Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Content Controls for Regulatory Compliance

By Robert Moeller
February 1, 2007
“Chief security officers need to fingerprint sensitive content to monitor outgoing flow,” says Robert Moeller.


A key requirement of Sarbanes-Oxley (SOX) is the definition, documentation, implementation and assessment of effective internal controls.

Controls are used to ensure the integrity of corporate information and the prompt reporting of material events that may affect the performance of the enterprise. While initial compliance efforts have focused on financial reporting, the scope of SOX is far broader and requires corporations--and CSOs--to develop effective internal controls for protecting key digital assets in a number of areas called Content Protection Controls.

To effectively protect sensitive content in a compliant manner, an enterprise must implement a set of policies and an automated technology solution to continuously monitor policy enforcement. Because of the many and varied lines of business and types of digital assets used, there is no single path to content protection. However, an enterprise looking to implement effective content protection controls should consider the following:

IDENTIFYING CONTENT AT RISK

There are multiple areas where an enterprise might have numerous levels of unprotected information assets. Typical digital information that is often at risk includes intellectual property such as source codes, product plans, engineering drawings, product formulations and patent materials, sensitive security video and database lists of customers and vendors. Understand and document these various types of information assets and the current control procedures in place.

CLASSIFICATION RULES

Content protection surveys will result in a long list of information assets. Enterprises should look at all of the identified data assets and decide which are most vulnerable, of which will receive priority for content protection controls. Special scrutiny should be given to content stored in a document management or content management system since this is of high value. Since an enterprise will not be able to establish content protection controls over all data assets, there should be a formal, documented record outlining content asset priority.

CULTURE OF CONTENT COMPLIANCE

Content protection policies and procedures need to be clearly stated to all stakeholders – employees, vendors and others. Clearly define types of sensitive content and how they can be copied or captured. All stakeholders should be required to sign and date a letter that states their acknowledgement of the document and that they agree to abide by them. With IT providing some guidance, the CSO, CFO or other senior officers should voice their concerns about content protection risks and vulnerabilities.

CONTENT PROTECTION TECHNOLOGY

Sensitive content leakage incidents can occur at many levels, including accidental postings of sensitive data on a public Web domain. Traditional IT control procedures such as identity management and access control lists are insufficient. New automated tools (content monitoring and filtering tools) are available to control content risks and vulnerabilities. These tools “fingerprint” sensitive content stored in the file system or in content management repositories. Installed at an organization’s Internet gateway, such tools monitor all of the content flowing out of and onto the Internet, thus deterring accidental or intentional sensitive data postings. Actions may include alerting, logging and actual blocking the attempted transmission.

There are several critical features to look for in an effective content protection solution:
  • Content Format Support – Ability to fingerprint and detect the large number of file formats.
  • Derivative Work Detection – Ability to accurately detect fragments of the original content that may be transmitted.
  • Language Independence - Ability to fingerprint and accurately detect content written in any language and character set.
  • Content Repository Support – Ability to register content to be protected from all storage locations and repositories.
  • Defensible Audit Trail – Audit trail and reporting capabilities that meet robust auditing standards.
  • Flexible Policy Definition – Ability to easily define policies that meet business needs.
  • Appliance Packaging – Software and hardware bundled together for ease of installation, optimum performance and lower total cost.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

About the Author Robert Moeller is an expert and consultant specializing in compliance issues and internal controls. He has led teams to help organizations achieve Sarbanes-Oxley compliance and also is the author of several books including Sarbanes-Oxley and the New Internal Auditing Rules and Brink’s Modern Internal Auditing, 6th Edition, both published by Wiley. Moeller has an MBA in finance from the University of Chicago and has accumulated a wide range of professional certifications including the CPA, CISA, PMP and CISSP.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Effective Content Protection Controls

    See More
  • Jonathan-Kassa.jpg

    Jonathan Kassa joins Margolis Healy as VP for Regulatory Compliance

    See More
  • Surveillance, video wall

    Improving situational awareness via video content analytics is the key to business safety and compliance for COVID-19

    See More

Related Products

See More Products
  • 150 things.jpg

    The Handbook for School Safety and Security

  • Physical Security and Safety: A Field Guide for the Practitioner

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing