<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Compliance Archives - Jay Longley</title>
	<atom:link href="https://jaylongley.com/tag/compliance/feed/" rel="self" type="application/rss+xml" />
	<link>https://jaylongley.com/tag/compliance/</link>
	<description>Innovator, Technologist &#38; Aviator</description>
	<lastBuildDate>Thu, 28 Mar 2024 20:32:00 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://jaylongley.com/wp-content/uploads/2022/09/cropped-skull01-32x32.jpg</url>
	<title>Compliance Archives - Jay Longley</title>
	<link>https://jaylongley.com/tag/compliance/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>The Crucial Role of Domain Names</title>
		<link>https://jaylongley.com/the-crucial-role-of-domain-names/</link>
		
		<dc:creator><![CDATA[Jay]]></dc:creator>
		<pubDate>Mon, 12 Feb 2024 19:13:26 +0000</pubDate>
				<category><![CDATA[CISO]]></category>
		<category><![CDATA[Breach]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Domain Name]]></category>
		<category><![CDATA[Threat Actor]]></category>
		<guid isPermaLink="false">https://jaylongley.com/?p=1000</guid>

					<description><![CDATA[<p>Domain Name, the most critical component of your business.  See why, here...</p>
<p>The post <a href="https://jaylongley.com/the-crucial-role-of-domain-names/">The Crucial Role of Domain Names</a> appeared first on <a href="https://jaylongley.com">Jay Longley</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><h3>Introduction</h3></p>



<p>In the vast digital landscape where businesses thrive and connect, a company&#8217;s domain name stands as a beacon, guiding clients and partners to its virtual doorstep. Often overlooked, the domain name is arguably the most critical component of a business&#8217;s presence, influencing communication, identity, branding, and security. In this blog post, we&#8217;ll delve into why safeguarding your business from domain name hijacking is of paramount importance and explore best practices for securing it against potential threats.</p>



<p><em><strong>Let&#8217;s pause here for a minute. Immediately do the following for your domain.</strong></em></p>



<ol class="wp-block-list">
<li>Setup Multi-Factor Authentication using a FIDO2 Key. If you do not know what a FIDO2 key is, contact me, and we can get you configured.</li>



<li>Set your domain name to &#8220;Client Prohibit Transfer&#8221; or something similar that your Domain Registrar has. This will prevent it from moving overseas.</li>



<li>Set your domain registrar to force a MFA challenge when any single action is performed to your domain. If you add a record, you should have an MFA Challenge. If you change your address…get that MFA challenge. If you login…you guessed it…MFA Challenge. This will keep you in the know for arguably the most critical component of your entire business. Your Domain name.</li>
</ol>



<p><strong><span style="text-decoration: underline;"><em>Now back to the post&#8230;.</em></span></strong></p>



<p><h3><p>The Power of a Domain Name</p></h3></p>



<p><u>Communication Hub:</u><br>A domain name serves as the cornerstone of an organization&#8217;s online communication. It is not merely an address; it&#8217;s the virtual handshake that connects businesses with their audience. A memorable and relevant domain name enhances brand recall and fosters customer trust.</p>



<p><span style="text-decoration: underline;">Brand Identity</span>:<br>Your domain name is an integral part of your brand identity. It encapsulates your business name, mission, and values in a single, cohesive package. Consistency across digital channels builds brand recognition and loyalty.</p>



<p><span style="text-decoration: underline;">Branding and Marketing</span>:<br>A well-chosen domain name can significantly impact your marketing efforts. It is part of your advertising collateral, appearing on business cards, promotional materials, and online campaigns. A strong and memorable domain name can contribute to the success of marketing initiatives.</p>



<p><span style="text-decoration: underline;">Retirement Accounts, Bank Accounts, Taxes, Everything Business</span>:<br>Let&#8217;s face it. Your entire business runs off this domain name. Don&#8217;t believe me, try to login to any portal, receive an email, or file a form online&#8230; Try to do anything without access to your domain name…It is near impossible. Now imagine you lose your domain to a Threat Actor, and they can now access every place you could not.  Imagine someone intercepting ALL of your forms, communications, emails, etc, so they have the same information, or even more information about you, than you have access to.</p>



<p><h3>The Security Imperative, and why you need to perform these steps</h3></p>



<p><span style="text-decoration: underline;">Implement Multi-Factor Authentication (MFA)</span>:<br>Implementing Multi-Factor Authentication (MFA) is a non-negotiable step in securing your domain name. MFA adds an extra layer of protection beyond a simple username and password, making it significantly harder for unauthorized individuals to gain access. Do not set your MFA challenge to send to an email…If a threat actor has your domain name, they can get that email. Set it to a FIDO2 key and thank me later.</p>



