Centraleyes’s Glossary

A-Z guide to commonly used cybersecurity terms and phrases
 
Glossary visual

Resources | Glossary

hipaa covered entity
Key Takeaways: ​​What are HIPAA Covered Entities? HIPAA covered entities are organizations that must follow federal rules for protecting patient...
iso 9001
What is an ISO 9001 Audit? An ISO 9001 audit is a structured, independent review used to assess whether an...
grc_convergence
Key Takeaways What is GRC Convergence? GRC convergence describes an approach to organizing governance, risk, and compliance activities so they...
dod distribution
Key Takeaways What are DoD Distribution Statements? DoD Distribution Statements are standardized markings used by the U.S. Department of Defense...
continuous monitoring
Key Takeaways What is Continuous Monitoring? Continuous monitoring is the practice of maintaining ongoing visibility into systems, controls, and risk...
cmmc accreditation
Key Takeaways What Is the CMMC Accreditation Body? The CMMC Accreditation Body (CMMC-AB), now officially operating under The Cyber AB,...
fedramp-baseline
Key Takeaways What Are FedRAMP Baselines? FedRAMP baselines are standardized sets of security controls that define the minimum cybersecurity requirements...
sox controls
Key Takeaways What are SOX Controls? SOX controls are the internal mechanisms organizations use to ensure that financial reporting is...
cui-enclave
Key Takeaways What is a CUI Enclave? A CUI enclave is a defined, isolated environment used to store, process, and...
processing-integrity
Key Takeaways What is Processing Integrity? Processing integrity is one of the SOC 2 Trust Services Criteria and focuses on...
doc control procedure
Key Takeaways What Is a Document Control Procedure? A document control procedure is the system an organization uses to manage...
iso data destruction
Key Takeaways What is ISO 27001 Data Destruction? In ISO 27001, data destruction refers to permanently erasing information so it...
hipaa enforcement rule
Key Takeaways What Is the HIPAA Enforcement Rule? The HIPAA Enforcement Rule is the section of the Health Insurance Portability...
vciso
Key Takeaways What is a vCISO (Virtual Chief Information Security Officer)? A virtual Chief Information Security Officer (vCISO) is an...
pci NONCOMPLIANCE
Key Takeaways What are PCI Non-Compliance Fees? PCI non-compliance fees are penalties that merchants may face if they fail to...
nist incident response lifecycle
Key Takeaways What is the NIST Incident Response Life Cycle? The NIST Incident Response Life Cycle is a structured process...
hipaa omnibus rule
Key Takeaways What Is the HIPAA Omnibus Rule? The HIPAA Omnibus Rule is a 2013 regulatory update issued by the...
business continuity plan
When disaster strikes, most companies don’t fail because the event was too big. It’s more often the result of not...
human resource security policy
What is a Human Resource Security Policy? A human resource security policy is a structured document that defines how people-related...
fraud risk assessment
What Is a Fraud Risk Assessment? A Fraud Risk Assessment is a structured process used by businesses to evaluate their...
Supplier Performance Risk System
If you plan on working with the Department of Defense (DoD) and handling Controlled Unclassified Information (CUI), you’ve probably heard...
audit exception-feature
What is an Audit Exception? Audit Exception is a term that often pops up in discussions about internal audits, financial...
managed security service provider
What is a Managed Security Service Provider? A Managed Security Service Provider acts as an extension of an organization’s IT...
pa-dss
What is PA-DSS? The Payment Application Data Security Standard (PA-DSS) was a globally recognized security standard developed by the Payment...
cybersecurity-benchmark
What is Cybersecurity Benchmarking? Would you drive a car without knowing its safety rating? Just like crash tests help assess...
cardholder data environment
What is a Cardholder Data Environment (CDE)? A Cardholder Data Environment (CDE) refers to the specific systems, processes, and people...
c3pao
What Is a C3PAO? A C3PAO (Certified Third-Party Assessment Organization) is an organization accredited by the Cybersecurity Maturity Model Certification...
Trust Center
Trust Centers are having their moment. They’ve become a must-have for organizations handling sensitive data. Acting as a central, public-facing...
nacha-compliance-feature
What Is NACHA Compliance? NACHA compliance refers to adherence to the operating rules and guidelines set forth by the National...
microsoft-sspa
If you’re a Microsoft supplier, you must adhere to the Microsoft Supplier Security and Privacy Assurance (SSPA) program. This Microsoft...
Skip to content