<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=323641658531367&amp;ev=PageView&amp;noscript=1">

STEP 2: Identify Resources for Compliance

Know what you have. And what you don’t.

Overwhelmed Olivia_BLUE-png

You can't secure what you can't identify

 

Checklist-3

Healthcare compliance isn’t about meeting checklists

Without a full inventory, risk assessments fall flat. Gap assessments miss critical blind spots. And remediation plans become guesses instead of strategy. 

You can’t:

  • Secure what you haven’t identified. 
  • Assign ownership to what’s invisible.
  • Prove compliance without documentation.

Before you assign responsibilities, write policies, or remediate risks, you need to know the people, systems, assets, and controls already in place.

What to Inventory (and Why)

Here's what you need to documents to understand your current state and uncover gaps before they become liabilities:

Assets

Assets

What systems, tools, and infrastructure are in play?


  • Laptops, servers, mobile devices
  • SaaS platforms, development environments
  • Cloud services (AWS, Azure)

 Why It Matters

Why It Matters: 

Every asset is a potential risk vector. You can’t monitor, protect, or audit what you haven’t logged and classified. 

Complacent Colin_BLUE-png

Organizations

How is your organization and decision-making structured?


  • Are you part of a parent org?
  • Do you managed multiple business units? 
  • Is decision-making centralized or siloed?

Why It Matters

Why It Matters: 

Your org chart affects scope, responsibility, and control mapping — especially when frameworks like SOC 2 and ISO require role clarity. 

Locations

Locations

Where does your company operate and store data?


  • Physical offices
  • Remote employees
  • Cloud infrastructure / Co-located datacenters

 Why It Matters

Why It Matters: 

Many frameworks include physical security controls. Knowing where sensitive data resides helps narrow your focus and avoid unnecessary scope.

Users

Users

Who are the personnel involved in your systems?


  • Who has access?
  • Who approves access?
  • Who owns which responsibilities?

 Why It Matters

Why It Matters: 

Every security control eventually ties to a person. Roles, access, and accountability need to be mapped before anything else. 

Documentation

Documentation

What policies and procedures already exist?


  • InfoSec policies
  • Security training logs
  • 3rd Party Risk documentation
  • Access control, onboarding & offboarding procedures

 Why It Matters

Why It Matters: 

No need to reinvent the wheel — leverage existing documentation where possible. Just make sure it’s current, consistent, and complete. 

ALIEN_B_BLUE-png-1

Security Controls

What security safeguards are already in place?


  • MFA, firewalls, encryption, logging
  • Vendor reviews
  • Risk assessments
  • Physical badge access + logs, shredding policies

 Why It Matters

Why It Matters: 

Controls are the backbone of any compliance program. You’ll need to know where they exist (and don’t) to accurately perform your risk and gap assessments. 

Compliance Inventory Mistakes to Avoid

Relying on Static Lists

Relying on Static Lists

Spreadsheets and one-time exports age quickly. They miss changes in staff, tools, and structure.


Use a living inventory that updates regularly and reflects your current systems, people, and assets—not what you had six months ago.

Tracking people, but not their roles

Tracking People, Not Roles

Listing users without understanding what they do leaves big gaps in responsibility and risk mapping.


Map users to roles and responsibilities so you know who owns what—and where policies and controls apply. 

Overlooking hidden assets

Overlooking Hidden Assets

 It’s easy to miss cloud services, mobile apps, and 'shadow IT' —especially those procured without IT involvement.


Take a comprehensive view of assets across departments, device types, and platforms, not just what’s centrally managed by IT. 

Treating documentation as a checkbox

Not Connecting Documentation

Policies, procedures, and system diagrams often live in folders, disconnected from controls or audit prep.


Link every document to a control, risk, or requirement so it actually supports your compliance narrative and audit readiness. 

Start Your Risk Assessment

Now that you have the right people and platform in place, it’s time to uncover what could go wrong — before it does.

Kick off a foundational risk assessment to identify threats, assess their likelihood and impact, and document a plan that satisfies auditors and protects your organization.

Identify Current Resources