ISpectra Technologies
60 terms · A–Z

Security & Compliance Glossary

Plain-English definitions of the cybersecurity, compliance and privacy terms that show up in audits, RFPs, regulator letters and engineering reviews.

A 5 terms

Access Control

Identity & Access

The process of granting or denying specific requests for accessing resources. Implemented through identification, authentication and authorisation, access control underpins SOC 2, ISO 27001 and most other security frameworks.

Asset Inventory

Governance

A complete, continuously maintained list of all hardware, software, data and cloud resources owned or operated by an organization. The starting point for almost every compliance program.

Audit Trail

Detection & Logging

A chronological, tamper-resistant record of system activities — used to detect suspicious behaviour, investigate incidents and demonstrate compliance during audits.

Authentication

Identity & Access

The process of verifying the identity of a user, system or service — typically with passwords, MFA, certificates or biometrics.

Authorisation

Identity & Access

The process of granting or denying access rights to authenticated users, based on policies, roles or attributes.

B 2 terms

Backup & Recovery

Resilience

Processes and technology to copy and restore data after loss, corruption or ransomware. Tested recovery time objectives (RTO) and recovery point objectives (RPO) are required for SOC 2 and ISO 27001.

Business Continuity Plan (BCP)

Resilience

A documented program describing how an organization will continue critical operations during disruption — staffing, facilities, vendors, technology and communications.

C 4 terms

CIS Controls

Frameworks

A prioritised set of 18 cybersecurity safeguards from the Center for Internet Security — widely used as a baseline that maps to NIST, SOC 2 and ISO.

Cloud Access Security Broker (CASB)

Cloud Security

A control point that sits between cloud service users and providers — enforcing visibility, compliance, data security and threat protection.

Compliance

Compliance

Adherence to a defined set of laws, regulations or standards. In security, common targets include SOC 2, ISO 27001, HIPAA, PCI DSS, GDPR and DPDP.

Configuration Management

Governance

The process of defining, baselining and tracking the configuration of systems and software — key to detecting drift and unauthorised change.

D 6 terms

Data Classification

Data Protection

The categorisation of data by sensitivity (public, internal, confidential, restricted) so the right protections can be applied.

Data Loss Prevention (DLP)

Data Protection

Tools and processes that detect and block sensitive data from leaving an organisation through email, endpoints, cloud storage or other channels.

Data Subject Access Request (DSAR)

Privacy

A request from an individual to access, correct or delete their personal data. Both GDPR and DPDP require organisations to respond within statutory timelines.

DevSecOps

Engineering

A culture and toolset that embeds security into every stage of the software delivery lifecycle — from design through build, test, deploy and run.

Disaster Recovery (DR)

Resilience

The technical subset of business continuity — restoring IT systems and data after a major disruption such as ransomware, outage or natural disaster.

DPDP Act

Privacy

India’s Digital Personal Data Protection Act, 2023 — sets rules for processing personal data of Indian residents, including consent, notice, retention and Significant Data Fiduciary obligations.

E 3 terms

Encryption at Rest

Cryptography

The encoding of stored data so it cannot be read without a decryption key — a core control under SOC 2, ISO 27001, HIPAA, PCI DSS and most modern frameworks.

Encryption in Transit

Cryptography

The encoding of data while moving between systems — typically TLS 1.2+ for web traffic and mTLS for service-to-service communication.

Endpoint Detection & Response (EDR)

Detection & Logging

Technology that monitors endpoints for malicious behaviour, automates response, and gives investigators rich telemetry for hunting and forensics.

F 1 terms

FedRAMP

Frameworks

The US Federal Risk and Authorization Management Program — standardises security assessment, authorization and continuous monitoring for cloud services used by US federal agencies.

G 2 terms

GDPR

Privacy

The EU General Data Protection Regulation — protects personal data of individuals in the European Union, with penalties up to 4% of global turnover for non-compliance.

Governance, Risk & Compliance (GRC)

Governance

The integrated discipline of aligning IT and security activities with business goals, managing risk, and meeting regulatory requirements.

H 2 terms

Hardening

Operations

The process of reducing the attack surface of a system by removing unnecessary services, applying CIS or vendor benchmarks, and tightening configuration.

HIPAA

Privacy

The US Health Insurance Portability and Accountability Act — sets privacy and security standards for protected health information (PHI) handled by covered entities and business associates.

I 6 terms

Identity Provider (IdP)

Identity & Access

A system that creates, maintains and manages identity information — and provides authentication services to applications. Examples: Okta, Azure AD, Google Workspace.

Incident Response

Operations

A documented, tested process for detecting, containing, eradicating and recovering from security incidents — and learning from them.

Information Security Management System (ISMS)

Frameworks

A systematic approach to managing sensitive company information — the core construct certified by ISO/IEC 27001.

Insider Threat

Threats

A current or former employee, contractor or partner who misuses authorised access — intentionally or accidentally — to harm the organisation.

