Compliance

IT Compliance OverviewHIPAA, PCI-DSS, SOC 2 & More

Understanding regulatory compliance frameworks and what they mean for your business. This guide breaks down the major compliance requirements, helps you determine which apply to your organization, and provides a roadmap for achieving and maintaining compliance.

14 min read|Last updated: December 2025

About the Author: This guide draws from 32 years of hands-on experience as a certified Cybersecurity Engineer/Architect, Network Engineer, and Disaster Recovery Officer. Having helped organizations across healthcare, finance, retail, and government navigate compliance requirements through thousands of audits and assessments, these insights reflect real-world implementation challenges and solutions. Schedule a free compliance consultation to understand your obligations and avoid costly penalties.

Important Disclaimer

This guide provides general educational information about compliance frameworks. It is not legal advice. Compliance requirements vary by jurisdiction, industry, and specific business circumstances. Always consult qualified legal and compliance professionals for guidance specific to your situation.

Introduction to IT Compliance

IT compliance refers to meeting the standards and regulations that govern how organizations handle data, protect privacy, and maintain security. These requirements come from various sources - government regulations, industry standards, and contractual obligations.

For many businesses, compliance is not optional. Depending on your industry, the data you handle, and who you do business with, you may be legally required to meet specific security and privacy standards. Failure to comply can result in significant fines, legal liability, and loss of business opportunities.

What This Guide Covers

  • -Overview of major compliance frameworks (HIPAA, PCI-DSS, SOC 2, GDPR, CMMC)
  • -How to determine which frameworks apply to your business
  • -Key requirements and common controls across frameworks
  • -Practical steps to achieve and maintain compliance
  • -Common mistakes and how to avoid them

Why Compliance Matters

Beyond avoiding fines, compliance provides tangible business benefits. It demonstrates to customers, partners, and regulators that you take data protection seriously.

Business Benefits

  • - Win contracts requiring compliance certification
  • - Reduce cyber insurance premiums
  • - Build customer trust and loyalty
  • - Competitive advantage over non-compliant competitors
  • - Improved security posture overall

Non-Compliance Risks

  • - HIPAA: Up to $1.5M+ per violation category/year
  • - PCI-DSS: $5,000-$100,000/month until compliant
  • - GDPR: Up to 4% of global annual revenue
  • - Loss of ability to accept payments or contracts
  • - Class action lawsuits and legal liability

Compliance is Good Security

While compliance and security are not identical, well-designed compliance frameworks establish baseline security practices that protect against common threats. Organizations that achieve compliance typically have significantly better security than those that do not. Think of compliance as a structured path to security - not the destination, but a solid foundation.

HIPAA (Healthcare)

HealthcareMedical Data

The Health Insurance Portability and Accountability Act (HIPAA) protects patient health information (PHI). It applies to healthcare providers, health plans, healthcare clearinghouses, and their business associates - any organization that handles PHI.

Who Must Comply

  • -Covered Entities: Healthcare providers, health plans, clearinghouses
  • -Business Associates: Any vendor/partner handling PHI on their behalf
  • -IT providers, billing companies, cloud services storing PHI
  • -Consultants, attorneys, accountants with PHI access

Key Requirements

Security Rule

  • - Administrative safeguards (policies, training)
  • - Physical safeguards (facility access, workstation security)
  • - Technical safeguards (access control, encryption, audit logs)
  • - Risk analysis required annually

Privacy Rule

  • - Minimum necessary standard
  • - Patient rights (access, amendment)
  • - Notice of Privacy Practices
  • - Authorization requirements

Breach Notification Rule

  • - Must notify affected individuals within 60 days of discovery
  • - Breaches affecting 500+ individuals must be reported to HHS and media
  • - All breaches logged in annual report to HHS
  • - "Wall of Shame" - public posting of breaches 500+ individuals

Common HIPAA Controls

  • Business Associate Agreements (BAAs) with all vendors handling PHI
  • Encryption of PHI at rest and in transit
  • Unique user identification and strong authentication
  • Audit logging of all PHI access
  • Regular security awareness training
  • Documented policies and procedures

PCI-DSS (Payment Card Industry)

RetailE-commercePayment Processing

The Payment Card Industry Data Security Standard (PCI-DSS) applies to any organization that stores, processes, or transmits credit card data. This includes retailers, e-commerce sites, payment processors, and their service providers.

