Chapter
Licensed
Unlicensed
Requires Authentication
29 Security of processing (Article 32)
You are currently not able to access this content.
You are currently not able to access this content.
Chapters in this book
- Frontmatter I
- Preface V
- Contents VII
-
Part I HIPAA, HITECH, and HITRUST
- 1 HIPAA foundations: What it is and what it isn’t 3
- 2 The HIPAA security rule: Safeguards and framework mapping 18
- 3 The HITECH act: Enforcement, breach response, and access rights 26
- 4 Breach notification and incident response 36
- 5 Administrative and physical safeguards 47
- 6 HITRUST – From compliance to assurance at scale 62
- 7 Bringing it all together: Operationalizing HIPAA compliance 76
-
Part II NIST cybersecurity and privacy
- 8 The NIST landscape: Foundations of cybersecurity and privacy 85
- 9 The NIST cybersecurity framework: From strategy to practice 92
- 10 NIST SP 800-53: Control families in focus 101
- 11 NIST SP 800-171: Protecting CUI in non-federal systems 109
- 12 Implementing NIST in practice: Use cases across sectors 119
- 13 NIST maturity models and self-assessments 124
-
Part III ISO/IEC 27001
- 14 ISO/IEC 27001: Layered security architecture and control mapping 133
- 15 Designing secure architecture with compliance in mind 147
- 16 Identity, access, and authentication models 171
- 17 Logging, monitoring, and system integrity 184
- 18 Compliance-ready incident response 196
- 19 System hardening and secure configuration management 206
- 20 Putting it all together: ISO/IEC 27001 in action 215
-
Part IV PCI DSS and payment security
- 21 PCI DSS 4.0: Foundations of payment security 229
- 22 Deep dive: PCI requirements 1–6 236
- 23 Deep dive: PCI requirements 7–12 249
- 24 PCI reporting, SAQs, and certification pathways 262
- 25 Part IV recap: PCI DSS in practice 272
-
Part V GDPR and global privacy laws
- 26 GDPR foundations: Scope, principles, and applicability 277
- 27 Lawful basis and consent management 292
- 28 Rights of the data subject 306
- 29 Security of processing (Article 32) 314
- 30 Breach notification under GDPR (Articles 33–34) 320
- 31 International data transfers and schrems II 330
- 32 Operationalizing GDPR: DPIAs, DPOs, and records of processing 338
- 33 GDPR enforcement and risk-based accountability 346
-
Part VI Global privacy atlas
- 34 California CPRA: US state-level privacy done big 357
- 35 Brazil LGPD: Latin America’s GDPR-inspired framework 366
- 36 India’s DPDP act: Data empowerment in the world’s largest democracy 378
- 37 China’s PIPL: Privacy with Chinese characteristics 392
- 38 Quebec Law 25: Canada’s sharpest privacy reform yet 410
- 39 UK GDPR: Post-Brexit privacy and the “British way” 426
- 40 HIPAA and the new security rule 440
-
Part VII Mapping and crosswalks
- 41 Unified compliance architecture: A cross-framework blueprint 465
- 42 Unified incident response and breach handling 474
- 43 The unified risk register: A strategic approach to multi-framework compliance 483
- 44 Harmonized policy sets and centralized documentation 490
- 45 Compliance evidence strategy and control libraries 497
- 46 Cross-framework audit prep and storytelling 506
- 47 Harmonized training, awareness, and culture 512
- 48 Multi-framework tabletop exercises and red team simulations 520
- 49 The future of compliance 527
-
Part VIII Privacy engineering and control automation
- 50 Architecting for compliance: Embedding privacy in systems design 533
- 51 Policy-as-code and compliance automation pipelines 543
- 52 GRC-as-code, operationalizing compliance in real time 554
- 53 Control libraries, compliance SDKs, and reusable governance patterns 573
- 54 Simulation playbooks: Stress-testing your compliance in the real world 588
- 55 Global data protection frameworks: GDPR, ISO 27001, and beyond 599
- 56 Operationalizing NIST – Controls, profiles, and use cases 616
-
Part IX AI and global compliance
- 57 Privacy blueprints for AI and machine learning systems 637
- 58 AI governance, privacy, and risk – Frameworks for responsible deployment 663
- 59 The compliance singularity, AI, trust, and the end of policies 683
- 60 Global AI governance models 691
-
Part X Templates, labs, and appendices
- A Templates and forms: Compliance in action 701
- B Multi-framework audit checklists 705
- C Simulation playbooks and tabletop exercises 707
- D Compliance evidence index 711
- E Glossary of terms and acronyms 713
