SERVICES / REGULATORY COMPLIANCE AUDITS

SERVICES / REGULATORY COMPLIANCE AUDITS

Regulatory Compliance Audits

Regulatory Compliance Audits

The regulatory reality

Compliance examinations have fundamentally changed. Regulators are no longer satisfied with a policy binder and a completed questionnaire — they want evidence that your controls are actually implemented, consistently followed, and producing measurable results. Organizations that treat compliance as an annual checkbox exercise are the ones that fail examinations, face findings, and in the worst cases, experience the breach the framework was designed to prevent.

Thorium conducts compliance audits as substantive technical and procedural assessments. We map your actual control environment against framework requirements, gather supporting evidence, identify gaps with specificity, and produce documentation your team can act on and your examiners will accept. Every engagement is led by senior practitioners with direct experience across the frameworks your organization is subject to.

FFIEC / NCUA

FFIEC / NCUA

FFIEC / NCUA

The FFIEC Cybersecurity Assessment Tool and Information Security booklet establish the baseline expectations for community banks and credit unions. NCUA examiners use these standards to evaluate your security program during examinations — and findings can result in formal actions, increased oversight, and reputational damage.

The FFIEC Cybersecurity Assessment Tool and Information Security booklet establish the baseline expectations for community banks and credit unions. NCUA examiners use these standards to evaluate your security program during examinations — and findings can result in formal actions, increased oversight, and reputational damage.

NIST SP 800-53 / CSF

NIST SP 800-53 / CSF

NIST SP 800-53 / CSF

NIST SP 800-53 and the Cybersecurity Framework are the gold standards for security program structure. We assess your control environment against applicable control families, identify gaps, and produce a maturity scoring that gives your leadership a clear picture of program strength and investment priorities.

NIST SP 800-53 and the Cybersecurity Framework are the gold standards for security program structure. We assess your control environment against applicable control families, identify gaps, and produce a maturity scoring that gives your leadership a clear picture of program strength and investment priorities.

HIPAA Security Rule

HIPAA Security Rule

HIPAA Security Rule

The HIPAA Security Rule requires covered entities and business associates to implement administrative, physical, and technical safeguards protecting electronic protected health information. OCR audits and breach investigations routinely find that organizations failed to conduct required risk analyses or implement documented security measures.

The HIPAA Security Rule requires covered entities and business associates to implement administrative, physical, and technical safeguards protecting electronic protected health information. OCR audits and breach investigations routinely find that organizations failed to conduct required risk analyses or implement documented security measures.

PCI-DSS

PCI-DSS

PCI-DSS

PCI-DSS applies to any organization that stores, processes, or transmits cardholder data. We assess your cardholder data environment, evaluate control implementation against current PCI requirements, identify scope and segmentation gaps, and produce remediation guidance that prepares you for a formal QSA assessment. Applies to: Organizations accepting or processing credit and debit card payments.

PCI-DSS applies to any organization that stores, processes, or transmits cardholder data. We assess your cardholder data environment, evaluate control implementation against current PCI requirements, identify scope and segmentation gaps, and produce remediation guidance that prepares you for a formal QSA assessment. Applies to: Organizations accepting or processing credit and debit card payments.

CMMC Level 1 & 2

CMMC Level 1 & 2

CMMC Level 1 & 2

CMMC 2.0 requires DoD contractors to demonstrate compliance with NIST SP 800-171 controls protecting Controlled Unclassified Information. We assess your practice implementation against Level 1 and Level 2 requirements, identify gaps, and help you build the documentation and evidence artifacts required for certification. Applies to: DoD contractors and subcontractors handling Federal Contract Information or Controlled Unclassified Information.

CMMC 2.0 requires DoD contractors to demonstrate compliance with NIST SP 800-171 controls protecting Controlled Unclassified Information. We assess your practice implementation against Level 1 and Level 2 requirements, identify gaps, and help you build the documentation and evidence artifacts required for certification. Applies to: DoD contractors and subcontractors handling Federal Contract Information or Controlled Unclassified Information.

ISO 27001

ISO 27001

ISO 27001

ISO 27001 provides a systematic framework for establishing, implementing, and maintaining an information security management system. We conduct gap assessments against Annex A controls, evaluate your ISMS documentation, and produce readiness findings that prepare your organization for formal certification audits. Applies to: Organizations pursuing ISO 27001 certification or seeking international framework alignment.

ISO 27001 provides a systematic framework for establishing, implementing, and maintaining an information security management system. We conduct gap assessments against Annex A controls, evaluate your ISMS documentation, and produce readiness findings that prepare your organization for formal certification audits. Applies to: Organizations pursuing ISO 27001 certification or seeking international framework alignment.

Credit Unions

Credit Unions

NCUA examiners evaluate your security program against FFIEC standards and the Cybersecurity Assessment Tool. We build compliance documentation around the specific questions examiners ask — and the evidence they expect to see.

NCUA examiners evaluate your security program against FFIEC standards and the Cybersecurity Assessment Tool. We build compliance documentation around the specific questions examiners ask — and the evidence they expect to see.

Healthcare

Healthcare

OCR investigations consistently find that healthcare organizations failed to conduct adequate risk analyses or implement required safeguards. We close those gaps before they become findings — or headlines.

Defense Contractors

Defense Contractors

CMMC certification requires documented evidence of control implementation — not just policy documents. We assess your actual practices, identify gaps, and help you build the artifacts required for Level 1 and Level 2 certification.

CMMC certification requires documented evidence of control implementation — not just policy documents. We assess your actual practices, identify gaps, and help you build the artifacts required for Level 1 and Level 2 certification.

When is your next examination — and are you ready for it?

When is your next examination — and are you ready for it?

When is your next examination —
and are you ready for it?

Most organizations aren’t as prepared as they believe. A Thorium compliance assessment gives you an honest picture of where you stand — and a clear path to where you need to be.

Most organizations aren’t as prepared as they believe. A Thorium compliance assessment gives you an honest picture of where you stand — and a clear path to where you need to be.

Thorium Information Security, LLC.

Hayden, Idaho, USA

(208) 352-2877

Sales@ThoriumInfosec.com

Copyright © 2026 Thorium Information Security LLC. All rights reserved.

Copyright © 2026 Thorium Information Security LLC. All rights reserved.