Compliance Frameworks

The rules you live under, and how we help you live under them well.

Every regulated business operates at the intersection of two or three frameworks at once — and the outcome our clients buy is singular: technology that answers to all of them, simultaneously, without a scramble before every exam. An RIA lives under SEC, FINRA, and state privacy. A medical practice under HIPAA, PCI (if they take cards), and state breach notification. A defense supplier under CMMC, NIST SP 800-171, and ITAR. Below: the twelve frameworks that shape most of the work we do, and how each one changes the way we build.

SECU.S. Securities & Exchange Commission

Investment adviser and broker-dealer oversight, built into the architecture.

The SEC holds registered investment advisers and broker-dealers to Regulation S-P (the Safeguards and Disposal Rules), Regulation S-ID (identity-theft red flags), the Marketing Rule, and Books & Records preservation requirements under Advisers Act Rule 204-2 and Exchange Act Rule 17a-4. The Division of Examinations publishes its priorities every year; cybersecurity and operational resilience have led the list for over a decade.

Our role is to translate those requirements into real controls. Privileged-identity management, conditional access, WORM-compliant archiving of email / Teams / SMS, DLP tuned to PII and portfolio data, evidence packages ready before an exam letter arrives.

What this looks like for you

Reg S-P and Reg S-ID controls implemented and evidenced · books-and-records archiving · mock exam walkthroughs with your CCO · quarterly independent audit against SEC examination priorities.

Governing body: sec.gov · Exam priorities: Division of Examinations
FINRAFinancial Industry Regulatory Authority

Broker-dealer supervision, evidenced end-to-end.

FINRA governs broker-dealers through rules that reach directly into technology: Rule 4511 on books and records, Rule 3110 on supervision, Rule 2210 on communications with the public, and Rule 4370 on business continuity plans. Off-channel communications enforcement — the texts and personal-device messaging that everyone does and nobody governs — has produced more than a billion dollars in fines in recent years.

We build the controls that make supervision possible: advisor devices under management, personal messaging either off-limits or captured to the archive, written supervisory procedures (WSPs) that match what the technology actually does, not what the compliance manual promises.

What this looks like for you

Off-channel communications capture (Smarsh / LeapXpert / Global Relay) · device management for registered persons · BCP-aligned backup and recovery · WSP-to-technology reconciliation.

Governing body: finra.org
HIPAAHealth Insurance Portability & Accountability Act

Protected health information, protected by design.

The HIPAA Security Rule (45 CFR 164.308–312) imposes administrative, physical, and technical safeguards on covered entities and business associates. The Privacy Rule and Breach Notification Rule round out the framework, and HITECH strengthened the enforcement teeth. Every recent OCR settlement has pointed to the same root cause: the Security Risk Analysis wasn't current, or the controls it referenced weren't actually in place.

We serve as the Security Officer under 164.308(a)(2), maintain a living Security Risk Analysis, and run the annual tabletop against the breach-notification clock — so when something does happen, your team already knows the steps.

What this looks like for you

Annual Security Risk Analysis with evidence linking controls to addressable specifications · BAA tracking and renewal · EHR environment hardening · ransomware-specific backup and restore testing · breach-notification tabletops.

Governing body: hhs.gov/hipaa · Enforcement: HHS Office for Civil Rights
SOC 2AICPA Trust Services Criteria

The report your enterprise clients ask for before they'll send you work.

SOC 2 is an attestation report issued by an independent CPA firm against the AICPA Trust Services Criteria: Security (required), Availability, Processing Integrity, Confidentiality, and Privacy. Type I reports on design of controls at a point in time; Type II reports on operating effectiveness over a period (typically six to twelve months). For any firm selling B2B services with client data, it's increasingly the price of admission.

We don't issue the report — that's the auditor's job. We build the environment and the evidence so that when the auditor arrives, the answers exist and are documented. And we stand with you through the engagement.

What this looks like for you

Readiness assessment against the Trust Services Criteria · control design and documentation · evidence collection automation · auditor liaison during Type I and Type II engagements.

Authority: AICPA & CIMA
GLBAGramm-Leach-Bliley Act · FTC Safeguards Rule

Financial data protection, for any firm that touches it.

The Gramm-Leach-Bliley Act, implemented through the FTC Safeguards Rule, reaches far beyond banks: tax preparers, mortgage brokers, auto dealers extending financing, and many accounting firms are all "financial institutions" under the rule. The 2023 amendments added concrete requirements — a qualified individual responsible for the program, risk assessments in writing, MFA, encryption, vendor oversight, and an incident response plan.

We serve as that qualified individual, or support yours. The program isn't paperwork — it's a running cycle of assessment, control, evidence, and response.

What this looks like for you

FTC Safeguards Rule program build · qualified-individual support · MFA and encryption enforcement · vendor risk management · incident response plan with annual tabletop.

NIST CSFCybersecurity Framework 2.0

The lingua franca of modern cybersecurity programs.

The NIST Cybersecurity Framework organizes a program around six functions: Govern, Identify, Protect, Detect, Respond, Recover. It's voluntary — and it's also the scaffolding most regulators, insurers, and enterprise buyers now expect to see behind any cybersecurity conversation. Version 2.0 (2024) added Govern as a top-level function, making board-level accountability explicit.

We use CSF as the organizing structure for every client program, regardless of which sector-specific rule sits above it. It's how we keep the whole picture coherent when four or five other frameworks also apply.

What this looks like for you

CSF 2.0 program design · gap assessment against current and target profiles · integration with sector-specific rules (SEC, HIPAA, CMMC, DFS 500) · annual program review with leadership.

