Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » ISO 27001 » Surveillance Visit

Surveillance Visit

The primary purpose of the surveillance visits is for the certification body to assert whether your management system really works in everyday operations or not. It will focus on prospects that the certification audit wasn’t able to check: for instance, whether all the incidents are recorded, whether all corrective and preventive actions are properly recorded and implemented, whether all the measurements are made, whether the top management really supports and cares about the system, etc.

Additional reading

Hybrid Cloud Security: Best Practices and How to Overcome Challenges 

Imagine a rail control center where all trains are operated from a single center. This module is fairly simple. Now imagine the same control center burdened with managing airplanes and ships with interdependent schedules, further complicating operations.  A hybrid cloud setup looks somewhat like an operation center described above. Without a standardized flow of data…
ISO 27001 Password Policy

Implementing ISO 27001 Password Policy: Everything You Need to Know

Identity theft is not a joke, Jim. Millions of people suffer every year! Remember this dialogue from the popular TV show The Office? As compliance experts, we believe these are golden words to live by. Identity theft in a business environment ranges from wide net phishing attempts to targeted spear phishing attempts. And this is…
SOC 2 Password Requirements

SOC 2 Password Requirements: AICPA Guidelines & Best Practices

As the cost of credential theft increased by 65% in 2020 alone, passwords are like a virtual fortress that protects sensitive data. The SOC 2 framework establishes a number of guidelines that help service orgs bolster their security posture. One of these guidelines include abiding by the SOC 2 password requirements. This article covers the…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.