{"id":38,"date":"2020-04-06T11:32:00","date_gmt":"2020-04-06T11:32:00","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=38"},"modified":"2020-06-04T01:36:07","modified_gmt":"2020-06-04T01:36:07","slug":"common-mistakes-app-sec-monitoring","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/common-mistakes-app-sec-monitoring\/","title":{"rendered":"Common Mistakes in App Sec Monitoring for Compliance"},"content":{"rendered":"<p>When it comes to application security monitoring, there are three major mistakes that companies make: Not knowing what they\u2019re on the hook for, an inability to catch mistakes and insufficient or nonexistent follow through. There are a number of things that go into each of these mistakes, so let\u2019s break it down.<\/p>\n<p>Compliance tends to come from legal departments. Info sec plays a part in compliance and can be a bridge, and privacy departments which are typically led by lawyers are involved as well. What happens is these three departments come together and determine that the company should be incorporating certain compliance guidelines and will write an OISP. If your company needs to be HIPAA, PCI or GDPR compliant, your OISP will include language for that. The problem isn\u2019t knowing where the business needs to be compliant, it\u2019s ensuring that the information is disseminated throughout the company.<\/p>\n<p>The first mistake companies make is that companies are not aware of what they\u2019re actually on the hook for outside of a small group. That information is not disseminated through the company at least not in a digestable way. For example, if a company needs to be HIPAA or GDPR compliant, the executives in the company might know that they\u2019re on the hook for 4% of their annual gross revenue as a fine. However, the developers on the front lines of the business have no clue that not having a way to thoroughly delete all of a users info on demand is risking millions or billions of dollars. So step one is ensuring that people outside of the executive pool and the directly complaince-related departments actually facilitate maintaining compliance by understanding what\u2019s on the line if they don\u2019t.<\/p>\n<p>The second mistake is failing to understand that you have to catch ignorance because you can never totally prevent it. Lack of knowledge in compliance is a problem, so even if you\u2019re educating your employees, you have to catch their mistakes. Businesses are compliant on the day they\u2019re audited, they\u2019re compliant on the day they start, but in between those dates if there\u2019s no monitoring, then they aren\u2019t catching the accident and well-intentioned mistakes of their employees. Not catching these mistakes can result in hefty fines on the business.<\/p>\n<p>The third mistake happens when companies actually do educate their employees and disseminate information, but there\u2019s no active follow through. Yearly auditing is not enough. People can prepare for an audit, they can be compliant on that specific day, but monitoring needs to happen more frequently to ensure that compliance is happening day in and day out. And monitoring needs to be active. If, an employee does something wrong and doesn\u2019t realize it for six months, or worse tries to fix it on their own resulting in further problems, the business is still on the hook for everything that has happened and fines have accrued in some cases for as long as it&#8217;s gone uncorrected. So, monitoring can&#8217;t be passive until it&#8217;s audit season.<\/p>\n<p>These mistakes are costly to companies, and if a company isn\u2019t properly prepared to handle the fines thrown at them, it could very well put them out of business. So, ensure that information is disseminated throughout the business, actively monitor employees to ensure compliance is maintained, and systematically follow up to make sure your still complaint between audits. Taking these steps goes a long way toward keeping your business compliant.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>App sec monitoring and compliance are complicated. Here are three mistakes companies make and how to avoid them.<\/p>\n","protected":false},"author":1,"featured_media":31,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[10,6],"tags":[28,30,29,17],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Common Mistakes in App Sec Monitoring for Compliance - PWV Consultants<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/common-mistakes-app-sec-monitoring\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Common Mistakes in App Sec Monitoring for Compliance\" \/>\n<meta property=\"og:description\" content=\"App sec monitoring and compliance are complicated. Here are three mistakes companies make and how to avoid them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/common-mistakes-app-sec-monitoring\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-06T11:32:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-06-04T01:36:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/03\/green-and-beige-cord-1624895-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/common-mistakes-app-sec-monitoring\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/common-mistakes-app-sec-monitoring\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"Common Mistakes in App Sec