{"id":37732,"date":"2022-08-25T15:27:29","date_gmt":"2022-08-25T13:27:29","guid":{"rendered":"https:\/\/www.firstattribute.com\/?p=37732"},"modified":"2022-08-25T15:27:29","modified_gmt":"2022-08-25T13:27:29","slug":"understanding-components-of-it-compliance","status":"publish","type":"post","link":"https:\/\/www.firstattribute.com\/en\/news\/understanding-components-of-it-compliance\/","title":{"rendered":"Understanding components of IT compliance"},"content":{"rendered":"<p>Compliance with laws and internal and external contracts are an important factor for the IT landscape. For IT compliance, the IT infrastructure must meet a number of requirements.<\/p>\n<p>In this post, we&#8217;ll address what responsible parties should look out for. At the same time, we show how you can use identity and access management to strengthen <a href=\"https:\/\/www.firstware.com\/en\/compliance\/\" target=\"_blank\" rel=\"noopener\">IAM compliance<\/a> in your company.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Index<\/p>\n<span class=\"ez-toc-title-toggle\"><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.firstattribute.com\/en\/news\/understanding-components-of-it-compliance\/#What-does-IT-Compliance-mean\" >What does IT Compliance mean<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.firstattribute.com\/en\/news\/understanding-components-of-it-compliance\/#IT-helps-to-ensure-compliance\" >IT helps to ensure compliance<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.firstattribute.com\/en\/news\/understanding-components-of-it-compliance\/#Focus-on-IT-security-for-all-systems\" >Focus on IT security for all systems<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.firstattribute.com\/en\/news\/understanding-components-of-it-compliance\/#GDPR-IT-Security-Act-ISO-27001\" >GDPR, IT Security Act, ISO 27001<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.firstattribute.com\/en\/news\/understanding-components-of-it-compliance\/#Using-ITIL-and-COBIT-for-more-IT-security-and-efficiency\" >Using ITIL and COBIT for more IT security and efficiency<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.firstattribute.com\/en\/news\/understanding-components-of-it-compliance\/#How-to-achieve-optimal-IT-compliance-in-your-company\" >How to achieve optimal IT compliance in your company<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.firstattribute.com\/en\/news\/understanding-components-of-it-compliance\/#Define-requirements-for-IT-compliance\" >Define requirements for IT compliance<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.firstattribute.com\/en\/news\/understanding-components-of-it-compliance\/#Identification-of-risks\" >Identification of risks<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.firstattribute.com\/en\/news\/understanding-components-of-it-compliance\/#Clear-communication-of-processes-and-regular-audits\" >Clear communication of processes and regular audits<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.firstattribute.com\/en\/news\/understanding-components-of-it-compliance\/#About-FirstAttribute-AG\" >About FirstAttribute AG<\/a><\/li><\/ul><\/nav><\/div>\n\n<h2><span class=\"ez-toc-section\" id=\"What-does-IT-Compliance-mean\"><\/span>What does IT Compliance mean<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>In simple terms, IT compliance describes a <strong>binding guideline for adhering to rules<\/strong> and other regulations in the area of IT infrastructure. Within the framework of IT compliance, internal requirements can also be implemented to significantly increase IT security in a company. Examples of this are:<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-37737 size-large\" title=\"What does IT Compliance mean\" src=\"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2022\/08\/What-does-IT-Compliance-mean-Examples-1024x225.png\" alt=\"What does IT Compliance mean_Examples\" width=\"1024\" height=\"225\" srcset=\"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2022\/08\/What-does-IT-Compliance-mean-Examples-1024x225.png 1024w, https:\/\/www.firstattribute.com\/wp-content\/uploads\/2022\/08\/What-does-IT-Compliance-mean-Examples-300x66.png 300w, https:\/\/www.firstattribute.com\/wp-content\/uploads\/2022\/08\/What-does-IT-Compliance-mean-Examples-768x169.png 768w, https:\/\/www.firstattribute.com\/wp-content\/uploads\/2022\/08\/What-does-IT-Compliance-mean-Examples-1536x338.png 1536w, https:\/\/www.firstattribute.com\/wp-content\/uploads\/2022\/08\/What-does-IT-Compliance-mean-Examples-2048x450.png 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p><strong>IT compliance in a company ensures that an organization handles all processes in accordance with the law.<\/strong> Contracts that exist in the company and with customers or partners are also part of IT compliance, as the security of data processing is defined here. IT compliance is part of IT governance. This also includes guidelines for controlling, business processes and management.<\/p>\n<p>International conventions, EU directives, &#8220;unwritten laws&#8221;, &#8220;trade customs&#8221;, moral obligations in data processing or a wide variety of other rules can be combined to form a central IT compliance in the company. Finally, it is also about a <strong>code of conduct<\/strong>. This describes the work of the employees in the company with regard to the:<\/p>\n<ul>\n<li>handling of the IT infrastructure<\/li>\n<li>protection of data<\/li>\n<li>handling of security problems<\/li>\n<\/ul>\n<p>Helping to achieve this are reliable IT services and applications, such as an identity and access management system that specializes in <a href=\"https:\/\/www.firstware.com\/en\/compliance\/\" target=\"_blank\" rel=\"noopener\">IAM compliance<\/a>.