CIS ControlsCenter for Internet Security

The 18 controls that stop the attacks that actually happen.

The CIS Critical Security Controls (v8.1) are a prioritized set of 18 defensive actions drawn from real-world attack data. Implementation Group 1 is the essential hygiene every organization should meet. IG2 and IG3 scale up for higher-risk environments. Unlike most frameworks, CIS is specific enough to operationalize directly — inventory assets, manage accounts, protect data — and maps cleanly to NIST CSF, HIPAA, and others.

We use CIS as a tactical checklist on top of the broader framework — the place where "align with NIST CSF" gets turned into configurations and verifiable evidence.

What this looks like for you

IG1 / IG2 / IG3 implementation · asset inventory and management · secure configuration baselines · continuous vulnerability management · audit-log correlation.

Authority: cisecurity.org
NY DFS Part 500New York Department of Financial Services

The model law other states copied.

23 NYCRR Part 500 applies to any entity licensed by NYDFS — banks, insurers, producers, trust companies, mortgage servicers. The 2023 amendments raised the bar: a named CISO, annual certification signed by the board or senior officer, incident notification within 72 hours, MFA, encryption, annual penetration testing, tabletop exercises, and written incident response and business continuity plans. Connecticut, Massachusetts, and the NAIC model law followed with near-identical requirements.

We serve as the named CISO or support yours; the annual certification is signed with confidence because the evidence is continuous, not assembled the week before.

What this looks like for you

Named vCISO on the certification · annual risk assessment and written policies · MFA, encryption, pen testing, tabletop exercises · 72-hour incident-notification workflow.

PCI DSSPayment Card Industry Data Security Standard

If you take cards, you're in scope.

PCI DSS v4.0.1 governs any organization that stores, processes, or transmits cardholder data. Merchant levels 1–4 dictate the assessment type (QSA or self-assessment), but the core expectation is the same: encrypted transmission, segmented cardholder environments, quarterly vulnerability scans, annual penetration testing, and continuous monitoring. v4.0 introduced the customized approach — flexibility for mature programs — and more prescriptive authentication and scripting requirements.

We help scope the cardholder environment (the single biggest cost-saver), reduce it where we can, and document the controls that remain. Often the best answer is to take your environment out of scope.

What this looks like for you

Scope definition and reduction · network segmentation · quarterly ASV scanning and annual pen testing · SAQ preparation · QSA liaison.

CMMC 2.0Cybersecurity Maturity Model Certification

If you touch a DoD contract, CMMC 2.0 is no longer optional.

CMMC 2.0 became final rule at the end of 2024 and is now being written into solicitations and subcontracts. Level 1 (17 practices, annual self-assessment) covers Federal Contract Information. Level 2 (110 practices from NIST SP 800-171 Rev 2, audited every three years by an accredited C3PAO) covers Controlled Unclassified Information. Level 3 adds NIST SP 800-172 enhancements and is assessed by DIBCAC.

Most subcontractors end up at Level 2. The single most important decision is scope: what's in the CMMC boundary and what isn't. We run that scoping, build the enclave (GCC High or equivalent), remediate the SPRS score honestly, and stand with you through the C3PAO engagement.

What this looks like for you

CMMC scope and boundary workshop · CUI enclave (GCC High) build · NIST SP 800-171 gap assessment and remediation · SPRS score management · C3PAO assessment support · annual affirmation.

Authority: dodcio.defense.gov/CMMC · Assessor accreditation: Cyber AB
GDPREU General Data Protection Regulation

If any of your data touches Europe, you're in it.

GDPR applies to any organization offering goods or services to individuals in the EU, or monitoring their behavior — regardless of where the company is based. Core obligations: lawful basis for processing, data subject rights (access, erasure, portability), 72-hour breach notification, Data Protection Impact Assessments for high-risk processing, and in many cases a Data Protection Officer. Fines reach up to 4% of global annual revenue.

For most of our clients, GDPR shows up in narrower ways: a European client, a European employee, a marketing tool with EU data subjects. We map the exposure honestly, build the Records of Processing, and put the data-subject workflow in place so the obligation is operational, not aspirational.

What this looks like for you

Data mapping and Records of Processing · lawful-basis documentation · data-subject request workflow · cross-border transfer mechanisms (SCCs, adequacy) · DPIA support for high-risk processing.

Authority: gdpr.eu · Regulators: European Data Protection Board
State Privacy LawsPatchwork across 20+ U.S. states

Twenty states. Twenty variations on the same good idea.

California (CCPA/CPRA), Colorado (CPA), Connecticut (CTDPA), Virginia (VCDPA), Texas (TDPSA), and a growing list of other states have enacted comprehensive consumer privacy laws. Thresholds, covered data, and consumer rights vary — but the common core is now clear: data inventory, consumer rights to access and delete, opt-out of targeted advertising, reasonable security, and breach notification on tight clocks (often 30–60 days, faster in several states).

We take a single-framework approach: build to the highest common denominator and document variances where a specific state goes further. It's cheaper than maintaining parallel programs, and it makes expansion into new states a documentation change, not an engineering one.

What this looks like for you

Unified state-privacy program · data inventory and mapping · consumer-rights request workflow · breach-notification playbook by state · vendor/processor contract review.

— One framework or all twelve, we start the same way

A 20-minute conversation about the rules you live under.

Bring the framework that's on your mind. We'll walk you through what aligning well looks like in practice — and what your technology needs to do to get there. No pitch, no deck, one business-day response.

Start the conversation