<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:atom="http://www.w3.org/2005/Atom"
xmlns:sy="http://purl.org/rss/1.0/modules/syndication/">
	<channel>
		<title>Author at Infinum</title>
		<atom:link href="https://infinum.com/blog/author/tom-miller/feed/" rel="self" type="application/rss+xml" />
		<link></link>
		<description>Building digital products</description>
		<lastBuildDate>Fri, 17 Apr 2026 13:59:15 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>

					<item>
				<image>
					<url>19278542https://infinum.com/uploads/2026/04/img-GRC-article2.webp</url>
				</image>
				<title>Why GRC Fails – and What a Framework That Actually Works Looks Like</title>
				<link>https://infinum.com/blog/grc-framework/</link>
				<pubDate>Fri, 17 Apr 2026 11:46:06 +0000</pubDate>
				<dc:creator>Tom Miller</dc:creator>
				<guid isPermaLink="false">https://infinum.com/?p=19278542</guid>
				<description>
					<![CDATA[<p>Most GRC programs fail not because the framework is wrong, but because it's built to satisfy auditors, not protect businesses. Here's what that costs you – and how to do it differently.</p>
<p>The post <a href="https://infinum.com/blog/grc-framework/">Why GRC Fails – and What a Framework That Actually Works Looks Like</a> appeared first on <a href="https://infinum.com">Infinum</a>.</p>
]]>
				</description>
				<content:encoded>
					<![CDATA[<div
	class="wrapper"
	data-id="es-115"
	 data-animation-target='inner-items'>
		
			<div class="wrapper__inner">
			<div class="block-blog-content js-block-blog-content">
	
<div class="block-blog-content-sidebar" data-id="es-92">
	</div>

<div class="block-blog-content-main">
	
<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-95"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-93">
	<p	class='typography typography--size-36-text js-typography block-typography__typography'
	data-id='es-94'
	>
	<strong>Most GRC programs fail not because the framework is wrong, but because it&#8217;s built to satisfy auditors, not protect businesses. Here&#8217;s what that costs you – and how to do it differently.</strong></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-98"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-96">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-97'
	>
	Most organisations have some version of GRC in place. Policies exist. Compliance boxes get ticked. A risk register lives somewhere in a shared drive, last updated before anyone currently on the team joined. And then a breach happens, or an audit goes badly, and everyone is surprised.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-101"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-99">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-100'
	>
	They shouldn&#8217;t be. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-104"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-102">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-103'
	>
	The most common GRC failure isn&#8217;t ignorance of the framework – it&#8217;s treating it as an administrative exercise rather than a decision-making system. You end up with documentation that describes security rather than delivers it.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-107"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-105">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-106'
	>
	That distinction matters more than most security conversations acknowledge.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-110"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-108">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-109'
	>
	<strong>Why GRC exists – and why it usually gets implemented wrong</strong></h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-113"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-111">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-112'
	>
	GRC – governance, risk, and compliance – is a system for making security decisions that support a business rather than obstruct it. Not rules imposed from above, but a framework built around what the organisation is actually trying to achieve.</p></div>	</div>
</div>
</div>		</div>
	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-126"
	 data-animation-target='inner-items'>
		
			<div class="block-columns" data-id="es-125">
	
<div class="block-column" data-id="es-124">
	
<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-123"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="grid block-grid__grid" data-id="es-122">
	
<div class="block-grid-item" data-id="es-121">
	
<a	class="card-simple js-card-simple block-card__card-simple card-simple--has-link js-card-simple-link card-simple__content-align--left"
	data-id="es-116"
	 href='https://infinum.com/blog/what-is-grc/'>

	
	
	<div class="card-simple__content">
		<div class="card-simple__heading-wrap">
			<div	class='typography typography--size-24-text js-typography card-simple__heading'
	data-id='es-117'
	>
	<strong>If you want a deeper grounding in GRC fundamentals before going further, start with our GRC explainer – it covers the full framework from first principles.</strong></div>		</div>

		<button	class="btn btn--color-infinum btn--size-medium btn--width-default btn__icon-position--right card-simple__btn js-block-card-btn js-card-simple-link"
	data-id="es-118"
	 tabindex='-1'>
		<div class="btn__inner">
					<div	class='typography typography--size-none js-typography btn__label'
	data-id='es-119'
	>
	Start here</div>		
		<i
	class="icon btn__icon icon--size-16 icon--scale-100"
	 aria-hidden='true' data-name='arrow-right-16' data-id='es-120'>
	<svg fill='none' height='16' viewBox='0 0 17 16' width='17' xmlns='http://www.w3.org/2000/svg' xmlns:xlink='http://www.w3.org/1999/xlink'><g stroke='currentColor' stroke-width='2'><path d='m.5 7.99999 14 .00001'/><path d='m9.23352 2.7251 5.97848 5.97852'/><path d='m9.23352 13.2744 5.97848-5.9785'/></g></svg></i>	</div>
	</button>	</div>
</a>
</div>
</div>	</div>
</div>
</div>	</div>

<div
	class="wrapper"
	data-id="es-292"
	 data-animation-target='inner-items'>
		
			<div class="wrapper__inner">
			<div class="block-blog-content js-block-blog-content">
	
<div class="block-blog-content-sidebar" data-id="es-127">
	</div>

<div class="block-blog-content-main">
	
<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-130"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-128">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-129'
	>
	The problem is that most implementations start from the wrong end. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-133"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-131">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-132'
	>
	They start with a compliance requirement, <strong>reverse-engineer the policies needed to satisfy it</strong>, and call that a GRC program. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-136"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-134">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-135'
	>
	The risk register gets populated because ISO 27001 requires one, not because anyone is actively using it. Policies get written because auditors want to see them, not because they reflect how the business actually operates.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-138"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-highlighted-text">
	<p	class='typography typography--size-36-text js-typography block-highlighted-text__typography'
	data-id='es-137'
	>
	This is checkbox compliance. And it&#8217;s not just ineffective – it&#8217;s actively dangerous. It creates the appearance of security maturity without the substance. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-141"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-139">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-140'
	>
	When something goes wrong, the documentation says the right things. The reality doesn&#8217;t match.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-144"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-142">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-143'
	>
	A GRC framework that works starts with a different question: what is this business trying to achieve, and what could prevent it? <strong>Risk is the answer. </strong>Governance and compliance are how you respond to it.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-147"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-145">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-146'
	>
	<strong>Start with risk – and be honest about it</strong></h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-150"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-148">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-149'
	>
	Risk sits at the centre of GRC. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-155"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="blockquote block-blockquote__blockquote" data-id="es-151">
	
	<div class="blockquote__content">
		<i
	class="icon blockquote__icon icon--size-16 icon--scale-100"
	 aria-hidden='true' data-name='blockquote-24' data-id='es-152'>
	<svg fill='none' height='24' viewBox='0 0 24 24' width='24' xmlns='http://www.w3.org/2000/svg'><path clip-rule='evenodd' d='m12 24c6.6274 0 12-5.3726 12-12 0-2.79685-.9568-5.37021-2.561-7.41062-.581.22951-1.0832.60583-1.5069 1.12898-.5132.60844-.7698 1.41969-.7698 2.43375v.07605h2.5789v5.59004h-5.6197v-5.01962c0-1.11547.154-2.06616.4619-2.85205.3336-.81125.757-1.48307 1.2702-2.01545.528-.52161 1.1175-.92155 1.7687-1.1998-2.0728-1.70651-4.7279-2.73128-7.6223-2.73128-6.62742 0-12 5.37258-12 12 0 6.6274 5.37258 12 12 12zm-3.53811-18.05347c-.30793.78589-.46189 1.73658-.46189 2.85205v5.01962h5.6197v-5.59004h-2.5789v-.07605c0-1.01406.2566-1.82531.7698-2.43375.5389-.63379 1.1804-1.05209 1.9245-1.2549v-2.28164c-.7441.07605-1.4626.25351-2.1555.53238-.6928.27887-1.3086.68449-1.84752 1.21688-.51321.53238-.9366 1.2042-1.27019 2.01545z' fill='currentColor' fill-rule='evenodd'/></svg></i><p	class='typography typography--size-36-text js-typography blockquote__quote'
	data-id='es-153'
	>
	<strong>Most organisations are far better at documenting risk than they are at being honest about it.</strong></p>
		<div class="blockquote__caption-wrap">
			<div	class='typography typography--size-12-text-roman js-typography blockquote__caption'
	data-id='es-154'
	>
	TOM MILLER, HEAD OF ASSURANCE, AMR CYBERSECURITY – PART OF INFINUM</div>		</div>
	</div>
</div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-158"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-156">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-157'
	>
	The starting point is asset classification – understanding what you&#8217;re actually trying to protect. Critical data, intellectual property, operational systems, customer-facing services. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-161"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-159">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-160'
	>
	Not everything is equal, and treating it as if it is means you&#8217;ll over-invest in protecting things that don&#8217;t matter and under-invest in protecting things that do.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-164"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-162">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-163'
	>
	Once assets are mapped, the threat picture becomes clearer. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-167"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="lists" data-id="es-165">
	<ul	class='typography typography--size-16-text-roman js-typography lists__typography'
	data-id='es-166'
	>
	<li><strong>Sensitive customer data attracts financially motivated attackers.</strong></li><li><strong>Source code repositories attract competitors and state actors. </strong></li><li><strong>Physical sites face different exposure entirely.</strong></li></ul></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-170"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-168">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-169'
	>
	The threats facing each asset differ in nature, method, and likely impact – and that shapes how risk should be assessed.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-173"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-171">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-172'
	>
	<span class='screen-reader-text'>Risk assessment comes down to two dimensions: impact and likelihood. </span><span aria-hidden='true'>Risk assessment comes down to two dimensions: <strong>impact and likelihood. </strong></span></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-176"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-174">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-175'
	>
	<span class='screen-reader-text'>How damaging would this event be – financially, operationally, reputationally? And how likely is it to occur given your current controls and environment? </span><span aria-hidden='true'><em>How damaging would this event be – financially, operationally, reputationally? And how likely is it to occur given your current controls and environment? </em></span></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-179"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-177">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-178'
	>
	Plot those two on a matrix, score them consistently, and you get a risk level you can act on.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-182"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-180">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-181'
	>
	The scoring methodology matters less than its consistent application. An organisation that assesses risk differently each quarter produces data that can&#8217;t be trended or compared. The value of a risk register is cumulative – it shows you how risk is changing over time, which controls are working, and where new exposure is emerging.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-184"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-highlighted-text">
	<p	class='typography typography--size-36-text js-typography block-highlighted-text__typography'
	data-id='es-183'
	>
	<strong>Risk reviews should happen at least annually for the full register, and quarterly for anything rated high.</strong> </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-187"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-185">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-186'
	>
	Each risk needs a named owner – a senior person responsible for accepting that the risk level is appropriate and for escalating it if it changes. Without ownership, risks get logged and forgotten.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-190"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-188">
	<h3	class='typography typography--size-36-text js-typography block-typography__typography'
	data-id='es-189'
	>
	<strong>What to do when a control isn&#8217;t working</strong></h3></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-193"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-191">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-192'
	>
	This is where most GRC programs go quiet. A control gets implemented, it gets checked off, and nobody asks whether it actually changed anything.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-195"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-highlighted-text">
	<p	class='typography typography--size-36-text js-typography block-highlighted-text__typography'
	data-id='es-194'
	>
	When a control isn&#8217;t working – when the risk level hasn&#8217;t moved, or when incidents keep recurring in the same area – the answer isn&#8217;t to add more controls. It&#8217;s to go back to the risk assessment and ask whether you&#8217;ve correctly understood the threat.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-198"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-196">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-197'
	>
	Often, the control addresses the symptom rather than the cause. A phishing training module doesn&#8217;t solve a culture that punishes people for reporting mistakes. A firewall rule doesn&#8217;t fix misconfigured cloud permissions.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-203"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="blockquote block-blockquote__blockquote" data-id="es-199">
	