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"IT-helps-to-ensure-compliance\"><\/span>IT helps to ensure compliance<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>If companies or individual employees do not adhere to the various rules, the entire organization feels the negative effects. For this reason, clear rules and structures are necessary to minimize the risk of compliance violations.<\/p>\n<p>The IT infrastructure is an important tool in this process. IT compliance therefore not only describes adherence to the defined rules while working with IT. Rather, it also ensures compliance with the rules that IT makes possible in the first place.<\/p>\n<p>An example of this is the handling of logon data and personal information. These are much more secure and effective with well-structured IT systems than without an optimally adapted environment for managing user logins. Through <a href=\"https:\/\/www.firstware.com\/en\/systems\/connect-hr-systems\/\" target=\"_blank\" rel=\"noopener\">connections with HR systems<\/a>, employee credentials and data can be managed more easily, securely and, most importantly, with firmly defined rules based on IT compliance. IT is not only a component of compliance, it is, properly used, a tool to be able to adhere to IT compliance at all times.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-37744\" title=\"Strengthen IT compliance with FirstWare IDM-Portal\" src=\"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2022\/08\/Strengthen-IT-Compliance_FirstWare-IDM-Portal-300x253.png\" alt=\"Strengthen IT compliance with FirstWare IDM-Portal\" width=\"450\" height=\"380\" srcset=\"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2022\/08\/Strengthen-IT-Compliance_FirstWare-IDM-Portal-300x253.png 300w, https:\/\/www.firstattribute.com\/wp-content\/uploads\/2022\/08\/Strengthen-IT-Compliance_FirstWare-IDM-Portal-1024x865.png 1024w, https:\/\/www.firstattribute.com\/wp-content\/uploads\/2022\/08\/Strengthen-IT-Compliance_FirstWare-IDM-Portal-768x649.png 768w, https:\/\/www.firstattribute.com\/wp-content\/uploads\/2022\/08\/Strengthen-IT-Compliance_FirstWare-IDM-Portal-1536x1298.png 1536w, https:\/\/www.firstattribute.com\/wp-content\/uploads\/2022\/08\/Strengthen-IT-Compliance_FirstWare-IDM-Portal.png 1541w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/p>\n<p>By using an <a href=\"https:\/\/www.firstware.com\/en\/\" target=\"_blank\" rel=\"noopener\">IAM system<\/a>, such as FirstWare IDM-Portal from FirstAttribute AG, important rules can be enforced that strengthen <a href=\"https:\/\/www.firstware.com\/en\/compliance\/\" target=\"_blank\" rel=\"noopener\">compliance<\/a>. In particular, access authorizations are more secure and easier to manage through automated processes.\u00a0<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Focus-on-IT-security-for-all-systems\"><\/span>Focus on IT security for all systems<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The compliance requirements for IT consist primarily of<\/p>\n<ul>\n<li>the security of all IT systems,<\/li>\n<li>their availability and<\/li>\n<li>the definition of optimal data retention and archiving.<\/li>\n<\/ul>\n<p><strong>Data protection<\/strong> also plays an essential role here, since most companies process a great deal of personal data in IT processes.<\/p>\n<p>As part of IT compliance, <strong>documentation<\/strong> should take place, from which the potential dangers emerge on the basis of a <strong>risk analysis. <\/strong>Hardware and software play just as important a role here as the rest of the IT infrastructure, i.e., including the data center, the building, and the various security systems relevant for access to the data centers.<\/p>\n<p>If companies use <strong>cloud services<\/strong>, security and data protection are also very important here. In addition to security, the various licenses are also relevant, because all commercially used products must of course be properly licensed. License violations can cause high costs. Companies should avoid incorrect licensing through IT compliance.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"GDPR-IT-Security-Act-ISO-27001\"><\/span>GDPR, IT Security Act, ISO 27001<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>In addition to contracts and specifications to which companies subject themselves, the <strong>General\u00a0Data Protection Regulation (GDPR) <\/strong>and the <strong>IT Security Act<\/strong> (Act on Increasing the Security of Information Technology Systems), which is particularly relevant for operators of critical infrastructures (CRITIS), are important for IT compliance in the EU. These include telecommunications providers or hospitals.<\/p>\n<p>The <strong>Act on Control and Transparency in Business<\/strong> (KonTraG) is intended to improve corporate governance, especially in German companies. In addition, the <strong>ISO 19600 and ISO 27001<\/strong> certifications are still a basis for many companies. With <strong>ISO 27002:2022<\/strong>, the Information Security Management Standard receives new measures. Those certified to ISO27001:2013 have about two years to complete certification to the new standard.