- F Control crosswalk appendix 718
- G Resources and further reading 719
- Index 721
Chapters in this book
- Frontmatter I
- Preface V
- Contents VII
-
Part I HIPAA, HITECH, and HITRUST
- 1 HIPAA foundations: What it is and what it isn’t 3
- 2 The HIPAA security rule: Safeguards and framework mapping 18
- 3 The HITECH act: Enforcement, breach response, and access rights 26
- 4 Breach notification and incident response 36
- 5 Administrative and physical safeguards 47
- 6 HITRUST – From compliance to assurance at scale 62
- 7 Bringing it all together: Operationalizing HIPAA compliance 76
-
Part II NIST cybersecurity and privacy
- 8 The NIST landscape: Foundations of cybersecurity and privacy 85
- 9 The NIST cybersecurity framework: From strategy to practice 92
- 10 NIST SP 800-53: Control families in focus 101
- 11 NIST SP 800-171: Protecting CUI in non-federal systems 109
- 12 Implementing NIST in practice: Use cases across sectors 119
- 13 NIST maturity models and self-assessments 124
-
Part III ISO/IEC 27001
- 14 ISO/IEC 27001: Layered security architecture and control mapping 133
- 15 Designing secure architecture with compliance in mind 147
- 16 Identity, access, and authentication models 171
- 17 Logging, monitoring, and system integrity 184
- 18 Compliance-ready incident response 196
- 19 System hardening and secure configuration management 206
- 20 Putting it all together: ISO/IEC 27001 in action 215
-
Part IV PCI DSS and payment security
- 21 PCI DSS 4.0: Foundations of payment security 229
- 22 Deep dive: PCI requirements 1–6 236
- 23 Deep dive: PCI requirements 7–12 249
- 24 PCI reporting, SAQs, and certification pathways 262
- 25 Part IV recap: PCI DSS in practice 272
-
Part V GDPR and global privacy laws
- 26 GDPR foundations: Scope, principles, and applicability 277
- 27 Lawful basis and consent management 292
- 28 Rights of the data subject 306
- 29 Security of processing (Article 32) 314
- 30 Breach notification under GDPR (Articles 33–34) 320
- 31 International data transfers and schrems II 330
- 32 Operationalizing GDPR: DPIAs, DPOs, and records of processing 338
- 33 GDPR enforcement and risk-based accountability 346
-
Part VI Global privacy atlas
- 34 California CPRA: US state-level privacy done big 357
- 35 Brazil LGPD: Latin America’s GDPR-inspired framework 366
- 36 India’s DPDP act: Data empowerment in the world’s largest democracy 378
- 37 China’s PIPL: Privacy with Chinese characteristics 392
- 38 Quebec Law 25: Canada’s sharpest privacy reform yet 410
- 39 UK GDPR: Post-Brexit privacy and the “British way” 426
- 40 HIPAA and the new security rule 440
-
Part VII Mapping and crosswalks
- 41 Unified compliance architecture: A cross-framework blueprint 465
- 42 Unified incident response and breach handling 474
- 43 The unified risk register: A strategic approach to multi-framework compliance 483
- 44 Harmonized policy sets and centralized documentation 490
- 45 Compliance evidence strategy and control libraries 497
- 46 Cross-framework audit prep and storytelling 506
- 47 Harmonized training, awareness, and culture 512
- 48 Multi-framework tabletop exercises and red team simulations 520
- 49 The future of compliance 527
-
Part VIII Privacy engineering and control automation
- 50 Architecting for compliance: Embedding privacy in systems design 533
- 51 Policy-as-code and compliance automation pipelines 543
- 52 GRC-as-code, operationalizing compliance in real time 554
- 53 Control libraries, compliance SDKs, and reusable governance patterns 573
- 54 Simulation playbooks: Stress-testing your compliance in the real world 588
- 55 Global data protection frameworks: GDPR, ISO 27001, and beyond 599
- 56 Operationalizing NIST – Controls, profiles, and use cases 616
-
Part IX AI and global compliance
- 57 Privacy blueprints for AI and machine learning systems 637
- 58 AI governance, privacy, and risk – Frameworks for responsible deployment 663
- 59 The compliance singularity, AI, trust, and the end of policies 683
- 60 Global AI governance models 691
-
Part X Templates, labs, and appendices
- A Templates and forms: Compliance in action 701
- B Multi-framework audit checklists 705
- C Simulation playbooks and tabletop exercises 707
- D Compliance evidence index 711
- E Glossary of terms and acronyms 713
- F Control crosswalk appendix 718
- G Resources and further reading 719
- Index 721