Glosario de Cumplimiento
AICPA
Learn moreAICPA standards for the American Institute of Certified Public Accountants (AICPA) who created the Service Organizational Controls standard. It is the largest organization of accountants in the United States.
APRA Prudential Standard CPS 234
Learn morePrudential Standard CPS 234 is a regulatory framework established by the Australian Prudential Regulation Authority (APRA) to enhance cybersecurity in the financial services industry.
Acuerdo de Socio Comercial (HIPAA)
Learn moreUn socio comercial de HIPAA es una persona u organización que proporciona ciertos servicios o funciones que implican el acceso a información de salud protegida (PHI) en nombre de una entidad cubierta.
Afirmación de Gestión (SOC 2)
Learn moreUna afirmación de gestión SOC 2 es una declaración hecha por la administración de una organización de servicios que describe el compromiso de la organización con la seguridad, disponibilidad, integridad del procesamiento, confidencialidad y privacidad de los datos de los clientes.
Annex A Controls
Learn moreAnnex A is part of the ISO 27001 standard document. It outlines all ISO 27001 controls and groups them into categories.
Asociado Comercial (HIPAA)
Learn moreUn asociado comercial de HIPAA es una persona u organización que proporciona ciertos servicios o funciones que implican acceso a información de salud protegida (PHI) en nombre de una entidad cubierta.
Auditor
Learn moreAn auditor is an accounting firm hired by a company to assess whether it meets a compliance standard such as SOC 2 or ISO 27001. Compliance standards require companies to implement a long list of security controls.
Autenticación Multifactor (MFA)
Learn moreLa autenticación multifactor (MFA) es un proceso de inicio de sesión de cuenta en múltiples pasos que requiere que los usuarios ingresen dos o más piezas de información.
Brecha de Datos
Learn moreUna brecha de datos es un incidente de seguridad en el cual información sensible, confidencial o protegida es accedida, robada o divulgada por un individuo o entidad no autorizada.
Bridge Letter
Learn moreA SOC 2 bridge letter is a document that provides information about the controls and systems of a service organization for a period of time that is not covered by a previously issued SOC 2 report.
CCPA
Learn moreThe California Consumer Privacy Act (CCPA) declares that companies must inform consumers about how their data is being used and empowers consumers to decide how or if their data is shared.
Cloud Compliance
Learn moreCloud compliance refers to the set of rules and regulations that govern the use of cloud computing services.
Compliance Risk Management
Learn moreCompliance risk management is an organization’s process for regularly identifying, analyzing, and mitigating risks. In the context of SOC 2 and ISO 27001, risk management refers to security and compliance risk management, meaning you’ll want to understand risks to sector and geography specific regulation and compliance standards.
Compliance Software
Learn moreCompliance software is a software tool an organization can use to scan and monitor its vendors, systems, and controls to ensure they are compliant with certain security standards or regulations. Compliance software can be part of an organization's compliance risk management strategy to continuously track, monitor, and remediate any compliance risks that would jeopardize an organization's ability to stay compliant with relevant security standards and regulations.
Continuous Integration (CI) and Continuous Delivery (CD)
Learn moreContinuous Integration (CI) and Continuous Delivery (CD) are practices in software engineering for improving the development process through automation and streamlined workflows.
Control
Learn moreA control is a specific rule or safeguard used to improve a company’s security and compliance. Common types of safeguards include management, physical, legal, operational, and technical controls.
Control de Acceso
Learn moreEl control de acceso es un aspecto esencial de la gestión de la seguridad y se utiliza para proteger recursos, prevenir el acceso no autorizado y garantizar el cumplimiento.
Criterios de Servicios de Confianza SOC 2
Learn moreLos Criterios de Servicios de Confianza de AICPA son el marco utilizado por los auditores para determinar qué controles de seguridad y cumplimiento probarán en una empresa.
Cuestionarios de seguridad
Learn moreUn cuestionario de seguridad es una lista de preguntas que evalúan las prácticas de seguridad y privacidad de su organización. Las organizaciones a menudo intercambian cuestionarios como parte del proceso de debida diligencia.
Cybersecurity
Learn moreCybersecurity is the body of technologies, processes, and practices designed to protect data, information, programs, systems, networks, and devices from digital attacks from unauthorized users on the internet.
Cybersecurity Maturity Model Certification (CMMC)
Learn moreThe Cybersecurity Maturity Model Certification (CMMC) is a cybersecurity framework developed by the United States Department of Defense (DoD).
Data Integrity
Learn moreData integrity refers to the accuracy, consistency, and reliability of data throughout its lifecycle, from creation to deletion.