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Using-ITIL-and-COBIT-for-more-IT-security-and-efficiency\"><\/span>Using ITIL and COBIT for more IT security and efficiency<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>With IT frameworks such as <strong>ITIL<\/strong> or <strong>COBIT<\/strong>, companies can ensure that IT processes run according to standardized specifications and are as secure and efficient as possible. The specifications are not mandatory, but they help to operate the company&#8217;s own IT infrastructure as securely as possible, drawing on the experience of the authors. At the same time, adherence to the ITIL and COBIT specifications almost always improves IT compliance.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"How-to-achieve-optimal-IT-compliance-in-your-company\"><\/span>How to achieve optimal IT compliance in your company<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"Define-requirements-for-IT-compliance\"><\/span>Define requirements for IT compliance<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>First, it should be documented exactly which laws, standards and contracts play a role for the company that must be observed without fail as part of IT compliance. Then a list of the processes, programs and IT infrastructure affected should be drawn up, which relates to IT compliance. Within this framework, it is already possible to determine which requirements the individual processes must fulfill, especially the processes for the personal processing of data.<\/p>\n<p>There may still be different areas in the company that have different IT compliance requirements. Here, it may also make sense to carry out <strong>modernization measures<\/strong>, for example to <strong>connect <a href=\"https:\/\/www.firstware.com\/en\/systems\/connect-hr-systems\/\" target=\"_blank\" rel=\"noopener\">HR systems<\/a> directly with the systems for managing user accounts<\/strong>.\u00a0<\/p>\n<p><img decoding=\"async\" class=\"imgshadow wp-image-37752 size-medium alignleft\" title=\"Create new user in compliance with IT\" src=\"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2022\/08\/Create-new-user_IT-compliance-300x265.png\" alt=\"Create new user in compliance with IT\" width=\"300\" height=\"265\" srcset=\"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2022\/08\/Create-new-user_IT-compliance-300x265.png 300w, https:\/\/www.firstattribute.com\/wp-content\/uploads\/2022\/08\/Create-new-user_IT-compliance-1024x904.png 1024w, https:\/\/www.firstattribute.com\/wp-content\/uploads\/2022\/08\/Create-new-user_IT-compliance-768x678.png 768w, https:\/\/www.firstattribute.com\/wp-content\/uploads\/2022\/08\/Create-new-user_IT-compliance.png 1181w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>One example is FirstAttribute&#8217;s Identity and Access Management solution FirstWare IDM-Portal.<\/p>\n<p>In order to perform the onboarding of new users more effectively, faster and with fewer errors, a solution with a focus on <a href=\"https:\/\/www.firstware.com\/en\/compliance\/\" target=\"_blank\" rel=\"noopener\">IAM compliance<\/a> is ideal, especially if Active Directory is used as the database.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Identification-of-risks\"><\/span>Identification of risks<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Part of the development of an IT compliance is the <strong>identification and discussion of risks<\/strong> that a company expects if it does not adhere to compliance. In doing so, it is also useful to record impending penalties for responsible persons in the company as well as fines and other negative effects.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Clear-communication-of-processes-and-regular-audits\"><\/span>Clear communication of processes and regular audits<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Once all the requirements are clear and the IT compliance policy has been created by the various people responsible in the company, it must of course be publicized within the company. The binding nature must be just as clear as its enforcement and monitoring. A compliance manager can holistically check <strong>compliance and conduct audits<\/strong> at regular intervals. Detected weaknesses can thus be identified and remedied on an ongoing basis, and the associated processes optimized. This should be accompanied by training sessions to bring employees up to date and raise their awareness of the issue.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"About-FirstAttribute-AG\"><\/span>About FirstAttribute AG<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>FirstAttribute AG is an independent German cloud service and software company focused on <a href=\"https:\/\/www.firstware.com\/en\/compliance\/\" target=\"_blank\" rel=\"noopener\">compliance-oriented Identity &amp; Access Management<\/a> (IAM) for AD and M365\/Azure AD.<\/p>\n<p>Learn more about our other products and services at <a href=\"https:\/\/www.firstattribute.com\/en\/company\/about-us\/\">About Us<\/a>.