🌍 Spirit & Intent of a Security Standard In my experience this is the most powerful and often overlooked aspect when creating a security standard. I do this first, to focus my research, my writing and prevent me from deviating from the subject. Think of it as the constitution for a standard, providing the context for why it exists. What is Spirit & Intent? A concise statement that defines the underlying core security issue the standard is trying to solve, and the overall desired security outcome. It frames the standard, making it the source of truth for interpreting any requirement. ➡️ Spirit is the philosophy: Why are we doing this? ➡️ Intent is the objective: What is the fundamental result we must achieve? I place it in the 'Introduction' section and then follow on with any relevant org specific information. 🌍 Why it’s Critical for Compliance When SMEs, stakeholders or audit, encounters a requirement that seems unclear, or overly prescriptive, you can refer to the Spirit & Intent. Plus, it really helps when responding to resistance, pushback and general enquiry. In short, if the literal interpretation of a requirement violates the Spirit & Intent, then Spirit & Intent should win. Example: Spirit & Intent for a Data Classification standard: This standard establishes requirements for classifying, labelling, and secure handling (access, process, share, store, transport and secure dispose) of company X information.
Defining Spirit & Intent in a Security Standard
More Relevant Posts
-
One of the most common questions I hear from clients preparing for an assessment is: “How can we be sure we’re truly ready?” I like to frame it through the lens of the game Clue: • WHO owns the control or requirement? Do they know it’s theirs? • WHAT is being done to meet it, and is it documented? • WHEN is the action performed, and how often? • WHERE is it carried out (does it actually protect the in-scope environment)? • HOW is it executed? Could you walk an auditor through it live in a walkthrough or screen share? 🔑 The takeaway: Tell the story. Connect the dots. Readiness isn’t just about having controls in place - it’s about being able to clearly demonstrate that your organization understands its responsibilities and can show evidence with confidence. And yes, this “board” doesn’t capture every security domain… but you get the gist 😉
To view or add a comment, sign in
-
-
In today's interconnected world, software supply chains are essential, yet they carry risks that may not be immediately apparent. An OPSWAT expert will guide you through the 7 most overlooked vulnerabilities in software and AI project supply chains, providing insights on how to address these gaps. Key topics include: - The 7 Weak Links: Discover real-world risks such as hidden dependencies, unmaintained packages, and pipeline integrity threats. - Beyond SBOMs: Learn about the limitations of Software Bill of Materials (SBOMs) and the importance of combining them with automated scanning, proactive data loss prevention, and comprehensive mitigation measures. - Best Practices & Standards: Receive actionable guidance on aligning with SBOM standards from CISA, NIST, FDA, ISO, and CERT-In, as well as global regulations. Register today to enhance your defenses with practical strategies like automated scanning and risk scoring. https://lnkd.in/ezGVWs7j
To view or add a comment, sign in
-
It’s easy to think you’re covered — until something happens. That’s when people start asking questions. "Who was responsible?" "Why wasn’t this flagged earlier?" "Where was the system that was supposed to prevent this?" In our experience, the clients who take security seriously are the ones who’ve seen what it looks like when it fails. They’re not paranoid. They’re prepared. Because after the fact, it’s not about the budget anymore, you go straight into problem resolution mode and keeping the business alive, when from the beginning the focus should have been on prevention. These small intangibles can make or break a business, as it only takes one moment before total chaos can ensue, and from there you're stuck playing catch up. The goal is to always control what you can control, which is processes and systems. #StrategicSecurity #PreparedNotParanoid #SecurityLeadership #IPG #RiskAwareness #TorontoSecurity
To view or add a comment, sign in
-
Not sure what’s changed in ISO 27001:2022? You’re not the only one! The update introduces new controls, merges old ones, and changes the way information security is structured and it’s leaving many businesses wondering where to start. Our latest blog breaks everything down in plain English, helping you understand what’s different, what’s stayed the same, and how to prepare for a smooth transition before the 2025 deadline. Read more here: https://lnkd.in/etr_2gmF
To view or add a comment, sign in
-
-
Certification Institute for Research Quality (CIRQ), an International Standards Organization (ISO) audit and certification body that is a subsidiary of the Insights Association, has awarded certification to New York, NY-based OvationMR for compliance with the ISO/IEC 27001:2022, a widely recognized and internationally accepted information security standard. Read more: https://lnkd.in/gPTjtGQp
To view or add a comment, sign in
-
In IT audit, integrity and confidentiality aren’t just buzzwords they’re the pillars that safeguard trust in a digital world. I remember an audit where we uncovered a critical vulnerability, one that could have exposed sensitive client data. Choosing to report it transparently, while ensuring no details leaked, was a test of integrity and confidentiality. Integrity means reporting facts as they are no sugarcoating, no hidden agendas. It’s about being honest with stakeholders, even when the truth is uncomfortable. Confidentiality means protecting every piece of information, understanding that a single breach can ripple into massive damage financially and reputationally. Together, they create a promise: the audit won’t just follow processes, but honor the trust placed in us by organizations and their customers. In your experience, how do you balance being transparent with protecting sensitive information? When has that balance made or broken a project?