<p><span style="text-decoration: underline;">Perform Regular Audits and Monitoring</span>:<br>Regularly audit and monitor your domain settings. Ensure that only authorized personnel have access to domain management tools. Any unauthorized changes or suspicious activity should be promptly investigated.</p>



<p><span style="text-decoration: underline;">Domain Registrar Security</span>:<br>Choose a reputable domain registrar that prioritizes security. Look for registrars that offer additional security features such as domain locking, which prevents unauthorized transfers, and WHOIS privacy protection to shield your contact information from public view. If your registrar does not support MFA, change, immediately.</p>



<p><h3><p>The Nightmare of Domain Hijacking</p></h3></p>



<p>Imagine waking up to discover that your business has suffered from domain name hijacking and the domain has been stolen and relocated to a foreign server by a Threat Actor. The consequences can be catastrophic:</p>



<p><span style="text-decoration: underline;">Business Disruption</span>:<br>Domain hijacking can lead to significant downtime and disrupt your online operations. This downtime could result in lost revenue, damage to your reputation, and erode customer trust.</p>



<p><span style="text-decoration: underline;">Identity Theft</span>:<br>A hijacked domain can be used for phishing attacks, spreading malware, or tarnishing your brand&#8217;s reputation. This can lead to a loss of customer trust and loyalty.</p>



<p><span style="text-decoration: underline;">Recovery Challenges</span>:<br>Recovering a stolen domain can be a protracted and complex process. It often involves legal action and may not guarantee a swift resolution. Prevention through robust security measures is the key.</p>



<p><span style="text-decoration: underline;">HOURS</span><br>If you lose your domain name for any reason, you have mere hours at most to stop from having it lost forever.  Act on this now.  Do not wait.  Call an expert immediately.</p>



<p><h3><p>In Conclusion</p></h3></p>



<p>In the digital era, where the online realm is as critical as the physical storefront, businesses must recognize the value of domain names as the linchpin of their digital identity. By implementing stringent security measures such as Multi-Factor Authentication and regular audits, organizations can fortify their defenses against potential threats, ensuring that their virtual presence remains a secure and trusted space. Remember, in the ever-evolving landscape of cybersecurity, safeguarding your domain is not just a precaution; it&#8217;s a necessity. Prevent domain name hijacking for your company today!</p>



<p>Additional Reading<br>Password Managers<br><a href="https://jaylongley.com/the-secure-your-life-series-password-managers/" target="_blank" rel="noreferrer noopener">https://jaylongley.com/the-secure-your-life-series-password-managers/</a><br><br>Backing up your DNS Zones<br><a href="https://tacticalware.com/godaddy-backup-dns-zone/" target="_blank" rel="noreferrer noopener">https://tacticalware.com/godaddy-backup-dns-zone/</a><br><br>Lock your DNS<br><a href="https://www.godaddy.com/help/unlock-or-lock-my-domain-410" target="_blank" rel="noreferrer noopener">https://www.godaddy.com/help/unlock-or-lock-my-domain-410</a><br><br>FIDO2 Key:<br><a href="https://www.yubico.com/" target="_blank" rel="noreferrer noopener">https://www.yubico.com/</a></p>
<p>The post <a href="https://jaylongley.com/the-crucial-role-of-domain-names/">The Crucial Role of Domain Names</a> appeared first on <a href="https://jaylongley.com">Jay Longley</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Due Diligence Questionnaire &#8211; Cybersecurity</title>
		<link>https://jaylongley.com/due-diligence-questionnaire-cybersecurity/</link>
		
		<dc:creator><![CDATA[Jay]]></dc:creator>
		<pubDate>Wed, 31 May 2023 01:19:49 +0000</pubDate>
				<category><![CDATA[CISO]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[DDQ]]></category>
		<category><![CDATA[Due Diligence Questionnaire]]></category>
		<category><![CDATA[Questionnaire]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://jaylongley.com/?p=842</guid>

					<description><![CDATA[<p>Below you will find a simplified due diligence questionnaire focusing on cybersecurity....</p>
<p>The post <a href="https://jaylongley.com/due-diligence-questionnaire-cybersecurity/">Due Diligence Questionnaire &#8211; Cybersecurity</a> appeared first on <a href="https://jaylongley.com">Jay Longley</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h2>Introduction</h2>
<p>Below you will find a simplified due diligence questionnaire focusing on cybersecurity.  While I personally recommend using a framework such as the <a href="https://sharedassessments.org/sig/">Standard Information Gathering Assessment</a>, not all need something that comprehensive.</p>



