What 15 Years of Enterprise Security Taught Me About Compliance
Fifteen years ago, I started my career in enterprise security compliance. I’ve conducted hundreds of assessments—TISAX for automotive suppliers, PCI-DSS for retailers, ISO 27001 for manufacturers, NIS2 readiness for everyone.
Along the way, I’ve learned lessons that don’t appear in frameworks or certification guides. Lessons about what actually matters, what doesn’t, and why some companies breeze through audits while others struggle despite similar security investments.
These are the truths I wish someone had told me when I started. They’re the foundation of how I approach enterprise security compliance today—and why I eventually built tools to solve the problems I kept seeing.
Lesson 1: Documentation Beats Technology
The most counterintuitive lesson: companies with excellent security often fail audits, while companies with mediocre security pass. The difference? Documentation.
I’ve seen Palo Alto-equipped SOCs fail TISAX assessments because they couldn’t produce change records. I’ve seen companies with basic pfSense firewalls pass ISO 27001 because every decision was documented, justified, and traceable.
Auditors can’t assess what they can’t see. Your security might be excellent, but if you can’t demonstrate it with evidence, you’ll fail. According to BSI guidance, audit evidence is as important as the controls themselves.
This doesn’t mean documentation over substance. It means documentation of substance. Build good security AND document it. Doing one without the other fails.
Lesson 2: Compliance Is a Floor, Not a Ceiling
Early in my career, I thought compliance meant security. Pass the audit, you’re secure. Fail the audit, you’re not.
Experience taught me otherwise. Compliance frameworks represent minimum acceptable standards. Meeting them makes you compliant, not secure. Many breached organizations were fully compliant at the time of breach.
Enterprise security compliance should be the starting point, not the destination. The best organizations I’ve worked with view frameworks as foundations to build upon, not checklists to complete.
Conversely, chasing compliance without understanding security creates dangerous false confidence. You can tick every box and still be vulnerable. The ENISA threat landscape reports are full of compliant organizations that got breached.
Lesson 3: Process Over Products
Security vendors sell products. Compliance frameworks require processes. The gap between these causes most failures.
I’ve seen companies buy every security tool on the Gartner Magic Quadrant and still fail audits. Tools without process are just expensive equipment. Process with basic tools often passes.
A €50,000 SIEM that nobody monitors is worth less than a €5,000 log aggregator with defined review procedures. The tool doesn’t matter if the process doesn’t exist.
Enterprise security compliance assessments focus on process evidence: How do you detect threats? What happens when you detect them? Who’s responsible? How do you know it works? Products support these processes but don’t replace them.
Lesson 4: Continuous Beats Annual
The traditional compliance model: prepare frantically for annual audit, pass, ignore security for 11 months, repeat. This model is dying.
Modern frameworks like NIS2 assume continuous compliance. Auditors increasingly conduct unannounced assessments. Incident reporting requirements mean you can’t hide problems until the next audit cycle.
Organizations that integrate compliance into daily operations—security as normal work, not special project—perform better long-term. They don’t have “audit season” because every day is audit-ready.
Continuous enterprise security compliance also costs less. The scramble before annual audits—overtime, consultants, emergency fixes—disappears when compliance is continuous. According to industry research, continuous compliance reduces total audit costs by 30-40%.
Lesson 5: People Are the Bottleneck
Technical controls are easy. People are hard. Every failed audit I’ve investigated traced back to human factors: training gaps, unclear responsibilities, process breakdowns, or simple mistakes.
The engineer who bypassed change management “just this once.” The manager who approved without reviewing. The team that forgot to document emergency changes. People, not technology, cause compliance failures.
Successful enterprise security compliance programs invest heavily in people: clear role definitions, practical training, reasonable processes that humans will actually follow. Tools should support people, not replace their judgment.
I’ve learned to design for human nature, not against it. If a process is cumbersome, people will bypass it. Make the right thing to do also the easy thing to do.