Data Loss Prevention (DLP)
Learn moreData loss prevention (DLP) is a set of policies and technologies designed to prevent sensitive or confidential information from being lost, stolen, or exposed.
Data Mining
Learn moreData mining is the process of discovering patterns, trends, and insights from large datasets.
Datos del titular de la tarjeta
Learn moreEl Consejo de Normas de Seguridad de la Industria de Tarjetas de Pago (PCI SSC) estableció qué datos del titular de la tarjeta deben protegerse según PCI DSS.
Defense Industrial Base
Learn moreThe Defense Industrial Base (DIB) refers to the worldwide industrial complex that enables research and development, design, production, delivery, and maintenance of military weapons systems, subsystems, and components or parts, to meet U.S. military requirements.
Defense Innovation Unit (DIU)
Learn moreThe Defense Innovation Unit (DIU) is an organization within the United States Department of Defense (DoD) that works to strengthen national security by increasing the military's adoption of innovative commercial technology.
Department of Defense Information Network (DoDIN)
Learn moreThe Department of Defense Information Network (DoDIN) is a global set of information capabilities, processes, and personnel for collecting, processing, storing, disseminating, and managing information on demand to warfighters, policymakers, and support personnel.
DevSecOps
Learn moreDevSecOps integrates security practices within the DevOps process.
Due Diligence Questionnaire (DDQ)
Learn moreA Due Diligence Questionnaire is a comprehensive questionnaire used to assess a company's business operations, financial performance, legal and regulatory compliance, and other key areas.
Entidad cubierta
Learn moreUna entidad cubierta es un proveedor de atención médica, un plan de salud o una agencia de compensación de atención médica que está sujeta a las reglas de privacidad y seguridad de la Ley de Portabilidad y Responsabilidad del Seguro de Salud (HIPAA).
Federal Information Security Management Act (FISMA)
Learn moreThe Federal Information Security Management Act is United States legislation that was enacted as part of the Electronic Government Act of 2002.
Firewall
Learn moreA firewall is a network security device that monitors and controls incoming and outgoing network traffic.
GDPR
Learn moreIn May 2018, the European Union implemented the General Data Protection Regulation (GDPR) to create one legal framework for collecting and processing personal information from individuals who live inside the European Economic Area.
Governance, Risk, and Compliance (GRC)
Learn moreGovernance, Risk, and Compliance (GRC) is a management framework that organizations use to ensure they are operating in a legal, ethical, and effective manner.
HIPAA
Learn moreCongress passed the Health Insurance Portability and Accountability Act (HIPAA) in 1996 in order to create national standards to protect sensitive patient health data.
HIPAA Employee Training
Learn moreHealthcare organizations are legally required to have certain administrative safeguards, like employee training, in place to protect patient data against breaches and comply with HIPAA.
HIPAA Enforcement Rule
Learn moreThe HIPAA Enforcement Rule governs violation investigations and penalties.
HIPAA Omnibus Rule
Learn moreThe HIPAA Breach Notification Rule requires covered entities and their business associates to notify individuals, HHS, and, in some cases, the media when there is a breach of unsecured protected health information (PHI).
HIPAA Privacy Rule
Learn moreThe HIPAA Privacy Rule establishes national standards for protecting the privacy and security of protected health information.
HIPAA Rules
Learn moreThe Health Insurance Portability and Accountability Act (HIPAA) includes a set of rules to help healthcare organizations and their business associates protect the security and confidentiality of sensitive patient data. To become compliant, healthcare organizations must follow five HIPAA rules to safeguard this protected health information (PHI).
HIPAA Safeguards
Learn moreThe HIPAA Security Rule outlines three types of safeguards — administrative, physical, and technical — to properly protect PHI.
HIPAA Security Rule
Learn moreThe HIPAA Security Rule is a set of regulations issued by the U.S. Department of Health and Human Services (HHS) that establish national standards for protecting electronic personal health information (ePHI).
HITECH
Learn moreThe Health Information Technology for Economic and Clinical Health Act (HITECH Act) was enacted under Title XIII of the American Recovery and Reinvestment Act (ARRA) of 2009.
ISO 27001
Learn moreThe ISO 27001 is a security and compliance standard created jointly by the International Organization for Standardization and the International Electrotechnical Commission.
ISO 27001 Stage 1 Audit
Learn moreAn ISO 27001 certification audit happens in multiple stages. For organizations pursuing certification for the first time, the audit process begins with a Stage 1 audit, also referred to as an ISMS design review.
