Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » COBIT » COBIT framework

COBIT framework

COBIT is an ISACA framework abbreviated for Control Objectives for Information and Related Technology. It was developed to assist IT managers, auditors, and users in developing IT governance and control. COBIT offers a list of widely accepted measures, indicators, processes, and best practices for IT resources management, considering a particular industry’s specificity.  

COBIT can be aligned with IT management frameworks such as TOGAF, CMMI, and ITIL. However, it differs from other frameworks because it incorporates risk management, security, and information governance.

Now, the key objective of the COBIT framework is to align IT through investments with business objectives and mitigate IT risks. To achieve this, COBIT focuses on several key concepts:

  • Frameworks. Both IT governance frameworks link IT activities with organizational requirements, and good information is utilized in decision-making.
  • Process Descriptions. COBIT has effectively offered precise and result-oriented process definitions that remain general yet malleable to businesses. These descriptions provide a reference for planning and controlling the construction processes.
  • Control Objectives. COBIT suggests that business organizations must have five control objectives to address IT risks.
  • Management Guidelines. COBIT has control objectives for providing tools that allocate responsibilities, provide self-checking, and approve IT activities and performance measures.
  • Maturity Models. With COBIT’s maturity models, an organization can assess the capability of its business processes, monitor the levels of improvement, and even determine the areas that require improvement.

In the latest update for 2019, forecasting the COBIT model adds new concepts and 40 management and governance objectives to improve the effectiveness of governance programs. 

Additional reading

From Entry-Level to Expert: How to Build a Resilient Career in GRC

If you’re here as an aspiring mid-level or entry-level GRC professional—or even someone looking to break into GRC cybersecurity with dreams of becoming a CISO down the line—then there’s some news for you: the not-so-good and the good.  The not-so-good news? The path ahead isn’t as straightforward as you might hope. The demands from entry-level…

Oneleet vs Secureframe: The Definitive 2025 Buyer’s Guide

You’re here because it’s decision time. You’re tasked with narrowing down on a compliance automation tool that promises to get you through SOC 2, ISO 27001, or HIPAA with less effort. But the wrong choice could slow your audits, drain your team’s time, and blow up your budget with hidden costs. And you’ve narrowed it down…

Risk Assessment Methods Explained [And How to Choose the Right One]

Businesses in the post-COVID era have realized the need to prioritize the security of their critical assets. In 2023 alone, the average cost of a data breach was $4.45 million – a figure that can make or break businesses with bootstrapped budgets and harsh market conditions. This necessitates the development of risk assessment methodologies to…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.