<h4>Due Diligence Questionnaire</h4>
<p>1. Do you have a documented cybersecurity policy in place?<br>2. Are there designated personnel responsible for cybersecurity within your organization?<br>3. How do you identify and assess cybersecurity risks?<br>4. Do you have a process for regularly updating and patching software and systems?<br>5. How do you protect your network and systems from unauthorized access?<br>6. Have you implemented multi-factor authentication for accessing sensitive systems and data?<br>7. How do you manage and protect user accounts and access privileges?<br>8. Do you conduct regular security awareness training for employees?<br>9. How do you monitor and detect cybersecurity incidents or breaches?<br>10. Do you have an incident response plan in place? If so, how often is it tested?<br>11. Have you experienced any significant cybersecurity incidents in the past? If so, how were they addressed?<br>12. How do you secure sensitive data and ensure its confidentiality?<br>13. Do you encrypt data in transit and at rest?<br>14. Are your systems and applications regularly scanned for vulnerabilities?<br>15. How do you protect against malware, including ransomware?<br>16. Do you have intrusion detection and prevention systems in place?<br>17. Have you implemented secure coding practices for your software development processes?<br>18. Do you perform regular penetration testing to identify vulnerabilities?<br>19. How do you ensure third-party vendors or partners adhere to your cybersecurity requirements?<br>20. Do you comply with relevant cybersecurity standards and regulations, such as GDPR or HIPAA?</p>



<p>To create a customized Due Diligence Questionnaire / DDQ for your organization, you can copy and modify the above code, or you can contact me for assistance in creating a comprehensive questionnaire.</p>



<p>For more CISO Articles, please see:<br><a href="https://jaylongley.com/category/ciso/" target="_blank" rel="noreferrer noopener">https://jaylongley.com/category/ciso/</a></p>
<p>The post <a href="https://jaylongley.com/due-diligence-questionnaire-cybersecurity/">Due Diligence Questionnaire &#8211; Cybersecurity</a> appeared first on <a href="https://jaylongley.com">Jay Longley</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Consequences of Non-Compliance with CJIS</title>
		<link>https://jaylongley.com/consequences-of-non-compliance-with-cjis/</link>
					<comments>https://jaylongley.com/consequences-of-non-compliance-with-cjis/#comments</comments>
		
		<dc:creator><![CDATA[Jay]]></dc:creator>
		<pubDate>Wed, 31 May 2023 01:16:45 +0000</pubDate>
				<category><![CDATA[CISO]]></category>
		<category><![CDATA[CJIS]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[M365]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://jaylongley.com/?p=840</guid>

					<description><![CDATA[<p>Non-compliance with CJIS can expose organizations to legal liabilities, including potential lawsuits, damages, and legal consequences</p>
<p>The post <a href="https://jaylongley.com/consequences-of-non-compliance-with-cjis/">Consequences of Non-Compliance with CJIS</a> appeared first on <a href="https://jaylongley.com">Jay Longley</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Non-compliance with CJIS (Criminal Justice Information Services) requirements can have various consequences, both at the federal and state levels. Here are some potential outcomes of not being CJIS compliant:</p>



<h3>Loss of access to critical systems:</h3><p>Failure to comply with CJIS requirements may result in the suspension or revocation of an organization&#8217;s access to CJIS systems and data. This can severely impact the ability of law enforcement agencies or other criminal justice entities to carry out their duties effectively.</p>



<h3>Penalties and fines:</h3><p>Non-compliance with CJIS may lead to financial penalties imposed by federal or state authorities. The exact amount of fines can vary depending on the severity of the violation and the governing jurisdiction.</p>



<h3>Legal liabilities: </h3><p>Non-compliance with CJIS can expose organizations to legal liabilities, including potential lawsuits, damages, and legal consequences. Failure to protect sensitive criminal justice information adequately can result in legal actions from affected individuals or entities.</p>



<h3>Reputational damage: </h3><p>Not being CJIS compliant can harm an organization&#8217;s reputation and trustworthiness, particularly in the criminal justice sector. Negative publicity surrounding data breaches or security incidents can erode public confidence and impact relationships with partners, stakeholders, and the community.</p>



<h3>Loss of future opportunities: </h3><p>CJIS compliance is often a prerequisite for collaborating with federal agencies, participating in criminal justice initiatives, or obtaining certain contracts or grants. Non-compliant organizations may be excluded from these opportunities, limiting their growth and participation in relevant programs.</p>



