Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » COBIT » COBIT domains

COBIT domains

COBIT 4.1 breaks down IT governance and management into four key domains, each focusing on specific areas of IT processes. 

Evaluate, Direct, and Monitor (EDM): EDM forms the major component of the COBIT 5 model and concerns itself with the optimal accomplishment of IT business integration and governance. This domain includes identifying directions for IT’s strategic growth, evaluating outcomes and achievements, and creating guarantees of activities’ conformity to standards and regulations.  

Align, Plan, and Organize (APO): APO, on the other hand, is more focused on turning corporate strategies into executable IT projects. This can be defined as taking and documenting IT choices to coordinate IT actions with a company’s goals.

Build, Acquire, and Implement (BAI): In the BAI domain, more emphasis is placed on the practical implementation of IT projects, from development to procurement and integration. It has some features associated with risk management, quality assurance, and good project work.  

Deliver, Service, and Support (DSS): DSS stands for the management of information technology solutions in organizations after implementation. This entails service provision for an organization’s needs, management of events or occurrences, and support for the total IT services to guarantee their efficiency.  

Monitor, Evaluate, and Assess (MEA): MEA is central to proving continuity toward improving IT governance. It is an ongoing process of monitoring IT processes, IT performance, and even the outcomes of IT governance and management practices.

Additional reading

nis2 guidelines

NIS2 Guidelines Broken Down: Non-Negotiable for EU

The risk of large-scale disruptions and data breaches has skyrocketed, exposing vulnerabilities in systems essential to our everyday lives. The NIS2 directive aims to strengthen cybersecurity frameworks and ensure organizations are better prepared to tackle these threats head-on. The Network and Information Systems (NIS) 2 Directive isn’t just another boring compliance checklist. It introduces significant…
Laika vs Vanta vs Sprinto

Laika vs Vanta vs Sprinto: What’s your best bet?

The perception of compliance has gradually shifted from a necessary evil to an essential tool for business. However, with increasingly stringent frameworks to adhere to and endless controls to monitor, compliance pros need a wingman that makes their life easier.  If you have been researching, you would know that Laika, Vanta and Sprinto are heavyweight…
ISO 27001 Vulnerability Management

ISO 27001 Vulnerability Management + (Free Controls List)

Staying vigilant can go a long way in preventing risk. A number of threats are known to the organization and can be prevented by implementing simple measures such as strong passwords and firewall configurations. Some others may require more complex measures, constituting a strong security posture. ISO 27001 vulnerability management, therefore, aims to proactively address…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.