Custom Compliance Standards
While UTMStack provides pre-built compliance frameworks for major standards like HIPAA, SOC 2, and CMMC, many organizations need to monitor compliance with custom requirements, industry-specific regulations, or internal security policies. UTMStack’s flexible compliance engine allows you to create and monitor custom compliance standards.
When to Use Custom Standards
Consider creating custom compliance standards when:
- Your industry has specific regulatory requirements not covered by standard frameworks
- Your organization has internal security policies requiring monitoring
- You need to combine requirements from multiple frameworks
- You operate in multiple jurisdictions with different compliance needs
- You have contractual obligations with specific compliance requirements
Best Practice: Even when using pre-built standards, create custom controls for organization-specific policies and procedures that extend beyond regulatory baselines.
Custom Compliance Architecture
Compliance Components
A custom compliance standard consists of several components:
{
"standard": {
"name": "Financial Services Security Standard",
"version": "1.0",
"description": "Custom compliance standard for financial services operations",
"domains": [
{
"id": "FSSS-AC",
"name": "Access Control",
"controls": [
{
"id": "FSSS-AC-01",
"description": "Multi-factor authentication required for all financial system access",
"rules": ["mfa_enforcement", "financial_system_access"],
"evidence_requirements": ["authentication_logs", "mfa_usage_reports"]
}
]
}
]
}
}
Control Hierarchy
Organize custom standards in a logical hierarchy:
- Standard: Top-level compliance framework
- Domains: Logical groupings of related controls (e.g., Access Control, Data Protection)
- Controls: Specific security requirements or objectives
- Rules: UTMStack detection rules that validate control implementation
- Evidence: Logs, events, and reports that demonstrate compliance
Creating Custom Standards
Step 1: Define Requirements
Identify and document your compliance requirements:
- Review applicable regulations and standards
- Document internal security policies
- Identify contractual obligations
- Consult with legal and compliance teams
- Map requirements to technical controls
Step 2: Design Control Framework
Organize requirements into a structured framework:
standard_name: PCI DSS Custom Extension
version: 1.0
domains:
- name: Enhanced Authentication
controls:
- id: PCI-AUTH-01
description: Biometric authentication for card data access
severity: high
required_evidence:
- biometric_authentication_logs
- access_audit_trail
monitoring_frequency: real-time
- name: Advanced Encryption
controls:
- id: PCI-ENC-01
description: AES-256 encryption for all cardholder data
severity: critical
required_evidence:
- encryption_status_logs
- key_management_audit
monitoring_frequency: continuous
Step 3: Create Detection Rules
Develop UTMStack rules to monitor each control:
{
"rule": {
"name": "FSSS-AC-01: MFA Not Used for Financial System",
"description": "Detects financial system access without MFA",
"severity": "high",
"query": {
"bool": {
"must": [
{"match": {"event.category": "authentication"}},
{"match": {"event.outcome": "success"}},
{"match": {"app.name": "financial_system"}}
],
"must_not": [
{"exists": {"field": "auth.mfa.verified"}}
]
}
},
"actions": [
{
"type": "alert",
"priority": "high",
"notify": ["[email protected]", "[email protected]"]
},
{
"type": "ticket",
"system": "jira",
"project": "COMPLIANCE",
"issue_type": "Violation"
}
]
}
}
Specify what evidence should be collected for each control:
- Log Sources: Systems and applications providing evidence
- Retention Period: How long evidence must be retained
- Storage Location: Where evidence is archived
- Access Controls: Who can access compliance evidence
Compliance Tip: Retention periods should align with regulatory requirements. When in doubt, retain evidence longer rather than shorter.
Step 5: Build Compliance Dashboard
Create a dashboard to visualize compliance status:
- Overall compliance score
- Control status by domain
- Recent violations and exceptions
- Evidence collection status
- Trending and historical analysis
Example: Custom GDPR Monitoring
Here’s a complete example for custom GDPR compliance monitoring:
GDPR Control Definition
{
"standard": "GDPR Data Protection",
"domains": [
{
"name": "Data Subject Rights",
"controls": [
{
"id": "GDPR-DSR-01",
"article": "Article 15",
"requirement": "Right of access by the data subject",
"description": "Monitor and track all data subject access requests",
"monitoring": {
"data_sources": ["privacy_portal", "email_gateway", "customer_service"],
"detection_criteria": "subject_access_request keyword or form submission",
"response_sla": "30 days",
"escalation": "[email protected]"
}
},
{
"id": "GDPR-DSR-02",
"article": "Article 17",
"requirement": "Right to erasure (right to be forgotten)",
"description": "Track deletion requests and verify complete data removal",
"monitoring": {
"data_sources": ["all_databases", "backup_systems", "third_party_processors"],
"verification": "automated_deletion_audit",
"response_sla": "30 days",
"evidence": "deletion_certificate"
}
}
]
},
{
"name": "Data Breach Notification",
"controls": [
{
"id": "GDPR-BREACH-01",
"article": "Article 33",
"requirement": "Notification of breach to supervisory authority",
"description": "Detect potential personal data breaches and ensure 72-hour notification",
"monitoring": {
"detection": "automated_breach_detection",
"workflow": "breach_assessment_and_notification",
"notification_sla": "72 hours",
"required_documentation": [
"breach_nature",
"affected_individuals_count",
"consequences",
"remediation_measures"
]
}
}
]
}
]
}
GDPR Monitoring Rules
// Rule: GDPR-DSR-01 - Track Subject Access Requests
{
name: "GDPR Subject Access Request Received",
description: "Detects and tracks data subject access requests",
severity: "medium",
