Skip to main content
Hero image for The Framework Trap: When Compliance Kills Security

The Framework Trap: When Compliance Kills Security

4 min read

compliance security-strategy community-banking

There’s a particular kind of meeting I’ve sat through more times than I can count.

Someone pulls up a spreadsheet. Rows of controls. Color-coded. Green, yellow, red. The conversation is entirely about turning the reds green.

Nobody asks whether any of it actually reduces risk.

That’s the framework trap. And most organizations are in it.

You Have It Backwards

Here’s the thing compliance-first programs get wrong: compliance is not the goal. It’s the outcome.

Do security right, and compliance follows. Patch the things that matter. Enforce access controls. Test your response capability. Review your vendors. Do those things consistently and your framework scores take care of themselves.

But when you lead with the framework, you end up optimizing for the score instead of the outcome. You get green cells and unrestored backups. Perfect documentation and no one who can execute the plan at 2 a.m.

Compliant and breached. It happens constantly.

What Frameworks Are Actually Good For

This isn’t an argument against NIST, CIS, FFIEC, or the CRI Profile. They’re genuinely useful.

They’re useful because building a security program with no reference point is hard. You’ll miss things. Frameworks are decades of collective experience about what tends to go wrong. That’s worth something.

Use them as a checklist. A sanity check. A way to pressure-test whether you’ve covered the basics.

“We have MFA deployed.” Does the framework flag that privileged accounts need stricter controls? Good. You might have missed that. Fix it.

“We have an incident response plan.” Does the framework ask about tabletop exercises and communication trees? Good. Check whether you’ve actually done those things.

That’s frameworks working the way they’re supposed to. You’re using them to find gaps in what you’re already building. Not using them to build the thing.

What Goes Wrong

The problem is when the framework becomes the operating manual.

When that happens, the security team spends most of their energy on the assessment cycle. Controls get documented. Policies get written. Evidence gets collected. Scores go up. Leadership is happy.

And then the real work, patching production systems, reviewing privileged access, testing whether backups restore, gets deprioritized because it’s not directly tied to a checklist item.

The fastest way to know if an organization has fallen into this is one question: “What changed in your security posture because of this assessment?”

Not what got documented. What actually changed.

If the answer is mostly policies and evidence folders, you’re optimizing for the wrong thing.

Do the Security Work First

Start with your actual risk. For most community banks, that’s business email compromise, ransomware, and third-party access. For most startups, it’s access control, data handling, and vendor security.

Build controls around those risks. Patch what’s exploitable. Enforce access. Train people on what they’re most likely to encounter. Test the things that matter.

Then bring in the framework. Walk through it. Ask: did we miss anything? Are there categories here we haven’t thought about? Is there something in the Protect or Detect functions that we’ve glossed over?

Use it to find holes in what you’ve built. Fill the holes. Move on.

When the examiner or auditor shows up, your scores will reflect a program that works. Not a program that was built to produce a score.

The Real Risk

Organizations that lead with compliance create a false sense of security that’s worse than knowing you’re exposed.

I’d rather work with a team that scores a 60 and knows exactly where they’re vulnerable than one that scores a 90 and thinks they’re done.

Compliance is the byproduct of doing the work. It’s not the work.

Stop building toward the assessment. Build toward resilience. The scores will follow.


If you’re not sure whether your program is built around real risk or around assessment cycles, that’s worth a conversation. loravaughn.com

Ready to Secure Your Growth?

Whether you need an executive speaker for your next event or a fractional CISO to build your security roadmap, let's talk.

Consulting services are delivered through Vaughn Cyber Group.