Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » Generic » Cybersecurity – Shared Responsibility

Cybersecurity – Shared Responsibility

The cybersecurity shared responsibility model plays a great role in mitigating the various aspects of the cloud environment. 

For example, in a shared security model with GCP, Google will be responsible for ensuring that their firewalls remain impenetrable, and you, as a google cloud user, will be responsible for ensuring that you have implemented MFA, used a strong password, and don’t access your business environment that’s hosted on  GCP from open public networks. Google is responsible for guarding the cloud service, while you are responsible for guarding your own account in the cloud service.

Moreover, cybersecurity is a responsibility we all share, and each person plays a role in protecting themselves and others. Just one infected computer can spread malware to countless others. To enhance your safety online, you’ve got to follow some basic cybersecurity measures.

Best practices to ensure your online safety

  • Avoid opening suspicious-looking emails or attachments.
  • Create strong passwords and avoid sharing them with anyone.
  • Keep your operating system, browser, and critical software updated by installing updates regularly.
  • Be cautious about sharing personal information online, and use privacy settings to control the information you share.

Additional reading

Getting FedRAMP Compliance

FedRAMP Compliance: Importance and Steps

Before the establishment of FedRAMP, the U.S. government’s approach to cloud security was inconsistent and inefficient, leading to increased risks to national information. The introduction of the FedRAMP framework in 2011 aimed to provide a standardized approach to cloud security practices and ensure secure cloud deployment by agencies, emphasizing FedRAMP compliance. Ever since, the FedRAMP…
Cyber Risk Quantification Explained: Key Models, Challenges, and Best Practices

Cyber Risk Quantification: Understanding Models & How to Address Key Challenges 

Keeping your cloud business safe has never been harder. The problem? An infinitely growing pile of risks, shoestring budgets, crunched bandwidth, and teams stretched thin.  But there’s a solution hiding in plain sight: Cyber risk quantification. It’s the antidote to guesswork and helps you pinpoint the business-critical risks, quantify their potential impact, and prioritize accordingly….

Article 20 GDPR Right to Data Portability

The GDPR right to data portability focuses on protecting the data privacy rights of the citizens of the European Union. Article 20’s Right to Data Portability focuses on one aspect of the rights and freedom an individual has under the GDPR law. Are you finding it challenging to differentiate Article 20’s service requests from the…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.