Framework Guides
Detailed guides for each compliance framework supported in PartnerAlly.
Framework Guides
Each compliance framework has specific requirements, terminology, and approaches. These guides help you understand what each framework requires and how to achieve compliance.
Supported Frameworks
SOC 2
Service Organization Control 2 for service providers
ISO 27001
International standard for information security management
HIPAA
Health Insurance Portability and Accountability Act
GDPR
General Data Protection Regulation (EU)
PCI DSS
Payment Card Industry Data Security Standard
AML/BSA
Anti-Money Laundering and Bank Secrecy Act
SOC 2
What Is SOC 2?
SOC 2 (Service Organization Control Type 2) is an auditing framework that verifies service providers securely manage data. It's based on five Trust Service Criteria.
Trust Service Criteria
| Criteria | Focus |
|---|---|
| Security | Protection against unauthorized access |
| Availability | System availability for operation |
| Processing Integrity | Accurate, complete processing |
| Confidentiality | Protection of confidential information |
| Privacy | Collection, use, and disposal of personal information |
Key Requirements
- Security policies and procedures
- Access control mechanisms
- Change management processes
- Incident response procedures
- Risk management program
Preparing for SOC 2 Audit
SOC 2 Type II audits cover a period (usually 6-12 months) and test operating effectiveness. Plan ahead to have evidence covering the entire period.
- Enable SOC 2 framework in PartnerAlly
- Upload all relevant policies
- Review and remediate gaps
- Collect evidence throughout the period
- Engage an auditor
ISO 27001
What Is ISO 27001?
ISO 27001 is an international standard for information security management systems (ISMS). It provides a framework for managing security risks.
Structure
| Component | Description |
|---|---|
| Clauses 4-10 | Management system requirements |
| Annex A | 93 controls across 4 themes (ISO 27001:2022) |
Annex A Themes
- Organizational Controls (37 controls)
- People Controls (8 controls)
- Physical Controls (14 controls)
- Technological Controls (34 controls)
Key Requirements
- Information security policy
- Risk assessment process
- Statement of Applicability (SoA)
- Internal audit program
- Management review process
Achieving ISO 27001 Certification
- Define ISMS scope
- Conduct risk assessment
- Implement controls
- Conduct internal audit
- Undergo certification audit
HIPAA
What Is HIPAA?
HIPAA (Health Insurance Portability and Accountability Act) protects health information privacy and security. It applies to covered entities and business associates.
Key Rules
| Rule | Focus |
|---|---|
| Privacy Rule | How PHI can be used and disclosed |
| Security Rule | Technical and physical safeguards |
| Breach Notification | Reporting requirements for breaches |
Safeguards
Administrative Safeguards:
- Security management process
- Assigned security responsibility
- Workforce security
- Information access management
- Security awareness training
- Contingency plan
- Evaluation
Physical Safeguards:
- Facility access controls
- Workstation use and security
- Device and media controls
Technical Safeguards:
- Access control
- Audit controls
- Integrity
- Transmission security
HIPAA Compliance in PartnerAlly
- Enable HIPAA framework
- Upload BAA templates and policies
- Document safeguards implementation
- Conduct required risk assessment
- Track ongoing compliance
GDPR
What Is GDPR?
GDPR (General Data Protection Regulation) is the EU's data protection law. It applies to organizations processing EU residents' data.
Key Principles
| Principle | Requirement |
|---|---|
| Lawfulness | Legal basis for processing |
| Purpose Limitation | Specific, legitimate purposes |
| Data Minimization | Only necessary data |
| Accuracy | Keep data accurate |
| Storage Limitation | Don't keep longer than needed |
| Security | Appropriate security measures |
| Accountability | Demonstrate compliance |
Data Subject Rights
- Right to access
- Right to rectification
- Right to erasure
- Right to restrict processing
- Right to data portability
- Right to object
GDPR Compliance Steps
- Map data processing activities
- Establish lawful bases
- Implement security measures
- Document processing
- Enable data subject rights
GDPR requires demonstrating compliance, not just achieving it. Documentation is essential.
PCI DSS
What Is PCI DSS?
PCI DSS (Payment Card Industry Data Security Standard) protects cardholder data. It applies to any organization handling payment cards.
Requirements
| Requirement | Focus |
|---|---|
| 1-2 | Network security |
| 3-4 | Cardholder data protection |
| 5-6 | Vulnerability management |
| 7-9 | Access control |
| 10-11 | Monitoring and testing |
| 12 | Security policies |
Compliance Levels
Based on transaction volume:
- Level 1: Over 6 million transactions (annual assessment)
- Level 2: 1-6 million transactions
- Level 3: 20,000-1 million e-commerce
- Level 4: Under 20,000 e-commerce
Key Controls
- Encrypt cardholder data
- Restrict access on need-to-know basis
- Regular vulnerability scans
- Penetration testing
- Security awareness training
AML/BSA
What Is AML/BSA?
Anti-Money Laundering (AML) and Bank Secrecy Act (BSA) regulations combat financial crimes. Required for financial institutions and money services businesses.
Key Requirements
| Requirement | Description |
|---|---|
| Customer Due Diligence | Know Your Customer (KYC) |
| Transaction Monitoring | Detect suspicious activity |
| SAR Filing | Report suspicious activity |
| CTR Filing | Report large cash transactions |
| Recordkeeping | Maintain required records |
Crypto-Specific AML
For cryptocurrency businesses:
- Travel Rule compliance
- Wallet screening
- Blockchain analytics
- Exchange monitoring
Choosing Your Frameworks
Factors to Consider
| Factor | Questions |
|---|---|
| Industry | What's required for your industry? |
| Customers | What do customers require? |
| Geography | What regulations apply where? |
| Data Types | What data do you handle? |
| Business Model | Service provider? Processor? |
Common Combinations
| Business Type | Typical Frameworks |
|---|---|
| SaaS Company | SOC 2, GDPR |
| Healthcare SaaS | SOC 2, HIPAA, GDPR |
| FinTech | SOC 2, PCI DSS, AML |
| Crypto Exchange | AML, SOC 2 |
| Enterprise Software | SOC 2, ISO 27001 |
Next Steps
- Best Practices - Implementation guidance
- Video Tutorials - Visual guides
- Framework Settings - Enable frameworks