Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and Management

Compliance Theater: Why Cybersecurity’s Favorite Shakespearean Tragedy is Failing Us

By Johann Dettweiler
Person working on two laptops at the same time
freestocks via Unsplash
January 6, 2026

IT security teams, especially the compliance cast, love drama. The slower, more arcane, and less intelligible the script, the louder the applause. Every few years, someone strides onstage with a seemingly edgy rallying cry: “Let’s burn it all down and start again!”

Let’s be honest: torching the set doesn’t fix the play. The real villain isn’t any one framework. It’s the lackluster production we force our best people to perform “assessments” that consume weeks, cost a fortune, and deliver stale, unread artifacts.

The antagonist? Binders of off-topic prose masquerading as plot. Screenshots that expire the instant they’re printed or “evidence packages” that are obsolete by the time the curtain falls. We’re trapped in a Shakespearean tragedy where the props are fake, the lines are stale, and everyone keeps applauding while the castle quietly burns behind the scrim.

Traditional assessments repeat the same tired scenes: pages of narrative “implementation statements” drafted by non-engineers; expensive engineers reduced to screenshot clerks; the whole bundle shipped to auditors with fingers crossed that no one notices half the evidence is already out of date. Passing an audit in January tells you nothing meaningful about your security in March.

The General Services Administration (GSA) tried to break this cycle with the FedRAMP 20x pilot, a push to drag compliance into the 21st century. Goals included:

  • Automate checks so teams stop dying inside chasing artifacts.
  • Reuse strong commercial practices instead of reinventing government wheels.
  • Shift from point-in-time snapshots to continuous, data-driven proof.
  • Build trust directly between agencies and providers — no binder middleman.
  • Stop slowing down innovation just to satisfy the audit calendar.

Industry shouldn’t just nod politely; it should lean in. Toss the dusty script and stage something different: real-time, query-driven compliance.

The Problem: Screenshots Are for Chumps

Legacy “evidence” is performative. An auditor drops a generic checklist and system owners scramble for artifacts: policy PDFs, console exports, and the beloved screenshot. An engineer halts real work, configures the perfect view, captures “Figure 12.1 – MFA Enabled,” pastes it into Word, and repeats that ritual hundreds of times.

It’s slow, error prone, and robs service teams of time and creates false confidence. In a cloud world where infrastructure can change hourly, screenshots are the compliance equivalent of checking your MySpace profile to gauge social relevance. Technically it exists, practically it’s still as lame as the day you wrote it. 

A New Model: Trust the Query, Not the Clipboard

With 20x as catalyst, security teams can rewrite the script. Stop telling stories and just show data. Instead of flowery paragraphs about “disks encrypted with customer-managed keys,” ask the platform directly: “List every disk and its encryption status.” The system answers immediately and without bias. Here’s the stack in plain terms:

  • Query layer: Turn cloud and SaaS APIs into tables that can be queried directly. Want to know which Okta users lack MFA? Query it. Which repos lack branch protections? Query it. Which buckets are public? Query it.
  • Orchestration layer: Define controls as code and run them in bulk. Each control is a check; a collection of checks is a benchmark.

Put them together and FedRAMP’s Key Security Indicators (KSIs) become executable. Instead of a binder of screenshots, give auditors a dashboard with live, drill-down results. Imagine being an assessor and receiving useful, structured data instead of a PDF brick.

How It Works: Compliance as Code

Every control becomes a declarative rule plus a query.

  • Old way: “We use customer-managed keys.” (Maybe.)
  • New way: A query checks every disk, in real time. If any aren’t CMK-encrypted, the control fails. Engineers decide if the state is intentional; if not, they fix it. Done.

Because controls live in source control, they’re versioned, peer-reviewed, and repeatable. When requirements change, update the query and re-run. And the model goes far beyond cloud configs: any service with an API becomes a living CMDB you can interrogate at will. 

From Paperwork to Continuous Trust

FedRAMP 20x is a glimpse of the future and, in one form or another, it’s inevitable. Current paperwork-centric practices can’t keep up with threats and can even make systems less secure by diverting resources to performance instead of protection.

Compliance is becoming a data discipline: continuous checks, automated validation, and evidence that flows from the actual running state of the system. This scales beyond FedRAMP. Any framework, government or commercial, that demands proof of implementation benefits from compliance as code. Controls become queries. Queries become continuous evidence. Auditors become validators of automation, not artifact chasers.

The thesis is simple: compliance shouldn’t be theater; it should be engineering. A query-driven model delivers continuous compliance faster, cheaper, and with more trust. The future is query-driven, automated, and continuous. Let’s stop romanticizing the tired tragedies of old and start staging a production that actually protects the castle.

KEYWORDS: encrypted devices encryption IT departments and security IT leader

Share This Story

Johann Dettweiler is CISO at stackArmor (a Tyto Athene company).

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Pixelated brain

Critical Thinking Erosion: A Hidden Threat to Security Career Resilience

Red block among white blocks

Plenty of Associations, But Not Enough Association

Person on iPhone

The Olympics Are Going Mobile — Your Security Strategy Has to Follow

Phone showing hearts and flirty emojis

Valentine’s Day 2026: Inside the Industrial-Scale Romance Scam Economy

Banking security

How Banks Can Protect Their Most Valuable Asset: Customers

SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing