats<\/strong>. Do your policies address <a href=\"https:\/\/centricconsulting.com\/blog\/from-q-day-to-ai-risks-the-cybersecurity-wake-up-call-for-leaders\/\">phishing attacks powered by artificial intelligence<\/a>, insider threats, and zero-day exploits involving brand-new threats that security scanners haven\u2019t profiled?<\/li>\n<li style=\"font-weight: 400;\"><strong>Employee training doesn\u2019t include real-world scenarios.<\/strong> Do your employees know how to handle a <a href=\"https:\/\/www.ibm.com\/think\/topics\/spear-phishing\" target=\"_blank\" rel=\"noopener\">spear phishing<\/a> attack? Do executives know how to detect whale phishing? Do they understand how to check whether a website is spoofed or legitimate?<\/li>\n<li style=\"font-weight: 400;\"><strong>Access controls are excessively permissive.<\/strong> When someone no longer works at your company, is there a system for revoking their credentials? Do you use MFA for all user accounts? What about <a href=\"https:\/\/csrc.nist.gov\/glossary\/term\/role_based_access_control\" target=\"_blank\" rel=\"noopener\">role-based access<\/a>? Are there limits in place to control who can access sensitive areas based on their job duties?<\/li>\n<li style=\"font-weight: 400;\"><strong>Incident response plans aren\u2019t tested.<\/strong> Have you tested your incident response plans to see if they can handle persistent attacks? What about lateral network penetration or privilege escalation assaults?<\/li>\n<li style=\"font-weight: 400;\"><strong>Compliance testing isn\u2019t ongoing.<\/strong> While it\u2019s good to prepare for audits, do you only give compliance-focused attention when an audit is looming? Your compliance testing should be ongoing.<\/li>\n<\/ul>\n<h2 style=\"font-weight: 400;\">How to Assess and Test Compliance Controls for Risks<\/h2>\n<p style=\"font-weight: 400;\">By regularly assessing and <a href=\"https:\/\/centricconsulting.com\/blog\/how-a-cybersecurity-risk-assessment-helps-business-security_cyber\/\">testing your controls for risks<\/a>, you can prevent a long list of compliance issues, especially if you use the following guidelines.<\/p>\n<h3 style=\"font-weight: 400;\">Conduct Security Audits and Gap Assessments<\/h3>\n<p style=\"font-weight: 400;\">A security audit and gap assessment involves evaluating your security policies and the technologies you use to build your safeguards, assessing their effectiveness, and identifying vulnerabilities.<\/p>\n<p style=\"font-weight: 400;\">To do this, you should start with a respected framework, such as <a href=\"https:\/\/www.nist.gov\/about-nist\" target=\"_blank\" rel=\"noopener\">NIST<\/a>, <a href=\"https:\/\/www.cisecurity.org\/\" target=\"_blank\" rel=\"noopener\">CIS<\/a>, <a href=\"https:\/\/www.iso.org\/standard\/27001\" target=\"_blank\" rel=\"noopener\">ISO 27001<\/a>, or <a href=\"https:\/\/dodcio.defense.gov\/cmmc\/About\/\" target=\"_blank\" rel=\"noopener\">CMMC<\/a>. These give you a structure around which to architect your assessment.<\/p>\n<p style=\"font-weight: 400;\">Then, compare your current practices to the best practices outlined in the frameworks you choose. <strong>Perform a side-by-side comparison and document your findings, preferably using an easy-to-read chart.<\/strong><\/p>\n<p style=\"font-weight: 400;\">You can then interview those in charge of your security to see how well they understand their roles and responsibilities.<\/p>\n<p style=\"font-weight: 400;\">After collecting all of this data and getting everyone on the same page, it\u2019s time to create an action plan. Here\u2019s how you can structure it:<\/p>\n<ul>\n<li style=\"font-weight: 400;\"><strong>Document your findings by outlining ways your security program meets<\/strong>, exceeds, or falls short of what your chosen standard describes. For example, <a href=\"https:\/\/csrc.nist.gov\/pubs\/sp\/800\/53\/r5\/upd1\/final\" target=\"_blank\" rel=\"noopener\">NIST SP 800-53<\/a> says an organization should disable or remove inactive accounts after a certain period of time.<\/li>\n<li style=\"font-weight: 400;\"><strong>Monitor how well you adhere to compliance requirements over time<\/strong>. Laws change, and so does your infrastructure, so continually monitoring compliance is essential.<\/li>\n<li style=\"font-weight: 400;\"><strong>Establish an ongoing compliance reporting system<\/strong>. For example, you can set up a rubric you use to evaluate how well you stick to compliance standards and periodically distribute it to stakeholders.<\/li>\n<li style=\"font-weight: 400;\"><strong>Set up remediation protocols to address issues<\/strong>. Your remediation system should consist of a list of team members responsible for fixing compliance problems, timelines for completing their work, and who verifies the quality of their work.<\/li>\n<\/ul>\n<h3 style=\"font-weight: 400;\">Perform Penetration Testing and Vulnerability Scans<\/h3>\n<p style=\"font-weight: 400;\">Use real-world attack scenarios to find security issues. You can start with automated tools that scan your systems for vulnerabilities. This is a quick way to discover issues you need to address.