Cybersecurity & GRC Consulting

Real answers to real questions—backed by practical support from Turnstone Compliance.

❓What is governance, risk, and compliance (GRC)?

🔧 How Turnstone Helps:
We help businesses build GRC programs from the ground up—developing control maps, risk registers, policy libraries, and compliance workflows tied to real-world operations.

❓ What does a security consultant do?

🔧 How Turnstone Helps:
Our team brings experience across IT, OT, compliance, and frameworks. We don’t just advise—you get implementation guidance, templates, and documentation tailored to your operations.

❓Why do I need a cybersecurity risk assessment?

A risk assessment helps identify vulnerabilities, compliance gaps, and potential threats to your data, systems, and operations. It’s the foundation for all effective cybersecurity programs.

🔧 How Turnstone Helps:
We conduct targeted, framework-aligned risk assessments (e.g., NIST, HIPAA, CMMC) that prioritize what matters most to your business. You’ll get a clear picture of where you stand—and a path to fix what matters.

❓ What are common cybersecurity gaps most businesses have?
  • Some of the most common gaps include:
  • No central logging or visibility
  • No multifactor authentication (MFA)
  • Outdated software or unpatched systems
  • No written policies or incident response plan
  • Lack of user training

🔧 How Turnstone Helps:
We identify your gaps, map them to frameworks or contracts (like CMMC or HIPAA), and help implement the controls—from policy to tech—with documentation you can reuse in audits or RFPs.

❓What is CMMC and who needs it?

CMMC (Cybersecurity Maturity Model Certification) is required for contractors and subcontractors working with the U.S. Department of Defense, especially those handling CUI (Controlled Unclassified Information).

🔧 How Turnstone Helps:
We support CMMC Level 1 & 2 readiness by aligning your environment to NIST 800‑171, calculating your SPRS score, building System Security Plans (SSPs), and documenting remediation in POA&Ms.

❓What’s the difference between NIST 800‑53 and NIST 800‑171?

800‑53 is a full catalog of security and privacy controls used by federal agencies. 800‑171 is a tailored set for non-federal entities that handle CUI—especially relevant to DoD suppliers.

🔧 How Turnstone Helps:
We help you interpret both 800‑53 and 800‑171, map your existing controls, and build or refine your policies, tech, and documentation to meet those requirements without overengineering. We’ll also help you strategize your data flow for using, transmitting, or storing CUI.

❓ How does my business know where to start with cybersecurity?

🔧 How Turnstone Helps:
We help organizations prioritize what matters. Our framework-based approach gives you a phased, affordable roadmap to grow your security posture over time.

❓ What if I don’t know what compliance requirements apply to my contract?

That’s common—especially in industries where contracts reference cybersecurity terms like “DFARS,” “HIPAA,” or “reasonable safeguards” without explaining the technical expectations.

🔧 How Turnstone Helps:
We analyze your contracts, scopes of work, or vendor requirements to identify what compliance frameworks apply. Then we break it down into actionable steps—what you need to implement, what you can inherit or delegate, and how to prove it during audits or reviews.

❓ Do you work with MSPs or subcontract with private businesses?

Yes. Many of our engagements come through MSPs, MSSPs, or IT service providers who rely on our expertise for compliance, security assessments, or documentation support. We also work behind the scenes with private businesses that need help aligning with client, contractual, or regulatory cybersecurity requirements.

🔧 How Turnstone Helps:
We act as an extension of your team—providing white-label or direct consulting services for cybersecurity strategy, risk management, and compliance readiness. We’re also registered on SAM.gov and classified under applicable NAICS codes, making us an eligible partner for public-sector and subcontracted private engagements.

❓ Do you work with state and local government organizations (or their subcontractors)?

Yes. State and local governments face many of the same cybersecurity and compliance challenges as private businesses—especially in education, public health, utilities, and emergency response. They’re often required to follow NIST-based controls, HIPAA safeguards, CJIS standards, or state-specific regulations.

🔧 How Turnstone Helps:
We support government agencies and contractors with security assessments, risk reduction strategies, and compliance alignment for frameworks like NIST 800‑53, HIPAA, or CJIS.
Turnstone Compliance is registered on SAM.gov and classified under relevant NAICS codes, making us visible and procurement-ready to support prime contractors as a subcontractor public sector projects and vendors.

❓What is a cybersecurity framework, and do I need one?

A cybersecurity framework provides structure for managing security risks. Common examples include NIST CSF, ISO 27001, CIS Controls, and NERC CIP. These aren’t products to ‘buy’, but guidelines to align your organization’s efforts in ensuring that company assets, procedure, and resilience are meeting regulatory requirements.

🔧 How Turnstone Helps:
We work with you to select the right framework and implement it in a way that fits your environment. Our consulting ensures the program is manageable, auditable, and effective—not just paperwork. Some organizations may require cross-mappings or multiple frameworks at once, depending on their contractual obligations.

❓What is HIPAA compliance in cybersecurity terms?

HIPAA requires protecting patient data (ePHI) with administrative, technical, and physical safeguards—including access controls, audits, and risk assessments.

🔧 How Turnstone Helps:
We assess your HIPAA Security Rule compliance, help implement technical safeguards (like encryption and access controls), and develop your risk analysis, policies, and documentation for audit readiness.

❓What is PCI-DSS and why does it matter to my e-commerce, retail, or service business?

PCI-DSS is a set of security requirements for any business that handles credit card data. It’s not optional—if you accept payments, you’re expected to meet certain standards to protect cardholder information.

Common IT/security oversights include:

  • Inadequate logging, monitoring, and retention of access or system activity
  • Poor or missing network segmentation of the cardholder environment

🔧 How Turnstone Helps:
We help businesses understand what parts of PCI apply to them, and walk you through implementation and validation—whether you’re a retail shop, SaaS platform, or service provider.

❓I’m not a big company—does PCI-DSS still apply to me?

“The PCI DSS applies to all entities that store, process, and/or transmit cardholder data. It covers technical
and operational system components included in or connected to cardholder data. If you accept or
process payment cards, PCI DSS applies to you.”

Common IT/security oversights include:

  • Inadequate logging, monitoring, and retention of access or system activity
  • Poor or missing network segmentation of the cardholder environment

🔧 How Turnstone Helps:
We help businesses understand what parts of PCI apply to them, and walk you through implementation and validation—whether you’re a retail shop, SaaS platform, or service provider.

❓When should I start thinking about PCI compliance?

🔧 How Turnstone Helps:
We analyze your environment to identify what systems are in scope and help you apply the correct controls for encryption, access, and monitoring—so you’re not left guessing.