<\/p>\n<p><a href=\"https:\/\/www.firstattribute.com\/en\/company\/contact\/\" target=\"_blank\" rel=\"noopener\"><button class=\"ButtonBeratung aligncenter\">Contact us now<\/button><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Compliance with laws and internal and external contracts are an important factor for the IT landscape. For IT compliance, the [&hellip;]<\/p>\n","protected":false},"author":22,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[3229,3233],"tags":[3350,3349,3351],"class_list":["post-37732","post","type-post","status-publish","format-standard","hentry","category-idm-portal-en","category-news","tag-it-security-en","tag-it-compliance-en","tag-it-governance-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IT compliance - Enforce policies and increase IT security<\/title>\n<meta name=\"description\" content=\"How do you strengthen IT compliance in your company? Learn which steps are necessary to increase IT security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.firstattribute.com\/en\/news\/understanding-components-of-it-compliance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT compliance - Enforce policies and increase IT security\" \/>\n<meta property=\"og:description\" content=\"How do you strengthen IT compliance in your company? Learn which steps are necessary to increase IT security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.firstattribute.com\/en\/news\/understanding-components-of-it-compliance\/\" \/>\n<meta property=\"og:site_name\" content=\"FirstAttribute\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-25T13:27:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2022\/08\/What-does-IT-Compliance-mean-Examples-1024x225.png\" \/>\n<meta name=\"author\" content=\"Sophia Tunui\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sophia Tunui\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/news\\\/understanding-components-of-it-compliance\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/news\\\/understanding-components-of-it-compliance\\\/\"},\"author\":{\"name\":\"Sophia Tunui\",\"@id\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/#\\\/schema\\\/person\\\/0eba423dafd283d465f02a0612241c59\"},\"headline\":\"Understanding components of IT compliance\",\"datePublished\":\"2022-08-25T13:27:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/news\\\/understanding-components-of-it-compliance\\\/\"},\"wordCount\":1199,\"publisher\":{\"@id\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/news\\\/understanding-components-of-it-compliance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.firstattribute.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/What-does-IT-Compliance-mean-Examples-1024x225.png\",\"keywords\":[\"IT security\",\"IT-Compliance\",\"IT-Governance\"],\"articleSection\":[\"IDM-Portal\",\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/news\\\/understanding-components-of-it-compliance\\\/\",\"url\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/news\\\/understanding-components-of-it-compliance\\\/\",\"name\":\"IT compliance - Enforce policies and increase IT security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/news\\\/understanding-components-of-it-compliance\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/news\\\/understanding-components-of-it-compliance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.firstattribute.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/What-does-IT-Compliance-mean-Examples-1024x225.png\",\"datePublished\":\"2022-08-25T13:27:29+00:00\",\"description\":\"How do you strengthen IT compliance in your company? Learn which steps are necessary to increase IT security.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/news\\\/understanding-components-of-it-compliance\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/news\\\/understanding-components-of-it-compliance\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/news\\\/understanding-components-of-it-compliance\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.firstattribute.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/What-does-IT-Compliance-mean-Examples-1024x225.png\",\"contentUrl\":\"https:\\\/\\\/www.firstattribute.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/What-does-IT-Compliance-mean-Examples-1024x225.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/news\\\/understanding-components-of-it-compliance\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Understanding components of IT compliance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/\",\"name\":\"FirstAttribute AG\",\"description\":\"Identity Access Management, Active Directory Spezialisten\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/#organization\",\"name\":\"FirstAttribute AG\",\"url\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.firstattribute.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/FIRSTATTRIBUTE-Logo2013-final-700x145px.png\",\"contentUrl\":\"https:\\\/\\\/www.firstattribute.