A security manager needs a philosophy about how to address security issues, and I find that many elements of mine can be reduced to a few words that almost amount to mantras: \u201cObey the rule of least privilege,\u201d \u201cA company is only as strong as its weakest link,\u201d \u201cSecurity is a process, not a point solution\u201d and \u201cTrust but verify.\u201dThis week I added a new mantra: \u201cCompliance does not equal security.\u201dTrouble TicketAt issue:\u00a0The company has to meet the requirements for a tougher certification of its credit card-handling practices. But at the end of the day, those requirements don\u2019t seem tough enough.Action plan:\u00a0Obtain the budget and resources to go beyond compliance toward true security.This truth has come home to me over the past several months as we have worked to obtain Level 1 PCI compliance. This effort is quite different from achieving other PCI levels, which merely required completing a self-assessment questionnaire and passing quarterly security scans. Instead, we must provide excruciating amounts of evidence to a third-party qualified assessor.The process is exhausting, with more than 400 controls, many of which require the submission of evidence. For example, it isn\u2019t enough to simply check the box stating, \u201cI encrypt credit cards at rest.\u201d Evidence must be submitted proving that the data is really encrypted. In the case of encryption at rest, we simply provide a screenshot of the encrypted value in the database or file system. To prove encryption in transit, we have to show a sample of network traffic (for instance, from a sniffer) that demonstrates that data is truly encrypted.[ ALSO ON CSO:The top 6 Governance, Risk and Compliance certifications\u00a0 ]And yet, despite the tremendous effort to meet the compliance requirements, I have learned that compliance does not equal security. I will explain how I came to realize this.One of the requirements is that companies must prove that they are logging certain activities and regularly reviewing the logs. Some companies will spend hundreds of thousands of dollars deploying state-of-the-art security incident event management infrastructure and hiring a team of security analysts to provide 24\/7 monitoring. Others may hire a third party and offload the collection, correlation and analysis of events on a 24\/7 basis. Such round-the-clock coverage is ideal for detecting indicators of compromise, because hacking activity can occur at any hour of the day, but my company can\u2019t meet that standard. What we do is to log all events and use scripts to search for a few suspicious types of log entries \u2014 and if we don\u2019t have a script for a particular type of suspicious log entry, we won\u2019t see it. If an event is flagged, an email is sent to a distribution list, which we monitor every day, but not 24\/7. I know \u2014 it\u2019s a pathetic situation, and I plan to change it. But the thing is that our pathetic, patchwork monitoring passes PCI. That doesn\u2019t mean, though, that it properly protects our organization. Compliance does not equal security.Another example involves our VPN deployment. We use strong encryption in transit, with a requirement for multifactor authentication for access to our corporate network, and that is enough to pass PCI, no problem. But what PCI doesn\u2019t uncover is the fact that a user with knowledge of VPN configuration settings can obtain VPN software and install it on any computer in the world, placing that untrusted device on our network. We can overcome that problem with Network Admissions Control or other forms of controls that restrict VPN access to only authorized, corporate-owned devices, and I do intend to address this shortcoming in that way sometime soon. The point is, though, that as far as Level 1 PCI is concerned, we\u2019re good to go.I have hardly exhausted the examples, but here is just one more, involving the requirements for antivirus and patch management. Most compliance activities represent a point-in-time state: We demonstrate to the auditor that at the time of the audit, all our PCs and servers were up to date with patches and endpoint protection. It would be far better if the auditor had us prove, via metrics, that we maintained a certain level of compliance throughout the year. Many companies rush to get all devices up to snuff for the auditor, and then relax until the next yearly audit.Compliance is not mere window dressing, but it\u2019s far from a guarantee of security. I will drive that point home as I seek additional budget and head count so that our organization can become more secure, and not merely compliant.This week's journal is written by a real security manager,\u00a0"Mathias Thurman,"\u00a0whose name and employer have been disguised for obvious reasons. Contact him at\firstname.lastname@example.org.Click\u00a0here\u00a0for more security articles.