Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » Generic » Cybersecurity – Shared Responsibility

Cybersecurity – Shared Responsibility

The cybersecurity shared responsibility model plays a great role in mitigating the various aspects of the cloud environment. 

For example, in a shared security model with GCP, Google will be responsible for ensuring that their firewalls remain impenetrable, and you, as a google cloud user, will be responsible for ensuring that you have implemented MFA, used a strong password, and don’t access your business environment that’s hosted on  GCP from open public networks. Google is responsible for guarding the cloud service, while you are responsible for guarding your own account in the cloud service.

Moreover, cybersecurity is a responsibility we all share, and each person plays a role in protecting themselves and others. Just one infected computer can spread malware to countless others. To enhance your safety online, you’ve got to follow some basic cybersecurity measures.

Best practices to ensure your online safety

  • Avoid opening suspicious-looking emails or attachments.
  • Create strong passwords and avoid sharing them with anyone.
  • Keep your operating system, browser, and critical software updated by installing updates regularly.
  • Be cautious about sharing personal information online, and use privacy settings to control the information you share.

Additional reading

How to get started with GRC implementation

6 Steps GRC Implementation Roadmap: A quick guide

Over time, businesses have experienced their fair share of realizations and revelations that have become the key drivers for GRC implementation. In the face of the interconnected nature of risks, they have learned that sticking to their traditional siloed practices is a recipe for disaster. They have also grappled with regulatory complexities and cyber threats…
pci dss levels

PCI DSS Levels: Ensuring Secure Payment Processing

Credit card transactions have become the lifeblood of commerce. With this convenience comes a critical responsibility: protecting sensitive cardholder data. As cyber threats evolve and data breaches make headlines, businesses of all sizes must prioritize the security of payment information.  This is where the Payment Card Industry Data Security Standard (PCI DSS) comes in. It’s…

How to perform Compliance Gap Analysis?

When it comes to compliance, starting off on the right foot requires surveying your present conditions. It has a defining impact on how fast companies get to the audit-ready phase and reap the benefits of certification. Chief compliance officers see compliance gap analysis as a guiding method to steering their compliance efforts. Conducting a thorough…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.