SlideShare a Scribd company logo
How can a successful
SOC2-compliant ISMS
be built without power,
money and allocated
resources?
Vsevolod Shabad
vshabad@vshabad.com
+7 777 726 4790
Briefly about me: the international octopus
IT Cybersecurity
Cloud
Technologies
Risk
Management
Compliance
Data Science
& ML
Project
Management
Culture
Changes
Fraud
Prevention
🇷🇺 🇰🇿
🇷🇸 🇧🇬
🇸🇬
🇹🇷
Briefly about company
•US vendor of Kubernetes orchestration software
in multi-cloud environments (AWS, Azure, GCP, …)
•Geo-distributed team (~15 people)
•Flat organisational structure led by CTO
What SOC2 means
ISO 27001 SOC2 (SSAE 18)
Formal title
Information security, cybersecurity
and privacy protection — Information security
management systems — Requirements
Statement on Standards
for Attestation Engagements
no. 18
Purpose Information Security Management System Trust Management System
Content
A specific set of controls
(ISO 27001 Annex A, ISO 27002)
+ include/exclude justification
A set of principles:
• Security
• Availability
• Processing Integrity
• Confidentiality
• Privacy
Compliance assessment Periodic
• Periodic (SOC2 Type 1) – processes
and politics
• Continuous (SOC2 Type 2) – controls
efficiency
Information disclosure to interested parties Not intended By NDA
The typical SOC2 report (fragment)
The reasons for the supplier SOC2 certification
• Customer benefit – Due Care
for the Supply Chain Attack risks
• Supplier benefit – the prerequisite
for getting the tenders of large
corporate customers
Sonatype 8th Annual State of the Software Supply Chain report
https://www.sonatype.com/resources/2023-software-supply-chain-report
Three components of Security Governance
WHAT and WHY?
• Standards, Policies, Guidelines
HOW?
• Procedures (+ automation)
BY WHOM?
• Personnel
Information security priority raising
MISSION
VALUES
RISKS
• A general feeling of a large
accumulated technical debt
• Transparency of the sales
pipeline and current state
• Salary delays
+ Personal authority of vCISO
How was chosen the key asset to protect
• Discussed the importance
of focus (thanks to the Kanban
approach!)
• Inventoried the potential threat
actor groups and their interests
• Determined which assets
are most valued for them
The key asset is the
Docker image of the
supplied software
The threat model fragment (STRIDE approach)
Threat Desired Property Preventive control Detective Control
Spoofing Authencity Docker Content Trust DOCKER_CONTENT_TRUST = 1
Tampering Integrity SHA256 Digest Tagging ‘docker pull’ return code
Repudiation Non-Repudiability Personalized Docker Hub accounts Docker Hub Audit Logs
Information Disclosure Confidentiality No No
Denial of Service Availability Docker Hub Download Rate Limit Docker pull timeout
Elevation of Privilege Authorisation Image vulnerability check Falco runtime monitoring
Asset (object) – distributive Docker images of the supplied software
Example of Trust Service Criteria:
CC7.1 To meet its objectives, the entity uses detection and monitoring procedures to identify (1) changes to configurations that
result in the introduction of new vulnerabilities, and (2) susceptibilities to newly discovered vulnerabilities.
First-stage documents
• Key cybersecurity and trust principles
for XXX company
• Acceptable Use Policy
• Release Publishing Policy
• Vulnerability & Patch Management Policy
• Vulnerability Check & Triage
Procedure
• Vulnerability Remediation Procedure
• …
Key cybersecurity and trust principles…
…
Management Principles
• Stewardship and Accountability. Everyone is responsible for protecting the information, and individuals are held accountable.
• Risk Management. The information must not be stored without understanding and formally mitigating or accepting the risk.
• Business Ownership. All employees and independent contractors own information security. Senior managers are involved in determining
and accepting information security risks.
• Privacy. Privacy and security are not a "zero-sum game". All aspects of privacy are weighed and incorporated into security practices.
Architecture Principles
• Defense In-Depth. A system should employ multiple levels of defense such that a single breach of one sub-system does not expose
the entire system directly to an attacker.
• Least Privilege Access. A user, system, or process should only be granted the minimum set of privileges they require to perform their designated job.
• Segmentation. Sub-systems should be partitioned logically and isolated using physical devices and/or security controls.
• …
Statement of Responsibility
• CTO is a senior manager who is ultimately accountable for all information risk assessments, security strategies, planning and budgeting,
incident management, and information security implementation. CTO approves all components of the Company's ISMS and is solely accountable
for authorizing any violation of the policies, standards, and procedures of the Company's ISMS based on his reasoned judgment. CTO provides
a reasonable decision about the ISMS's scope and is solely accountable for all cybersecurity issues out of this scope.
• …
Primarily used tools
•Trivy (+ custom post-processor *)
• Vulnerable third-party packages & libraries
• Vulnerable build tools
• Misconfigurations of Dockerfiles
•Gosec (+custom post-processor *)
• Vulnerable custom source code
* False positives suppression
Key difficulties and ways to overcome
• Too many identified critical
vulnerabilities at the first launch
+ tight release deadlines
• Demonstration of Due Care
• Accepted Compromise:
• Public disclosure of the list
of open critical vulnerabilities
at the moment of new release
• CTO’s personal public commitment
• Private notification of the key
customers about open critical
vulnerabilities two weeks before
the public announce
Building ISMS is a marathon,
not a sprint!
https://calendly.com/vshabad
+7 777 726 4790 (cell, WhatsApp, TG)
vshabad@vshabad.com
https://linkedin.com/in/vshabad