<\/p>\n<p style=\"font-weight: 400;\">You should also make a list of all of the software you use and check to ensure you\u2019re using the latest version. As an addendum to this step, you may have to double-check the compatibility of the hardware that runs your software. <strong>Sometimes, wiping out and replacing an old version of your software can raise issues if the new version isn\u2019t compatible with a computer\u2019s or server\u2019s operating system.<\/strong><\/p>\n<p style=\"font-weight: 400;\">It\u2019s also a good idea to include at least a few social engineering-style attacks, such as phishing, in your <a href=\"https:\/\/centricconsulting.com\/blog\/securing-your-business-with-penetration-testing\/\">penetration testing<\/a>. This lets you check how ready your employees are to stave off attackers.<\/p>\n<h3 style=\"font-weight: 400;\">Assess Access Controls and Permissions<\/h3>\n<p style=\"font-weight: 400;\">If you don\u2019t already have <a href=\"https:\/\/centricconsulting.com\/blog\/how-to-vet-identity-and-access-management-tools_cyber\/\">access control assessment systems<\/a> in place, it may take a little time to set them up, but it\u2019s well worth it. To do this, you assess every employee\u2019s access \u2014 in-house and remote or hybrid. It\u2019s best to avoid starting with a list of current employees from your HR department. You\u2019re better off using your list of access credentials as a starting point so you can check to see if each person with access still works for your organization.<\/p>\n<p style=\"font-weight: 400;\">Once you\u2019ve clarified who has access and deleted unnecessary credentials, you can vet each set of privileges, checking to see if they absolutely need to have the access they do. For instance, someone in HR may not need access to customer payment information, and someone in accounts receivable may not need access to HR\u2019s employee management system.<\/p>\n<h3 style=\"font-weight: 400;\">Evaluate Incident Response Readiness<\/h3>\n<p style=\"font-weight: 400;\">Your incident response readiness evaluation should unfold a lot like a compliance fire drill. <strong>This is when you perform tabletop exercises to see how well your teams react to incidents and whether the steps they take meet your compliance needs.<\/strong><\/p>\n<p style=\"font-weight: 400;\">Often, it\u2019s best to divide those involved into teams, such as <a href=\"https:\/\/centricconsulting.com\/blog\/how-to-build-a-formidable-purple-team-security-strategy\/\">Red, Blue, and Purple Teams<\/a>:<\/p>\n<p><a href=\"https:\/\/centricconsulting.com\/wp-content\/uploads\/2025\/03\/Cyber-Test-Current-Compliance-Controls.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-58021\" src=\"https:\/\/centricconsulting.com\/wp-content\/uploads\/2025\/03\/Cyber-Test-Current-Compliance-Controls-1024x461.png\" alt=\"Venn diagram chart relating red team, purple team and blue team cyber testing teams and how they work together.\" width=\"800\" height=\"360\" srcset=\"https:\/\/centricconsulting.com\/wp-content\/uploads\/2025\/03\/Cyber-Test-Current-Compliance-Controls-1024x461.png 1024w, https:\/\/centricconsulting.com\/wp-content\/uploads\/2025\/03\/Cyber-Test-Current-Compliance-Controls-300x135.png 300w, https:\/\/centricconsulting.com\/wp-content\/uploads\/2025\/03\/Cyber-Test-Current-Compliance-Controls-768x346.png 768w, https:\/\/centricconsulting.com\/wp-content\/uploads\/2025\/03\/Cyber-Test-Current-Compliance-Controls-600x270.png 600w, https:\/\/centricconsulting.com\/wp-content\/uploads\/2025\/03\/Cyber-Test-Current-Compliance-Controls-992x447.png 992w, https:\/\/centricconsulting.com\/wp-content\/uploads\/2025\/03\/Cyber-Test-Current-Compliance-Controls-850x383.png 850w, https:\/\/centricconsulting.com\/wp-content\/uploads\/2025\/03\/Cyber-Test-Current-Compliance-Controls-750x338.png 750w, https:\/\/centricconsulting.com\/wp-content\/uploads\/2025\/03\/Cyber-Test-Current-Compliance-Controls.png 1034w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/a><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><strong>The Red Team<\/strong> attacks some or all of your digital infrastructure. You may even incorporate physical infrastructure attacks as well, such as an attempt to get into a server room. The Red Team also documents what they find during the attack, highlighting how long it took and the ease with which they were able to penetrate defenses.<\/li>\n<li style=\"font-weight: 400;\"><strong>The Blue Team<\/strong> consists of your network defenders. They try to detect, contain, and mitigate the attacks of the Red Team. The Blue Team should also document their findings regarding challenges and successes they experienced during the test.<\/li>\n<li style=\"font-weight: 400;\"><strong>The Purple Team<\/strong> ensures collaboration between the Red and Blue Teams and that their work results in actionable analysis. Purple Team members make sure those on the Red Team share their findings with the Blue Team. They also give feedback on the work of the Red and Blue Teams. In addition, the Purple Team validates the effectiveness of the security measures the Blue Team uses to stop the Red Team\u2019s attacks.<\/li>\n<\/ul>\n<h3 style=\"font-weight: 400;\">Implement Continuous Compliance Monitoring<\/h3>\n<p style=\"font-weight: 400;\"><strong>You can use automated tools, such as security information and event management (SIEM) systems, to monitor your compliance continuously.