Lesson 6: Risk-Based Thinking Wins
Checklist compliance—treating every requirement equally—wastes resources and misses real risks. The best security programs are risk-based: more investment where risk is higher, less where it’s lower.
ISO 27001 explicitly requires risk-based approach. NIS2 follows the same principle. Auditors expect you to explain WHY you implemented controls, not just THAT you implemented them.
“We implemented this control because our risk assessment identified X threat to Y asset with Z impact” is a passing answer. “We implemented this control because the framework said to” is not.
Enterprise security compliance should flow from risk assessment, not the other way around. Understand your risks first, then select controls that address them. The framework is a tool, not a substitute for thinking.
Lesson 7: Management Sets the Tone
Security culture comes from the top. When executives treat compliance as a cost center to minimize, the organization follows. When executives treat security as a business enabler, magic happens.
The most successful compliance programs I’ve seen had visible executive sponsorship. Board-level reporting. Security as a standing agenda item. Budgets that reflect stated priorities.
NIS2 makes this explicit with management liability provisions. But the principle was always true: enterprise security compliance succeeds or fails based on management commitment.
If you’re struggling with security culture, look at management behavior first. Do they model the security practices they expect from others? Do they fund security appropriately? Do they hold people accountable?
Lesson 8: Perfect Is the Enemy of Done
I’ve watched companies delay compliance initiatives for years seeking the “perfect” solution. Meanwhile, they remain non-compliant and vulnerable.
Good enough implemented beats perfect planned. An 80% solution deployed today provides more security than a 100% solution still in committee.
This doesn’t mean accepting poor security. It means pragmatic prioritization: address the biggest risks first, improve continuously, don’t let perfection paralyze progress.
Enterprise security compliance is a journey, not a destination. You’ll never be “done.” Accept that, start where you are, and improve systematically.
Lesson 9: Vendors Aren’t Your Friends
Security vendors sell products. Their goal is revenue, not your compliance. The “complete solution” they promise usually requires additional purchases, professional services, and ongoing subscriptions.
I’ve seen companies buy tools they didn’t need because vendors positioned them as compliance requirements. I’ve seen budgets consumed by enterprise solutions when open-source tools would suffice.
Be skeptical of vendor compliance claims. Ask for specific mapping to requirements. Verify with independent sources. The BSI’s IT-Grundschutz catalog provides vendor-neutral guidance.
This lesson influenced my own product development. I built FwChange to solve a real problem, priced for mid-market budgets, without the enterprise complexity that adds cost without value.
Lesson 10: Compliance Should Be a Byproduct
The best enterprise security compliance programs don’t focus on compliance. They focus on good security practices. Compliance becomes a byproduct of doing security well.
When security is embedded in operations—risk-informed decisions, documented changes, trained staff, tested procedures—audit evidence generates itself. You’re not preparing for audits; you’re operating securely. Audits just confirm what’s already true.
Organizations that chase compliance as the goal often achieve neither compliance nor security. Organizations that pursue genuine security usually achieve both.
This is the synthesis of everything I’ve learned: build real security, document it properly, and compliance follows. The reverse doesn’t work.
Applying These Lessons
After 15 years, I still conduct assessments and help organizations achieve compliance. But now I also build tools that embody these lessons.
FwChange exists because documentation should be automatic. VarnaAI exists because mid-market companies deserve compliance tools that don’t require enterprise budgets.
If you’re facing TISAX, NIS2, ISO 27001, or any other enterprise security compliance challenge, these lessons apply. Focus on documentation. Build processes, not just products. Make compliance continuous. Invest in people. Think risk-based.
And if you need help, reach out. I’ve spent 15 years learning these lessons so you don’t have to learn them the hard way.
About the Author
Nick Falshaw is a security consultant with 15+ years experience in enterprise security compliance across the DACH region. He’s the founder of FwChange and VarnaAI, building compliance tools for mid-market companies. Connect on LinkedIn.