More Related Content

PPTX
For Business's Sake, Let's focus on AppSec
PPTX
Add-Structure-and-Credibility-to-Your-Security-Portfolio-with-CIS-Controls-v8...
PPTX
Lets talk about soc2s, baby! BSidesLV 2021
PDF
DTS Solution - Building a SOC (Security Operations Center)
PDF
Cybersecurity concepts & Defense best practises
PDF
How to Build a Secure IT Infrastructure in 2025.
PDF
Security+ SY0-701 CERTIFICATION TRAINING.pdf
PDF
CompTIA Security+ (Plus) Certification Training Course
For Business's Sake, Let's focus on AppSec
Add-Structure-and-Credibility-to-Your-Security-Portfolio-with-CIS-Controls-v8...
Lets talk about soc2s, baby! BSidesLV 2021
DTS Solution - Building a SOC (Security Operations Center)
Cybersecurity concepts & Defense best practises
How to Build a Secure IT Infrastructure in 2025.
Security+ SY0-701 CERTIFICATION TRAINING.pdf
CompTIA Security+ (Plus) Certification Training Course

Similar to How can a successful SOC2-compliant ISMS be built without power, money and allocated resources? (20)

PDF
CompTIA_Security_plus_SY0-701_course_content.pdf
PDF
CompTIA_Security_plus_SY0-701_course_content.pdf
PDF
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
PDF
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
PPTX
CISSP Domain 03 Security Architecture and Engineering.pptx
PDF
Secure the modern Enterprise
PPTX
Zero Trust 20211105
PPTX
Threat modelling(system + enterprise)
PPTX
Regulated Reactive - Security Considerations for Building Reactive Systems in...
PPTX
Sdl deployment in ics
PDF
Careers in Cyber Security
PDF
Building a Cyber Security Operations Center for SCADA/ICS Environments
PPTX
chapitre1-cloud security basics-23 (1).pptx
PPTX
Incident Response and Contingency Plan Training for Virtustream Healthcare Cl...
PPSX
TSS - App Penetration Testing Services
PPTX
Cloud Security Zen: Principles to Meditate On
PPTX
The New Security Practitioner
PDF
Cybersecurity_Security_architecture_2023.pdf
PDF
CA_Module_2.pdf
PDF
Monotype Enterprise Complete Scan Report 2024
CompTIA_Security_plus_SY0-701_course_content.pdf
CompTIA_Security_plus_SY0-701_course_content.pdf
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
CISSP Domain 03 Security Architecture and Engineering.pptx
Secure the modern Enterprise
Zero Trust 20211105
Threat modelling(system + enterprise)
Regulated Reactive - Security Considerations for Building Reactive Systems in...
Sdl deployment in ics
Careers in Cyber Security
Building a Cyber Security Operations Center for SCADA/ICS Environments
chapitre1-cloud security basics-23 (1).pptx
Incident Response and Contingency Plan Training for Virtustream Healthcare Cl...
TSS - App Penetration Testing Services
Cloud Security Zen: Principles to Meditate On
The New Security Practitioner
Cybersecurity_Security_architecture_2023.pdf
CA_Module_2.pdf
Monotype Enterprise Complete Scan Report 2024
Ad