<h3>Increased security risks: </h3><p>Non-compliance with CJIS requirements can leave organizations vulnerable to cyberattacks, data breaches, and unauthorized access to sensitive information. Inadequate security measures may result in the compromise of criminal justice data, leading to potential harm to investigations, public safety, and individuals&#8217; privacy.</p>



<p>To avoid these consequences, organizations involved in handling criminal justice information should prioritize CJIS compliance. This involves implementing the necessary security controls, conducting regular assessments and audits, providing security awareness training to personnel, and staying up to date with any updates or changes to the CJIS Security Policy. It is advisable to consult with legal and security professionals familiar with CJIS compliance to ensure proper adherence to the requirements.</p>



<p>To learn about CJIS at an entry level, visit:<br><a href="https://jaylongley.com/what-is-cjis-compliance/" target="_blank" rel="noreferrer noopener">https://jaylongley.com/what-is-cjis-compliance/</a></p>



<p>For more CISO related resources here, please visit:<br><a href="https://jaylongley.com/category/ciso/" target="_blank" rel="noreferrer noopener">https://jaylongley.com/category/ciso/</a></p>



<p>To learn more about the FBI CJIS guidelines, please visit the following link:<br><a href="https://www.fbi.gov/file-repository/cjis-security-policy_v5-8_20190601.pdf" target="_blank" rel="noreferrer noopener">https://www.fbi.gov/file-repository/cjis-security-policy_v5-8_20190601</a></p>
<p>The post <a href="https://jaylongley.com/consequences-of-non-compliance-with-cjis/">Consequences of Non-Compliance with CJIS</a> appeared first on <a href="https://jaylongley.com">Jay Longley</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://jaylongley.com/consequences-of-non-compliance-with-cjis/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>What is CJIS Compliance</title>
		<link>https://jaylongley.com/what-is-cjis-compliance/</link>
					<comments>https://jaylongley.com/what-is-cjis-compliance/#comments</comments>
		
		<dc:creator><![CDATA[Jay]]></dc:creator>
		<pubDate>Wed, 31 May 2023 01:13:58 +0000</pubDate>
				<category><![CDATA[CISO]]></category>
		<category><![CDATA[CJIS]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://jaylongley.com/?p=838</guid>

					<description><![CDATA[<p>Criminal Justice Information Services (CJIS) Security Policy, which is a set of guidelines and requirements established by....</p>
<p>The post <a href="https://jaylongley.com/what-is-cjis-compliance/">What is CJIS Compliance</a> appeared first on <a href="https://jaylongley.com">Jay Longley</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>CJIS compliance means following the FBI&#8217;s Criminal Justice Information Services Security Policy. This policy outlines guidelines and requirements for organizations in the U.S. that deal with criminal justice information (CJI).</p>



<p>The CJIS Security Policy mandates strict security controls and measures to protect CJI. It addresses physical and personnel security, access controls, authentication, encryption, incident response, and auditing. Its goal is to safeguard the confidentiality, integrity, and availability of CJI at all times.</p>



<p>Law enforcement agencies, courts, correctional facilities, and other criminal justice entities must comply. They need to implement required security controls and prove their compliance through audits and assessments.</p>



<p>To meet CJIS security requirements, organizations must set up proper safeguards, offer security training, assess risks, control access, and secure CJI&#8217;s transmission and storage.</p>



<p>Failing to comply with CJIS standards can lead to severe consequences. These include losing access to essential systems, facing penalties, legal issues, reputational harm, and affecting criminal investigations.</p>



<p>Organizations handling CJI should get to know the CJIS Security Policy well. They must work to put in place and keep up the necessary security measures for compliance.</p>



<p>To learn more about the consequences of being out of compliance with CJIS, visit:<br><a href="https://jaylongley.com/consequences-of-non-compliance-with-cjis/" target="_blank" rel="noreferrer noopener">https://jaylongley.com/consequences-of-non-compliance-with-cjis/</a></p>



<p>For more CISO related resources here, please visit:<br><a href="https://jaylongley.com/category/ciso/" target="_blank" rel="noreferrer noopener">https://jaylongley.com/category/ciso/</a></p>