To view or add a comment, sign in
-
-
“Best practice” is a great way to say… nothing. Most security advice sounds the same: - Use strong passwords - Keep software up to date - Don’t click suspicious links It’s not wrong—it’s just not useful. What actually works? Baselines. Defined. Documented. Repeatable. A good baseline says: - Here’s what normal looks like - Here’s what we expect from every device, every identity, every process - Here’s what we check, track, and measure It removes guesswork. It creates alignment. And it turns vague policies into real operational outcomes. This post breaks down how to use baselines to drive clarity, simplify audits, and respond faster when things go sideways. Because “secure enough” isn’t something you guess—it’s something you define.
To view or add a comment, sign in
-
Why Information Assurance Matters More Than Ever In an era of increasing cyber threats and regulatory scrutiny, Information Assurance (IA) is no longer a back-office function—it’s a strategic imperative. Our IA Consultant, Mark Holden, shares his expert insights on why organisations must prioritise IA to safeguard data, build trust, and ensure operational resilience. “Information Assurance isn’t just about compliance—it’s about confidence.” Read Mark’s full blog here: https://lnkd.in/envgNghp #InformationAssurance #CyberSecurity #ShieldedSolutions #HonestPragmaticSecurity #VeteranOwned #RiskManagement #DataGovernance #LeadershipInSecurity
To view or add a comment, sign in
-
It is always encouraging to work with a peer company that sees value in stepping back and asking honest questions about how it operates. We have supported a security provider that wanted a governance review of its policies, processes, and standard operating procedures, as well as its approach to vulnerability assessments, both for current contracts and future bids. What stood out was their openness. They recognised that their documentation, structure, and assessment methods needed refinement, and they wanted practical guidance to strengthen them. That kind of humility is not weakness, it is professionalism. For Red Latitude, supporting another company in this way is not about competition. It is about raising the standard across the sector. When companies invest in improving how they plan, assess, and deliver, it benefits everyone, the providers, their clients, and ultimately the security of the assets and people they protect. Stronger governance and well-contextualised vulnerability assessments mean procedures and SOPs that actually fit the environment they are meant to serve. That is what gives clients assurance, not just that risks are being managed, but that they are being understood in context. #SecurityGovernance #OperationalResilience #ProfessionalStandards #Collaboration
To view or add a comment, sign in
-
You'll be forgotten in 6 months. Harsh? Maybe. True? Absolutely. I've watched brilliant CISOs leave organisations. Within a year, their security programs crumbled. Not because they weren't good. Because they never institutionalised what they built. Here's what nobody tells you: 𝗬𝗼𝘂𝗿 𝘁𝗲𝗰𝗵𝗻𝗶𝗰𝗮𝗹 𝗴𝗲𝗻𝗶𝘂𝘀 𝗶𝘀 𝘄𝗼𝗿𝘁𝗵𝗹𝗲𝘀𝘀 𝗶𝗳 𝗶𝘁 𝗱𝗶𝗲𝘀 𝘄𝗶𝘁𝗵 𝘆𝗼𝘂𝗿 𝗱𝗲𝗽𝗮𝗿𝘁𝘂𝗿𝗲. The CISOs who create a lasting impact do 3 things differently: 𝟭. 𝗧𝗵𝗲𝘆 𝗱𝗼𝗰𝘂𝗺𝗲𝗻𝘁 𝘁𝗵𝗲 𝗪𝗛𝗬, 𝗻𝗼𝘁 𝗷𝘂𝘀𝘁 𝘁𝗵𝗲 𝗪𝗛𝗔𝗧. Your policies are useless without context. Write down why you made each decision. What threats were you seeing? What business constraints shaped your choices? Future leaders need your reasoning, not just your rules. 𝟮. 𝗧𝗵𝗲𝘆 𝗯𝘂𝗶𝗹𝗱 𝗳𝗿𝗮𝗺𝗲𝘄𝗼𝗿𝗸𝘀, 𝗻𝗼𝘁 𝘀𝗶𝗹𝗼𝘀. Stop being the bottleneck. Create decision frameworks that work without you. Incident response playbooks. Risk assessment matrices. Vendor evaluation criteria. Make yourself replaceable. 𝟯. 𝗧𝗵𝗲𝘆 𝗰𝗿𝗲𝗮𝘁𝗲 𝗮𝗿𝘁𝗲𝗳𝗮𝗰𝘁𝘀 𝗼𝗳 𝗰𝘂𝗹𝘁𝘂𝗿𝗲. Security expertise doesn't live in your head. It lives in stories, case studies, and documented lessons learned. Build a knowledge base that captures your hard-won wisdom and transfer those to others. Your legacy isn't the tools you deployed. It's whether your successor can build on what you created instead of starting from scratch. Are you building a program or just renting one? ♻️ Repost this if you found it valuable. 📅 DM me to schedule a 1:1 meeting if you need help.
To view or add a comment, sign in
More from this author
Explore content categories
- Career
- Productivity
- Finance
- Soft Skills & Emotional Intelligence
- Project Management
- Education
- Technology
- Leadership
- Ecommerce
- User Experience
- Recruitment & HR
- Customer Experience
- Real Estate
- Marketing
- Sales
- Retail & Merchandising
- Science
- Supply Chain Management
- Future Of Work
- Consulting
- Writing
- Economics
- Artificial Intelligence
- Employee Experience
- Workplace Trends
- Fundraising
- Networking
- Corporate Social Responsibility
- Negotiation
- Communication
- Engineering
- Hospitality & Tourism
- Business Strategy
- Change Management
- Organizational Culture
- Design
- Innovation
- Event Planning
- Training & Development