Compliance Glossary
Browse our list of commonly used security, privacy, and compliance terms and acronyms.
AICPA
AICPA standards for the American Institute of Certified Public Accountants (AICPA) who created the Service Organizational Controls standard. It is the largest organization of accountants in the United States.
Learn MoreAccess Control
Access control is an essential aspect of security management and is used to protect resources, prevent unauthorized access, and ensure compliance.
Learn MoreAnnex A Controls
Annex A is part of the ISO 27001 standard document. It outlines all ISO 27001 controls and groups them into categories.
Learn MoreAuditor
An auditor is an accounting firm hired by a company to assess whether it meets a compliance standard such as SOC 2 or ISO 27001. Compliance standards require companies to implement a long list of security controls.
Learn MoreBridge Letter
A SOC 2 bridge letter is a document that provides information about the controls and systems of a service organization for a period of time that is not covered by a previously issued SOC 2 report.
Learn MoreBusiness Associate (HIPAA)
A HIPAA business associate is a person or organization that provides certain services or functions that involve access to protected health information (PHI) on behalf of a covered entity.
Learn MoreBusiness Associate Agreement (HIPAA)
A HIPAA business associate is a person or organization that provides certain services or functions that involve access to protected health information (PHI) on behalf of a covered entity.
Learn MoreCCPA
The California Consumer Privacy Act (CCPA) declares that companies must inform consumers about how their data is being used and empowers consumers to decide how or if their data is shared.
Learn MoreCardholder Data
The Payment Card Industry Security Standards Council (PCI SSC) established what cardholder data must be protected under PCI DSS.
Learn MoreCloud Compliance
Cloud compliance refers to the set of rules and regulations that govern the use of cloud computing services.
Learn MoreCompliance Risk Management
Compliance risk management is an organization’s process for regularly identifying, analyzing, and mitigating risks. In the context of SOC 2 and ISO 27001, risk management refers to security and compliance risk management, meaning you’ll want to understand risks to sector and geography specific regulation and compliance standards.
Learn MoreCompliance Software
Compliance software is a software tool an organization can use to scan and monitor its vendors, systems, and controls to ensure they are compliant with certain security standards or regulations. Compliance software can be part of an organization's compliance risk management strategy to continuously track, monitor, and remediate any compliance risks that would jeopardize an organization's ability to stay compliant with relevant security standards and regulations.
Learn MoreControl
A control is a specific rule or safeguard used to improve a company’s security and compliance. Common types of safeguards include management, physical, legal, operational, and technical controls.
Learn MoreCovered Entity
A covered entity is a healthcare provider, health plan, or healthcare clearinghouse that is subject to the Health Insurance Portability and Accountability Act (HIPAA) Privacy and Security Rules.
Learn MoreCybersecurity
Cybersecurity is the body of technologies, processes, and practices designed to protect data, information, programs, systems, networks, and devices from digital attacks from unauthorized users on the internet.
Learn MoreCybersecurity Maturity Model Certification (CMMC)
The Cybersecurity Maturity Model Certification (CMMC) is a cybersecurity framework developed by the United States Department of Defense (DoD).
Learn MoreData Breach
A data breach is a security incident in which sensitive, confidential, or protected information is accessed, stolen, or disclosed by an unauthorized individual or entity.
Learn MoreData Integrity
Data integrity refers to the accuracy, consistency, and reliability of data throughout its lifecycle, from creation to deletion.
Learn MoreData Loss Prevention (DLP)
Data loss prevention (DLP) is a set of policies and technologies designed to prevent sensitive or confidential information from being lost, stolen, or exposed.
Learn MoreData Mining
Data mining is the process of discovering patterns, trends, and insights from large datasets.
Learn MoreFirewall
A firewall is a network security device that monitors and controls incoming and outgoing network traffic.
Learn MoreGDPR
In May 2018, the European Union implemented the General Data Protection Regulation (GDPR) to create one legal framework for collecting and processing personal information from individuals who live inside the European Economic Area.
Learn MoreGovernance, Risk, and Compliance (GRC)
Governance, Risk, and Compliance (GRC) is a management framework that organizations use to ensure they are operating in a legal, ethical, and effective manner.
Learn MoreHIPAA
Congress passed the Health Insurance Portability and Accountability Act (HIPAA) in 1996 in order to create national standards to protect sensitive patient health data.
Learn MoreHIPAA Breach Notification Rule
The HIPAA Breach Notification Rule requires covered entities and their business associates to notify individuals, HHS, and, in some cases, the media when there is a breach of unsecured protected health information (PHI).
Learn MoreHIPAA Employee Training
Healthcare organizations are legally required to have certain administrative safeguards, like employee training, in place to protect patient data against breaches and comply with HIPAA.
