Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » ISO 27001 » Cryptographic Techniques

Cryptographic Techniques

Cryptographic techniques are used to ensure the confidentiality and integrity of data in the presence of an antagonist. Various cryptographic methods based on the security needs and the threats involved, such as public key cryptography and symmetric key cryptography, can be used during the transit and storage of the data.

Additional reading

How to perform Compliance Gap Analysis?

When it comes to compliance, starting off on the right foot requires surveying your present conditions. It has a defining impact on how fast companies get to the audit-ready phase and reap the benefits of certification. Chief compliance officers see compliance gap analysis as a guiding method to steering their compliance efforts. Conducting a thorough…
The Essential 8

Building Stronger Defenses: A Practical Guide to Essential 8

Think your business is secure? The gaps you don’t see are exactly what the Essential 8 is designed to close. The Australian Cyber Security Centre (ACSC) established the Essential 8 framework in response to escalating assaults on organizations across industries. Frameworks such as the Essential 8 exist to fill specific gaps that make organizations vulnerable. …
top-hipaa-compliance-software-feature

Top 10 HIPAA Compliance Software (2025 Updated)

Skipping something as fundamental as a risk assessment can have devastating consequences. Excellus Health Plan is a case in point. The insurer paid $5.1 million in settlement after hackers breached its systems and exposed the data of 9.3 million patients.  The cause? Routine security practices—like monitoring and access reviews—had been overlooked.   Unfortunately, they’re not alone….

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.