More from Vsevolod Shabad (20)

PDF
AI Safety and Security - the basement of customer trust
PDF
Slash Incident Resolution Time - From 30 Days to 1
PDF
Почему нужно бояться искусственного интеллекта и как это правильно делать
PDF
Опыт разработки стратегии ИБ и киберзащиты производственной инфраструктуры в...
PDF
Agile-подходы в ИБ
PDF
State regulation of information protection in the cloud - international and K...
PDF
Государственное регулирование защиты данных в облаках - международный и каза...
PDF
Первые шаги нового CISO
PDF
С широко закрытыми глазами - риск-ориентированный подход к миграции в облака
PDF
Public clouds - tasty but scary
PDF
Building a cybersecurity strategy for growing companies (IDC Day 2022 - Tashk...
PDF
Public clouds: to love passionately, to be afraid, or to hate (IDC Security D...
PDF
Как повысить результативность борьбы с фродом: опыт "Халык Банка"
PDF
Как оценить пользу от ИБ и увязать с нею инвестиции в безопасность
PDF
Проекты по обеспечению непрерывности бизнеса: ЧТО, ЗАЧЕМ, КАК и ПОЧЕМУ ТАК ДО...
PDF
ITIL, SCRUM, Kanban in Cybersecurity
PDF
Обработка спйсмоданных: возможности оптимизации ИТ-инфраструктуры
PDF
Гидродинамическое моделирование: возможности оптимизации ИТ-инфраструктуры
PDF
Мощнее или умнее? Возможности оптимизации ИТ-инфраструктуры для сейсмики
PDF
СХД для обработки сейсмики: сравнительный обзор
AI Safety and Security - the basement of customer trust
Slash Incident Resolution Time - From 30 Days to 1
Почему нужно бояться искусственного интеллекта и как это правильно делать
Опыт разработки стратегии ИБ и киберзащиты производственной инфраструктуры в...
Agile-подходы в ИБ
State regulation of information protection in the cloud - international and K...
Государственное регулирование защиты данных в облаках - международный и каза...
Первые шаги нового CISO
С широко закрытыми глазами - риск-ориентированный подход к миграции в облака
Public clouds - tasty but scary
Building a cybersecurity strategy for growing companies (IDC Day 2022 - Tashk...
Public clouds: to love passionately, to be afraid, or to hate (IDC Security D...
Как повысить результативность борьбы с фродом: опыт "Халык Банка"
Как оценить пользу от ИБ и увязать с нею инвестиции в безопасность
Проекты по обеспечению непрерывности бизнеса: ЧТО, ЗАЧЕМ, КАК и ПОЧЕМУ ТАК ДО...
ITIL, SCRUM, Kanban in Cybersecurity
Обработка спйсмоданных: возможности оптимизации ИТ-инфраструктуры
Гидродинамическое моделирование: возможности оптимизации ИТ-инфраструктуры
Мощнее или умнее? Возможности оптимизации ИТ-инфраструктуры для сейсмики
СХД для обработки сейсмики: сравнительный обзор
Ad

Recently uploaded (20)

