Governance, Risk, and Compliance (GRC) is the discipline that translates security work into something the business, board, and regulators understand. Done well, it aligns security investment with business risk and produces audit-ready evidence on demand. Done poorly, it generates spreadsheets nobody reads. This module covers the GRC mental model, the major frameworks, and how to set up a function that actually informs decisions.
The three components
- Governance: who decides what, with what authority. Security policies, decision rights, escalation paths, board oversight
- Risk: identifying what could harm the business, assessing likelihood and impact, deciding to accept, mitigate, transfer, or avoid
- Compliance: demonstrating adherence to required standards (regulations, contracts, certifications)
These overlap. A compliance requirement is also a risk if unmet. A governance decision shapes how risks are addressed. Treat them as one ecosystem.
Risk management β the operating loop
- Identify: what threats and vulnerabilities exist that could harm the business?
- Assess: for each risk, estimate likelihood (low/med/high or quantitative) and impact (financial, regulatory, reputational, operational)
- Prioritise: rank by inherent risk score (likelihood Γ impact)
- Treat: choose action β Accept, Mitigate, Transfer (insurance), Avoid (don’t do the thing)
- Implement: deploy controls; track to completion
- Monitor: measure residual risk; review regularly
- Report: communicate risk posture to leadership and board
Most programs fail at #6 β risks logged at one point in time, never revisited. A risk register that hasn’t been updated in 6 months is fiction.
Quantitative vs qualitative risk
- Qualitative β high/medium/low ratings. Easy. Subjective. Useful for prioritisation among many risks
- Quantitative β actual numbers. “Annual loss expectancy = $850K.” Harder. More credible to finance/board. FAIR (Factor Analysis of Information Risk) is the leading methodology
Practical answer: qualitative for fast triage; quantitative for the top 5-10 risks where the analysis effort is justified by decision impact.
Major compliance frameworks
Information security management
- ISO 27001 β international standard for ISMS (Information Security Management System). Process-based; certification widely recognized
- NIST CSF β Cybersecurity Framework. Function-based (Identify, Protect, Detect, Respond, Recover). Voluntary in US; widely adopted
- NIST 800-53 β detailed control catalog. Mandatory for US federal; influential elsewhere
- CIS Controls β prioritised list of practical controls. Excellent starting point for SMEs
Sector-specific
- SOC 2 β service organisation controls. Type 1 (point-in-time), Type 2 (over time). Common requirement for SaaS vendors selling to enterprises
- PCI-DSS β Payment Card Industry Data Security Standard. Mandatory if you handle cardholder data
- HIPAA β US healthcare data protection
- GDPR / DPDP / CCPA β privacy regulations
- RBI guidelines β for Indian banks and financial services
- SEBI cybersecurity framework β for Indian capital markets entities
- NCIIPC requirements β for Indian Critical Information Infrastructure
Industry-specific
- NERC CIP β North American electric utilities
- FedRAMP β US federal cloud
- StateRAMP, GovRAMP β variants
- IRAP β Australian government
- C5 β German cloud
You don’t need every framework. Map your customer/regulator obligations and select. Many requirements overlap β controls satisfying SOC 2 typically satisfy 60-70% of ISO 27001.
Mapping controls across frameworks
If you serve enterprise customers globally, you’ll need multiple. The pattern that works:
- Adopt one comprehensive framework as your “primary” (usually NIST CSF or ISO 27001)
- Implement controls aligned to that framework
- For each additional regime (SOC 2, PCI), maintain a mapping spreadsheet
- Each control collects evidence once; mapping shows which frameworks it satisfies
Tools: SecureFrame, Drata, Vanta, Tugboat β automate evidence collection and framework mapping. Worth the cost for any team pursuing two or more certifications.
Audit readiness β the operational discipline
Audits assess whether your controls operate as documented. Survival approach:
- Document controls β what the control is, who owns it, how it operates, how evidence is collected
- Operate controls consistently β most audit failures are inconsistent operation, not missing controls. “We do quarterly access reviews” but the last one is 7 months old
- Collect evidence continuously β automated where possible. Manual evidence rarely catches up at audit time
- Run internal audits β at half the formal audit cadence. Catch and fix issues before external auditors find them
- Track exceptions and gaps β known issues with treatment plans look better than discovered surprises
Policy hierarchy
Documentation hierarchy that auditors expect:
- Policy β what we will do (high-level, board-approved). Stable for years
- Standard β specific requirements (e.g., minimum password length 14 chars). Updated quarterly to annually
- Procedure β how we operationally satisfy standards (e.g., quarterly access review process). Updated as needed
- Guideline β recommendations, not mandatory
Each level references the level above. A procedure traces to a standard, which traces to a policy. Auditor follows the trace; finds gaps if traces break.
Risk register β what it should contain
For each risk:
- Risk ID and short title
- Description (what could go wrong)
- Inherent likelihood and impact (before controls)
- Existing controls
- Residual likelihood and impact (after controls)
- Risk owner (the person accountable for managing)
- Treatment plan and target date
- Monitoring KPI
- Last reviewed date
Keep it in a system, not a spreadsheet, once it has more than 30 entries. Spreadsheets stop being reviewed at scale.
Board reporting
What the board wants to know:
- Top 5 risks and what we’re doing about them
- Critical incidents this quarter
- Compliance posture by framework (green/yellow/red)
- Major program milestones (audit dates, certification renewals)
- Investment requests with risk-based justification
Format: 1-2 page narrative + heat map of risks + traffic light dashboard. Rarely should board reports exceed 10 pages.
What the next modules cover
Module 2 dives deep into ISO 27001 implementation for Indian organisations. Module 3 covers SOC 2 specifically β the framework most Indian SaaS firms encounter from US enterprise customers. Module 4 covers third-party risk management. Module 5 covers running internal audits effectively.