Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » ISO 27001 » Restricted

Restricted

An authenticator class, type, or instantiation has added risk of false acceptance associated with its use that is, therefore, subject to added requirements.

Additional reading

A Quick Guide to SOC 2 Vendor Management 

A Quick Guide to SOC 2 Vendor Management 

Over the last two years, it is estimated that 98% of organizations have experienced a data breach attributed to third-party risks. Organizations often overlook the importance of vendor management while framing the risk management process. And this can come with devastating consequences.  At some point, cyber threat actors try to exploit and gain access to…
Everything You Need to Know about Cyber Essentials

Cyber Essentials: A Key Cybersecurity Certification for Organizations

Amid the rapid strides into the digital realm, the accompanying risks loom large. The emergence of Cyber Essentials stands as a pivotal response to these challenges within contemporary cybersecurity. Crafted by the National Cyber Security Centre (NCSC), this nationally recognized certification acts as a cornerstone, erecting a robust defense against prevalent online threats. Its implementation…
Cloud Security Posture Management

Chaos to Clarity: Demystifying Cloud Security Posture Management

CSPM ensures your cloud business runs smoothly, corrects security misconfigurations, and enables business continuity and growth.  The agility, scalability, and accessibility that make cloud technology desirable also breed a complex environment ripe for exploitation. The cloud is just a misconfiguration away from a major disaster.  With a big surface area of attack and no clear…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.