GRC terms explained
A
What is Access Control?
Access control restricts system and data access to authorized users. Learn RBAC, MFA, least privilege, and requirements across SOC 2, ISO 27001, HIPAA, and PCI DSS.
B
What is Breach Notification?
Breach notification under HIPAA requires organizations to notify individuals, HHS, and sometimes media when unsecured PHI is compromised. Learn the requirements.
What is a Business Associate?
A HIPAA business associate is any vendor or partner that creates, receives, or transmits PHI on behalf of a covered entity. Learn your obligations.
C
What is a Cardholder Data Environment?
The Cardholder Data Environment (CDE) encompasses all systems that store, process, or transmit cardholder data. Learn how to define and secure your CDE.
What is a Certification Body?
A certification body is an accredited organization that audits and certifies companies against standards like ISO 27001. Learn how to choose the right one.
What is Change Management?
Change management is the process of controlling modifications to systems and infrastructure to prevent unauthorized changes and maintain security and stability.
What is Continuous Monitoring?
Continuous monitoring tracks security controls in real time to detect threats and verify compliance. Learn how to implement it for SOC 2, ISO 27001, and NIST CSF.
What is a Control Framework?
A control framework is a structured set of security controls and guidelines that organizations use to build and evaluate their security programs.
D
E
F
G
H
I
What is Incident Response?
Incident response is the organized process of detecting, containing, and recovering from security incidents. Learn the phases, team roles, and compliance needs.
What is an ISMS?
An ISMS is a systematic framework for managing information security risks. Learn how an ISMS works, its components, and how it relates to ISO 27001 certification.
What is ISO 27001?
ISO 27001 is the international standard for information security management systems (ISMS). Learn about certification requirements, Annex A controls, and how to prepare.
J
K
L
M
What is Malware?
Malware is malicious software designed to damage, disrupt, or gain unauthorized access to systems. It includes viruses, ransomware, spyware, and trojans.
N
O
P
What is PCI DSS?
PCI DSS is the security standard for organizations that handle credit card data. Learn about compliance levels, requirements, and what changed in PCI DSS 4.0.
What is PCI Scope?
PCI scope defines which systems, people, and processes are subject to PCI DSS requirements. Learn how to accurately determine and reduce your PCI scope.
What is Penetration Testing?
Penetration testing is a simulated cyberattack that identifies vulnerabilities in your systems before real attackers can exploit them. Learn the types and process.
Q
R
What is Remediation?
Compliance remediation is the process of fixing security gaps and audit findings. Learn how to prioritize, track, and close remediation items efficiently.
S
What is Security Awareness Training?
Security awareness training educates employees about cybersecurity threats and best practices. Learn what to include and how it satisfies compliance requirements.
What is a Self-Assessment Questionnaire (SAQ)?
A PCI DSS Self-Assessment Questionnaire (SAQ) is a validation tool for merchants and service providers to self-evaluate their cardholder data security.
What is a Service Auditor?
A service auditor is a CPA firm that performs SOC 2 and other attestation engagements. Learn how to select an auditor and what to expect during the audit process.
What is SOC 2?
SOC 2 is an auditing framework for service organizations based on five Trust Services Criteria. Learn about SOC 2 Type I vs Type II, audit timelines, and what it takes to get compliant.
What is SOC 2 Type I?
A SOC 2 Type I report evaluates whether an organization's controls are properly designed at a specific point in time. Learn how it differs from Type II.
What is SOC 2 Type II?
A SOC 2 Type II report evaluates whether controls operated effectively over a period of time. Learn about observation periods, audit processes, and requirements.
What is SSAE 18?
SSAE 18 is the attestation standard governing SOC 1, SOC 2, and SOC 3 audits in the United States. Learn how it shapes audit requirements and reporting.
T
What is the HITECH Act?
The HITECH Act strengthened HIPAA by extending requirements to business associates, increasing penalties, and mandating breach notification. Learn the key provisions.
What is the Minimum Necessary Rule?
The Minimum Necessary Rule requires that access to PHI be limited to the minimum amount needed for a specific purpose. Learn how to implement it under HIPAA.
What is Third-Party Risk?
Third-party risk is the potential for security incidents, data breaches, or operational disruption originating from your vendors and service providers.