PDF
Module 3 - Functions of the Supervisor - Part 1 - Student Resource (1).pdf
PDF
1911 Gold Corporate Presentation Aug 2025.pdf
PDF
Daniels 2024 Inclusive, Sustainable Development
PDF
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
PDF
NewBase 12 August 2025 Energy News issue - 1812 by Khaled Al Awadi_compresse...
PPTX
sales presentation، Training Overview.pptx
PDF
Introduction to Generative Engine Optimization (GEO)
PDF
Module 2 - Modern Supervison Challenges - Student Resource.pdf
PDF
How to Get Funding for Your Trucking Business
PDF
Solara Labs: Empowering Health through Innovative Nutraceutical Solutions
PPTX
Board-Reporting-Package-by-Umbrex-5-23-23.pptx
PDF
How to Get Approval for Business Funding
PDF
Tata consultancy services case study shri Sharda college, basrur
PDF
Outsourced Audit & Assurance in USA Why Globus Finanza is Your Trusted Choice
PPTX
Negotiation and Persuasion Skills: A Shrewd Person's Perspective
PDF
Deliverable file - Regulatory guideline analysis.pdf
PPTX
operations management : demand supply ch
PDF
Solaris Resources Presentation - Corporate August 2025.pdf
PDF
NISM Series V-A MFD Workbook v December 2024.khhhjtgvwevoypdnew one must use ...
PDF
How to Get Business Funding for Small Business Fast
Module 3 - Functions of the Supervisor - Part 1 - Student Resource (1).pdf
1911 Gold Corporate Presentation Aug 2025.pdf
Daniels 2024 Inclusive, Sustainable Development
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
NewBase 12 August 2025 Energy News issue - 1812 by Khaled Al Awadi_compresse...
sales presentation، Training Overview.pptx
Introduction to Generative Engine Optimization (GEO)
Module 2 - Modern Supervison Challenges - Student Resource.pdf
How to Get Funding for Your Trucking Business
Solara Labs: Empowering Health through Innovative Nutraceutical Solutions
Board-Reporting-Package-by-Umbrex-5-23-23.pptx
How to Get Approval for Business Funding
Tata consultancy services case study shri Sharda college, basrur
Outsourced Audit & Assurance in USA Why Globus Finanza is Your Trusted Choice
Negotiation and Persuasion Skills: A Shrewd Person's Perspective
Deliverable file - Regulatory guideline analysis.pdf
operations management : demand supply ch
Solaris Resources Presentation - Corporate August 2025.pdf
NISM Series V-A MFD Workbook v December 2024.khhhjtgvwevoypdnew one must use ...
How to Get Business Funding for Small Business Fast

How can a successful SOC2-compliant ISMS be built without power, money and allocated resources?

