Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » Generic » Cybersecurity – Shared Responsibility

Cybersecurity – Shared Responsibility

The cybersecurity shared responsibility model plays a great role in mitigating the various aspects of the cloud environment. 

For example, in a shared security model with GCP, Google will be responsible for ensuring that their firewalls remain impenetrable, and you, as a google cloud user, will be responsible for ensuring that you have implemented MFA, used a strong password, and don’t access your business environment that’s hosted on  GCP from open public networks. Google is responsible for guarding the cloud service, while you are responsible for guarding your own account in the cloud service.

Moreover, cybersecurity is a responsibility we all share, and each person plays a role in protecting themselves and others. Just one infected computer can spread malware to countless others. To enhance your safety online, you’ve got to follow some basic cybersecurity measures.

Best practices to ensure your online safety

  • Avoid opening suspicious-looking emails or attachments.
  • Create strong passwords and avoid sharing them with anyone.
  • Keep your operating system, browser, and critical software updated by installing updates regularly.
  • Be cautious about sharing personal information online, and use privacy settings to control the information you share.

Additional reading

compliance auditor

What Is a Compliance Auditor? Roles, Responsibilities & Career Path

Businesses spend somewhere between six to nine months to comply with cybersecurity standards. The majority of this timeframe is taken up by the compliance audit.  It’s a comprehensive process of to and fro calls between a business’s GRC team and the compliance auditor, who needs to ensure that evidence is gathered, all questions answered and…
A Quick Guide to Compliance Documentation

A Quick Guide to Compliance Documentation

Having comprehensive compliance documentation acts as the backbone to showcase that your organization adheres to regulatory standards. And navigating through the complex compliance documentation acts as a challenge for organizations today because of the constantly evolving policies and framework, the necessity of maintaining version histories, the intricacies of managing many moving parts and processes with…

GDPR Data Processor vs Data Controller (Main Differences)

Key Points  Introduction Is your cloud-hosted company a data processor or controller? It’s important to understand the main differences because it defines your responsibilities under the GDPR.  Trying to obtain GDPR compliance can be confusing and frustrating if there is confusion about the different roles. When comparing GDPR data processor vs controller, there are some…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.