In my last post, I discussed compliance frameworks, postulating that they should be a starting point for our attempts to secure our networks and not a be-all-end-all goal. Getting beyond the compliance is the goal of this post. I don’t wish to be taken as bashing compliance. As I’ve previously discussed, compliance is a strong corporate motivator to exercise at least the minimum recognized security controls to show due diligence. Compliance frameworks also serve as a common language, ensuring that practitioners, academics, and business managers alike can form an understanding. Frameworks normally cover the most common situations and thereby reduce the amount of work required to develop a reasonably secure network. The problem comes, however, when threat or technology changes outpace the changes to the framework, or our business requirements don’t fit neatly into the mold of common implementations. In the last two of these examples, a network ...