ISO 27001 Stage 2 Audit
Learn moreAn ISO 27001 Stage 2 audit is the second part of a two-stage audit process for ISO/IEC 27001 certification
Información No Clasificada Controlada (CUI)
Learn moreLa Información No Clasificada Controlada (CUI) es información que requiere protección o controles de difusión de acuerdo con leyes aplicables, regulaciones y políticas gubernamentales, pero no está clasificada.
Information Security Management System (ISMS)
Learn moreThe ISO 27001 standard evaluates an organization’s information security management system, or ISMS.
Information Security Policy
Learn moreAn information security policy is a set of rules and guidelines that define how an organization manages and protects its information assets, including data, systems, and networks.
Infrastructure as a Service (IaaS)
Learn moreThe Department of Defense Information Network (DoDIN) is a global set of information capabilities, processes, and personnel for collecting, processing, storing, disseminating, and managing information on demand to warfighters, policymakers, and support personnel.
Instituto Nacional de Estándares y Tecnología (NIST)
Learn moreEl Instituto Nacional de Estándares y Tecnología es una agencia no reguladora del Departamento de Comercio de los Estados Unidos.
Internal Audit
Learn moreAn internal security audit is an evaluation of an organization's internal security controls, policies, and procedures to assess their effectiveness and identify areas for improvement.
International Organization for Standardization (ISO)
Learn moreISO stands for the International Organization for Standardization, which is a non-governmental organization that develops and publishes international standards for a wide range of industries and sectors.
Intrusion Detection System (IDS)
Learn moreAn intrusion detection system (IDS) is a network security technology designed to detect and respond to suspicious or malicious activity on a computer network.
Intrusion Prevention System (IPS)
Learn moreAn intrusion detection system (IDS) is a network security technology designed to detect and respond to suspicious or malicious activity on a computer network.
Joint Interoperability Test Command (JITC)
Learn moreThe Joint Interoperability Test Command (JITC) is part of the United States Department of Defense.
Keylogging
Learn moreKeylogging is a technique used to capture and record keystrokes made on a keyboard.
Malware
Learn moreMalware, abreviatura de software malicioso, se refiere a cualquier software o programa que está específicamente diseñado para causar daño, perjuicio o interrupción a los sistemas informáticos, redes o dispositivos móviles.
NIST CSF
Learn moreThe NIST CSF (National Institute of Standards and Technology Cybersecurity Framework) is a set of voluntary guidelines, standards, and best practices for managing cybersecurity risks in critical infrastructure organizations.
Niveles de impacto
Learn moreLos niveles de impacto se utilizan dentro de ciertos marcos de seguridad, como los proporcionados por el Departamento de Defensa de los Estados Unidos (DoD), para categorizar el potencial impacto de la divulgación, alteración o destrucción no autorizada de información.
On-Premises
Learn more"On-premises" (or "On-prem") refers to the location and management of servers, resources, and IT infrastructure.
PCI Attestation of Compliance (AoC)
Learn moreAn Attestation of Compliance (AoC) is a document that confirms that an organization has undergone a Payment Card Industry Data Security Standard (PCI DSS) assessment and is compliant with the standard.
PCI DSS
Learn morePayment card industry Data Security Standard (PCI DSS) is a set of security standards intended to ensure that all companies that process, store, or transmit credit card information maintain a secure environment.
PCI DSS Approved Scanning Vendor (ASV)
Learn moreA PCI DSS Approved Scanning Vendor (ASV) is a company that has been certified by the Payment Card Industry Security Standards Council (PCI SSC) to conduct external vulnerability scans of merchants and service providers that handle payment card data.
PCI Self-Assessment Questionnaire (SAQ)
Learn moreA PCI SAQ (Payment Card Industry Self-Assessment Questionnaire) is a tool used by merchants and service providers to assess their compliance with the PCI DSS.
Patch Management
Learn morePatch management is the process of identifying, acquiring, testing, and applying software updates.
Pen Test
Learn moreA penetration test (or “pen test”) is a simulated attack on an organization’s system and services, often conducted by a white hat or ethical hacker. The SOC 2 and ISO 27001 audits both require a penetration test.
Phishing
Learn morePhishing is a type of social engineering attack in which an attacker sends fraudulent emails, text messages, or other electronic communication to individuals, attempting to trick them into revealing sensitive information
Platform as a Service (PaaS)
Learn morePaaS, or Platform-as-a-Service, is a cloud computing model that offers organizations a complete cloud platform—hardware, software, and infrastructure—for developing, running, and managing applications without building and maintaining those platforms on-premises.
Policy
Learn moreA policy is a governing document describing what an organization does to ensure security and compliance. It outlines responsibilities and general procedures meant to implement and maintain specific security and compliance controls.