PCI-DSS Levels (by Transaction Volume)

LevelTransactions/YearValidation
Level 16M+ transactionsOn-site audit by QSA, quarterly scans
Level 21M-6M transactionsAnnual SAQ, quarterly scans
Level 320K-1M transactionsAnnual SAQ, quarterly scans
Level 4<20K transactionsAnnual SAQ, quarterly scans recommended

The 12 PCI-DSS Requirements

Build & Maintain Secure Network

  1. 1. Install and maintain firewall configuration
  2. 2. Do not use vendor-supplied default passwords

Protect Cardholder Data

  1. 3. Protect stored cardholder data
  2. 4. Encrypt transmission of cardholder data

Vulnerability Management

  1. 5. Protect against malware, update anti-virus
  2. 6. Develop and maintain secure systems

Access Control Measures

  1. 7. Restrict access to cardholder data by business need
  2. 8. Identify and authenticate access to systems
  3. 9. Restrict physical access to cardholder data

Monitor & Test Networks

  1. 10. Track and monitor all access to network resources
  2. 11. Regularly test security systems and processes

Security Policy

  1. 12. Maintain information security policy

Reduce Your PCI Scope

The best way to simplify PCI compliance is to reduce your scope - minimize what systems touch cardholder data.

  • - P2PE (Point-to-Point Encryption): Encrypts card data from terminal to processor
  • - Tokenization: Replace card numbers with tokens that have no value if stolen
  • - Hosted payment pages: Card data never touches your servers
  • - Network segmentation: Isolate payment systems from rest of network

SOC 2 (Service Organizations)

SaaSCloud ServicesData Centers

SOC 2 (Service Organization Control 2) is an auditing framework for service providers that store customer data. Unlike HIPAA or PCI-DSS, SOC 2 is not legally required - but it is increasingly demanded by enterprise customers before they will do business with you.

The Five Trust Service Criteria

Security (Required)

Protection against unauthorized access. Includes firewalls, access controls, encryption.

Availability (Optional)

System uptime and accessibility. Includes disaster recovery, redundancy, monitoring.

Processing Integrity (Optional)

Data processing is complete, accurate, and authorized.

Confidentiality (Optional)

Information designated as confidential is protected appropriately.

Privacy (Optional)

Personal information is collected, used, retained, and disclosed properly.

SOC 2 Type I vs Type II

Type I

  • - Point-in-time assessment
  • - Controls are designed properly
  • - Faster to achieve (2-3 months)
  • - Good starting point

Type II

  • - Assessment over 3-12 month period
  • - Controls operate effectively over time
  • - More comprehensive and trusted
  • - What enterprise customers want

Common SOC 2 Controls

  • Risk assessment process
  • Security policies and procedures
  • Background checks for employees
  • Security awareness training
  • Access control and authentication
  • Encryption (at rest and in transit)
  • Vulnerability management
  • Incident response procedures
  • Change management process
  • Vendor management program

GDPR & CCPA (Privacy Regulations)

PrivacyConsumer Rights

Privacy regulations give individuals control over their personal data. GDPR applies to EU residents' data (regardless of where your business is located), while CCPA applies to California residents.

GDPR (European Union)

  • - Applies if you have EU customers/users
  • - Consent required for data collection
  • - Right to access, correction, deletion
  • - Data portability rights
  • - 72-hour breach notification
  • - Fines up to 4% of global revenue

CCPA/CPRA (California)

  • - Applies to CA residents' personal info
  • - Right to know what data is collected
  • - Right to delete personal information
  • - Right to opt-out of sale of data
  • - No discrimination for exercising rights
  • - $2,500-$7,500 per violation

Key Privacy Requirements

  • -Privacy Policy: Clear disclosure of what data you collect and how you use it
  • -Consent Management: Mechanisms to obtain and record user consent
  • -Data Subject Rights: Processes to handle access, deletion, and correction requests
  • -Data Inventory: Know what personal data you have and where it lives
  • -Vendor Contracts: Data Processing Agreements with service providers

CMMC (Government Contractors)

DefenseGovernment

The Cybersecurity Maturity Model Certification (CMMC) is required for Department of Defense (DoD) contractors. It replaces self-attestation with third-party certification for handling Controlled Unclassified Information (CUI).

CMMC 2.0 Levels

Level 1: Foundational (17 practices)

Basic cyber hygiene. Annual self-assessment. For Federal Contract Information (FCI) only.

Level 2: Advanced (110 practices)

NIST SP 800-171 alignment. Third-party assessment required for most. For CUI.

Level 3: Expert (130+ practices)

Government-led assessment. For highest-priority CUI programs.

Timeline Warning

CMMC requirements are being phased into DoD contracts. If you do business with the DoD or are in the defense supply chain, you need to start preparing now. Achieving Level 2 compliance typically takes 12-18 months and requires significant investment. Organizations without certification will be ineligible for new contracts requiring CMMC.

CMMC Preparation Steps

  1. 1.Identify if you handle CUI or FCI
  2. 2.Determine your required CMMC level
  3. 3.Conduct gap assessment against NIST 800-171
  4. 4.Create System Security Plan (SSP) and POA&M
  5. 5.Implement required controls
  6. 6.Engage C3PAO for assessment (Level 2)

Choosing the Right Framework

Most organizations need to comply with multiple frameworks. The good news is that there is significant overlap - implementing controls for one framework often satisfies requirements for others.