query: `
event.category: "web" AND
(request.body: "subject access request" OR
form.type: "sar_submission" OR
email.subject: "GDPR access request")
`,
enrichment: {
extract_fields: ["data_subject.email", "request.timestamp", "request.scope"],
create_case: true,
due_date: "30 days",
assign_to: "privacy_team"
}
}
// Rule: GDPR-BREACH-01 - Detect Potential Data Breaches
{
name: "GDPR Potential Personal Data Breach",
description: "Detects events indicating potential breach of personal data",
severity: "critical",
query: `
(event.category: "database" AND action: "bulk_export" AND record_count: >1000) OR
(event.category: "file_access" AND file.classification: "personal_data" AND
user.type: "unauthorized") OR
(event.category: "malware" AND data.classification: "personal_data")
`,
actions: [
{
type: "immediate_alert",
notify: ["[email protected]", "[email protected]"]
},
{
type: "create_incident",
template: "gdpr_breach_assessment",
severity: "critical",
sla: "72 hours"
},
{
type: "start_workflow",
workflow: "breach_notification_process"
}
]
}
Industry-Specific Examples
Financial Services (Custom PCI DSS)
standard: Enhanced PCI DSS
extends: pci_dss_v4
custom_controls:
- id: EPCI-TXN-01
description: Real-time transaction monitoring for anomalies
threshold: $10,000 single transaction or $50,000 daily aggregate
monitoring: continuous
- id: EPCI-GEO-01
description: Geographic access restrictions for cardholder data
allowed_countries: [US, CA, UK]
alert_on: access_from_disallowed_country
Healthcare (Custom HIPAA)
standard: Extended HIPAA Security
extends: hipaa
custom_controls:
- id: EHIPAA-TELEMEDICINE-01
description: Telemedicine platform security monitoring
requirements:
- end_to_end_encryption
- session_recording_disabled
- patient_consent_verified
- provider_authentication
- id: EHIPAA-RESEARCH-01
description: De-identification verification for research data
validation: automated_phi_detection
approval: irb_required
Manufacturing (Custom CMMC)
standard: Supply Chain Security Standard
extends: cmmc_level2
custom_controls:
- id: SCSS-SUPPLIER-01
description: Third-party supplier access monitoring
requirements:
- dedicated_supplier_portal
- time_limited_access
- data_access_logging
- quarterly_access_review
Integration Tip: Custom standards can extend pre-built frameworks, inheriting all controls and adding your specific requirements.
Compliance Automation
Automated Control Testing
Schedule regular automated testing of controls:
{
"control_test": {
"control_id": "FSSS-AC-01",
"test_schedule": "daily",
"test_type": "automated",
"test_procedure": {
"step1": "Query authentication logs for financial system access",
"step2": "Verify MFA was used for each access event",
"step3": "Calculate compliance percentage",
"step4": "Generate exception report for non-compliant events"
},
"success_criteria": "100% of access events use MFA",
"failure_action": "alert_compliance_team"
}
}
Continuous Compliance Scoring
Calculate real-time compliance scores:
- Domain scores: Compliance level for each domain
- Overall score: Aggregate compliance across all controls
- Trend analysis: Compliance trajectory over time
- Risk scoring: Weight controls by risk level
Exception Management
Track and manage compliance exceptions:
{
"exception": {
"control_id": "FSSS-ENC-02",
"description": "Legacy system cannot support required encryption standard",
"risk_level": "medium",
"compensating_controls": [
"Network segmentation isolates legacy system",
"Enhanced monitoring of all access",
"Quarterly penetration testing"
],
"remediation_plan": "System upgrade scheduled for Q3 2026",
"approved_by": "CISO",
"approval_date": "2026-01-15",
"expiration_date": "2026-09-30"
}
}
Custom Compliance Reporting
Executive Dashboard
High-level compliance overview for leadership:
- Overall compliance percentage
- Compliance by domain
- Critical violations requiring attention
- Trending and improvement metrics
- Comparison to previous periods
Technical Report
Detailed report for security and compliance teams:
- Control-by-control assessment
- Evidence collection status
- Detailed violation logs
- Remediation tracking
- Testing results
Audit Report
Audit-ready evidence packages:
- Control objectives and implementation
- Evidence organized by control
- Testing methodology and results
- Exception documentation
- Compliance certifications
Report Customization: Use UTMStack’s report builder to create custom reports that match your organization’s format and branding requirements.
Best Practices
Control Design
- Measurable: Controls should have clear, measurable success criteria
- Automated: Prefer automated monitoring over manual checks
- Actionable: Controls should trigger specific remediation actions
- Documented: Maintain clear documentation for each control
Rule Development
- Accurate: Minimize false positives through careful rule tuning
- Complete: Ensure rules cover all aspects of the control
- Tested: Validate rules before production deployment
- Maintained: Regularly review and update rules
Evidence Management
- Comprehensive: Collect sufficient evidence to demonstrate compliance
- Secure: Protect compliance evidence from tampering
- Retained: Maintain evidence for required retention periods
- Accessible: Ensure evidence can be retrieved for audits
Governance
- Version Control: Track changes to compliance standards
- Change Management: Formal process for modifying controls
- Regular Review: Quarterly review of custom standards
- Stakeholder Input: Include security, legal, and business teams
Migration and Updates
Managing changes to custom compliance standards:
- Version Management: Maintain version history of standards
- Impact Analysis: Assess impact of proposed changes
- Phased Rollout: Implement changes gradually
- Parallel Monitoring: Run old and new standards simultaneously during transition
- Validation: Verify new controls work as expected
- Documentation: Update all compliance documentation