Compliance pillar

Global control assurance and statutory evidence operations

We track audit opinions, regulator handbooks, and enforcement actions so compliance leaders can anchor internal controls to current statutes across North America, Europe, Asia-Pacific, Latin America, and the Middle East.

Briefings cover COSO-based internal control systems, Sarbanes-Oxley Section 404 testing, EU Corporate Sustainability Reporting Directive (CSRD) disclosures, Digital Operational Resilience Act (DORA) readiness, beneficial ownership reporting, and cross-border privacy obligations. Coverage includes MAS environmental risk management, UAE economic substance rules, EU DAC8 crypto-tax transparency, and Brazil CVM sustainability assurance to balance tax, audit, and environmental coverage across regions.

Latest compliance intelligence

Each update is source-linked to government bulletins, supervisory statements, or enacted legislation so assurance teams can cite primary evidence in audit workpapers.

Compliance · Credibility 94/100 · · 7 min read

EU Digital Operational Resilience Act First Enforcement Wave Reveals ICT Risk Management Gaps Across Financial Sector

The European Supervisory Authorities have initiated the first coordinated enforcement actions under the Digital Operational Resilience Act, issuing supervisory findings to over forty financial institutions across banking, insurance, and investment management. The findings identify pervasive gaps in ICT third-party risk management, incident classification and reporting, and digital operational resilience testing — the three DORA pillars where regulators have focused initial supervisory attention. Financial entities that treated DORA compliance as a documentation exercise rather than an operational-capability-building program are receiving the most severe findings. The enforcement signals confirm that supervisors will assess DORA compliance based on demonstrated operational capability, not just policy documentation.

  • DORA
  • ICT Risk Management
  • Financial Sector Resilience
  • Third-Party Risk
  • Incident Reporting
  • Resilience Testing
Open dedicated page

Compliance · Credibility 94/100 · · 9 min read

HIPAA Security Rule Modernization Proposed Rule Mandates Encryption, MFA, and 72-Hour Recovery

The Department of Health and Human Services has published a proposed rule to modernize the HIPAA Security Rule for the first time since 2013, replacing the current "addressable" implementation specification framework with mandatory minimum security standards. The proposed rule requires encryption of electronic protected health information at rest and in transit without exception, mandates multi-factor authentication for all systems containing ePHI, establishes a 72-hour maximum recovery time objective for critical systems, and introduces annual penetration-testing and vulnerability-scanning requirements. Healthcare organizations and their business associates face a fundamental shift from a flexible, risk-based compliance model to prescriptive security baselines that reflect the modern threat landscape targeting the healthcare sector.

  • HIPAA Security Rule
  • Healthcare Cybersecurity
  • Encryption Mandate
  • Multi-Factor Authentication
  • Recovery Time Objectives
  • Healthcare Compliance
Open dedicated page

Compliance · Credibility 94/100 · · 8 min read

PCI DSS 4.0.1 Clarifications Address Targeted Risk Analysis and Client-Side Script Controls

The PCI Security Standards Council has published PCI DSS version 4.0.1, a limited revision that clarifies several requirements that generated widespread confusion during the first year of PCI DSS 4.0 enforcement. Key clarifications address the scope of targeted risk analyses for flexible implementation requirements, the applicability of client-side JavaScript integrity controls, and the documentation expectations for customized approach validation. While 4.0.1 introduces no new requirements, the clarifications materially affect how qualified security assessors evaluate compliance, and organizations that built their 4.0 programs based on ambiguous language should review their implementations against the updated guidance to avoid assessment findings.

  • PCI DSS 4.0.1
  • Payment Security
  • Targeted Risk Analysis
  • Client-Side Scripts
  • Compliance Assessment
  • Multi-Factor Authentication
Open dedicated page

Compliance · Credibility 94/100 · · 7 min read

DORA Enforcement Intensifies as Financial Sector Faces Operational

The EU Digital Operational Resilience Act (DORA) enforcement has intensified in January 2026, with regulators conducting operational resilience audits and requiring detailed Register of Information submissions. Financial institutions face penalties up to 2% of global turnover for non-compliance, while critical ICT providers face fines up to €5 million. Organizations must demonstrate mature risk management programs with comprehensive third-party oversight documentation.

  • DORA Enforcement
  • Digital Operational Resilience
  • Financial Sector Compliance
  • ICT Risk Management
  • Third-Party Risk
  • EU Regulation
Open dedicated page

Compliance · Credibility 92/100 · · 7 min read

Three New State Privacy Laws Take Effect: Indiana, Kentucky, and Rhode Island

Three new comprehensive state privacy laws became effective January 1, 2026: Indiana Consumer Data Protection Act (ICDPA), Kentucky Consumer Data Protection Act (KCDPA), and Rhode Island Data Transparency and Privacy Protection Act (RIDPA). Rhode Island's law is notable for requiring public disclosure of third parties receiving personal data and having no cure period for violations. Organizations must assess applicability based on varying processing thresholds across all three states.

  • Indiana ICDPA
  • Kentucky KCDPA
  • Rhode Island RIDPA
  • State Privacy Laws
  • Consumer Data Rights
  • Privacy Compliance
Open dedicated page

Featured guide: Compliance operations control room

The Compliance Operations Guide expands this pillar with a 3,250-word playbook that unites Sarbanes-Oxley Section 404 attestations, EU DORA ICT risk controls, DOJ charging considerations, and MAS TRM accountabilities into a single operating model.

  • Synchronise regulatory drivers. Map cross-border obligations from Sarbanes-Oxley, DOJ’s 2023 Evaluation of Corporate Compliance Programs, and DORA’s governance, incident, and third-party mandates into a shared control inventory backed by primary citations.
  • Instrument evidence workflows. Follow the guide’s orchestration blueprint to log control tests, incident response, and third-party oversight directly into workflow engines that satisfy MAS TRM and PCAOB AS 2201 documentation standards.
  • Operationalise metrics and reporting. Use the metrics portfolio to brief boards on remediation velocity, culture indicators, and regulator commitments aligned with U.S. Sentencing Guidelines Chapter 8 and DORA governance reviews.

Compliance fundamentals

Tie internal control, disclosure, and privacy programmes back to the statutes and supervisory guidance we curate, ensuring evidence stands up during audits.

Compliance tips

Implementation checklists for controls, evidence, and certifications aligned with SOX, DORA, GDPR, and global privacy requirements.

Compliance guide collection

Deep-dive playbooks covering Sarbanes-Oxley modernization, ESG assurance, privacy enforcement, and third-party risk oversight distill regulator source material into actionable programmes.

SOX Modernization Control Playbook

Align SEC management guidance, PCAOB AS 2201, and COSO 2013 with automation-ready ICFR controls, evidence hubs, and modernization roadmaps.

ESG Assurance Operating Guide

Operationalise CSRD, ESRS, SEC climate disclosures, and ISSA 5000 with double materiality workflows, data governance, and assurance readiness.

Global Privacy Enforcement Readiness Guide

Build GDPR, CPRA, LGPD, and PDPA programmes with regulator-aligned governance, automation, and breach response controls.

Third-Party Risk Oversight Playbook

Integrate OCC, Federal Reserve, EBA, MAS, and Basel resilience expectations into lifecycle vendor oversight and board reporting.