	<div class="blockquote__content">
		<i
	class="icon blockquote__icon icon--size-16 icon--scale-100"
	 aria-hidden='true' data-name='blockquote-24' data-id='es-200'>
	<svg fill='none' height='24' viewBox='0 0 24 24' width='24' xmlns='http://www.w3.org/2000/svg'><path clip-rule='evenodd' d='m12 24c6.6274 0 12-5.3726 12-12 0-2.79685-.9568-5.37021-2.561-7.41062-.581.22951-1.0832.60583-1.5069 1.12898-.5132.60844-.7698 1.41969-.7698 2.43375v.07605h2.5789v5.59004h-5.6197v-5.01962c0-1.11547.154-2.06616.4619-2.85205.3336-.81125.757-1.48307 1.2702-2.01545.528-.52161 1.1175-.92155 1.7687-1.1998-2.0728-1.70651-4.7279-2.73128-7.6223-2.73128-6.62742 0-12 5.37258-12 12 0 6.6274 5.37258 12 12 12zm-3.53811-18.05347c-.30793.78589-.46189 1.73658-.46189 2.85205v5.01962h5.6197v-5.59004h-2.5789v-.07605c0-1.01406.2566-1.82531.7698-2.43375.5389-.63379 1.1804-1.05209 1.9245-1.2549v-2.28164c-.7441.07605-1.4626.25351-2.1555.53238-.6928.27887-1.3086.68449-1.84752 1.21688-.51321.53238-.9366 1.2042-1.27019 2.01545z' fill='currentColor' fill-rule='evenodd'/></svg></i><p	class='typography typography--size-36-text js-typography blockquote__quote'
	data-id='es-201'
	>
	Controls should reduce either the likelihood or the impact of a risk. If neither is moving, something is wrong with the control, the assessment, or both. </p>
		<div class="blockquote__caption-wrap">
			<div	class='typography typography--size-12-text-roman js-typography blockquote__caption'
	data-id='es-202'
	>
	TOM MILLER, HEAD OF ASSURANCE, AMR CYBERSECURITY – PART OF INFINUM</div>		</div>
	</div>
</div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-206"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-204">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-205'
	>
	For technical controls specifically,<a href="https://infinum.com/blog/why-penetration-testing-is-important/"> penetration testing</a> is one of the most direct ways to find out whether a control is actually doing what you think it is.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-209"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-207">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-208'
	>
	<strong>Why security policies fail – and what to do about it</strong>?</h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-212"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-210">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-211'
	>
	Governance is what makes risk management repeatable. Documented policies, defined responsibilities, clear ownership – the infrastructure that ensures security doesn&#8217;t live in one person&#8217;s head and doesn&#8217;t fall apart when someone leaves.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-215"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-213">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-214'
	>
	But governance has a failure mode that organisations consistently underestimate: policies that nobody follows.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-218"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="lists" data-id="es-216">
	<ul	class='typography typography--size-16-text-roman js-typography lists__typography'
	data-id='es-217'
	>
	<li><strong>Lock down laptops too tightly, and people find workarounds.  </strong></li><li><strong>Require complex passwords to be changed every 30 days, and they get written on sticky notes. </strong></li><li><strong>Mandate a slow, bureaucratic approval process for software tools, and teams start using personal accounts for work data.</strong></li></ul></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-221"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-219">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-220'
	>
	If staff are bypassing a control, that is not a compliance problem. It is a design problem. The control is wrong. It&#8217;s asking people to choose between doing their job and following the rules, and unsurprisingly, they choose their job.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-223"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-highlighted-text">
	<p	class='typography typography--size-36-text js-typography block-highlighted-text__typography'
	data-id='es-222'
	>
	The irony is that overly strict controls often create more risk than they prevent – because the workarounds are almost always less secure than whatever the policy was trying to enforce.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-226"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-224">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-225'
	>
	The fix isn&#8217;t stricter enforcement. It&#8217;s redesigning the control to be compatible with how work actually gets done. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-229"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-227">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-228'
	>
	<strong>Security that works with people is more effective than security that works against them, even if it looks less rigorous on paper.</strong></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-232"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-230">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-231'
	>
	Metrics are how you catch this early.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-235"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-233">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-234'
	>
	Security training completion rates, phishing simulation results, patch compliance rates, incident trends – these tell you whether the governance framework is working in practice, not just on paper. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-238"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-236">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-237'
	>
	Patterns in that data are diagnostic. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-241"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-239">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-240'
	>
	If phishing click rates stay flat after multiple training rounds, the training isn&#8217;t the solution. If patch compliance drops in one team, there&#8217;s a resourcing or tooling problem to fix, not a people problem to escalate.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-244"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-242">
	<h3	class='typography typography--size-36-text js-typography block-typography__typography'
	data-id='es-243'
	>
	Incident reporting culture sits underneath all of it </h3></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-247"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-245">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-246'
	>
	Teams that punish mistakes get underreporting. Underreporting means the same vulnerabilities recur because nobody connected the dots between incidents. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-249"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-highlighted-text">
	<p	class='typography typography--size-36-text js-typography block-highlighted-text__typography'
	data-id='es-248'
	>
	An environment where people report phishing clicks, near misses, and process failures without fear is not a soft environment – it&#8217;s one that learns faster than its attackers. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-252"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-250">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-251'
	>
	For teams building software, the same principle applies to the development process itself: embedding security from the start is cheaper and more effective than bolting it on later.<a href="https://infinum.com/blog/ssdlc-application-security/"> Here&#8217;s what that shift looks like in practice.</a></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-255"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-253">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-254'
	>
	<strong>How to decide whether to comply with a regulation</strong>?</h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-258"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-256">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-257'
	>
	Compliance is the most visible part of GRC, and the most frequently misunderstood. The default assumption is that compliance requirements are obligations to be met. Some are. Many aren&#8217;t.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-261"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-259">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-260'
	>
	There are three distinct categories worth separating:</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-264"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="lists" data-id="es-262">
	<ul	class='typography typography--size-16-text-roman js-typography lists__typography'
	data-id='es-263'
	>
	<li><strong>Mandatory compliance</strong> – legal requirements that apply to your organisation based on sector, geography, or the nature of the data you handle. GDPR for organisations processing EU personal data.<a href="https://infinum.com/blog/eu-cybersecurity-legislation-nis2-dora/"> NIS2 and DORA</a> for financial services and critical sectors across the EU. Non-compliance here isn&#8217;t a business decision – it&#8217;s a legal exposure.</li><li><strong>Commercial compliance</strong> – certifications and frameworks that aren&#8217;t legally required but open doors. ISO 27001 is the most common example: many enterprise customers and regulated-industry partners won&#8217;t sign contracts with vendors who can&#8217;t demonstrate it. The compliance decision here is a sales and market access question as much as a security one.</li><li><strong>Voluntary frameworks</strong> – standards like NIST or CIS Controls that provide useful structure without any external mandate. The value is in the methodology, not the certification.</li></ul></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-267"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-265">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-266'
	>
	Treating all three categories the same way produces bad decisions. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-270"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-268">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-269'
	>
	Spending significant resources on a voluntary framework while ignoring a mandatory obligation is a governance failure. So is pursuing an expensive certification that none of your target customers will ever ask for.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-273"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-271">
	<h3	class='typography typography--size-36-text js-typography block-typography__typography'
	data-id='es-272'
	>
	<strong>Outcome-based regulation changes the calculation</strong></h3></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-276"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-274">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-275'
	>
	Increasingly, regulators define what good looks like rather than prescribing exactly how to get there. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-279"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-277">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-278'
	>
	<a href="https://infinum.com/cybersecurity/nis2-compliance-services/" target="_blank" rel="noreferrer noopener">NIS2</a> is a clear example – it specifies required capabilities and outcomes across risk management, incident handling, and supply chain security, but leaves implementation to the organisation.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-282"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-280">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-281'
	>
	This is good policy design. It acknowledges that a one-size-fits-all technical prescription can&#8217;t account for the diversity of organisations in scope. But it <strong>shifts the burden onto organisations</strong> to genuinely interpret what compliance means for their context, rather than following a checklist.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-285"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-283">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-284'
	>
	That interpretation requires security judgment, not just legal review. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-287"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-highlighted-text">
	<p	class='typography typography--size-36-text js-typography block-highlighted-text__typography'
	data-id='es-286'
	>
	A small professional services firm and a hospital group might both fall under NIS2, but the controls that constitute appropriate risk management for each look very different. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-290"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-288">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-289'
	>
	Getting that translation right is the work – and it can&#8217;t be delegated entirely to a compliance team.</p></div>	</div>
</div>
</div>		</div>
	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-303"
	 data-animation-target='inner-items'>
		
			<div class="block-columns" data-id="es-302">
	
<div class="block-column" data-id="es-301">
	
<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-300"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="grid block-grid__grid" data-id="es-299">
	
