The Audit Defense Library

Practitioner-depth guides on FISMA, FedRAMP, CMMC, DCAA audit readiness, and AI governance for federal systems. Written by a CPA, CISSP, CISA with Big 4 audit experience.

All FISMA & NIST RMF FedRAMP CMMC DCAA Federal AI Governance GovCon Compliance Federal Cybersecurity Federal Zero Trust Federal GRC Engineering AI Governance GRC Engineering Cybersecurity Cloud Security HIPAA SOC 2
Cybersecurity

NIST Cybersecurity Assessment: The 60-Day Framework Guide

NIST released CSF 2.0 in February 2024, the first major framework revision in a decade. The update added a sixth function (Govern), expanded applicability beyond critical infrastructure to all organizations, and introduced implementation tiers replacing...

Read the Guide
Cybersecurity

Incident Response Plan: Implementation Guide for Teams

Two million and thirty thousand dollars. The cost difference between organizations that test their incident response plans and those that discover their plans do not work during an actual breach. IBM's 2024 Cost of a...

Read the Guide
Cybersecurity

How to Document Security Incidents for Audits

Organization A resolved 47 security incidents last quarter. The incident log shows detailed timelines, containment actions, root cause analysis, and corrective action status for each one. The SOC 2 auditor reviewed the documentation, confirmed CC7.3...

Read the Guide
HIPAA

HIPAA Risk Assessment: Five-Step Process for OCR

Every HIPAA risk assessment I review commits the same fundamental error. The document is titled "Risk Assessment." The content is a checklist. MFA: yes. Encryption: yes. Backup: yes. A series of binary answers telling OCR...

Read the Guide
AI Governance

What Counts as PHI in AI Tools? The Mosaic Effect

In 2000, Latanya Sweeney at Carnegie Mellon demonstrated that 87% of the U.S. population becomes uniquely identifiable from three data points: five-digit ZIP code, gender, and date of birth [Sweeney 2000]. She proved it by...

Read the Guide
AI Governance

What Is AI Governance? The 2026 Strategic Guide

AI governance is the system of policies, oversight mechanisms, and accountability structures directing how organizations develop, deploy, and monitor artificial intelligence. Three frameworks define the 2026 standard: the EU AI Act (enforcement August 2, 2026),...

Read the Guide
HIPAA

BAA for Google Drive

The most common HIPAA violation I encounter during healthcare practice assessments is the one nobody suspects. Not missing encryption. Not absent MFA. A therapist, office manager, or billing coordinator sending patient intake forms through a...

Read the Guide
HIPAA

Do I Need a Firewall for HIPAA? (Router vs. Firewall Guide 2026)

In 2011, the first OCR enforcement action targeting network security infrastructure fined a community health center $750,000 for lacking "technical policies and procedures for electronic information systems that maintain ePHI" [OCR Phoenix Cardiac Surgery Settlement...

Read the Guide
Cybersecurity

Vulnerability Scanning vs Penetration Testing Explained

When was the last time a human attacker tested whether your vulnerability scan findings are actually exploitable? Not a scanner running automated checks against a database. A certified ethical hacker chaining vulnerabilities together, testing business...

Read the Guide
HIPAA

Is ChatGPT HIPAA Compliant? Plan-by-Plan Matrix

Which ChatGPT plan does your organization use? Not the plan the IT department approved. The plan your clinical staff actually uses. The one a medical assistant discovered through a colleague. The one a billing specialist...

Read the Guide
HIPAA

What Is a Business Associate Agreement (BAA)?

Before the 2013 HIPAA Omnibus Rule, Business Associates operated in a regulatory gray zone. Covered entities signed agreements. Vendors accepted them. HHS had no direct enforcement authority over the vendors themselves. When Advocate Medical Group...

Read the Guide
Cybersecurity

NIST CSF 2.0 Implementation: The C-Suite Investment Guide

When ISO 27001 introduced Annex A revisions in 2022, organizations that had built their programs on the original control set spent months remapping evidence. The frameworks did not change materially. The structure changed. Control numbering...

Read the Guide