Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » Generic » Cybersecurity – Shared Responsibility

Cybersecurity – Shared Responsibility

The cybersecurity shared responsibility model plays a great role in mitigating the various aspects of the cloud environment. 

For example, in a shared security model with GCP, Google will be responsible for ensuring that their firewalls remain impenetrable, and you, as a google cloud user, will be responsible for ensuring that you have implemented MFA, used a strong password, and don’t access your business environment that’s hosted on  GCP from open public networks. Google is responsible for guarding the cloud service, while you are responsible for guarding your own account in the cloud service.

Moreover, cybersecurity is a responsibility we all share, and each person plays a role in protecting themselves and others. Just one infected computer can spread malware to countless others. To enhance your safety online, you’ve got to follow some basic cybersecurity measures.

Best practices to ensure your online safety

  • Avoid opening suspicious-looking emails or attachments.
  • Create strong passwords and avoid sharing them with anyone.
  • Keep your operating system, browser, and critical software updated by installing updates regularly.
  • Be cautious about sharing personal information online, and use privacy settings to control the information you share.

Additional reading

The Complete Guide To Identity And Access Management

In 2023, 83% of organizations experienced at least one identity-related data breach, according to the Defined Security Alliance. These incidents—ranging from unauthorized access to stolen credentials—cost companies millions and eroded customer trust.  This tells us how crucial it is to have a well-defined Identity and Access Management (IAM) strategy. IAM is a collection of procedures,…
soc 2 audit cost

How much does a SOC 2 Audit Cost in 2025

When you look to pitch for high-value projects in new markets, having a robust organization-wide security culture and a SOC 2 compliance report can be a significant advantage. Your security compliance could become the deciding factor that tips the scales in your favor. But a SOC 2 doesn’t come cheap.  Did you know a good…

Due Diligence Software [Features, Ratings, & How to Pick The Right One]

A Verizon study found that a staggering 62% of data breaches originate from third-party relations. While external tools and partnerships are critical to ensuring uninterrupted growth, it is not uncommon for them to become a roadblock rather than an enabler, especially if they don’t undergo a filtering process.  Businesses often think that onboarding vendors is…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.