<\/strong> For instance, some SIEM systems collect and analyze security logs from a range of sources you integrate with them. Others incorporate behavioral analytics, which can detect threats based on how a network segment functions, the speed with which data flows out of your network, or other metrics.<\/p>\n<p style=\"font-weight: 400;\">Regardless of the solution you choose, make sure it collects and securely stores logs so you can evaluate them, if necessary, after an incident.<\/p>\n<p style=\"font-weight: 400;\">You should also look for features that make it easier to maintain compliance and fight threats, such as:<\/p>\n<ul>\n<li style=\"font-weight: 400;\"><strong>Premade compliance templates<\/strong>. Use a template based on frameworks like ISO 27001, PCI DSS, and NIST.<\/li>\n<li style=\"font-weight: 400;\"><strong>Automated compliance audit reporting<\/strong>. These are useful when you need to demonstrate compliance to those on your team or external stakeholders you may have to report to.<\/li>\n<li style=\"font-weight: 400;\"><strong>Built-in retention policies that conform to compliance requirements<\/strong>. For instance, the <a href=\"https:\/\/bsaaml.ffiec.gov\/manual\/Appendices\/17?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noopener\">Bank Secrecy Act<\/a> (BSA) requires a company to retain certain records for at least five years. Your SIEM solution can be set up to automatically meet these kinds of storage requirements.<\/li>\n<li style=\"font-weight: 400;\"><strong>Real-time threat detection<\/strong>. This flags threats as they occur.<\/li>\n<li style=\"font-weight: 400;\"><strong>User behavioral analysis<\/strong>. A SIEM that analyzes user behavior can detect threats based on anomalous user actions, such as logging in from a suspicious location.<\/li>\n<li style=\"font-weight: 400;\"><strong>Automated incident response<\/strong>. A SIEM can automatically trigger actions to stop or contain threats, such as quarantining a device or blocking an apparently malicious IP address.<\/li>\n<\/ul>\n<h2 style=\"font-weight: 400;\">Take Control of Your Compliance Validation System<\/h2>\n<p style=\"font-weight: 400;\">It\u2019s dangerous to presume compliance, even if you\u2019ve checked all the boxes. With an experienced partner, you can get help testing your security to make sure it defends your network from the most recent threats. Centric Consulting\u2019s compliance experts lean on years of experience to assess if your organization meets the most relevant compliance standards.<\/p>\n<p style=\"font-weight: 400;\">\n        <div class=\"inline-cta purple\">\n            <div class=\"inline-cta--content\">\n                Cybersecurity for critical infrastructure is vital to everyday life, and it\u2019s up to your organization to help keep it secure. Download our white paper for industry-based tips.\n            <\/div>\n            <div class=\"inline-cta--button\">\n                <a\n                    class=\"button\"\n                    href=\"https:\/\/centricconsulting.com\/ub-cybersecurity-critical-importance-critical-infrastructure\/\"\n                    target=\"_blank\"\n                    >\n\n                    Get the White Paper\n                <\/a>\n            <\/div>\n        <\/div>\n<p style=\"font-weight: 400; text-align: center;\"><em>Don\u2019t wait for an audit failure or breach \u2014 <a href=\"https:\/\/centricconsulting.com\/technology-solutions\/cybersecurity-consulting-services\/\">assess your compliance controls today<\/a>.<\/em> <a class=\"button-text\" href=\"https:\/\/centricconsulting.com\/contact\/\">Contact us<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Testing compliance controls helps you find security gaps and how checkbox compliance fails against modern threats.<\/p>\n","protected":false},"author":467,"featured_media":56712,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":""},"categories":[1],"tags":[23785],"coauthors":[23791],"class_list":["post-56706","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-cybersecurity","resource-categories-blogs","orbitmedia_post_topic-cybersecurity"],"acf":[],"publishpress_future_action":{"enabled":false,"date":"2025-12-05 06:42:11","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/posts\/56706","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/users\/467"}],"replies":[{"embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/comments?post=56706"}],"version-history":[{"count":9,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/posts\/56706\/revisions"}],"predecessor-version":[{"id":58022,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/posts\/56706\/revisions\/58022"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/media\/56712"}],"wp:attachment":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/media?parent=56706"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/categories?post=56706"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/tags?post=56706"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/coauthors?post=56706"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}