If You...You Likely Need
Handle patient health informationHIPAA
Accept credit card paymentsPCI-DSS
Provide SaaS to enterprise customersSOC 2
Have EU customers/usersGDPR
Have California customersCCPA
Contract with DoD/governmentCMMC/FedRAMP
Work with financial institutionsSOC 2, SOX, GLBA

Control Mapping Strategy

Many controls satisfy multiple frameworks simultaneously. For example, implementing MFA, encryption, and access logging can help satisfy requirements in HIPAA, PCI-DSS, SOC 2, and CMMC. A good compliance strategy identifies these overlaps to reduce duplicate effort and cost.

Compliance Roadmap

Achieving compliance is a journey, not a destination. Here is a practical roadmap:

1

Scope and Assess

  • - Identify which regulations apply to your business
  • - Document what data you handle and where it lives
  • - Conduct gap assessment against requirements
  • - Prioritize gaps by risk and effort
2

Policy and Documentation

  • - Develop required policies and procedures
  • - Create system security plan/documentation
  • - Document your control environment
  • - Establish governance structure
3

Implement Controls

  • - Deploy technical controls (encryption, access control, monitoring)
  • - Implement administrative controls (training, procedures)
  • - Establish physical controls as needed
  • - Configure systems to meet requirements
4

Test and Validate

  • - Conduct internal audits
  • - Perform vulnerability scans and penetration testing
  • - Test incident response procedures
  • - Validate backup and recovery processes
5

Certify/Attest

  • - Complete self-assessments (SAQ, risk analysis)
  • - Engage external auditors if required
  • - Address any findings
  • - Obtain certification/attestation
6

Maintain and Monitor

  • - Continuous monitoring of controls
  • - Regular training and awareness
  • - Periodic reassessment
  • - Update for regulatory changes

Common Mistakes to Avoid

Treating compliance as a one-time project

Compliance is ongoing. You need continuous monitoring, regular training, and periodic reassessment. A "check the box" mentality leads to gaps that auditors and attackers will find.

Ignoring vendor/third-party compliance

Your compliance extends to your vendors. If they handle regulated data for you, you need BAAs (HIPAA), DPAs (GDPR), or SOC 2 reports. A vendor breach is your breach.

Paper-only compliance

Having policies that nobody follows is worse than having no policies - it creates legal liability. If your policy says you do something, you need to actually do it and have evidence.

Underestimating scope and timeline

First-time compliance efforts take longer than expected. SOC 2 Type II needs a 3-12 month observation period. CMMC Level 2 can take 12-18 months. Start early.

Not involving IT from the start

Compliance is not just a legal/business problem. Technical controls require IT involvement. IT needs to be at the table from day one, not brought in at the end to implement.

Over-scoping

More is not always better. If you can legitimately reduce your compliance scope (e.g., through network segmentation for PCI-DSS), do it. Less scope = less cost and complexity.

The Cost of Compliance

Compliance requires investment in people, processes, and technology. Understanding the costs helps with budgeting and building the business case.

Typical Cost Categories

One-Time Costs

  • - Gap assessment and remediation
  • - Policy and procedure development
  • - Technical control implementation
  • - Employee training development
  • - Initial audit/assessment fees

Ongoing Costs

  • - Annual audit/assessment fees
  • - Security tool subscriptions
  • - Continuous monitoring
  • - Regular training
  • - Staff time for compliance activities

Rough Cost Estimates (Small to Mid-Size Business)

FrameworkInitial InvestmentAnnual Maintenance
HIPAA$15,000-$50,000$5,000-$20,000
PCI-DSS (SAQ)$5,000-$25,000$3,000-$15,000
SOC 2 Type II$50,000-$150,000$25,000-$75,000
CMMC Level 2$75,000-$250,000$30,000-$100,000

*Costs vary widely based on current security posture, company size, and complexity. These are rough estimates.

Reducing Compliance Costs

  • - Build security in from the start: Retrofitting is always more expensive
  • - Leverage cloud provider controls: AWS, Azure, GCP have many built-in compliant controls
  • - Use compliance automation tools: Vanta, Drata, Secureframe can reduce manual effort
  • - Control mapping: Implement once, satisfy multiple frameworks
  • - Right-size scope: Do not over-engineer or over-scope

When to Get Professional Help

Compliance is complex and the stakes are high. Consider engaging professionals when:

  • -You are unsure which regulations apply to your business
  • -You need certification for customer or contract requirements
  • -You lack in-house compliance or security expertise
  • -You are preparing for an audit
  • -You have had a security incident or breach
  • -Your organization is growing and compliance requirements are changing

Free Compliance Assessment

Get guidance from a certified Cybersecurity Engineer/Architect with 32 years of hands-on experience helping organizations across healthcare, finance, retail, and government achieve and maintain compliance. We help you understand your obligations, identify gaps, and implement controls without enterprise budgets. Our expertise comes at no additional cost - we work with 200+ vendors to find the right solutions at wholesale pricing.

Schedule Free Assessment