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/FIRSTATTRIBUTE-Logo2013-final-700x145px.png\",\"width\":700,\"height\":145,\"caption\":\"FirstAttribute AG\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/#\\\/schema\\\/person\\\/0eba423dafd283d465f02a0612241c59\",\"name\":\"Sophia Tunui\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IT compliance - Enforce policies and increase IT security","description":"How do you strengthen IT compliance in your company? Learn which steps are necessary to increase IT security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.firstattribute.com\/en\/news\/understanding-components-of-it-compliance\/","og_locale":"en_US","og_type":"article","og_title":"IT compliance - Enforce policies and increase IT security","og_description":"How do you strengthen IT compliance in your company? Learn which steps are necessary to increase IT security.","og_url":"https:\/\/www.firstattribute.com\/en\/news\/understanding-components-of-it-compliance\/","og_site_name":"FirstAttribute","article_published_time":"2022-08-25T13:27:29+00:00","og_image":[{"url":"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2022\/08\/What-does-IT-Compliance-mean-Examples-1024x225.png","type":"","width":"","height":""}],"author":"Sophia Tunui","twitter_misc":{"Written by":"Sophia Tunui","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.firstattribute.com\/en\/news\/understanding-components-of-it-compliance\/#article","isPartOf":{"@id":"https:\/\/www.firstattribute.com\/en\/news\/understanding-components-of-it-compliance\/"},"author":{"name":"Sophia Tunui","@id":"https:\/\/www.firstattribute.com\/en\/#\/schema\/person\/0eba423dafd283d465f02a0612241c59"},"headline":"Understanding components of IT compliance","datePublished":"2022-08-25T13:27:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.firstattribute.com\/en\/news\/understanding-components-of-it-compliance\/"},"wordCount":1199,"publisher":{"@id":"https:\/\/www.firstattribute.com\/en\/#organization"},"image":{"@id":"https:\/\/www.firstattribute.com\/en\/news\/understanding-components-of-it-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2022\/08\/What-does-IT-Compliance-mean-Examples-1024x225.png","keywords":["IT security","IT-Compliance","IT-Governance"],"articleSection":["IDM-Portal","News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.firstattribute.com\/en\/news\/understanding-components-of-it-compliance\/","url":"https:\/\/www.firstattribute.com\/en\/news\/understanding-components-of-it-compliance\/","name":"IT compliance - Enforce policies and increase IT security","isPartOf":{"@id":"https:\/\/www.firstattribute.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.firstattribute.com\/en\/news\/understanding-components-of-it-compliance\/#primaryimage"},"image":{"@id":"https:\/\/www.firstattribute.com\/en\/news\/understanding-components-of-it-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2022\/08\/What-does-IT-Compliance-mean-Examples-1024x225.png","datePublished":"2022-08-25T13:27:29+00:00","description":"How do you strengthen IT compliance in your company? Learn which steps are necessary to increase IT security.","breadcrumb":{"@id":"https:\/\/www.firstattribute.com\/en\/news\/understanding-components-of-it-compliance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.firstattribute.com\/en\/news\/understanding-components-of-it-compliance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firstattribute.com\/en\/news\/understanding-components-of-it-compliance\/#primaryimage","url":"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2022\/08\/What-does-IT-Compliance-mean-Examples-1024x225.png","contentUrl":"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2022\/08\/What-does-IT-Compliance-mean-Examples-1024x225.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.firstattribute.com\/en\/news\/understanding-components-of-it-compliance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.firstattribute.com\/en\/"},{"@type":"ListItem","position":2,"name":"Understanding components of IT compliance"}]},{"@type":"WebSite","@id":"https:\/\/www.firstattribute.com\/en\/#website","url":"https:\/\/www.firstattribute.com\/en\/","name":"FirstAttribute AG","description":"Identity Access Management, Active Directory Spezialisten","publisher":{"@id":"https:\/\/www.firstattribute.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.firstattribute.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.firstattribute.com\/en\/#organization","name":"FirstAttribute AG","url":"https:\/\/www.firstattribute.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firstattribute.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2021\/01\/FIRSTATTRIBUTE-Logo2013-final-700x145px.png","contentUrl":"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2021\/01\/FIRSTATTRIBUTE-Logo2013-final-700x145px.png","width":700,"height":145,"caption":"FirstAttribute AG"},"image":{"@id":"https:\/\/www.firstattribute.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.firstattribute.com\/en\/#\/schema\/person\/0eba423dafd283d465f02a0612241c59","name":"Sophia Tunui"}]}},"_links":{"self":[{"href":"https:\/\/www.firstattribute.com\/en\/wp-json\/wp\/v2\/posts\/37732","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.firstattribute.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.firstattribute.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.firstattribute.com\/en\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/www.firstattribute.com\/en\/wp-json\/wp\/v2\/comments?post=37732"}],"version-history":[{"count":15,"href":"https:\/\/www.firstattribute.com\/en\/wp-json\/wp\/v2\/posts\/37732\/revisions"}],"predecessor-version":[{"id":37757,"href":"https:\/\/www.firstattribute.com\/en\/wp-json\/wp\/v2\/posts\/37732\/revisions\/37757"}],"wp:attachment":[{"href":"https:\/\/www.firstattribute.com\/en\/wp-json\/wp\/v2\/media?parent=37732"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.firstattribute.com\/en\/wp-json\/wp\/v2\/categories?post=37732"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.firstattribute.com\/en\/wp-json\/wp\/v2\/tags?post=37732"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}