Compass IT Compliance Blog / Compliance (2)

New PCI Requirements Released for SAQ A Merchant Validation

New SAQ A Requirements

The PCI Security Standards Council (PCI SSC) recently introduced significant updates for merchants validating their compliance using Self-Assessment Questionnaire A (SAQ A). These updates, part of PCI DSS v4.0.1, reflect industry feedback and evolving security concerns, particularly t …

Read Story

When SOC 2 Compliance Makes Sense

When SOC 2 Compliance Makes Sense

In today’s business landscape, security and trust are paramount. SOC 2 compliance has become a widely recognized standard for demonstrating a commitment to protecting sensitive data and maintaining robust security practices. Whether you’re working with enterprise clients, handling cri …

Read Story

Understanding SOC 2 Compliance & Vendor Management

SOC 2 Vendor Management

SOC 2 (System and Organization Controls 2) is a trusted auditing standard developed by the American Institute of Certified Public Accountants (AICPA). It assesses an organization’s information systems against the Trust Services Criteria (TSC): security, availability, processing integr …

Read Story

Understanding DoD Impact Levels for Cloud Security

DoD Impact Levels

The security of information is a cornerstone of the Department of Defense's (DoD) operations. To safeguard sensitive data, the DoD has developed Impact Levels (ILs), a framework that categorizes information systems based on their sensitivity and the potential impact of a compromise. T …

Read Story

SAS 145 and IT General Controls: What Organizations Need to Know

SAS 145 and IT General Controls

The release of SAS 145 (Statement on Auditing Standards No. 145) represents a significant shift in how auditors evaluate and respond to the risks of material misstatements, particularly in complex IT environments. As IT General Controls (ITGCs) underpin key financial processes and rep …

Read Story

Leveraging a Virtual CISO (vCISO) for SOC 2 Compliance

Leveraging Virtual CISO for SOC 2 Compliance

In the rapidly evolving landscape of cybersecurity and data privacy, achieving and maintaining compliance with industry standards like SOC 2 is critical for businesses of all sizes. However, this process can be daunting, especially for organizations lacking the internal expertise or r …

Read Story

Subscribe by email