<div class="block-grid-item" data-id="es-298">
	
<a	class="card-simple js-card-simple block-card__card-simple card-simple--has-link js-card-simple-link card-simple__content-align--left"
	data-id="es-293"
	 href='https://infinum.com/blog/cybersecurity-trends-2026/'>

	
	
	<div class="card-simple__content">
		<div class="card-simple__heading-wrap">
			<div	class='typography typography--size-24-text js-typography card-simple__heading'
	data-id='es-294'
	>
	<strong><strong><strong><strong>For a current view of which regulatory shifts are having the most practical impact on security teams right now,</strong><a href="https://infinum.com/blog/cybersecurity-trends-2026/"><strong> our 2026 cybersecurity trends piece</strong></a><strong> covers the landscape.</strong></strong></strong></strong></div>		</div>

		<button	class="btn btn--color-infinum btn--size-medium btn--width-default btn__icon-position--right card-simple__btn js-block-card-btn js-card-simple-link"
	data-id="es-295"
	 tabindex='-1'>
		<div class="btn__inner">
					<div	class='typography typography--size-none js-typography btn__label'
	data-id='es-296'
	>
	Learn more here</div>		
		<i
	class="icon btn__icon icon--size-16 icon--scale-100"
	 aria-hidden='true' data-name='arrow-right-16' data-id='es-297'>
	<svg fill='none' height='16' viewBox='0 0 17 16' width='17' xmlns='http://www.w3.org/2000/svg' xmlns:xlink='http://www.w3.org/1999/xlink'><g stroke='currentColor' stroke-width='2'><path d='m.5 7.99999 14 .00001'/><path d='m9.23352 2.7251 5.97848 5.97852'/><path d='m9.23352 13.2744 5.97848-5.9785'/></g></svg></i>	</div>
	</button>	</div>
</a>
</div>
</div>	</div>
</div>
</div>	</div>

<div
	class="wrapper"
	data-id="es-335"
	 data-animation-target='inner-items'>
		
			<div class="wrapper__inner">
			<div class="block-blog-content js-block-blog-content">
	
<div class="block-blog-content-sidebar" data-id="es-304">
	</div>

<div class="block-blog-content-main">
	
<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-307"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-305">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-306'
	>
	<strong>Vendor risk: the risk you let in without realising it</strong></h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-310"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-308">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-309'
	>
	Your own security posture is only part of the picture. Every supplier onboarded, every tool deployed, every third party with any form of access to your systems extends your attack surface. In most organisations, that surface is considerably larger than anyone has formally mapped.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-312"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-highlighted-text">
	<p	class='typography typography--size-36-text js-typography block-highlighted-text__typography'
	data-id='es-311'
	>
	Vendor risk management isn&#8217;t about being suspicious of suppliers. It&#8217;s about not assuming trust where it hasn&#8217;t been established. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-315"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-313">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-314'
	>
	The questions worth asking before any significant vendor relationship:</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-318"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="lists" data-id="es-316">
	<ul	class='typography typography--size-16-text-roman js-typography lists__typography'
	data-id='es-317'
	>
	<li>Do they hold relevant certifications (ISO 27001, Cyber Essentials, SOC 2)?</li><li>Has their product been independently penetration tested, and will they share the findings?</li><li>How do they manage vulnerabilities in their own software and infrastructure?</li><li>What access will they have to your systems – and is that access scoped correctly?</li><li>What happens to your data if the relationship ends?</li></ul></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-321"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-319">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-320'
	>
	These aren&#8217;t bureaucratic hurdles. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-324"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-322">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-323'
	>
	They&#8217;re the minimum basis for making an informed decision about the risk a vendor introduces. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-327"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-325">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-326'
	>
	An organisation that can&#8217;t answer these questions about its critical suppliers has a <strong>material gap in its risk picture,</strong> regardless of how well-managed its internal controls are.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-330"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-328">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-329'
	>
	Supply chain compromise is one of the highest-impact attack vectors in the current threat landscape, precisely because it bypasses the controls organisations invest in protecting their own perimeter.<a href="https://infinum.com/blog/software-supply-chain-security/"> </a></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-333"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-331">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-332'
	>
	 </p></div>	</div>
</div>
</div>		</div>
	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-346"
	 data-animation-target='inner-items'>
		
			<div class="block-columns" data-id="es-345">
	
<div class="block-column" data-id="es-344">
	
<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-343"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="grid block-grid__grid" data-id="es-342">
	
<div class="block-grid-item" data-id="es-341">
	
<a	class="card-simple js-card-simple block-card__card-simple card-simple--has-link js-card-simple-link card-simple__content-align--left"
	data-id="es-336"
	 href='https://infinum.com/blog/software-supply-chain-security/'>

	
	
	<div class="card-simple__content">
		<div class="card-simple__heading-wrap">
			<div	class='typography typography--size-24-text js-typography card-simple__heading'
	data-id='es-337'
	>
	The software supply chain security problem is worth understanding in detail if your organisation builds or depends on software from third parties.</div>		</div>

		<button	class="btn btn--color-infinum btn--size-medium btn--width-default btn__icon-position--right card-simple__btn js-block-card-btn js-card-simple-link"
	data-id="es-338"
	 tabindex='-1'>
		<div class="btn__inner">
					<div	class='typography typography--size-none js-typography btn__label'
	data-id='es-339'
	>
	Learn more</div>		
		<i
	class="icon btn__icon icon--size-16 icon--scale-100"
	 aria-hidden='true' data-name='arrow-right-16' data-id='es-340'>
	<svg fill='none' height='16' viewBox='0 0 17 16' width='17' xmlns='http://www.w3.org/2000/svg' xmlns:xlink='http://www.w3.org/1999/xlink'><g stroke='currentColor' stroke-width='2'><path d='m.5 7.99999 14 .00001'/><path d='m9.23352 2.7251 5.97848 5.97852'/><path d='m9.23352 13.2744 5.97848-5.9785'/></g></svg></i>	</div>
	</button>	</div>
</a>
</div>
</div>	</div>
</div>
</div>	</div>

<div
	class="wrapper"
	data-id="es-372"
	 data-animation-target='inner-items'>
		
			<div class="wrapper__inner">
			<div class="block-blog-content js-block-blog-content">
	
<div class="block-blog-content-sidebar" data-id="es-347">
	</div>

<div class="block-blog-content-main">
	
<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-350"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-348">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-349'
	>
	<strong>The loop that most organisations miss</strong></h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-353"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-351">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-352'
	>
	The reason GRC works – when it works – is that governance, risk, and compliance aren&#8217;t separate programmes running in parallel. They&#8217;re a loop.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-355"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-highlighted-text">
	<p	class='typography typography--size-36-text js-typography block-highlighted-text__typography'
	data-id='es-354'
	>
	Risk assessment drives what governance policies need to exist. Governance structures ensure risks are owned and monitored. Compliance requirements feed back into risk, because falling foul of a regulation is itself a risk with an impact and a likelihood that needs to be assessed and managed.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-358"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-356">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-357'
	>
	Break any link in that loop and the system degrades. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-361"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-359">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-360'
	>
	Risk managed without governance produces decisions that live in spreadsheets and get forgotten. Governance without risk produces policies disconnected from the actual threats. Compliance without either produces documentation that satisfies auditors and protects no one.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-364"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-362">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-363'
	>
	The organisations that do this well aren&#8217;t the ones with the most sophisticated tools or the thickest policy libraries. They&#8217;re the ones where security decisions are made deliberately, with clear ownership, against a shared understanding of what the business is trying to protect.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-367"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-365">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-366'
	>
	That&#8217;s a cultural outcome as much as a process one. And it&#8217;s harder to fake than any compliance certificate.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-370"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-368">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-369'
	>
	<em>Security that works with your business rather than against it starts with the right foundations. Infinum&#8217;s security practice helps organisations build GRC frameworks grounded in real risk, not just audit readiness.</em><a href="https://infinum.com/services/cybersecurity/"><em> Explore our cybersecurity services</em></a><em> to see where we can help.</em></p></div>	</div>
</div>
</div>		</div>
	</div><p>The post <a href="https://infinum.com/blog/grc-framework/">Why GRC Fails – and What a Framework That Actually Works Looks Like</a> appeared first on <a href="https://infinum.com">Infinum</a>.</p>
]]>
				</content:encoded>
			</item>
					<item>
				<image>
					<url>19278431https://infinum.com/uploads/2026/04/img-GRC-article1.webp</url>
				</image>
				<title>What Is GRC? Governance, Risk, and Compliance Explained</title>
				<link>https://infinum.com/blog/what-is-grc/</link>
				<pubDate>Fri, 17 Apr 2026 11:46:02 +0000</pubDate>
				<dc:creator>Tom Miller</dc:creator>
				<guid isPermaLink="false">https://infinum.com/?p=19278431</guid>
				<description>
					<![CDATA[<p>GRC connects governance, risk, and compliance into a single decision-making system. Here's what each pillar means, how they interact, and how businesses apply them in practice.</p>
<p>The post <a href="https://infinum.com/blog/what-is-grc/">What Is GRC? Governance, Risk, and Compliance Explained</a> appeared first on <a href="https://infinum.com">Infinum</a>.</p>
]]>
				</description>
				<content:encoded>
					<![CDATA[<div
	class="wrapper"
	data-id="es-393"
	 data-animation-target='inner-items'>
		
			<div class="wrapper__inner">
			<div class="block-blog-content js-block-blog-content">
	
<div class="block-blog-content-sidebar" data-id="es-373">
	</div>

<div class="block-blog-content-main">
	
<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-376"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-374">
	<p	class='typography typography--size-36-text js-typography block-typography__typography'
	data-id='es-375'
	>
	<strong>GRC connects governance, risk, and compliance into a single decision-making system. Here&#8217;s what each pillar means, how they interact, and how businesses apply them in practice.</strong></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-379"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-377">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-378'
	>
	Most organizations already manage<strong> governance, risk, and compliance</strong> in some form – they just do it in separate silos, with different teams, different tools, and no shared language. GRC formalizes that into a single, connected system.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-382"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-380">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-381'
	>
	When governance, risk, and compliance operate independently, decisions get made without context. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-385"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-383">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-384'
	>
	An IT team patches vulnerabilities without knowing which ones actually threaten business-critical systems. A compliance team checks boxes without understanding the underlying risk. Leadership approves budgets without visibility into what they&#8217;re actually protecting.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-388"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-386">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-387'
	>
	GRC fixes that – not by adding process overhead, but by aligning security decisions with business goals. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-391"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-389">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-390'
	>
	And in an environment where the regulatory landscape keeps expanding, the number of threat vectors keeps growing, and senior leadership is increasingly held personally accountable for security failures, that alignment is no longer optional.</p></div>	</div>
</div>
</div>		</div>
	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-404"
	 data-animation-target='inner-items'>
		