Learn MoreHIPAA Enforcement Rule
The HIPAA Enforcement Rule governs violation investigations and penalties.
Learn MoreHIPAA Omnibus Rule
The HIPAA Breach Notification Rule requires covered entities and their business associates to notify individuals, HHS, and, in some cases, the media when there is a breach of unsecured protected health information (PHI).
Learn MoreHIPAA Privacy Rule
The HIPAA Privacy Rule establishes national standards for protecting the privacy and security of protected health information.
Learn MoreHIPAA Rules
The Health Insurance Portability and Accountability Act (HIPAA) includes a set of rules to help healthcare organizations and their business associates protect the security and confidentiality of sensitive patient data. To become compliant, healthcare organizations must follow five HIPAA rules to safeguard this protected health information (PHI).
Learn MoreHIPAA Safeguards
The HIPAA Security Rule outlines three types of safeguards — administrative, physical, and technical — to properly protect PHI.
Learn MoreHIPAA Security Rule
The HIPAA Security Rule is a set of regulations issued by the U.S. Department of Health and Human Services (HHS) that establish national standards for protecting electronic personal health information (ePHI).
Learn MoreHITECH
The Health Information Technology for Economic and Clinical Health Act (HITECH Act) was enacted under Title XIII of the American Recovery and Reinvestment Act (ARRA) of 2009.
Learn MoreISO 27001
The ISO 27001 is a security and compliance standard created jointly by the International Organization for Standardization and the International Electrotechnical Commission.
Learn MoreISO 27001 Stage 1 Audit
An ISO 27001 certification audit happens in multiple stages. For organizations pursuing certification for the first time, the audit process begins with a Stage 1 audit, also referred to as an ISMS design review.
Learn MoreISO 27001 Stage 2 Audit
An ISO 27001 Stage 2 audit is the second part of a two-stage audit process for ISO/IEC 27001 certification
Learn MoreInformation Security Management System (ISMS)
The ISO 27001 standard evaluates an organization’s information security management system, or ISMS.
Learn MoreInformation Security Policy
An information security policy is a set of rules and guidelines that define how an organization manages and protects its information assets, including data, systems, and networks.
Learn MoreInternal Audit
An internal security audit is an evaluation of an organization's internal security controls, policies, and procedures to assess their effectiveness and identify areas for improvement.
Learn MoreInternational Organization for Standardization (ISO)
ISO stands for the International Organization for Standardization, which is a non-governmental organization that develops and publishes international standards for a wide range of industries and sectors.
Learn MoreIntrusion Detection System (IDS)
An intrusion detection system (IDS) is a network security technology designed to detect and respond to suspicious or malicious activity on a computer network.
Learn MoreIntrusion Prevention System (IPS)
An intrusion detection system (IDS) is a network security technology designed to detect and respond to suspicious or malicious activity on a computer network.
Learn MoreKeylogging
Keylogging is a technique used to capture and record keystrokes made on a keyboard.
Learn MoreMalware
Malware, short for malicious software, refers to any software or program that is specifically designed to cause harm, damage, or disruption to computer systems, networks, or mobile devices.
Learn MoreManagement Assertion (SOC 2)
A SOC 2 management assertion is a statement made by the management of a service organization that describes the organization's commitment to security, availability, processing integrity, confidentiality, and privacy of customer data.
Learn MoreNIST CSF
The NIST CSF (National Institute of Standards and Technology Cybersecurity Framework) is a set of voluntary guidelines, standards, and best practices for managing cybersecurity risks in critical infrastructure organizations.
Learn MorePCI Attestation of Compliance (AoC)
An Attestation of Compliance (AoC) is a document that confirms that an organization has undergone a Payment Card Industry Data Security Standard (PCI DSS) assessment and is compliant with the standard.
Learn MorePCI DSS
Payment card industry Data Security Standard (PCI DSS) is a set of security standards intended to ensure that all companies that process, store, or transmit credit card information maintain a secure environment.
Learn MorePCI DSS Approved Scanning Vendor (ASV)
A PCI DSS Approved Scanning Vendor (ASV) is a company that has been certified by the Payment Card Industry Security Standards Council (PCI SSC) to conduct external vulnerability scans of merchants and service providers that handle payment card data.
Learn MorePCI Self-Assessment Questionnaire (SAQ)
A PCI SAQ (Payment Card Industry Self-Assessment Questionnaire) is a tool used by merchants and service providers to assess their compliance with the PCI DSS.
Learn MorePatch Management
Patch management is the process of identifying, acquiring, testing, and applying software updates.
Learn MorePen Test
A penetration test (or “pen test”) is a simulated attack on an organization’s system and services, often conducted by a white hat or ethical hacker. The SOC 2 and ISO 27001 audits both require a penetration test.