Política de Privacidad
Learn moreUna política de privacidad es una herramienta importante para que las organizaciones comuniquen a sus clientes o usuarios cómo se recopila, utiliza y protege su información personal, y para garantizar el cumplimiento de las leyes y regulaciones de privacidad aplicables.
Protected Health Information (PHI)
Learn morePHI is protected under the Health Insurance Portability and Availability Act (HIPAA), and includes any health data created, transmitted, or stored by a HIPAA-covered entity and its business associates.
Qualified Security Assessor (QSA)
Learn moreA Qualified Security Assessor (QSA) is an individual or organization that has been certified by the Payment Card Industry Security Standards Council (PCI SSC) to assess an organization's compliance with the Payment Card Industry Data Security Standard (PCI DSS).
Ransomware
Learn moreRansomware is a type of malicious software that encrypts a victim's files or system, rendering them inaccessible, and then demands a ransom payment in exchange for restoring access.
Regla de Notificación de Violaciones de HIPAA
Learn moreLa Regla de Notificación de Violaciones de HIPAA requiere que las entidades cubiertas y sus asociados de negocios notifiquen a los individuos, al HHS y, en algunos casos, a los medios de comunicación cuando hay una violación de información de salud protegida (PHI) no asegurada.
Request for Information (RFI)
Learn moreAn RFI, or Request for Information, is a standard business process for collecting written information about the capabilities of various suppliers.
Request for Proposal (RFP)
Learn moreAn RFP, or Request for Proposal, is a document that organizations use to solicit proposals from potential vendors or service providers for a specific product or service.
Request for Quotation (RFQ)
Learn moreA Request for Quotation is a document and process used in procurement where an organization asks vendors or suppliers to provide a quote for the supply of specific products or services.
Risk Assessment
Learn moreA risk assessment is a process that helps organizations identify and evaluate their cybersecurity risks, vulnerabilities, and threats.
Risk Management
Learn moreRisk management is the process of identifying, assessing, and mitigating potential risks to an organization.
SOC 1
Learn moreThe Service Organization Control 1 Report (SOC 1) is an auditor report assessing controls for financial reporting. The SOC 1 targets companies providing services that could affect clients’ financial statements or internal controls over financial reporting.
SOC 2
Learn moreThe Service Organization Control 2 Report (SOC 2) is an auditor report assessing controls for security and compliance. Any company offering a B2B service, along with any B2C company handling sensitive information, should think about getting a SOC 2 report completed.
SOC 2 Auditor
Learn moreSOC 2 auditors evaluate how effective your security program is and determine whether your internal controls meet the requirements of your chosen Trust Services Criteria (TSC).
SOC 2 Report
Learn moreA SOC 2 report summarizes the results of the compliance audit and the auditor’s findings.
SOC 2 Type I
Learn moreA SOC 2 Type 1 report examines how well a service organization's system and controls perform over a period of time.
SOC 2 Type II
Learn moreA SOC 2 Type 2 report examines how well a service organization's system and controls perform over a period of time.
SOC 3
Learn moreThe Service Organizational Control 3 Report (SOC 3) is a more concise and high level version of the SOC 2 meant to be released publicly as marketing material.
SSAE 16
Learn moreThe Statement on Standards for Attestation Engagements No. 16 (SSAE 16) is a set of standards developed specifically for certified public accountants (CPAs) to evaluate an organization’s internal controls and how service companies report on these controls.
SSAE 18
Learn moreThe Statement on Standards for Attestation Engagements No. 18 (SSAE 18) is a new set of standards that have replaced SSAE 16 to help increase the usefulness and quality of a SOC 1 report.
Standardized Information Gathering (SIG) Questionnaire
Learn moreThe SIG is a comprehensive set of questions used to assess the cybersecurity, IT, data security, and privacy risks and controls of third-party service providers and vendors.
Statement of Applicability (ISO 27001)
Learn moreAn ISO 27001 Statement of Applicability (SoA) is a document that identifies the controls that an organization has implemented to address the information security risks it has identified through a risk assessment.
System Description (SOC 2)
Learn moreA SOC 2 System Description is a narrative description of a service organization's systems, policies, and procedures related to the Trust Services Criteria of security, availability, processing integrity, confidentiality, and privacy.
Test
Learn moreA test refers to an auditor’s independent review of a security or compliance control. Auditors may assess a control’s design or implementation by requesting a copy of a relevant policy, conducting interviews, asking for related procedures, or even taking a sample of evidence, such as screenshots or tickets.
Threat Assessment
Learn moreA threat assessment is a process of identifying, analyzing, and evaluating potential threats to an organization.