			<div class="block-columns" data-id="es-403">
	
<div class="block-column" data-id="es-402">
	
<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-401"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="grid block-grid__grid" data-id="es-400">
	
<div class="block-grid-item" data-id="es-399">
	
<a	class="card-simple js-card-simple block-card__card-simple card-simple--has-link js-card-simple-link card-simple__content-align--left"
	data-id="es-394"
	 href='https://infinum.com/blog/grc-framework/'>

	
	
	<div class="card-simple__content">
		<div class="card-simple__heading-wrap">
			<div	class='typography typography--size-24-text js-typography card-simple__heading'
	data-id='es-395'
	>
	<strong>Already familiar with GRC but want a more practical perspective on how it should work in real businesses</strong>? Check out our blog on the GRC framework for modern organizations. </div>		</div>

		<button	class="btn btn--color-infinum btn--size-medium btn--width-default btn__icon-position--right card-simple__btn js-block-card-btn js-card-simple-link"
	data-id="es-396"
	 tabindex='-1'>
		<div class="btn__inner">
					<div	class='typography typography--size-none js-typography btn__label'
	data-id='es-397'
	>
	Learn more here</div>		
		<i
	class="icon btn__icon icon--size-16 icon--scale-100"
	 aria-hidden='true' data-name='arrow-right-16' data-id='es-398'>
	<svg fill='none' height='16' viewBox='0 0 17 16' width='17' xmlns='http://www.w3.org/2000/svg' xmlns:xlink='http://www.w3.org/1999/xlink'><g stroke='currentColor' stroke-width='2'><path d='m.5 7.99999 14 .00001'/><path d='m9.23352 2.7251 5.97848 5.97852'/><path d='m9.23352 13.2744 5.97848-5.9785'/></g></svg></i>	</div>
	</button>	</div>
</a>
</div>
</div>	</div>
</div>
</div>	</div>

<div
	class="wrapper"
	data-id="es-591"
	 data-animation-target='inner-items'>
		
			<div class="wrapper__inner">
			<div class="block-blog-content js-block-blog-content">
	
<div class="block-blog-content-sidebar" data-id="es-405">
	</div>

<div class="block-blog-content-main">
	
<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-408"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-406">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-407'
	>
	<strong>What does GRC stand for?</strong></h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-411"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-409">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-410'
	>
	GRC stands for Governance, Risk, and Compliance. Each term names a distinct discipline, but the value of GRC comes from how they interact.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-414"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-412">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-413'
	>
	<strong>Governance</strong> defines how an organization makes decisions – its policies, roles, responsibilities, and the processes that keep security practices consistent as the business grows or changes.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-417"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-415">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-416'
	>
	<strong>Risk</strong> is the analytical core. Risk management identifies what matters most to the business, assesses what could go wrong, and determines how much uncertainty the organization is willing to accept.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-420"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-418">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-419'
	>
	<strong>Compliance</strong> ensures the organization meets its legal, regulatory, contractual, and framework-based obligations – whether that&#8217;s GDPR,<a href="https://infinum.com/blog/eu-cybersecurity-legislation-nis2-dora/" target="_blank" rel="noreferrer noopener"> NIS2 and DORA</a>, <a href="https://infinum.com/cybersecurity/pci-dss-compliance-services/" target="_blank" rel="noreferrer noopener">PCI DSS</a>, ISO/IEC 27001, or requirements imposed by a customer.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-423"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-421">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-422'
	>
	The three are not parallel tracks – they form a loop. Governance defines how things should work, risk explains why controls are needed, compliance confirms that external expectations are met. Strip any one of them out and the system breaks down.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-426"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-424">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-425'
	>
	<strong>Why GRC matters for business</strong></h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-429"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-427">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-428'
	>
	The case for GRC goes well beyond avoiding fines, though the fines alone are significant. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-432"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="lists" data-id="es-430">
	<ul	class='typography typography--size-16-text-roman js-typography lists__typography'
	data-id='es-431'
	>
	<li>Under <a href="https://infinum.com/cybersecurity/nis2-compliance-services/" target="_blank" rel="noreferrer noopener">NIS2</a>, essential entities face penalties of up to €10 million or 2% of global turnover. </li><li>Under GDPR, major violations carry fines of up to €20 million or 4% of annual worldwide revenue. </li><li>Failure to comply with the Payment Card Industry Data Security Standard (PCI DSS) can result in suspension of card processing rights for non-compliant organisations. </li></ul></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-435"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-433">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-434'
	>
	These aren&#8217;t edge cases – they&#8217;re the baseline exposure for businesses operating in regulated environments.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-438"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-436">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-437'
	>
	But the more durable argument for GRC isn&#8217;t the downside. It&#8217;s the operational benefit.&nbsp;</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-443"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="blockquote block-blockquote__blockquote" data-id="es-439">
	
