Implementing a compliance program

Incident reporting and investigations are critical components of a robust compliance program. Without the right resources to identify and respond to incidents, and investigate allegations of wrongdoing, an organization can suffer serious financial damages — and its credibility with regulators can also be called into question. In this article, we discuss how to implement and automate a compliance program using the Results and Storyboards apps.

This article builds on the examples illustrated in Demonstrating compliance, and provides an approach that would enable an organization to comply with the COBIT® 5 Framework. However, the same workflow can also be applied to implement and automate compliance programs involving:

  • regulations applying to financial institutions, such as Truth-in Lending, Anti-Money Laundering, or Depository Insurance
  • other IT security frameworks, such as ISO or NIST
  • Data Privacy regulations, such as the EU GDPR, GLBA, HIPAA, and FERPA
  • regulations applying to government or higher-education, such as Uniform Grant Guidance, Single Audit, or Title IV

What's involved?

Implementing and automating a compliance program involves two key processes:

  • developing programs to identify and respond to incidents, typically using tiered or escalated response systems
  • conducting investigations to monitor and manage the details of one or more incidents

Incident reporting and investigations can be carried out throughout the compliance management process, allowing evaluators to:

  • capture incidents via data analytics
  • define triggered workflows for managing incidents
  • perform root cause analysis and remediation activities
  • close cases once they are ready for reporting

Where do I implement and automate a compliance program?

At Diligent, we use the Results and Storyboards apps to implement and automate our compliance program. We have implemented a security policy framework based on ISO 27001/2 to define minimum security requirements and expectations for security across the organization.

Our incident response program, which supports our overall compliance program, involves monitoring and investigating all events and reports of suspicious or unexpected activity. If an incident is confirmed, analysis begins, a severity is assigned and the record is escalated accordingly. Depending on the severity and incident type, our team gathers and analyzes information, involving forensic specialists as required, to determine the causes, impact, type and any other relevant information regarding the incident.

The big picture

  • Questionnaires are used to contextualize data and responses are stored in Tables.
  • Triggers automate your organization's remediation processes by executing a set of actions based on record data in a Table.
  • Storyboards present data results using multiple visualizations, which is based on record data in Tables.

Once you've conducted the required investigations, you can link Results data to your assessments in the Projects app to consolidate information and easily sign-off when remediation is complete.

Steps

Ready for a tour?

Let's take a closer look at these features in context.

1. Set up your data

The first step is to set up and organize your data in Results. There are three levels of organization for data: Collections, Analyses, and Tables. Data is stored in tables called Data Analytics. Each table is contained within an Analysis and a Collection.

2. Develop an incident response workflow

After you have set up your data containers in Results, you can develop an incident response workflow to route incidents for investigation and corrective action. Root cause analysis can be automated by triggering an alert (in the form of email notifications) to key personnel who can drill down to individual incident details to determine the circumstances behind the incident.

Tip

Incident data capture can also be automated using event reports. Organizations can efficiently collect whistleblower data to identify unethical behavior, take corrective action, and forecast future risk mitigation efforts.

Create questionnaires

Questionnaires are used to gather information from respondents and contextualize data. Each collection can have one or more questionnaires that you deploy as follow-up mechanisms when remediating records. Responses are captured in the specified table with each question defined as a distinct column.

Tip

The Template Questionnaires Collection contains a variety of pre-built questionnaires that you copy and use as a starting point. Each template questionnaire relates to different industry segments and is pre-populated with a series of questions.

Define a triggered workflow for managing incidents

Depending on the severity of the incident captured, triggers can be set up to send out emergency mass notifications to larger teams in a crisis management situation. For isolated incidents, root cause analysis can be performed by using individual workflows coupled with questionnaires to solicit feedback from process owners to determine the root cause of an incident captured.

Tip

Because incident management may involve different departments or teams that take part in investigating exceptions, workflow groups can also be used to build an incident management workflow based on each department's unique policies and procedures. For example, a Finance team may need to assign a transaction representing an expense policy violation to be reviewed by the manager of the affected department, whereby only a Finance team member will be able to "close” the issue once resolved.

3. Investigate and remediate records

From Results, you can manage the entire remediation process, which includes collecting evidence or input to close out your flagged record and resolve cases. All actions are recorded as a defensible evidence trail to support your investigations.

4. Report on data

Using the results of attestation projects and incident management root cause analyses, organizations can identify gaps or weaknesses in existing policies and provide feedback to policy writers to develop new policies or strengthen existing ones.

Tip

Policy changes can be populated back into Compliance Maps to begin the new cycle of mapping to regulations. This allows teams to ensure adherence to policy requirements by updating control frameworks, evaluate policy effectiveness through control attestation projects, and manage incidents as they arise.

Visualize data

You can visualize results to gain a deeper understanding of the facts and insights hidden in the data. Storyboards provide a macro view over a larger collection of similar incidents in order to determine trends and analyze the root cause of systemic issues. For frequently recurring incidents, storyboards can be used to report on the incidents portfolio as a whole.

Link Results data to your assessments in Projects

During any assessment phase, you can link Results data to support your documentation in Projects. By linking Results data, you can highlight exceptions or important information that pertains to a control failure, and eliminate subjectivity in risk assessments.

What's next? 

Learn how to demonstrate assurance over a compliance program

The Projects, Frameworks, and Compliance Maps apps can be used to build out attestation projects, capture and assign issues for remediation throughout the compliance review process, report on the effectiveness of controls, and validate and document compliance.

To find out more, see Demonstrating compliance.