  • 1. How can a successful SOC2-compliant ISMS be built without power, money and allocated resources? Vsevolod Shabad vshabad@vshabad.com +7 777 726 4790
  • 2. Briefly about me: the international octopus IT Cybersecurity Cloud Technologies Risk Management Compliance Data Science & ML Project Management Culture Changes Fraud Prevention 🇷🇺 🇰🇿 🇷🇸 🇧🇬 🇸🇬 🇹🇷
  • 3. Briefly about company •US vendor of Kubernetes orchestration software in multi-cloud environments (AWS, Azure, GCP, …) •Geo-distributed team (~15 people) •Flat organisational structure led by CTO
  • 4. What SOC2 means ISO 27001 SOC2 (SSAE 18) Formal title Information security, cybersecurity and privacy protection — Information security management systems — Requirements Statement on Standards for Attestation Engagements no. 18 Purpose Information Security Management System Trust Management System Content A specific set of controls (ISO 27001 Annex A, ISO 27002) + include/exclude justification A set of principles: • Security • Availability • Processing Integrity • Confidentiality • Privacy Compliance assessment Periodic • Periodic (SOC2 Type 1) – processes and politics • Continuous (SOC2 Type 2) – controls efficiency Information disclosure to interested parties Not intended By NDA
  • 5. The typical SOC2 report (fragment)
  • 6. The reasons for the supplier SOC2 certification • Customer benefit – Due Care for the Supply Chain Attack risks • Supplier benefit – the prerequisite for getting the tenders of large corporate customers Sonatype 8th Annual State of the Software Supply Chain report https://www.sonatype.com/resources/2023-software-supply-chain-report
  • 7. Three components of Security Governance WHAT and WHY? • Standards, Policies, Guidelines HOW? • Procedures (+ automation) BY WHOM? • Personnel
  • 8. Information security priority raising MISSION VALUES RISKS • A general feeling of a large accumulated technical debt • Transparency of the sales pipeline and current state • Salary delays + Personal authority of vCISO
  • 9. How was chosen the key asset to protect • Discussed the importance of focus (thanks to the Kanban approach!) • Inventoried the potential threat actor groups and their interests • Determined which assets are most valued for them The key asset is the Docker image of the supplied software
  • 10. The threat model fragment (STRIDE approach) Threat Desired Property Preventive control Detective Control Spoofing Authencity Docker Content Trust DOCKER_CONTENT_TRUST = 1 Tampering Integrity SHA256 Digest Tagging ‘docker pull’ return code Repudiation Non-Repudiability Personalized Docker Hub accounts Docker Hub Audit Logs Information Disclosure Confidentiality No No Denial of Service Availability Docker Hub Download Rate Limit Docker pull timeout Elevation of Privilege Authorisation Image vulnerability check Falco runtime monitoring Asset (object) – distributive Docker images of the supplied software Example of Trust Service Criteria: CC7.1 To meet its objectives, the entity uses detection and monitoring procedures to identify (1) changes to configurations that result in the introduction of new vulnerabilities, and (2) susceptibilities to newly discovered vulnerabilities.
  • 11. First-stage documents • Key cybersecurity and trust principles for XXX company • Acceptable Use Policy • Release Publishing Policy • Vulnerability & Patch Management Policy • Vulnerability Check & Triage Procedure • Vulnerability Remediation Procedure • …
  • 12. Key cybersecurity and trust principles… … Management Principles • Stewardship and Accountability. Everyone is responsible for protecting the information, and individuals are held accountable. • Risk Management. The information must not be stored without understanding and formally mitigating or accepting the risk. • Business Ownership. All employees and independent contractors own information security. Senior managers are involved in determining and accepting information security risks. • Privacy. Privacy and security are not a "zero-sum game". All aspects of privacy are weighed and incorporated into security practices. Architecture Principles • Defense In-Depth. A system should employ multiple levels of defense such that a single breach of one sub-system does not expose the entire system directly to an attacker. • Least Privilege Access. A user, system, or process should only be granted the minimum set of privileges they require to perform their designated job. • Segmentation. Sub-systems should be partitioned logically and isolated using physical devices and/or security controls. • … Statement of Responsibility • CTO is a senior manager who is ultimately accountable for all information risk assessments, security strategies, planning and budgeting, incident management, and information security implementation. CTO approves all components of the Company's ISMS and is solely accountable for authorizing any violation of the policies, standards, and procedures of the Company's ISMS based on his reasoned judgment. CTO provides a reasonable decision about the ISMS's scope and is solely accountable for all cybersecurity issues out of this scope. • …
  • 13. Primarily used tools •Trivy (+ custom post-processor *) • Vulnerable third-party packages & libraries • Vulnerable build tools • Misconfigurations of Dockerfiles •Gosec (+custom post-processor *) • Vulnerable custom source code * False positives suppression
  • 14. Key difficulties and ways to overcome • Too many identified critical vulnerabilities at the first launch + tight release deadlines • Demonstration of Due Care • Accepted Compromise: • Public disclosure of the list of open critical vulnerabilities at the moment of new release • CTO’s personal public commitment • Private notification of the key customers about open critical vulnerabilities two weeks before the public announce
  • 15. Building ISMS is a marathon, not a sprint! https://calendly.com/vshabad +7 777 726 4790 (cell, WhatsApp, TG) vshabad@vshabad.com https://linkedin.com/in/vshabad