Monitoring for Compliance\",\"datePublished\":\"2020-04-06T11:32:00+00:00\",\"dateModified\":\"2020-06-04T01:36:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/common-mistakes-app-sec-monitoring\/\"},\"wordCount\":591,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/common-mistakes-app-sec-monitoring\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/03\/green-and-beige-cord-1624895-scaled.jpg\",\"keywords\":[\"App Sec\",\"Compliance\",\"Monitoring\",\"Security\"],\"articleSection\":[\"Application Security\",\"Compliance\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/common-mistakes-app-sec-monitoring\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/common-mistakes-app-sec-monitoring\/\",\"name\":\"Common Mistakes in App Sec Monitoring for Compliance - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/common-mistakes-app-sec-monitoring\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/common-mistakes-app-sec-monitoring\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/03\/green-and-beige-cord-1624895-scaled.jpg\",\"datePublished\":\"2020-04-06T11:32:00+00:00\",\"dateModified\":\"2020-06-04T01:36:07+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/common-mistakes-app-sec-monitoring\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/common-mistakes-app-sec-monitoring\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/common-mistakes-app-sec-monitoring\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/03\/green-and-beige-cord-1624895-scaled.jpg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/03\/green-and-beige-cord-1624895-scaled.jpg\",\"width\":2560,\"height\":1707,\"caption\":\"Photo by Brett Sayles from Pexels\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/common-mistakes-app-sec-monitoring\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Common Mistakes in App Sec Monitoring for Compliance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Common Mistakes in App Sec Monitoring for Compliance - PWV Consultants","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/common-mistakes-app-sec-monitoring\/","og_locale":"en_US","og_type":"article","og_title":"Common Mistakes in App Sec Monitoring for Compliance","og_description":"App sec monitoring and compliance are complicated. Here are three mistakes companies make and how to avoid them.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/common-mistakes-app-sec-monitoring\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2020-04-06T11:32:00+00:00","article_modified_time":"2020-06-04T01:36:07+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/03\/green-and-beige-cord-1624895-scaled.jpg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/common-mistakes-app-sec-monitoring\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/common-mistakes-app-sec-monitoring\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"Common Mistakes in App Sec Monitoring for Compliance","datePublished":"2020-04-06T11:32:00+00:00","dateModified":"2020-06-04T01:36:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/common-mistakes-app-sec-monitoring\/"},"wordCount":591,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/common-mistakes-app-sec-monitoring\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/03\/green-and-beige-cord-1624895-scaled.jpg","keywords":["App Sec","Compliance","Monitoring","Security"],"articleSection":["Application Security","Compliance"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/common-mistakes-app-sec-monitoring\/","url":"https:\/\/www.pwvconsultants.com\/blog\/common-mistakes-app-sec-monitoring\/","name":"Common Mistakes in App Sec Monitoring for Compliance - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/common-mistakes-app-sec-monitoring\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/common-mistakes-app-sec-monitoring\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/03\/green-and-beige-cord-1624895-scaled.jpg","datePublished":"2020-04-06T11:32:00+00:00","dateModified":"2020-06-04T01:36:07+00:00","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/common-mistakes-app-sec-monitoring\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/common-mistakes-app-sec-monitoring\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/common-mistakes-app-sec-monitoring\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/03\/green-and-beige-cord-1624895-scaled.jpg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/03\/green-and-beige-cord-1624895-scaled.jpg","width":2560,"height":1707,"caption":"Photo by Brett Sayles from Pexels"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/common-mistakes-app-sec-monitoring\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Common Mistakes in App Sec Monitoring for Compliance"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/38"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=38"}],"version-history":[{"count":6,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/38\/revisions"}],"predecessor-version":[{"id":184,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/38\/revisions\/184"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/31"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=38"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=38"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=38"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}