	<div class="blockquote__content">
		<i
	class="icon blockquote__icon icon--size-16 icon--scale-100"
	 aria-hidden='true' data-name='blockquote-24' data-id='es-440'>
	<svg fill='none' height='24' viewBox='0 0 24 24' width='24' xmlns='http://www.w3.org/2000/svg'><path clip-rule='evenodd' d='m12 24c6.6274 0 12-5.3726 12-12 0-2.79685-.9568-5.37021-2.561-7.41062-.581.22951-1.0832.60583-1.5069 1.12898-.5132.60844-.7698 1.41969-.7698 2.43375v.07605h2.5789v5.59004h-5.6197v-5.01962c0-1.11547.154-2.06616.4619-2.85205.3336-.81125.757-1.48307 1.2702-2.01545.528-.52161 1.1175-.92155 1.7687-1.1998-2.0728-1.70651-4.7279-2.73128-7.6223-2.73128-6.62742 0-12 5.37258-12 12 0 6.6274 5.37258 12 12 12zm-3.53811-18.05347c-.30793.78589-.46189 1.73658-.46189 2.85205v5.01962h5.6197v-5.59004h-2.5789v-.07605c0-1.01406.2566-1.82531.7698-2.43375.5389-.63379 1.1804-1.05209 1.9245-1.2549v-2.28164c-.7441.07605-1.4626.25351-2.1555.53238-.6928.27887-1.3086.68449-1.84752 1.21688-.51321.53238-.9366 1.2042-1.27019 2.01545z' fill='currentColor' fill-rule='evenodd'/></svg></i><p	class='typography typography--size-36-text js-typography blockquote__quote'
	data-id='es-441'
	>
	<strong>Organizations with mature GRC programs make better decisions faster. Risk appetite is defined, so teams don&#8217;t have to relitigate every security investment. Compliance obligations are mapped, so the answer to &#8220;do we need to do this?&#8221; is documented rather than guessed. Governance structures are in place, so accountability doesn&#8217;t evaporate when the person who knew something leaves.</strong></p>
		<div class="blockquote__caption-wrap">
			<div	class='typography typography--size-12-text-roman js-typography blockquote__caption'
	data-id='es-442'
	>
	TOM MILLER, HEAD OF ASSURANCE, AMR CYBERSECURITY – PART OF INFINUM</div>		</div>
	</div>
</div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-446"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-444">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-445'
	>
	There&#8217;s also a commercial dimension. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-449"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-447">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-448'
	>
	Enterprise customers and regulated-sector partners regularly require evidence of security maturity before signing contracts. SOC 2 attestation, ISO/IEC 27001 certification, and documented compliance management systems are increasingly prerequisites rather than differentiators. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-452"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-450">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-451'
	>
	A strong GRC posture opens doors; the absence of one closes them.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-455"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-453">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-454'
	>
	<strong>How does risk management work in GRC?</strong></h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-458"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-456">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-457'
	>
	Risk management is where most GRC programs begin, and for good reason. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-461"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-459">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-460'
	>
	Without a clear picture of what you&#8217;re protecting and what threatens it, governance produces arbitrary rules and compliance becomes theater.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-464"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-462">
	<h3	class='typography typography--size-36-text js-typography block-typography__typography'
	data-id='es-463'
	>
	<strong>Step one: identify and classify your assets</strong></h3></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-467"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-465">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-466'
	>
	You cannot manage risk to assets you haven&#8217;t mapped. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-470"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-468">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-469'
	>
	Those assets may include customer data, intellectual property, operational systems, physical infrastructure, or vendor relationships. Classification matters because not all assets warrant the same level of protection – and trying to protect everything equally usually means protecting nothing well.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-473"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-471">
	<h3	class='typography typography--size-36-text js-typography block-typography__typography'
	data-id='es-472'
	>
	<strong>Step two: understand the threat landscape</strong></h3></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-476"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-474">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-475'
	>
	Different assets face different threats. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-479"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-477">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-478'
	>
	Personal data is targeted for financial gain. Critical infrastructure faces operational disruption. Source code may attract industrial espionage. Understanding the nature of threats – not just their existence – shapes how you assess and respond to them.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-482"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-480">
	<h3	class='typography typography--size-36-text js-typography block-typography__typography'
	data-id='es-481'
	>
	<strong>Step three: assess impact and likelihood</strong></h3></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-485"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-483">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-484'
	>
	This is where the risk matrix comes in. Risk is typically evaluated across two dimensions:</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-488"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="lists" data-id="es-486">
	<ul	class='typography typography--size-16-text-roman js-typography lists__typography'
	data-id='es-487'
	>
	<li><strong>Impact</strong> – how damaging an incident would be, in terms of financial loss, reputational harm, regulatory penalties, or operational disruption</li><li><strong>Likelihood</strong> – how probable it is that the event occurs, given existing controls and the threat environment</li></ul></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-491"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-489">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-490'
	>
	These are plotted on a matrix, commonly a 5×5 grid, to produce a risk score. The exact numbers are less important than the consistency of the methodology. Organizations that assess risks differently each time they run the exercise produce data that can&#8217;t be compared or trended. Continuous monitoring through defined key risk indicators (KRIs) keeps the picture current between formal review cycles.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-494"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-492">
	<h3	class='typography typography--size-36-text js-typography block-typography__typography'
	data-id='es-493'
	>
	<strong>Step four: decide how to treat the risk</strong></h3></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-497"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-495">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-496'
	>
	Once a risk level is established, the business chooses how to respond. The standard options are:</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-500"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="lists" data-id="es-498">
	<ul	class='typography typography--size-16-text-roman js-typography lists__typography'
	data-id='es-499'
	>
	<li><strong>Reduce</strong> the risk through controls – security training, technical safeguards, process changes</li><li><strong>Accept</strong> the risk if it falls within the organization&#8217;s risk appetite</li><li><strong>Avoid</strong> the risk by changing or discontinuing the activity that creates it</li><li><strong>Transfer</strong> the risk – through insurance, contracts, or third-party arrangements</li></ul></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-503"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-501">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-502'
	>
	Controls should be matched to risks specifically. Generic controls applied uniformly are expensive and often ineffective against the actual threats an organization faces. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-506"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-504">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-505'
	>
	For technical risks in particular,<a href="https://infinum.com/blog/why-penetration-testing-is-important/" target="_blank" rel="noreferrer noopener"> penetration testing</a> is one of the most direct ways to validate whether your controls actually hold up.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-509"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-507">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-508'
	>
	<strong>Risk assessment &amp; management is ongoing, not periodic</strong></h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-512"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-510">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-511'
	>
	Threats change. Businesses evolve. Acquisitions, new product lines, cloud migrations, and regulatory changes all shift the risk assessment. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-515"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-513">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-514'
	>
	Most organizations review their full risk register at least annually. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-518"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-516">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-517'
	>
	High-risk areas warrant more frequent reassessment. Assigning clear risk owners – people accountable for monitoring and managing specific risks – is what prevents risks from being noted once and then quietly forgotten.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-521"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-519">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-520'
	>
	<strong>What is governance in a GRC framework?</strong></h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-524"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-522">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-523'
	>
	Governance is the operational skeleton of GRC. It translates risk decisions into repeatable practice.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-527"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-525">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-526'
	>
	That includes</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-530"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="lists" data-id="es-528">
	<ul	class='typography typography--size-16-text-roman js-typography lists__typography'
	data-id='es-529'
	>
	<li><strong>documented policies</strong> covering data handling, access control, incident response plans, acceptable use, and other security-critical areas</li><li><strong>defined roles</strong> – from senior leadership accountability at board level down to team-level ownership – so that security doesn&#8217;t depend on any single individual</li><li><strong>processes </strong>for reviewing and updating those policies as the business changes</li></ul></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-533"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-531">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-532'
	>
	One design failure that consistently undermines governance programs: rules that are too strict for people to follow. Overly restrictive policies don&#8217;t eliminate risk – they push it underground. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-536"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-534">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-535'
	>
	Employees find workarounds. Shadow IT proliferates. Data ends up in personal accounts because the approved tools are too slow or too inconvenient.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-538"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-highlighted-text">
	<p	class='typography typography--size-36-text js-typography block-highlighted-text__typography'
	data-id='es-537'
	>
	<strong>Effective governance balances protection with usability. Policies should make it easier to work securely, not harder to work at all.</strong></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-541"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-539">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-540'
	>
	Governance frameworks also need scheduled reviews. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-544"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-542">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-543'
	>
	A policy written before your organization moved to cloud infrastructure, onboarded a major enterprise customer, or doubled headcount is likely obsolete in places. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-547"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-545">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-546'
	>
	Incident data, employee feedback, and internal audit results should all feed into governance updates – not sit in a report that nobody reads.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-550"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-548">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-549'
	>
	<strong>What compliance frameworks do businesses need?</strong></h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-553"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-551">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-552'
	>
	The answer depends on the industry, the markets served, and the nature of customer relationships. But the typical compliance picture for a modern business covers several layers:</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-556"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="lists" data-id="es-554">
	<ul	class='typography typography--size-16-text-roman js-typography lists__typography'
	data-id='es-555'
	>
	<li><strong>Legal and regulatory requirements</strong> – data protection laws, cybersecurity regulations, sector-specific legislation (<a href="https://infinum.com/blog/eu-cybersecurity-legislation-nis2-dora/" target="_blank" rel="noreferrer noopener">NIS2 and DORA</a> in the EU, for example)</li><li><strong>Industry frameworks</strong> – ISO/IEC 27001, Payment Card Industry Data Security Standard (<a href="https://infinum.com/cybersecurity/pci-dss-compliance-services/" target="_blank" rel="noreferrer noopener">PCI DSS</a>), SOC 2, NIST, CIS Controls</li><li><strong>Regional data protection regulations</strong> – the General Data Protection Regulation (GDPR) for organizations handling EU personal data; the California Consumer Privacy Act (CCPA) for those serving US consumers; the Health Insurance Portability and Accountability Act (HIPAA) for healthcare; the Sarbanes-Oxley Act (SOX) for US-listed companies</li><li><strong>Anti-corruption and financial crime frameworks</strong> – the Foreign Corrupt Practices Act (FCPA), the UK Bribery Act, and EU Money Laundering Directives for relevant sectors</li><li><strong>Contractual obligations</strong> – security requirements imposed by enterprise customers or partners, often as conditions of doing business</li></ul></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-559"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-557">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-558'
	>
	It&#8217;s important to note that these often overlap. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-562"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-560">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-561'
	>
	A financial services company serving EU customers may simultaneously need to comply with DORA, NIS2, GDPR, and the security requirements of its largest institutional clients. GRC provides the structure to manage these demands coherently rather than spinning up separate workstreams for each.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-565"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-563">
	<h3	class='typography typography--size-36-text js-typography block-typography__typography'
	data-id='es-564'
	>
	<strong>What is outcome-based regulation?</strong></h3></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-568"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-566">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-567'
	>
	A significant portion of modern compliance frameworks – including <a href="https://infinum.com/cybersecurity/nis2-compliance-services/" target="_blank" rel="noreferrer noopener">NIS2</a> and many data protection regimes – define outcomes rather than prescribing specific security controls. They tell you what you need to achieve, not exactly how to achieve it.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-571"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-569">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-570'
	>
	This creates flexibility. It also creates interpretation work. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-574"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-572">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-573'
	>
	&#8220;Implement appropriate technical and organizational measures&#8221; means different things for a 20-person SaaS company and a multinational bank. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-577"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-575">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-576'
	>
	Understanding your specific risk profile, business context, and the regulator&#8217;s expectations for your sector is what makes outcome-based regulatory compliance meaningful rather than aspirational.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-580"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-578">
	<h3	class='typography typography--size-36-text js-typography block-typography__typography'
	data-id='es-579'
	>
	<strong>Compliance is itself a risk decision</strong></h3></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-583"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-581">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-582'
	>
	Not every framework that exists is mandatory for your organization. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-586"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-584">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-585'
	>
	Some are legally required. Others are commercially beneficial – certain enterprise customers won&#8217;t sign contracts with vendors who can&#8217;t demonstrate ISO/IEC 27001 certification, for example. Others are optional but signal maturity to the market.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-589"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-587">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-588'
	>
	Deciding which standards to pursue should follow the same logic as any risk assessment follow-up decision: what are the obligations, what is the business value, and what does it cost?</p></div>	</div>
</div>
</div>		</div>
	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-602"
	 data-animation-target='inner-items'>
		
			<div class="block-columns" data-id="es-601">
	
<div class="block-column" data-id="es-600">
	
<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-599"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="grid block-grid__grid" data-id="es-598">
	
<div class="block-grid-item" data-id="es-597">
	
<a	class="card-simple js-card-simple block-card__card-simple card-simple--has-link js-card-simple-link card-simple__content-align--left"
	data-id="es-592"
	 href='https://infinum.com/blog/cybersecurity-trends-2026/'>

	
	
	<div class="card-simple__content">
		<div class="card-simple__heading-wrap">
			<div	class='typography typography--size-24-text js-typography card-simple__heading'
	data-id='es-593'
	>
	<strong>For an up-to-date view of which regulatory obligations are currently driving the most change, our 2026 cybersecurity trends piece is a useful companion read.</strong></div>		</div>

		<button	class="btn btn--color-infinum btn--size-medium btn--width-default btn__icon-position--right card-simple__btn js-block-card-btn js-card-simple-link"
	data-id="es-594"
	 tabindex='-1'>
		<div class="btn__inner">
					<div	class='typography typography--size-none js-typography btn__label'
	data-id='es-595'
	>
	Learn more here</div>		
		<i
	class="icon btn__icon icon--size-16 icon--scale-100"
	 aria-hidden='true' data-name='arrow-right-16' data-id='es-596'>
	<svg fill='none' height='16' viewBox='0 0 17 16' width='17' xmlns='http://www.w3.org/2000/svg' xmlns:xlink='http://www.w3.org/1999/xlink'><g stroke='currentColor' stroke-width='2'><path d='m.5 7.99999 14 .00001'/><path d='m9.23352 2.7251 5.97848 5.97852'/><path d='m9.23352 13.2744 5.97848-5.9785'/></g></svg></i>	</div>
	</button>	</div>
</a>
</div>
</div>	</div>
</div>
</div>	</div>

<div
	class="wrapper"
	data-id="es-625"
	 data-animation-target='inner-items'>
		
			<div class="wrapper__inner">
			<div class="block-blog-content js-block-blog-content">
	
<div class="block-blog-content-sidebar" data-id="es-603">
	</div>

<div class="block-blog-content-main">
	
<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-606"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-604">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-605'
	>
	<strong>Culture, metrics, and the feedback loop</strong></h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-609"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-607">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-608'
	>
	GRC doesn&#8217;t run on documents alone. It runs on people.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-611"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-highlighted-text">
	<p	class='typography typography--size-36-text js-typography block-highlighted-text__typography'
	data-id='es-610'
	>
	Security training participation rates, phishing simulation results, system patching cadence, and incident trends are all metrics that reveal how the governance framework is performing in practice – not just on paper. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-614"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-612">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-613'
	>
	Organizations that track these consistently identify weaknesses before they become incidents. Regular training sessions and awareness programs matter here not as regulatory compliance checkboxes, but as data sources: if phishing click rates don&#8217;t move after repeated training rounds, the training isn&#8217;t working.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-617"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-615">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-616'
	>
	The other half of this is incident reporting culture. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-620"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-618">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-619'
	>
	Employees need to feel safe raising concerns, reporting mistakes, and escalating near misses. Blame discourages reporting. Underreporting makes risk data unreliable and leaves the same vulnerabilities recurring across incidents that could have been connected.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-623"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-621">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-622'
	>
	Every incident that gets reported and analyzed is a direct feed into the risk register, the governance framework, and the next training cycle &#8211; that feedback loop is what makes GRC a living system rather than a compliance filing exercise.</p></div>	</div>
</div>
</div>		</div>
	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-636"
	 data-animation-target='inner-items'>
		
