Sarika Bhatta
May 8, 2025|5 min read

Everything You Need to Know About Security, Compliance & Governance

A clear breakdown of the terms you'll encounter in information security — policies, standards, frameworks, regulations, and how compliance actually works.

cybersecuritycompliancegovernance

Welcome! If you're new to information security, things might feel overwhelming at first. There's a sea of acronyms, laws, frameworks, and standards — but don't worry. Let's break it down.

Why Does Security Matter?#

Everything starts with information security. In today's digital world, information is one of the most valuable assets — and also one of the most vulnerable.

So, what is Information Security?#

Information Security means protecting data from:

  • Unauthorized access (someone reads it who shouldn't)
  • Alteration (data gets changed maliciously or accidentally)
  • Destruction or loss (data gets deleted or lost)

We use the CIA Triad to remember its 3 main goals:

  • Confidentiality: Keeping data secret.
  • Integrity: Ensuring data is accurate and unaltered.
  • Availability: Making sure systems and data are accessible when needed.

Example: If your company handles payment information and it gets leaked or tampered with — you've failed one or more parts of the CIA triad.

Wait… What's With All the Terms?#

When you start working in this space, you'll hear words like "framework," "standard," "policy," "controls," and "guidelines" all the time.

They sound similar but serve different purposes:

Policy

A policy is a high-level rule or statement of intent that defines what an organization must do to protect information and operate responsibly.

Purpose: To set the direction and expectations. It doesn't get into the how — just the what and why.

Example:

"All employees must use multi-factor authentication to access corporate systems."

Think of it as: The organization's internal law — set by leadership.

Standard

A standard is a mandatory specification that supports a policy. It provides the specific requirements (often technical or operational) that must be followed.

Purpose: To ensure consistency and uniformity in implementation across the organization.

Example:

"Passwords must be at least 12 characters and include a mix of upper/lowercase, numbers, and symbols."

Think of it as: The "rulebook" that tells you how to follow the policy.

Guideline

A guideline is a recommended (not required) practice. It offers helpful advice or suggestions to improve security or compliance.

Purpose: To provide flexibility. It's ideal for situations where you need professional judgment or when strict rules might not apply.

Example:

"It's recommended to lock your workstation when stepping away, even if it's for a short break."

Procedure

A procedure is a step-by-step instruction that tells you exactly how to carry out a task or process in alignment with a policy or standard.

Purpose: To provide detailed instructions to execute tasks safely and consistently.

Example:

"To reset your password, go to the intranet portal → Click on 'Account Settings' → Select 'Change Password' → Enter old and new password → Click Submit."

Framework

A framework is a structured set of rules, best practices, controls, and guidance that helps organizations manage security, risk, or compliance. It may include policies, standards, controls, and more.

Purpose: To provide a comprehensive blueprint for managing information security or compliance programs.

Example Frameworks:

  • ISO 27001 — Information Security Management
  • NIST 800–53 — Technical controls for federal systems
  • SOC 2 — Trust principles for service organizations

A blueprint or architecture for building your entire security program.

Regulation

A regulation is a legal requirement issued by a government or authority that organizations must comply with. Non-compliance can lead to legal penalties, fines, or bans.

Purpose: To protect individuals' rights, especially around privacy, financial data, or healthcare.

Examples of Regulations:

  • GDPR (EU data protection)
  • HIPAA (US health data privacy)
  • CCPA (California Consumer Privacy Act)
  • FISMA (US federal systems)

Can a company be "compliant" or "non-compliant" just by following regulations — or does this also apply to frameworks, policies, etc.?

Yes, a company can be compliant or non-compliant with:

  • Regulations (e.g., GDPR, HIPAA)
  • Standards (e.g., ISO 27001, PCI DSS)
  • Frameworks (e.g., NIST 800–53, SOC 2)
  • Its own internal policies or procedures

But the meaning and consequences of non-compliance depend on what you're failing to follow:

TypeCompliance With It Means…
RegulationYou are following the law.
FrameworkYou are following an industry-recognized structure.
StandardYou are meeting defined technical or procedural requirements.
PolicyYou are following your own organization's internal rules.

Does non-compliance always lead to legal penalties or fines?

Only regulations can lead to legal penalties (e.g., fines, bans). For everything else — the consequence is business or internal impact, not legal punishment.

Compliance non-compliance overview
Compliance non-compliance overview
  • Non-compliance with GDPR → You might be fined €20 million or 4% of annual revenue.
  • Non-compliance with ISO 27001 → You may lose your ISO certification and fail a client audit.
  • Non-compliance with internal policy → Your CISO might escalate the issue; you might face internal consequences.
  • Non-compliance with PCI DSS (for credit card data) → You might lose the ability to process cards or face fines from card networks.
  • HiTrust CSF — A unified framework mapping multiple standards (HIPAA, ISO, NIST)
Compliance governance overview
Compliance governance overview