GLBA vs ISO 28000
GLBA
U.S. federal law for financial privacy and safeguards
ISO 28000
International standard for supply chain security management systems.
Quick Verdict
GLBA mandates privacy notices and security for US financial firms protecting NPI, while ISO 28000 is a voluntary global standard for supply chain security management. Organizations adopt GLBA for legal compliance; ISO 28000 for resilience and certification.
GLBA
Gramm-Leach-Bliley Act
Key Features
- Mandates privacy notices and opt-out for NPI sharing
- Requires written information security program with safeguards
- Designates Qualified Individual for oversight and reporting
- Imposes 30-day FTC breach notification threshold
- Broad activity-based scope for financial institutions
ISO 28000
ISO 28000:2022 Security management systems requirements
Key Features
- Risk-based supply chain security management system
- PDCA cycle aligned with other ISO standards
- Explicit focus on supplier interdependencies and external processes
- Leadership commitment and security policy requirements
- Integrated incident response and recovery plans
Detailed Analysis
A comprehensive look at the specific requirements, scope, and impact of each standard.
GLBA Details
What It Is
Gramm-Leach-Bliley Act (GLBA) is a U.S. federal regulation enacted in 1999. It establishes privacy and security standards for financial institutions handling nonpublic personal information (NPI). Primary purpose: ensure transparency in data sharing and protect customer data via risk-based safeguards. Approach combines Privacy Rule notices/opt-outs with Safeguards Rule security programs.
Key Components
- Privacy Rule (16 C.F.R. Part 313): notices, opt-outs for nonaffiliate sharing.
- Safeguards Rule (16 C.F.R. Part 314): written security program with 9+ elements including risk assessment, Qualified Individual, vendor oversight.
- **Pretexting provisionsanti-social engineering protections. Built on risk-based governance; enforced by FTC for non-banks, no formal certification but audit/compliance model.
Why Organizations Use It
Legal mandate for financial entities; avoids penalties up to $100K/violation. Enhances risk management, customer trust, vendor controls. Provides competitive edge via demonstrated security; aligns with cyber insurance, stakeholder expectations.
Implementation Overview
Phased: scoping, risk assessment, policy development, technical controls (encryption, MFA), testing, training. Applies to broad financial activities (banks, fintech, auto dealers); U.S.-focused. Requires ongoing audits, board reporting, breach notifications.
ISO 28000 Details
What It Is
ISO 28000:2022 — Security and resilience — Security management systems — Requirements is an international certification standard specifying requirements for establishing, implementing, maintaining, and improving a security management system (SMS) focused on supply chain security. It adopts a risk-based, PDCA (Plan-Do-Check-Act) approach aligned with ISO management systems.
Key Components
- Clauses 4-10 cover context, leadership, planning, support, operation, performance evaluation, and improvement.
- Emphasizes risk assessment (aligned with ISO 31000), operational controls, security plans, and supplier interdependencies.
- Built on holistic principles like customization, human factors, and relationship management.
- Supports third-party certification per ISO 28003.
Why Organizations Use It
- Reduces supply chain risks (theft, sabotage, disruptions).
- Meets contractual, regulatory, and insurance requirements.
- Enhances resilience, market access, and stakeholder trust.
- Provides competitive edge via certified assurance.
Implementation Overview
- Phased: gap analysis, risk assessment, controls deployment, training, audits.
- Applicable to all sizes/industries with supply chains.
- Involves internal audits, management reviews, optional certification audits. (178 words)
Key Differences
| Aspect | GLBA | ISO 28000 |
|---|---|---|
| Scope | Consumer financial privacy and NPI security | Supply chain security management system |
| Industry | Financial institutions, non-banks (US) | All sectors with supply chains (global) |
| Nature | US federal law with FTC enforcement | Voluntary ISO certification standard |
| Testing | Risk assessments, penetration testing annually | Internal audits, management reviews periodically |
| Penalties | Up to $100k per violation, imprisonment | Loss of certification, no legal penalties |
Scope
Industry
Nature
Testing
Penalties
Frequently Asked Questions
Common questions about GLBA and ISO 28000
GLBA FAQ
ISO 28000 FAQ
You Might also be Interested in These Articles...

The SOC Maturity Roadmap: A 5-Step Blueprint for Scaling from Ad-Hoc to Optimized Operations
Unlock SOC excellence with our 5-step maturity roadmap. Compare SOC-CMM, NIST CSF, and CMMC frameworks to scale from ad-hoc to automated operations. Start your

The CIS Controls v8.1 Evidence Pack: What Auditors Ask For (and How to Produce Proof Fast)
Fail CIS Controls v8.1 audits due to missing evidence? Get the blueprint: exact artifacts auditors want, repository structure, and automation from security tool

From Reactive Gatekeeper to Proactive Strategist: How Compliance Software Reshapes the Compliance Professional's Day
Discover how compliance software automates monitoring, delivers real-time insights, and transforms compliance pros from reactive gatekeepers to proactive strate
Run Maturity Assessments with GRADUM
Transform your compliance journey with our AI-powered assessment platform
Assess your organization's maturity across multiple standards and regulations including ISO 27001, DORA, NIS2, NIST, GDPR, and hundreds more. Get actionable insights and track your progress with collaborative, AI-powered evaluations.
Explore More Comparisons
See how GLBA and ISO 28000 compare against other standards