Your security and compliance glossary

All the terms you need to know when you’re trying to get compliance audit ready, fast.

Show filters
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Follow us

SOC 2

SOC 2 is the most sought after security framework for scaling SaaS companies. Keep up-to-date with the latest SOC 2 terms.

ISO 27001

ISO 27001 is considered the international gold standard for information security management. Want to learn more? Get familiar with ISO 27001 terms.

HIPAA

HIPAA compliance keeps companies that access, process, or store protected health information in check. Find out commonly used HIPAA terminology.

PCI

PCI DSS applies to businesses that accept, process, store, transmit, or impact the security of cardholder data. Keep updated on PCI DSS terms.

Showing search results for:
Text

Cybersecurity

Cybersecurity is the work of protecting data, information, programs, and more from unauthorized or malicious access . Find out more about cybersecurity now!

ISO 27001 security standard

The ISO 27001 security standard is a set of best practices that support orgs in managing their information security. Find out more about ISO27001 now!

HIPAA Rules

The HIPAA Rules include the Privacy, Security, and Breach Notification Rules. Find out more about HIPAA now.

HIPAA employee training

The goal of HIPAA compliance training is to ensure that organizations are appropriately protecting the privacy of patients’ PHI. Find out more now!

Compliance software

Compliance software allows for an organization to monitor its internal systems and controls. Learn how compliance software can support your business.

Security questionnaire

A security questionnaire is a tool that an enterprise may give to an org to evaluate its security practices before choosing to do business. Find out more!

Vendor assessment

A vendor assessment program will establish guidelines to ensure that an org's vendors comply with their security policies and procedures. Find out more!

Vendor review

Vendor review is a process by which an organization can understand the potential risks of utilizing a vendor’s product or service. Find out more now!

Vendor management policy

A vendor management policy reviews an organization’s vendors and establishes requirements for the level of security that vendors maintain. Find out more!

IT security policy

An IT security policy establishes rules and procedures for the individuals who interact with an organization’s IT assets and resources. Find out more now!

No results found 🤷

Get compliant and
build trust, fast.

Two wind turbines on a white background.
Get compliant and build trust,
fast.
Get started