Glossary of Compliance
Compliance Glossary
Our list of curated compliance glossary offers everything you to know about compliance in one place.
PCI DSS Rules
PCI DSS rules are global security standards for any organization dealing with cardholder data to reduce security incidents, information theft, and data breaches in the payment industry.
Here are the 12 PCI compliance requirements or rules you need to know:
- Install and maintain a firewall to secure network connections
- Change default passwords and security settings provided by vendors
- Protect stored cardholder data with policies for data disposal
- Encrypt cardholder data when transmitting it over public networks
- Use and keep antivirus software updated
- Develop security systems and processes to address vulnerabilities
- Restrict access to cardholder data based on roles and privileges
- Assign user IDs for computer access and implement authentication measures
- Restrict physical access to cardholder data with monitoring tools
- Track and monitor network and data access, maintaining audit trails
- Regularly test systems and processes, including wireless access points
- Have an information security policy outlining technology usage rules and responsibilities
Additional reading
Streamlining Compliance Audits With Sprinto: The Power of Automated Evidence Collection
Evidence collection process involves maintaining dozens of spreadsheets, rolling deadlines, missing data, gathering data from siloed systems, managing checklists, implementing tools, and numerous back-and-forth conversations with auditors can be chaotic and eat away at your productivity. Juggling everything at once may seem achievable until you drop one ball, and your project spirals into chaos. Automated…
5 Foundational Cyber Essentials Controls for a Strong Security Posture
Your software is like a set of instructions for your device, consisting of thousands of lines of code. Sometimes, there are mistakes or weaknesses in these lines of code. Bad actors use these weaknesses to hack into your systems, similar to a burglar finding an open window. Is there a way to Without cybersecurity, it’s…
SOC 2 Report: Building Trust Through Compliance
In today’s day and age, data security is a pivotal selling point. Customers and prospects want to know that their data is secure and that the companies they sign on with have sufficient measures to ensure it stays that way. And so, companies are often tasked with proving the effectiveness of their security controls. A…

Sprinto: Your growth superpower
Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.