Intrusion Detection System (IDS)

Detection & Logging

A device or software that monitors a network or system for malicious activity or policy violations and reports them to a security team.

ISO/IEC 27001

Frameworks

The international standard for an Information Security Management System (ISMS) — the most widely recognised security certification globally.

L 1 terms

Least Privilege

Identity & Access

The principle that any user, program or process should have only the minimum access rights needed to perform its function — a SOC 2 and ISO 27001 staple.

M 2 terms

Managed Detection & Response (MDR)

Operations

A 24/7 security service that combines technology and human analysts to detect, investigate and respond to threats on behalf of the customer.

Multi-Factor Authentication (MFA)

Identity & Access

A security control requiring two or more independent factors (something you know, have, or are) to authenticate — drastically reducing the risk of credential compromise.

N 2 terms

Network Segmentation

Network Security

Dividing a network into isolated segments to limit the blast radius of attacks and constrain lateral movement.

NIST Cybersecurity Framework (CSF)

Frameworks

A risk-based framework from the US National Institute of Standards and Technology — organises security activities into Identify, Protect, Detect, Respond and Recover (and now Govern in CSF 2.0).

P 8 terms

Patch Management

Operations

The process of identifying, acquiring, installing and verifying patches for software and firmware — closing known vulnerabilities before attackers exploit them.

PCI DSS

Frameworks

The Payment Card Industry Data Security Standard — protects cardholder data through 12 requirements covering people, process and technology.

Penetration Test

Assurance

An authorised, simulated attack on a system, network or application to identify exploitable vulnerabilities — required for many compliance programs.

Personally Identifiable Information (PII)

Privacy

Information that, alone or in combination, can identify an individual — name, email, government ID, IP address, biometric data and more.

Phishing

Threats

Social engineering using deceptive messages to trick people into revealing credentials, transferring money or installing malware.

Principle of Defence in Depth

Architecture

Layering complementary security controls so that the failure of any single control does not result in compromise.

Privacy Impact Assessment (PIA)

Privacy

A structured analysis of how personal data is collected, used, shared and protected — and the risks to individuals — required by GDPR, DPDP and similar regimes.

Privileged Access Management (PAM)

Identity & Access

Tools and processes for securing, controlling and monitoring access by privileged accounts — admin, root, service accounts.

R 3 terms

Ransomware

Threats

Malware that encrypts data and demands payment for the decryption key. Modern variants also exfiltrate data and threaten public release.

Red Team

Assurance

An adversarial security exercise that simulates a real-world attacker against an organisation’s people, processes and technology.

Risk Assessment

Governance

A structured process to identify, analyse and evaluate risks to information assets — and decide how to treat them.

S 6 terms

Secure Software Development Lifecycle (SSDLC)

Engineering

A development process that integrates security activities — threat modelling, secure coding, code review, SAST/SCA, DAST — at every phase.

Security Information and Event Management (SIEM)

Detection & Logging

A platform that aggregates logs from across an environment, correlates events, and produces alerts for the SOC.

Security Operations Center (SOC)

Operations

The team and platform responsible for continuously monitoring, detecting, investigating and responding to cybersecurity incidents.

Service Organization Control (SOC) 2

Frameworks

An audit report developed by the AICPA that evaluates a service organisation’s controls relevant to security, availability, processing integrity, confidentiality and privacy.

Single Sign-On (SSO)

Identity & Access

A user authentication scheme that allows users to log in once and access multiple applications — reducing password fatigue and improving security.

Statement of Applicability (SoA)

Frameworks

An ISO 27001 document that lists which Annex A controls are applicable, why each is included or excluded, and where each is implemented.

T 2 terms

Threat Modelling

Engineering

A structured process to identify potential threats to a system early in design — STRIDE, attack trees and abuse cases are common methods.

Trust Services Criteria (TSC)

Frameworks

The set of principles used in SOC 2 audits — Security (always required), plus optional Availability, Processing Integrity, Confidentiality and Privacy.

V 3 terms

Vendor Risk Management (VRM)

Governance

The discipline of identifying, assessing and continuously monitoring risks introduced by third-party suppliers and service providers.

Virtual CISO (vCISO)

Operations

A part-time or fractional Chief Information Security Officer service — strategic leadership without a full-time hire.

Vulnerability Management

Operations

The continuous process of identifying, classifying, prioritising, remediating and reporting vulnerabilities across the technology estate.

W 1 terms

Web Application Firewall (WAF)

Network Security

A security control that filters and monitors HTTP(S) traffic to a web application — protecting against OWASP Top 10 attacks like SQLi and XSS.

Z 1 terms

Zero Trust

Architecture

A security model based on “never trust, always verify” — requiring authentication, authorisation and continuous validation for every transaction across users, devices and workloads.

Need help putting these into practice?

From SOC 2 to Zero Trust, our practitioners turn frameworks into shipping programs.

Talk to an advisor