<p>To learn more about the FBI CJIS guidelines, please visit the following link:<br><a href="https://www.fbi.gov/file-repository/cjis-security-policy_v5-8_20190601.pdf" target="_blank" rel="noreferrer noopener">https://www.fbi.gov/file-repository/cjis-security-policy_v5-8_20190601.pdf</a></p>
<p>The post <a href="https://jaylongley.com/what-is-cjis-compliance/">What is CJIS Compliance</a> appeared first on <a href="https://jaylongley.com">Jay Longley</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://jaylongley.com/what-is-cjis-compliance/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>NIST 800-53 Compliance Checklist</title>
		<link>https://jaylongley.com/nist-800-53-compliance-checklist/</link>
					<comments>https://jaylongley.com/nist-800-53-compliance-checklist/#comments</comments>
		
		<dc:creator><![CDATA[Jay]]></dc:creator>
		<pubDate>Wed, 31 May 2023 01:12:29 +0000</pubDate>
				<category><![CDATA[CISO]]></category>
		<category><![CDATA[800-53]]></category>
		<category><![CDATA[Checklist]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[NIST]]></category>
		<guid isPermaLink="false">https://jaylongley.com/?p=836</guid>

					<description><![CDATA[<p>Are you NIST 800-53 Compliant?  Use the checklist below to see how you stack up........</p>
<p>The post <a href="https://jaylongley.com/nist-800-53-compliance-checklist/">NIST 800-53 Compliance Checklist</a> appeared first on <a href="https://jaylongley.com">Jay Longley</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Are you <a href="https://csrc.nist.gov/pubs/sp/800/53/r5/upd1/final">NIST 800-53 Compliant</a>? Use the compliance checklist below to see how you stack up.</p>



<p><h4>Access Control (AC):</h4><p>1. Implement user identification and authentication mechanisms.<br>2. Enforce password complexity and expiration policies.<br>3. Use multi-factor authentication for accessing sensitive systems.<br>4. Control access to systems and data based on job roles and responsibilities.<br>5. Monitor and log user access activities.</p></p>



<p><h4>Configuration Management (CM):</h4><p>1. Establish and maintain baseline configurations for systems and devices.<br>2. Implement change control processes to manage system configuration changes.<br>3. Regularly scan systems for vulnerabilities and apply security patches.<br>4. Control and manage software installation and updates.<br>5. Maintain an inventory of authorized software and hardware.</p></p>



<p><h4>Audit and Accountability (AU):</h4><p>1. Enable system-level auditing and logging.<br>2. Review and analyze audit logs for security events.<br>3. Retain audit logs for an appropriate period.<br>4. Regularly review and update audit settings and configurations.<br>5. Implement mechanisms to detect and alert on unauthorized access attempts.</p></p>



<p><h4>Incident Response (IR):</h4><p>1. Develop an incident response plan.<br>2. Establish an incident response team and define roles and responsibilities.<br>3. Conduct regular incident response training and exercises.<br>4. Establish procedures for reporting and responding to security incidents.<br>5. Document and learn from security incidents to improve response capabilities.</p></p>



<p><h4>System and Communications Protection (SC):</h4><p>1. Implement firewalls and boundary protection mechanisms.<br>2. Encrypt sensitive data in transit and at rest.<br>3. Implement intrusion detection and prevention systems.<br>4. Establish network segmentation and segregation.<br>5. Protect against malware and unauthorized code execution.</p></p>



<p><h4>Security Assessment and Authorization (CA):</h4><p>1. Perform regular risk assessments to identify and address vulnerabilities.<br>2. Conduct security assessments of systems and applications.<br>3. Develop a system security plan that outlines security controls and procedures.<br>4. Obtain authorization for systems before deployment.<br>5. Continuously monitor and assess the effectiveness of security controls.</p></p>



<p>These are just a few examples of control families and areas covered in NIST 800-53. The complete NIST 800-53 publication and a more encompassing compliance checklist, contact me directly.  Organizations should refer to the full publication and conduct a comprehensive analysis of their specific requirements to ensure compliance with NIST 800-53.</p>



<p>For more about NIST 800-53, please review:<br><a href="https://jaylongley.com/what-is-nist-800-53/" target="_blank" rel="noreferrer noopener">https://jaylongley.com/what-is-nist-800-53/</a><br><br>For more CISO articles, please see:<br><a href="https://jaylongley.com/category/ciso/" target="_blank" rel="noreferrer noopener">https://jaylongley.com/category/ciso/</a></p>
<p>The post <a href="https://jaylongley.com/nist-800-53-compliance-checklist/">NIST 800-53 Compliance Checklist</a> appeared first on <a href="https://jaylongley.com">Jay Longley</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://jaylongley.com/nist-800-53-compliance-checklist/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
	</channel>
</rss>