			<div class="block-columns" data-id="es-635">
	
<div class="block-column" data-id="es-634">
	
<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-633"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="grid block-grid__grid" data-id="es-632">
	
<div class="block-grid-item" data-id="es-631">
	
<a	class="card-simple js-card-simple block-card__card-simple card-simple--has-link js-card-simple-link card-simple__content-align--left"
	data-id="es-626"
	 href='https://infinum.com/blog/ssdlc-application-security/'>

	
	
	<div class="card-simple__content">
		<div class="card-simple__heading-wrap">
			<div	class='typography typography--size-24-text js-typography card-simple__heading'
	data-id='es-627'
	>
	If your organization builds software, embedding security into the development lifecycle is where that loop starts – here&#8217;s how to make that shift.</div>		</div>

		<button	class="btn btn--color-infinum btn--size-medium btn--width-default btn__icon-position--right card-simple__btn js-block-card-btn js-card-simple-link"
	data-id="es-628"
	 tabindex='-1'>
		<div class="btn__inner">
					<div	class='typography typography--size-none js-typography btn__label'
	data-id='es-629'
	>
	Explore SSDLC</div>		
		<i
	class="icon btn__icon icon--size-16 icon--scale-100"
	 aria-hidden='true' data-name='arrow-right-16' data-id='es-630'>
	<svg fill='none' height='16' viewBox='0 0 17 16' width='17' xmlns='http://www.w3.org/2000/svg' xmlns:xlink='http://www.w3.org/1999/xlink'><g stroke='currentColor' stroke-width='2'><path d='m.5 7.99999 14 .00001'/><path d='m9.23352 2.7251 5.97848 5.97852'/><path d='m9.23352 13.2744 5.97848-5.9785'/></g></svg></i>	</div>
	</button>	</div>
</a>
</div>
</div>	</div>
</div>
</div>	</div>

<div
	class="wrapper"
	data-id="es-661"
	 data-animation-target='inner-items'>
		
			<div class="wrapper__inner">
			<div class="block-blog-content js-block-blog-content">
	
<div class="block-blog-content-sidebar" data-id="es-637">
	</div>

<div class="block-blog-content-main">
	
<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-640"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-638">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-639'
	>
	<strong>GRC tools: what actually matters</strong></h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-643"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-641">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-642'
	>
	The market for GRC platforms – compliance management systems, risk registers, policy libraries, audit tracking tools – is large and varied, ranging from enterprise-grade systems with automated controls mapping and real-time dashboards to simpler internal documentation and spreadsheet-based approaches.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-645"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-highlighted-text">
	<p	class='typography typography--size-36-text js-typography block-highlighted-text__typography'
	data-id='es-644'
	>
	Sophisticated tooling can be valuable – but only if it&#8217;s properly configured, actively maintained, and matched to organizational maturity. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-648"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-646">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-647'
	>
	A platform that requires significant customization and ongoing administration may create more overhead than it removes for a smaller organization.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-653"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="blockquote block-blockquote__blockquote" data-id="es-649">
	
	<div class="blockquote__content">
		<i
	class="icon blockquote__icon icon--size-16 icon--scale-100"
	 aria-hidden='true' data-name='blockquote-24' data-id='es-650'>
	<svg fill='none' height='24' viewBox='0 0 24 24' width='24' xmlns='http://www.w3.org/2000/svg'><path clip-rule='evenodd' d='m12 24c6.6274 0 12-5.3726 12-12 0-2.79685-.9568-5.37021-2.561-7.41062-.581.22951-1.0832.60583-1.5069 1.12898-.5132.60844-.7698 1.41969-.7698 2.43375v.07605h2.5789v5.59004h-5.6197v-5.01962c0-1.11547.154-2.06616.4619-2.85205.3336-.81125.757-1.48307 1.2702-2.01545.528-.52161 1.1175-.92155 1.7687-1.1998-2.0728-1.70651-4.7279-2.73128-7.6223-2.73128-6.62742 0-12 5.37258-12 12 0 6.6274 5.37258 12 12 12zm-3.53811-18.05347c-.30793.78589-.46189 1.73658-.46189 2.85205v5.01962h5.6197v-5.59004h-2.5789v-.07605c0-1.01406.2566-1.82531.7698-2.43375.5389-.63379 1.1804-1.05209 1.9245-1.2549v-2.28164c-.7441.07605-1.4626.25351-2.1555.53238-.6928.27887-1.3086.68449-1.84752 1.21688-.51321.53238-.9366 1.2042-1.27019 2.01545z' fill='currentColor' fill-rule='evenodd'/></svg></i><p	class='typography typography--size-36-text js-typography blockquote__quote'
	data-id='es-651'
	>
	What matters is not the sophistication of the tool but the quality of the thinking behind it. A GRC spreadsheet used rigorously beats an enterprise platform treated as a checkbox.</p>
		<div class="blockquote__caption-wrap">
			<div	class='typography typography--size-12-text-roman js-typography blockquote__caption'
	data-id='es-652'
	>
	TOM MILLER, HEAD OF ASSURANCE, AMR CYBERSECURITY &#8211; PART OF INFINUM</div>		</div>
	</div>
</div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-656"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-654">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-655'
	>
	Vendor risk management deserves specific attention. Every supplier introduced into your environment extends your attack surface, and that includes cloud providers, managed service providers, software vendors, and any third party with access to your systems or data. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-659"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-657">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-658'
	>
	Trust should be verified through due diligence, not assumed. When evaluating vendors, prioritize demonstrated experience, relevant credentials, and a clear approach to their own GRC.</p></div>	</div>


</div>
</div>		</div>
	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-672"
	 data-animation-target='inner-items'>
		
			<div class="block-columns" data-id="es-671">
	
<div class="block-column" data-id="es-670">
	
<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-669"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="grid block-grid__grid" data-id="es-668">
	
<div class="block-grid-item" data-id="es-667">
	
<a	class="card-simple js-card-simple block-card__card-simple card-simple--has-link js-card-simple-link card-simple__content-align--left"
	data-id="es-662"
	 href='https://infinum.com/blog/software-supply-chain-security/'>

	
	
	<div class="card-simple__content">
		<div class="card-simple__heading-wrap">
			<div	class='typography typography--size-24-text js-typography card-simple__heading'
	data-id='es-663'
	>
	<strong>For a practical framework on how to assess and manage that exposure, our guide to software supply chain security</strong> <strong>covers it step by step.</strong></div>		</div>

		<button	class="btn btn--color-infinum btn--size-medium btn--width-default btn__icon-position--right card-simple__btn js-block-card-btn js-card-simple-link"
	data-id="es-664"
	 tabindex='-1'>
		<div class="btn__inner">
					<div	class='typography typography--size-none js-typography btn__label'
	data-id='es-665'
	>
	Learn more here</div>		
		<i
	class="icon btn__icon icon--size-16 icon--scale-100"
	 aria-hidden='true' data-name='arrow-right-16' data-id='es-666'>
	<svg fill='none' height='16' viewBox='0 0 17 16' width='17' xmlns='http://www.w3.org/2000/svg' xmlns:xlink='http://www.w3.org/1999/xlink'><g stroke='currentColor' stroke-width='2'><path d='m.5 7.99999 14 .00001'/><path d='m9.23352 2.7251 5.97848 5.97852'/><path d='m9.23352 13.2744 5.97848-5.9785'/></g></svg></i>	</div>
	</button>	</div>
</a>
</div>
</div>	</div>
</div>
</div>	</div>

<div
	class="wrapper"
	data-id="es-732"
	 data-animation-target='inner-items'>
		
			<div class="wrapper__inner">
			<div class="block-blog-content js-block-blog-content">
	
<div class="block-blog-content-sidebar" data-id="es-673">
	</div>

<div class="block-blog-content-main">
	


<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-676"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-674">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-675'
	>
	<strong>How to build a GRC framework: where to start</strong></h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-679"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-677">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-678'
	>
	The most common mistake when building a GRC program is starting with the tools or the compliance checklist rather than the risk picture. The sequence matters.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-682"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-680">
	<h4	class='typography typography--size-24-text js-typography block-typography__typography'
	data-id='es-681'
	>
	<strong>Start with an honest assessment of where you are.</strong> </h4></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-685"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-683">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-684'
	>
	Map your assets, identify your regulatory obligations, and evaluate whether your current governance structures and compliance programs are actually functioning or just documented. Gaps between what the policies say and what teams do are the most important findings at this stage.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-688"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-686">
	<h4	class='typography typography--size-24-text js-typography block-typography__typography'
	data-id='es-687'
	>
	<strong>Define your risk appetite.</strong> </h4></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-691"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-689">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-690'
	>
	Senior leadership needs to agree – explicitly, on paper – on how much risk the organization is willing to accept in different areas. Without that anchor, every risk treatment decision becomes a negotiation.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-694"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-692">
	<h4	class='typography typography--size-24-text js-typography block-typography__typography'
	data-id='es-693'
	>
	<strong>Prioritize by impact.</strong> </h4></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-697"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-695">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-696'
	>
	You cannot fix everything at once. Address the highest-risk areas first, assign owners, and set measurable targets. A chief compliance officer or equivalent role provides the continuity needed to drive this process – someone whose job it is to track progress across the organization, not just within a single team.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-700"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-698">
	<h4	class='typography typography--size-24-text js-typography block-typography__typography'
	data-id='es-699'
	>
	<strong>Build compliance management into operations, not alongside them.</strong></h4></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-703"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-701">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-702'
	>
	Compliance programs that exist in parallel to how work actually gets done produce documentation and little else. The goal is to integrate compliance requirements into everyday workflows so that adherence is the path of least resistance, not an additional burden.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-706"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-704">
	<h4	class='typography typography--size-24-text js-typography block-typography__typography'
	data-id='es-705'
	>
	<strong>Review regularly.</strong> </h4></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-709"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-707">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-708'
	>
	A GRC program that isn&#8217;t updated is a liability. Set a cadence for risk register reviews, policy updates, and internal audit cycles. The specific intervals matter less than committing to them.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-712"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-710">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-711'
	>
	<strong>Why GRC builds business trust</strong></h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-715"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-713">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-714'
	>
	The organizations that handle security incidents badly are rarely those with the weakest technical controls. They&#8217;re often the ones that didn&#8217;t know what they were protecting, couldn&#8217;t communicate clearly with stakeholders, or had no documented process for responding.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-718"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-716">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-717'
	>
	GRC addresses all of that. It forces honest conversations about risk that many organizations avoid until something goes wrong. It creates accountability at the leadership level. And it produces the documentation and evidence that regulators, customers, and partners increasingly expect as a baseline condition of doing business.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-721"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-719">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-720'
	>
	No organization eliminates risk entirely. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-724"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-722">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-723'
	>
	What GRC provides is something more practical: the ability to understand it, manage it deliberately, and learn from it when things don&#8217;t go according to plan.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-727"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-725">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-726'
	>
	<em>Security decisions made without a governance and risk foundation tend to be reactive, inconsistent, and hard to justify when things go wrong. </em></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-730"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-728">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-729'
	>
	<em>Infinum&#8217;s security practice helps organizations build GRC frameworks that work in the real world – connected to business goals, not just compliance checklists.</em><a href="https://infinum.com/services/cybersecurity/"><em> Explore our cybersecurity services</em></a><em> to see where we can help.</em></p></div>	</div>
</div>
</div>		</div>
	</div><p>The post <a href="https://infinum.com/blog/what-is-grc/">What Is GRC? Governance, Risk, and Compliance Explained</a> appeared first on <a href="https://infinum.com">Infinum</a>.</p>
]]>
				</content:encoded>
			</item>
					<item>
				<image>
					<url>19274858https://infinum.com/uploads/2026/02/paper-4.webp</url>
				</image>
				<title>Cyber Security Model v4: How MOD Suppliers Can Prepare for Stricter Cyber Rules</title>
				<link>https://infinum.com/blog/cyber-security-model-v4/</link>
				<pubDate>Mon, 02 Feb 2026 15:21:04 +0000</pubDate>
				<dc:creator>Tom Miller</dc:creator>
				<guid isPermaLink="false">https://infinum.com/?p=19274858</guid>
				<description>
					<![CDATA[<p>Learn how MOD suppliers can prepare for CSMv4 with support from a DCC Level 1 certified company.</p>
<p>The post <a href="https://infinum.com/blog/cyber-security-model-v4/">Cyber Security Model v4: How MOD Suppliers Can Prepare for Stricter Cyber Rules</a> appeared first on <a href="https://infinum.com">Infinum</a>.</p>
]]>
				</description>
				<content:encoded>
					<![CDATA[<div
	class="wrapper"
	data-id="es-866"
	 data-animation-target='inner-items'>
		
