Glossary of Compliance
Compliance Glossary
Our list of curated compliance glossary offers everything you to know about compliance in one place.
Facility Security Plan
All HIPAA-Covered Components have to implement a facility security plan to safeguard the facility and the equipment within from unauthorized physical access, theft, and tampering for all locations that store and/or access ePHI.
Additional reading
How to create a Vulnerability Management Policy?
According to a recent report, more than 25,000 vulnerabilities were reported in the last two years. Security teams have been tasked with patching every one of these vulnerabilities. But imagine doing so without structured guidance. How cumbersome would that be? This highlights the importance of having a comprehensive vulnerability management policy. It provides a framework…
FISMA Requirements: List of Official Mandates and Practices
The Federal Information Security Management Act (FISMA) is a United States law that came into effect in 2002. Its goal is to guide federal agencies handling sensitive government information systems to develop, document, implement, and maintain security programs that protect their information systems. FISMA also focuses on developing risk-based policy for cost-effective security. In this…
What is Vulnerability Management Lifecycle ? Protect Your Assets Today
Most security professionals deal with two main issues. On one hand, there is an increasing attack surface. According to a report by JupiterOne, modern security teams are responsible for 165000 cyber assets including devices, applications, cloud workloads etc. On the other hand, there are visibility challenges. A report by Gartner states that less than 1%…

Sprinto: Your growth superpower
Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.


