From CISO Marketplace — the hub for security professionals Visit

Governance & Compliance Terms

81 terms

Anomaly-Driven Security Policies

Security measures that automatically adjust based on the detection of unusual activity patterns.

Attestation of Compliance (AOC)

Formal declaration validating adherence to standards like PCI DSS, issued by qualified auditors.

Automated Patch Management

Systems that automatically detect, schedule, and deploy patches to address software vulnerabilities.

Automated Security Compliance Checking

Systematic compliance verification.

Blockchain Audit Trail

Record of blockchain transactions and changes.

Blockchain Compliance Framework

Standards for regulatory compliance in blockchain.

Blockchain Compliance Monitoring

Tracking blockchain regulation adherence.

Blockchain Governance Framework

Structure for blockchain management.

Bug Bounty Program Analytics

Analyzing data from bug bounty programs to improve vulnerability detection and remediation processes.

Bug Bounty Program Optimization

Strategies to improve the efficiency and effectiveness of bug bounty programs in uncovering security flaws.

BYOD Security Policies

Guidelines and practices to secure networks while accommodating employee-owned devices.

CI/CD Security Automation

Automating security validations throughout the continuous integration and continuous delivery pipelines.

Compliance as Code

Automating regulatory compliance checks by encoding policies directly into software development processes.

Compliance Audit

Formal evaluation against regulatory frameworks like HIPAA or SOC 2.

Compliance Calendar Management

Timeline tracking of regulatory deadlines.

Compliance Control Testing

Validation of regulatory controls.

Compliance Documentation System

Platform for managing compliance records.

Compliance Evidence Collection

Gathering proof of regulatory adherence.

Compliance Maturity Model

Framework for measuring compliance effectiveness.

Compliance Monitoring Dashboard

Visual tracking of regulatory adherence.

Compliance Risk Assessment

Evaluation of regulatory risk exposure.

Compliance Training Platform

Educational system for regulatory requirements.

Compliance Workflow Automation

Automated compliance process management.

Critical Patch Update Automation

Automated processes to deploy essential software patches quickly to reduce vulnerability windows.

Criticality-Based Vulnerability Prioritization

A method of ranking vulnerabilities based on the criticality of the affected assets.

Cyber Hygiene Scoring

Metrics that assess and score an organization's basic security practices to highlight areas for improvement.

Cyber Insurance Risk Assessment

Evaluating an organization's cyber risk profile to determine appropriate insurance coverage and premiums.

Cyber Range Exercises

Simulated environments used to train cybersecurity professionals in realistic attack and defense scenarios.

Cybersecurity Compliance Program

Documented policies ensuring adherence to relevant laws and regulations.

Cybersecurity Maturity Models

Frameworks that assess and guide an organization's progression in implementing robust security practices.

Cybersecurity Orchestration Frameworks

Structured approaches that integrate multiple security tools and processes into a unified defense strategy.

Cybersecurity Standard

Benchmarks like NIST 800-53 guiding security control implementation.

Data Localization Requirement

Rules requiring local data storage.

Data Processing Agreement

Legal contract for data handling.

Data Processing Agreement Template

Standard data handling contract.

Data Protection Certification

Validation of privacy measures.

Data Protection Officer Role

Mandated privacy oversight position.

Data Sovereignty Requirements

National laws requiring data to stay within borders.

Data Transfer Agreement

Contract for data movement.

Decentralized Security Operations

Distributing security monitoring and response functions across multiple locations or teams for greater resilience.

DevSecOps Pipeline Integration

The seamless incorporation of security practices into continuous development and deployment processes.

GDPR Data Subject Rights

Specific individual rights under EU privacy law.

General Data Protection Regulation (GDPR)

EU regulation enforcing transparent personal data handling and user rights.

Governance, Risk, and Compliance (GRC)

Integrated framework managing organizational security objectives and legal obligations.

Immutable Logging

Logging systems engineered so that once data is recorded, it cannot be altered or deleted, ensuring audit integrity.

Integrated Compliance Monitoring

Systems that continuously verify adherence to security and regulatory standards across an organization.

Interactive Cyber Training Platforms

Web-based tools offering hands-on cybersecurity training through interactive simulations.

Medical Device Security Standards

Guidelines ensuring that connected medical devices are safeguarded against cyber vulnerabilities.

National Institute of Standards and Technology (NIST)

US agency developing cybersecurity frameworks and guidelines.

Payment Card Industry Data Security Standard (PCI DSS)

Security requirements for organizations handling credit card transactions.

Privacy Shield Framework

International data transfer agreement.

Privacy Training Platform

Educational system for privacy awareness.

Real-Time Security Posture Management

Continuous monitoring of an organization's security health to identify and remediate vulnerabilities promptly.

Regulatory Change Management

Tracking and implementing regulatory updates.

Regulatory Change Tracking

Monitoring regulatory updates.

Regulatory Filing System

Platform for submitting regulatory documents.

Regulatory Intelligence Platform

System for tracking regulatory changes.

Regulatory Reporting Automation

Automated compliance reporting systems.

Regulatory Reporting Engine

System for generating compliance reports.

Regulatory Reporting Framework

Structure for compliance reporting.

Regulatory Sandbox Environment

Test environment for compliance validation.

Regulatory Technology (RegTech)

Technology used to manage regulatory compliance.

Regulatory Technology Integration

Connecting compliance systems.

Risk-Based Vulnerability Scanning

Prioritizing vulnerability assessments based on the potential impact and likelihood of exploitation.

Security Awareness Gamification

The application of game mechanics to cybersecurity training to increase user engagement and retention.

Security Compliance Automation

Tools that automate the process of checking and maintaining security compliance.

Security Compliance Mapping

Aligning security controls with compliance requirements.

Security Fabric Integration

The process of linking disparate security tools into a unified, cohesive defense framework.

Security Policy Automation

The use of automated systems to enforce, update, and monitor security policies across an organization.

Security Policy Orchestration

Automated management and implementation of security policies across different tools and platforms.

Smart Contract Audit

Security assessment of blockchain-based automated contracts.

Smart Contract Governance

Management of decentralized contract systems.

Smart Contract Insurance

Risk protection for blockchain contracts.

Smart Contract Library

Collection of secure contract templates.

Smart Contract Registry

Database of blockchain contracts.

Smart Contract Security Auditing

The systematic review and testing of blockchain smart contracts to identify vulnerabilities and ensure reliability.

Software Bill of Materials (SBOM) Security

Ensuring that a complete and secure inventory of software components is maintained for vulnerability tracking.

Statement on Standards for Attestation Engagements (SSAE 18)

Auditing standard for reporting on internal controls.

Supply Chain Cybersecurity Risk

Evaluating and mitigating risks associated with third-party vendors and supply chain partners.

Vulnerability Disclosure Programs

Formal initiatives that enable researchers to report security flaws responsibly and securely.

Vulnerability Lifecycle Management

Comprehensive tracking of vulnerabilities from initial discovery through to remediation and closure.