			<div class="wrapper__inner">
			<div class="block-blog-content js-block-blog-content">
	
<div class="block-blog-content-sidebar" data-id="es-733">
	</div>

<div class="block-blog-content-main">
	
<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-736"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-734">
	<p	class='typography typography--size-36-text js-typography block-typography__typography'
	data-id='es-735'
	>
	<strong>The UK Ministry of Defence has officially rolled out Cyber Security Model v4, introducing stricter, more structured cyber security requirements for defence suppliers. Learn how CSM v4, DEFSTAN 05-138, and Defence Cyber Certification fit together and prepare for CSM v4 with a DCC Level 1 certified partner.</strong></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-739"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-737">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-738'
	>
	The UK Ministry of Defence (MOD) has raised the bar for everyone in its supply chain.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-742"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-740">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-741'
	>
	Starting December 3, 2025, all companies working with the MOD – whether a prime contractor, a Tier 2 supplier, or a <a href="https://infinum.com/third-party-cyber-risk-management/" id="https://infinum.com/third-party-cyber-risk-management/">third-party vendor</a> buried three layers deep – must follow a new set of cyber rules called the Cyber Security Model (CSM v4).</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-745"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-743">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-744'
	>
	The interim process tied to DEFCON 658 is out.&nbsp;</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-748"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-746">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-747'
	>
	In its place? A more structured, standardised framework that <a href="https://infinum.com/blog/software-supply-chain-security/" target="_blank" rel="noreferrer noopener">holds every supplier and their subcontractors accountable</a> for how they assess, manage, and report <a href="https://infinum.com/enterprise-cyber-risk-management/" id="https://infinum.com/enterprise-cyber-risk-management/">cyber risk</a>.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-750"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-highlighted-text">
	<p	class='typography typography--size-36-text js-typography block-highlighted-text__typography'
	data-id='es-749'
	>
	<strong>If you&#8217;re doing business with the MOD, you’ll need to follow stricter requirements, use new government tools, and be ready to show exactly how you’re protecting your digital systems and sensitive data.</strong></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-753"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-751">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-752'
	>
	So, what’s changed, and what does compliance actually look like now? </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-756"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-754">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-755'
	>
	Learn how MOD suppliers can prepare for Cyber Security Model v4 <strong>from </strong><a href="https://www.amrcybersecurity.com/" id="https://www.amrcybersecurity.com/"><strong>AMR CyberSecurity –</strong> <strong>part of Infinum</strong></a><strong>, a Defence Cyber Certification Level 1 certified company.</strong></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-759"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-757">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-758'
	>
	<strong>What is CSM and why does it matter?</strong></h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-762"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-760">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-761'
	>
	The Cyber Security Model (CSM) is the MOD’s framework to make sure <a href="https://infinum.com/blog/software-supply-chain-security/">every link in its supply chain takes cybersecurity seriously</a>. It’s a risk-based model that applies proportionate security controls based on the nature and sensitivity of the work being delivered.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-765"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-763">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-764'
	>
	But this isn’t just about your organisation. Under CSM v4, cyber accountability flows downstream, meaning you’re also responsible for assessing and validating the cyber posture of your subcontractors and third-party vendors. No matter how large or small, one weak link can put an entire contract at risk.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-768"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-766">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-767'
	>
	So, what exactly does the MOD expect you to do?</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-772"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="bullet bullet--left bullet__type--dot bullet__color--black block-bullet__bullet" data-id="es-769">
			<div class="bullet__dot"></div>
		<div class="bullet__content">
		<p	class='typography typography--size-24-text js-typography bullet__heading'
	data-id='es-770'
	>
	<strong>Complete or respond to Risk Assessments (RAs)</strong></p><p	class='typography typography--size-20-text-roman js-typography bullet__paragraph'
	data-id='es-771'
	>
	Before any procurement or contract work begins, the MOD Delivery Team will carry out a Risk Assessment to determine your Cyber Risk Profile (CRP) – essentially, how risky your role is from a cybersecurity standpoint. Based on this, your organisation will be assigned a CRP level (from Basic to Expert), which then dictates the level of controls you’ll need to meet.</p>	</div>
</div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-776"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="bullet bullet--left bullet__type--dot bullet__color--black block-bullet__bullet" data-id="es-773">
			<div class="bullet__dot"></div>
		<div class="bullet__content">
		<p	class='typography typography--size-24-text js-typography bullet__heading'
	data-id='es-774'
	>
	<strong><strong>Fill out a Supplier Assurance Questionnaire (SAQ)</strong></strong></p><p	class='typography typography--size-20-text-roman js-typography bullet__paragraph'
	data-id='es-775'
	>
	Once your CRP is set, you’ll need to complete a <a href="https://www.supplier-cyber-protection.service.gov.uk/scps" target="_blank" rel="noreferrer noopener">Supplier Assurance Questionnaire</a> (SAQ) through the Supplier Cyber Protection Service portal. This self-assessment shows how your organisation stacks up against the security controls required for your CRP level and is a mandatory part of the MOD’s supplier onboarding and compliance process.</p>	</div>
</div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-780"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="bullet bullet--left bullet__type--dot bullet__color--black block-bullet__bullet" data-id="es-777">
			<div class="bullet__dot"></div>
		<div class="bullet__content">
		<p	class='typography typography--size-24-text js-typography bullet__heading'
	data-id='es-778'
	>
	<strong><strong><strong>Apply relevant cyber controls from DEFSTAN 05-138</strong></strong></strong></p><p	class='typography typography--size-20-text-roman js-typography bullet__paragraph'
	data-id='es-779'
	>
	The cyber controls you&#8217;re being measured against are defined in <a href="https://www.gov.uk/government/publications/cyber-security-for-defence-suppliers-def-stan-05-138-issue-4" target="_blank" rel="noreferrer noopener">DEFSTAN 05-138</a>, a detailed MOD standard that outlines the minimum cyber security requirements for each CRP level. These range from essential controls at the lowest level, all the way up to comprehensive, expert-level defences for higher-risk contracts.</p>	</div>
</div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-784"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="bullet bullet--left bullet__type--dot bullet__color--black block-bullet__bullet" data-id="es-781">
			<div class="bullet__dot"></div>
		<div class="bullet__content">
		<p	class='typography typography--size-24-text js-typography bullet__heading'
	data-id='es-782'
	>
	<strong><strong><strong><strong><strong>Create a Cyber Improvement Plan (CIP) if you’re not fully compliant</strong></strong></strong></strong></strong></p><p	class='typography typography--size-20-text-roman js-typography bullet__paragraph'
	data-id='es-783'
	>
	Not quite meeting the requirements? That’s not an automatic disqualification, but you’ll need to document why. A Cyber Improvement Plan (CIP) outlines the gaps in your current setup, the steps you’re taking to close them, and the timeline for becoming fully compliant. It’s a structured way to stay in the game while actively improving your security posture.<br />
</p>	</div>
</div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-787"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-785">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-786'
	>
	Bottom line: If you want to work with the MOD, you need to take cybersecurity seriously – and be able to prove it.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-790"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-media">
	<div	class="media block-media__media media__border--none media__align--center-center"
	data-id="es-788"
	 data-media-type='image'>

	<figure class="image block-media__image-figure image--size-stretch" data-id="es-789">
	<picture class="image__picture block-media__image-picture">
								
			<source
				srcset=https://infinum.com/uploads/2026/02/img-dcc-cs-chart-1400x1400.webp				media='(max-width: 699px)'
				type=image/webp								height="1400"
												width="1400"
				 />
												<img
					src="https://infinum.com/uploads/2026/02/img-dcc-cs-chart.webp"
					class="image__img block-media__image-img"
					alt="CSM v4 supplier compliance process flowchart — from risk assessment to contract award"
										height="2100"
															width="2100"
										loading="lazy"
					 />
					</picture>

