Loading Form...
Thank you
Oct 28, 2020 | 3 minute read
written by Simon Stacey
If you are evaluating an eCommerce solution, the security of your customer and corporate data is extremely important. You likely want to understand what the security program of your potential eCommerce partner includes. A key aspect of leading security programs is compliance. In this blog, we will explore what compliance is and why it matters for digitally-driven brands.
Compliance is a third party adjudicated process of ensuring that an environment has been deployed to a certain level of security confidence. The goal for any deployment of an ecommerce solution is to inspire trust in your brand and to provide a reliable platform for online commerce. Compliance ensures that ecommerce platforms can reliably transact business without the individual customer having to independently audit every single online store they come across. Compliance enables businesses to feel confident that their shopper’s personal information will not be leaked online.
Compliance is a complicated process of ensuring that corporations can trust each other without the requirement to spend weeks auditing each other for every deal. It enables mutual trust and transparency to ensure that if we work together, we will not show up in the news. This process ensures that no one is the link in the chain that causes a shutdown of the client's global fleet due to a vendor being compromised.
There is a difference between being compliant and being secure. Compliance is primarily an exercise in ensuring that the environment in question complies with baseline standards. While the practice of security is to prevent compromise and ensure continued successful business operation. Baseline regulations are of use; however, a successful security practice goes beyond checking boxes.
There is a natural conflict between seamless business flow and ensuring that an environment is sealed enough not to leak. A good security practice is in service to the successful running of the enterprise and must be accommodating. Needless restrictions that inhibit flow will in reality cause workarounds to be created that will be significantly worse than if the restriction was designed around the use case to start with. For example, it is better to just install VLC onto every desktop then to have users download adware infested apps when they need to play that cute birthday video.
Compliance regulations such as PCI, SOC 2, GDPR, and CCPA can be of use in demonstrating the business value of security at an executive and board level. However, at a technical level, these regulations should not be the limit or only blueprint for how to safeguard a system. A good compliance program takes the stipulations of PCI and uses them as a guide to implement a strong security culture.
When evaluating the results of a particular vendor's compliance process as an interested client there are a few things to keep in mind:
As the world becomes more and more focused on digital experiences, compliance is vitally important to successfully enable a shift of commerce from the past into the digitally-focused future. Compliance allows the executive team to sleep easy knowing that they will not show up in the news as the latest cautionary story.