Learn MorePhishing
Phishing is a type of social engineering attack in which an attacker sends fraudulent emails, text messages, or other electronic communication to individuals, attempting to trick them into revealing sensitive information
Learn MorePolicy
A policy is a governing document describing what an organization does to ensure security and compliance. It outlines responsibilities and general procedures meant to implement and maintain specific security and compliance controls.
Learn MorePrivacy Policy
A privacy policy is an important tool for organizations to communicate with their customers or users about how their personal information is being collected, used, and protected, and to ensure compliance with applicable privacy laws and regulations.
Learn MoreProtected Health Information (PHI)
PHI is protected under the Health Insurance Portability and Availability Act (HIPAA), and includes any health data created, transmitted, or stored by a HIPAA-covered entity and its business associates.
Learn MoreQualified Security Assessor (QSA)
A Qualified Security Assessor (QSA) is an individual or organization that has been certified by the Payment Card Industry Security Standards Council (PCI SSC) to assess an organization's compliance with the Payment Card Industry Data Security Standard (PCI DSS).
Learn MoreRansomware
Ransomware is a type of malicious software that encrypts a victim's files or system, rendering them inaccessible, and then demands a ransom payment in exchange for restoring access.
Learn MoreRisk Assessment
A risk assessment is a process that helps organizations identify and evaluate their cybersecurity risks, vulnerabilities, and threats.
Learn MoreRisk Management
Risk management is the process of identifying, assessing, and mitigating potential risks to an organization.
Learn MoreSOC 1
The Service Organization Control 1 Report (SOC 1) is an auditor report assessing controls for financial reporting. The SOC 1 targets companies providing services that could affect clients’ financial statements or internal controls over financial reporting.
Learn MoreSOC 2
The Service Organization Control 2 Report (SOC 2) is an auditor report assessing controls for security and compliance. Any company offering a B2B service, along with any B2C company handling sensitive information, should think about getting a SOC 2 report completed.
Learn MoreSOC 2 Auditor
SOC 2 auditors evaluate how effective your security program is and determine whether your internal controls meet the requirements of your chosen Trust Services Criteria (TSC).
Learn MoreSOC 2 Report
A SOC 2 report summarizes the results of the compliance audit and the auditor’s findings.
Learn MoreSOC 2 Trust Services Criteria
AICPA’s Trust Services Criteria are the framework used by auditors to determine which security and compliance controls they will test for in a company.
Learn MoreSOC 2 Type I
A SOC 2 Type 1 report examines how well a service organization's system and controls perform over a period of time.
Learn MoreSOC 2 Type II
A SOC 2 Type 2 report examines how well a service organization's system and controls perform over a period of time.
Learn MoreSOC 3
The Service Organizational Control 3 Report (SOC 3) is a more concise and high level version of the SOC 2 meant to be released publicly as marketing material.
Learn MoreSSAE 16
The Statement on Standards for Attestation Engagements No. 16 (SSAE 16) is a set of standards developed specifically for certified public accountants (CPAs) to evaluate an organization’s internal controls and how service companies report on these controls.
Learn MoreSSAE 18
The Statement on Standards for Attestation Engagements No. 18 (SSAE 18) is a new set of standards that have replaced SSAE 16 to help increase the usefulness and quality of a SOC 1 report.
Learn MoreSecurity Questionnaires
A security questionnaire is a list of questions that assess your organization’s security and data privacy practices. Organizations often exchange questionnaires as part of the due diligence process.
Learn MoreStatement of Applicability (ISO 27001)
An ISO 27001 Statement of Applicability (SoA) is a document that identifies the controls that an organization has implemented to address the information security risks it has identified through a risk assessment.
Learn MoreSystem Description (SOC 2)
A SOC 2 System Description is a narrative description of a service organization's systems, policies, and procedures related to the Trust Services Criteria of security, availability, processing integrity, confidentiality, and privacy.
Learn MoreTest
A test refers to an auditor’s independent review of a security or compliance control. Auditors may assess a control’s design or implementation by requesting a copy of a relevant policy, conducting interviews, asking for related procedures, or even taking a sample of evidence, such as screenshots or tickets.
Learn MoreThreat Assessment
A threat assessment is a process of identifying, analyzing, and evaluating potential threats to an organization.
Learn MoreVendor Assessment
Vendor assessment is the process of evaluating a third party’s information security posture and data privacy practices during the vendor procurement process.
Learn MoreVendor Assessment Program
A vendor assessment program is an organization’s process of reviewing vendor security practices in order to ensure information is properly protected.
Learn MoreVendor Management
As an organization outsources more services and processes to vendors, vendor management becomes a critical part of an organization’s approach to risk management.
Learn MoreVulnerability Scan
A vulnerability scan is a type of automated security assessment that checks a computer system or network for known security weaknesses and vulnerabilities.
Learn More