Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » Generic » Cybersecurity – Shared Responsibility

Cybersecurity – Shared Responsibility

The cybersecurity shared responsibility model plays a great role in mitigating the various aspects of the cloud environment. 

For example, in a shared security model with GCP, Google will be responsible for ensuring that their firewalls remain impenetrable, and you, as a google cloud user, will be responsible for ensuring that you have implemented MFA, used a strong password, and don’t access your business environment that’s hosted on  GCP from open public networks. Google is responsible for guarding the cloud service, while you are responsible for guarding your own account in the cloud service.

Moreover, cybersecurity is a responsibility we all share, and each person plays a role in protecting themselves and others. Just one infected computer can spread malware to countless others. To enhance your safety online, you’ve got to follow some basic cybersecurity measures.

Best practices to ensure your online safety

  • Avoid opening suspicious-looking emails or attachments.
  • Create strong passwords and avoid sharing them with anyone.
  • Keep your operating system, browser, and critical software updated by installing updates regularly.
  • Be cautious about sharing personal information online, and use privacy settings to control the information you share.

Additional reading

Top Cybersecurity Challenges in 2026

TL;DR Cybersecurity threats are rapidly evolving, with global cybercrime damages projected to reach $8 trillion, making security a critical priority for organizations. The top cybersecurity challenges include cloud attacks, ransomware, IoT vulnerabilities, phishing/social engineering, and insider threats. These risks target sensitive data, cloud infrastructure, connected devices, and human behavior—often exploiting weak configurations or access controls….

Honest Oneleet Review 2026: Features, Pricing, Pros & Cons

TL;DR Oneleet is a compliance automation platform combining automation with vCISO-led guidance to help startups achieve frameworks like SOC 2, ISO 27001, HIPAA, and GDPR. Strengths: fast onboarding, automated evidence collection, endpoint monitoring, and dedicated security expert support. Limitations: supports one framework at a time, has custom (non-transparent) pricing, and may require some manual coordination…

SOC 1 vs SOC 2 vs SOC 3 Comparison — Overview & Comparison

SOC 1, SOC 2, and SOC 3 are independent attestation reports that help organizations prove they have reliable security, privacy, and internal controls in place. Although they originate from the same AICPA framework, each report serves a distinct purpose: SOC 1 focuses on financial reporting controls, SOC 2 evaluates security and trust principles, and SOC…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.