Why Cybersecurity Engineers must learn Governance, Risk, and Compliance (GRC)?

Omar Ahmed
4 min readJan 20, 2023
The Three Elements of GRC

Governance, Risk Management, and Compliance (GRC) is an essential aspect of cybersecurity for any organization. It is the process of ensuring that an organization is adhering to legal, regulatory, and industry standards while also effectively managing and mitigating risks. As a cybersecurity engineer, understanding GRC is crucial for protecting your organization’s sensitive data and assets.

One of the key components of GRC is compliance with industry standards such as Payment Card Industry Data Security Standards (PCI DSS), ISO 27001, and SOC 2. These standards are designed to protect sensitive information and ensure that organizations are implementing best practices for security.

PCI DSS, for example, is a set of security standards that apply to companies that process, store, or transmit credit card information. Compliance with this standard is mandatory for any organization that accepts credit card payments.

ISO 27001, on the other hand, is an international standard that provides a framework for an information security management system (ISMS).

In addition to compliance with industry standards, GRC also involves managing and mitigating risks. This includes identifying potential threats, assessing the likelihood and impact of those threats, and implementing controls to prevent or mitigate them.

As a cybersecurity engineer, you will be responsible for identifying and assessing risks, and implementing controls to mitigate them. This could include implementing security measures such as firewalls, intrusion detection systems, and encryption. It also includes regular security testing, incident response planning, and disaster recovery planning.

As a cybersecurity engineer, understanding the requirements of industry standards such as PCI DSS, ISO 27001, and SOC 2, is crucial for determining the controls that your organization needs to implement in order to be compliant. Each standard has its own specific requirements that must be met, and knowing these requirements will help you to identify areas where your organization may be vulnerable and implement the necessary controls to mitigate those risks.

PCI DSS Requirements

For example, PCI DSS requires that organizations implement firewalls to protect sensitive data, such as credit card information. As a cybersecurity engineer, you would need to understand the specific requirements of the PCI DSS standard and configure your organization’s firewall accordingly. This could include configuring the firewall to block certain types of traffic, or implementing intrusion detection and prevention systems to detect and block malicious activity.

Here are some common requirements for PCI DSS related to security controls :

PCI DSS:

  • Firewall configuration to protect cardholder data
  • Implementation of secure protocols for transmitting cardholder data across public networks
  • Use of strong encryption for storing and transmitting cardholder data
  • Use of unique IDs for each person with access to cardholder data
  • Implementation of intrusion detection and prevention systems
  • Regularly monitoring and testing of networks to detect vulnerabilities
  • Regularly updating anti-virus software and security patches
  • Implementing policies and procedures for incident response and management
Benefits of ISO 27001

Similarly, ISO 27001 requires that organizations implement an Information Security Management System (ISMS). This includes identifying and assessing risks, implementing controls to mitigate those risks, and regularly reviewing and updating the ISMS. As a cybersecurity engineer, you would need to understand the requirements of the ISO 27001 standard and implement controls such as encryption, access controls, and incident response procedures to meet those requirements.

Here are some common requirements for ISO 27001 related to security controls :

ISO 27001:

  • Implementation of an Information Security Management System (ISMS)
  • Identification and assessment of risks
  • Implementation of controls to mitigate identified risks
  • Regular review and update of the ISMS
  • Implementation of access controls for sensitive information
  • Implementation of encryption for sensitive data
  • Implementation of incident management procedures
  • Regularly monitoring and testing of networks to detect vulnerabilities
  • Regularly updating anti-virus software and security patches
  • Implementation of procedures for the management of third-party service providers
  • Implementation of a Business Continuity Management

The cybersecurity engineer not the only person that need to understand GRC:

For penetration testers, understanding GRC is crucial for identifying vulnerabilities in an organization’s systems and networks. By understanding the requirements of various standards and regulations, penetration testers can more effectively identify and exploit weaknesses in an organization’s security posture. This can help organizations to quickly identify and address potential security risks before they can be exploited by malicious actors.

SOC administrators also benefit from understanding GRC. SOC administrators are responsible for monitoring and protecting an organization’s systems and networks from security incidents. By understanding the requirements of various standards and regulations, SOC administrators can more effectively identify and respond to potential security incidents. This can help organizations to minimize the impact of security incidents and reduce the risk of data breaches.

In summary, as a cybersecurity engineer, understanding the requirements of industry standards is crucial for determining the controls that your organization needs to implement in order to be compliant. Knowing these requirements will also help you to identify areas where your organization may be vulnerable and configure the necessary controls to mitigate those risks. It is also important to regularly review and update the implemented controls based on the standard’s requirements.

--

--