Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » COBIT » COBIT framework

COBIT framework

COBIT is an ISACA framework abbreviated for Control Objectives for Information and Related Technology. It was developed to assist IT managers, auditors, and users in developing IT governance and control. COBIT offers a list of widely accepted measures, indicators, processes, and best practices for IT resources management, considering a particular industry’s specificity.  

COBIT can be aligned with IT management frameworks such as TOGAF, CMMI, and ITIL. However, it differs from other frameworks because it incorporates risk management, security, and information governance.

Now, the key objective of the COBIT framework is to align IT through investments with business objectives and mitigate IT risks. To achieve this, COBIT focuses on several key concepts:

  • Frameworks. Both IT governance frameworks link IT activities with organizational requirements, and good information is utilized in decision-making.
  • Process Descriptions. COBIT has effectively offered precise and result-oriented process definitions that remain general yet malleable to businesses. These descriptions provide a reference for planning and controlling the construction processes.
  • Control Objectives. COBIT suggests that business organizations must have five control objectives to address IT risks.
  • Management Guidelines. COBIT has control objectives for providing tools that allocate responsibilities, provide self-checking, and approve IT activities and performance measures.
  • Maturity Models. With COBIT’s maturity models, an organization can assess the capability of its business processes, monitor the levels of improvement, and even determine the areas that require improvement.

In the latest update for 2019, forecasting the COBIT model adds new concepts and 40 management and governance objectives to improve the effectiveness of governance programs. 

Additional reading

cybersecurity influencers

Top 25 Influential CISOs and Cybersecurity Leaders to Follow

Cybersecurity is new and everyone is talking about it! All that content is great for an enthusiast! It gets the job done! But, are they all relevant for a security professional? For true security folks the bar is set a lot higher and following the true security legends becomes important. To become a legend, one…

EU Data Act 2023 Explained: How to Prepare for it ?

By 2025, transmission of 180 Zettabytes of data is projected within the EU. For context, 11 trillion gigabytes make 1 zettabyte. While GDPR does what it does best to protect the privacy and integrity of user data, the need for a regulation purpose built to cater to the age of IoT(Internet of Things) and cloud computing…
HIPAA Risk Assessment

How to Perform a HIPAA Risk Assessment to Stay Compliant?

The HHS Office of Civil Rights (OCR) provides direction to healthcare entities to implement safeguards for the privacy and security of patients’ protected health information (ePHI) and ensure HIPAA compliance. However, the first crucial step in this direction is to conduct a HIPAA risk assessment, which identifies critical risks and security loopholes. Risk assessment helps…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.