			<figcaption class="image__figcaption block-media__image-figcaption">
			<em>The MOD’s CSM v4 process flow: From initial risk assessment to contract award, suppliers must demonstrate cyber-readiness through self-assessment, compliance checks, and, if needed, improvement plans.</em>		</figcaption>
	</figure></div></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-793"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-791">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-792'
	>
	<strong>DEFSTAN 05-138: What the MOD Expects</strong></h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-796"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-794">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-795'
	>
	Building on the CRP levels established during the initial CSM risk assessment, <a href="https://www.gov.uk/government/publications/cyber-security-for-defence-suppliers-def-stan-05-138-issue-4" target="_blank" rel="noreferrer noopener">DEFSTAN 05-138</a> outlines the specific cybersecurity controls that suppliers must meet based on their assigned risk profile.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-799"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-797">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-798'
	>
	This MOD standard acts as the benchmark for what’s expected at each level, from basic hygiene to expert-grade defences. The higher the risk, the more comprehensive and stringent the requirements. These controls form the foundation of both the SAQ process and any future DCC certification.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-802"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-800">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-801'
	>
	Here’s what each level includes:</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-806"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="bullet bullet--left bullet__type--dot bullet__color--infinum block-bullet__bullet" data-id="es-803">
			<div class="bullet__dot"></div>
		<div class="bullet__content">
		<h3	class='typography typography--size-24-text js-typography bullet__heading'
	data-id='es-804'
	>
	<strong><strong>Level 0 – Basic (3 controls)</strong></strong></h3><p	class='typography typography--size-20-text-roman js-typography bullet__paragraph'
	data-id='es-805'
	>
	The Level 0 ‘Basic<strong>’</strong> profile applies where there is a very low assessed cyber risk. It’s typically used for suppliers delivering outputs with minimal exposure to sensitive systems or data. At this level, organisations are expected to demonstrate basic cyber security hygiene: simple, essential measures that reduce common risks.</p>	</div>
</div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-810"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="bullet bullet--left bullet__type--dot bullet__color--infinum block-bullet__bullet" data-id="es-807">
			<div class="bullet__dot"></div>
		<div class="bullet__content">
		<h3	class='typography typography--size-24-text js-typography bullet__heading'
	data-id='es-808'
	>
	<strong><strong><strong>Level 1 – Foundational (101 controls)</strong></strong></strong></h3><p	class='typography typography--size-20-text-roman js-typography bullet__paragraph'
	data-id='es-809'
	>
	The Level 1 ‘Foundational’ profile is assigned where there is a low to moderate level of cyber risk. Suppliers at this level must show they have a comprehensive cyber security programme in place, covering core areas such as <a href="https://infinum.com/governance-risk-compliance-services/" id="https://infinum.com/governance-risk-compliance-services/">governance</a>, access control, incident response, and secure system management. Good practice is expected here.</p>	</div>
</div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-814"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="bullet bullet--left bullet__type--dot bullet__color--infinum block-bullet__bullet" data-id="es-811">
			<div class="bullet__dot"></div>
		<div class="bullet__content">
		<h3	class='typography typography--size-24-text js-typography bullet__heading'
	data-id='es-812'
	>
	<strong><strong><strong><strong>Level 2 – Advanced (139 controls)</strong></strong></strong></strong></h3><p	class='typography typography--size-20-text-roman js-typography bullet__paragraph'
	data-id='es-813'
	>
	The Level 2 ‘Advanced’ profile applies to suppliers delivering higher-risk contracted outputs. At this stage, organisations need to demonstrate advanced oversight, planning, and control of their cyber environment. This means mature policies, active monitoring, and well-embedded security processes that support robust organisational and operational resilience.</p>	</div>
</div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-818"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="bullet bullet--left bullet__type--dot bullet__color--infinum block-bullet__bullet" data-id="es-815">
			<div class="bullet__dot"></div>
		<div class="bullet__content">
		<h3	class='typography typography--size-24-text js-typography bullet__heading'
	data-id='es-816'
	>
	<strong><strong><strong><strong><strong>Level 3 – Expert (144 controls)</strong></strong></strong></strong></strong></h3><p	class='typography typography--size-20-text-roman js-typography bullet__paragraph'
	data-id='es-817'
	>
	The Level 3 ‘Expert’ profile represents the highest level of assessed cyber risk. Suppliers operating at this level are expected to demonstrate expert cyber security capabilities, fully embracing a <em>defence in depth</em> approach. Controls are designed to protect against sophisticated, evolving threats and assume that breaches are possible, focusing on prevention, detection, response, and recovery.</p>	</div>
</div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-821"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-819">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-820'
	>
	It’s important to note that these controls are considered a minimum baseline.&nbsp;</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-824"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-822">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-823'
	>
	Depending on the nature of the contract, the MOD may impose additional cyber requirements on top of DEFSTAN 05-138, raising the bar even further for critical or sensitive work.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-827"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-825">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-826'
	>
	<strong>Enter DCC: Independent certification for defence suppliers</strong></h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-830"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-828">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-829'
	>
	To move beyond self-assessments and strengthen assurance across the defence supply chain, the MOD, together with IASME as the Certification Authority, introduced the <a href="https://iasme.co.uk/defence-cyber-certification/" target="_blank" rel="noreferrer noopener">Defence Cyber Certification (DCC)</a>.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-837"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<a	class="card-simple js-card-simple card-simple--is-ad block-card__card-simple card-simple--has-link js-card-simple-link card-simple__content-align--left"
	data-id="es-831"
	 href='https://infinum.com/cybersecurity/'>

	
	
	<div class="card-simple__content">
		<div class="card-simple__heading-wrap">
			<p	class='typography typography--size-36-text js-typography card-simple__heading'
	data-id='es-832'
	>
	<strong>Got questions about CSM v4 or DCC? Let’s talk.</strong></p>		</div>

		<p	class='typography typography--size-16-text-roman js-typography card-simple__paragraph'
	data-id='es-833'
	 id='es-831-paragraph'>
	AMR CyberSecurity – part of Infinum is a Level 1 certified DCC Certification Body, and our security-cleared consultants are ready to help you navigate the requirements and move forward with confidence.</p><button	class="btn btn--color-infinum btn--size-small btn--width-default btn__icon-position--right card-simple__btn js-block-card-btn js-card-simple-link"
	data-id="es-834"
	 tabindex='-1'>
		<div class="btn__inner">
					<div	class='typography typography--size-none js-typography btn__label'
	data-id='es-835'
	>
	Contact us</div>		
		<i
	class="icon btn__icon icon--size-16 icon--scale-100"
	 aria-hidden='true' data-name='arrow-right-16' data-id='es-836'>
	<svg fill='none' height='16' viewBox='0 0 17 16' width='17' xmlns='http://www.w3.org/2000/svg' xmlns:xlink='http://www.w3.org/1999/xlink'><g stroke='currentColor' stroke-width='2'><path d='m.5 7.99999 14 .00001'/><path d='m9.23352 2.7251 5.97848 5.97852'/><path d='m9.23352 13.2744 5.97848-5.9785'/></g></svg></i>	</div>
	</button>	</div>
</a>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-840"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-838">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-839'
	>
	DCC isn’t a full replacement for the Supplier Assurance Questionnaire (SAQ), at least not yet. But it’s clear that the MOD is positioning DCC as the gold standard for demonstrating cyber maturity.&nbsp;</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-843"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-841">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-842'
	>
	Over time, it’s expected to become more tightly integrated into the Supplier Cyber Protection Service and potentially reduce the burden of repeated self-reporting.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-846"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-844">
	<h3	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-845'
	>
	<strong>How it works:</strong></h3></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-849"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="lists" data-id="es-847">
	<ul	class='typography typography--size-16-text-roman js-typography lists__typography'
	data-id='es-848'
	>
	<li>DCC certification is available in four levels, each aligned to CRP Levels 0 through 3, ensuring suppliers are measured against the appropriate risk threshold.</li><li>Certification offers a point-in-time snapshot of a supplier’s compliance with DEFSTAN 05-138.</li><li>To stay certified, suppliers must complete an annual check-in and undergo full recertification every three years, through an approved DCC Certification Body, such as <strong>AMR CyberSecurity – part of Infinum.</strong></li></ul></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-852"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-850">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-851'
	>
	For suppliers working on sensitive contracts, or for the ones hoping to, DCC is quickly becoming<strong> </strong>table stakes. It’s a proactive way to prove compliance, strengthen your competitive edge in defence tenders, and demonstrate to the MOD that cyber security is not just a policy on paper, but a practice in action.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-855"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-853">
	<h2	class='typography typography--size-36-text js-typography block-typography__typography'
	data-id='es-854'
	>
	<strong>How can we help</strong></h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-858"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-856">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-857'
	>
	Whether you&#8217;re tackling your first Risk Assessment or gearing up for DCC certification,we are here to support you.&nbsp;</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-861"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-859">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-860'
	>
	<span class='screen-reader-text'>As a Level 1 certified DCC Certification Body, we provide more than just checklists. We’ve partnered with both prime contractors and subcontractors throughout the MOD supply chain, helping defence suppliers navigate CSM v4 from day one – whether you&#8217;re assessing your CRP, preparing for DCC, or building a CIP roadmap.</span><span aria-hidden='true'>As a <strong>Level 1-certified DCC Certification Body</strong>, AMR CyberSecurity – part of Infinum provides more than just checklists. We’ve partnered with both prime contractors and subcontractors throughout the MOD supply chain, helping defence suppliers navigate CSM v4 from day one – whether you&#8217;re assessing your CRP, preparing for DCC, or building a CIP roadmap.</span></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-864"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-862">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-863'
	>
	<span class='screen-reader-text'>From independent assessments to hands-on consultancy, we tailor our approach to fit your organisation’s needs, so you’re not just compliant, you’re truly cyber-resilient. If you want to discuss your next steps, contact us.</span><span aria-hidden='true'><em>From independent assessments to hands-on consultancy, we tailor our approach to fit your organisation’s needs, so you’re not just compliant, you’re truly cyber-resilient. If you want to discuss your next steps, <a href="https://infinum.com/cybersecurity/#form" target="_blank" rel="noreferrer noopener">contact</a><a href="https://infinum.com/cybersecurity/#form"> us</a>.</em></span></p></div>	</div>
</div>
</div>		</div>
	</div><p>The post <a href="https://infinum.com/blog/cyber-security-model-v4/">Cyber Security Model v4: How MOD Suppliers Can Prepare for Stricter Cyber Rules</a> appeared first on <a href="https://infinum.com">Infinum</a>.</p>
]]>
				</content:encoded>
			</item>
		
	</channel>
</rss>