Share This:

When businesses pass a SOC 2 audit, complete a HIPAA assessment, or earn a Cyber Essentials certification, there’s often a sense of relief—the work is done.

In reality, that moment is where risk often begins. “Compliance frameworks establish a baseline,” says Omair Manzoor, CEO of ioSENTRIX. “They define minimum controls—but they’re updated slowly, while threats evolve constantly.”

The gap between what auditors verify and what attackers exploit continues to widen. And for many organizations, that gap appears in two key ways.

‘Attested’ vs. actual security

Cam Roberson, VP of Channel at Beachhead Solutions, calls it the “attested vs. actual” problem.

Organizations may check the box on controls, but real-world implementation is often inconsistent—policies may exist but aren’t enforced, or protections apply to some devices but not others.

“The difference shows up when it matters most—during a breach, an audit, or an insurance claim,” Roberson explains.

He recounts a case involving a medical practice where an employee’s supposedly lost laptop contained protected data. The situation escalated until the MSP remotely accessed the device and confirmed it was still active—ultimately preventing a reportable breach.

“That’s what effective security looks like in practice—not just on paper.”

Point-in-time compliance

“Most frameworks are point-in-time,” says Mit Patel, CEO of Assurix. “You’re compliant the day of the audit—not the other 364 days of the year.”

After certification, environments change—new devices, user behavior, and configuration drift all introduce risk.

The result? A compliance posture that quickly becomes outdated—and potentially vulnerable.

Where compliance falls short in practice

Jennifer Williams of Secarma notes that challenges often emerge during implementation.

“Organizations may understand the framework, but not how it applies to their environment,” she says. Legacy systems, remote users, and patching gaps rarely align neatly with policy definitions.

Even well-known standards leave room for interpretation.

  • HIPAA requires “rapid” response to lost devices—but doesn’t define what that means operationally
  • SOC 2 mandates penetration testing—but not its depth or methodology

As Manzoor explains, this can lead to organizations “checking the box” with automated scans—while serious vulnerabilities remain undetected.

Shifting from compliance to continuous security

The most effective organizations treat compliance as a starting point—not the end goal.

Patel emphasizes that MSPs play a critical role in ongoing governance: “A certificate is a snapshot. Continuous, verified evidence of security controls is far more valuable.”

For MSPs, bridging the gap requires a more proactive approach:

  • Validating controls with real-world testing
  • Monitoring environments continuously
  • Providing ongoing proof of performance—not just periodic certification

Manzoor’s advice is simple: “Show, don’t tell.” Running a penetration test after an audit often reveals critical gaps—making the risks tangible for clients.

As Williams puts it: “Certification shows intent. Testing proves effectiveness.”

Photo: SuPatMaN / Shutterstock


Share This:
Kevin Williams

Posted by Kevin Williams

Kevin Williams is a journalist based in Ohio. Williams has written for a variety of publications including the Washington Post, New York Times, USA Today, Wall Street Journal, National Geographic and others. He first wrote about the online world in its nascent stages for the now defunct “Online Access” Magazine in the mid-90s.

Leave a reply

Your email address will not be published. Required fields are marked *

 

This site uses Akismet to reduce spam. Learn how your comment data is processed.