Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » COBIT » IT Infrastructure Library

IT Infrastructure Library

IT Infrastructure Library, abbreviated as ITIL, is a compilation of guidelines for managing IT services to enhance service levels. One of the primary objectives of ITBM is to ensure that IT services remain relevant to the business agenda and on track as that agenda evolves.

ITIL has evolved a lot over the years. The first version was upgraded and enlarged and gradually became the present international standard. Today, the newest description of the ITIL framework is ITIL 4, but it is more useful to understand the framework’s evolution than to value the current version.

The current one is ITIL 4, which came in 2019, while ITIL 3 has been in practice since 2007. ITIL 4 is more contemporary to use compared to ITIL V3, and its major change is that since ITSM is mainly about delivering value to customers and users through IT services, it aims to establish stable environments, control costs, manage risks, and provide support services. 

Another major change in ITIL 4 is that this framework places a great emphasis on automation. This removes service management from IT’s dominion and promotes interaction and teamwork throughout the enterprise. Overall, this goes beyond the conventional service lifecycle approach.

With that being said, ITIL 4’s framework is built around four essential factors for successful value delivery:

  • Organizations and people: Organise the management of people in the firm so that their human capital reflects the business’s strategic plan.
  • Information and technology: Again, security should always go hand in hand with technology, and more emphasis should be given to how data is managed.
  • Partners and suppliers: Bring together external stakeholders to easily facilitate service delivery.

Value streams and processes: Processes that increase demand and convert it into value should be managed.

Additional reading

COSO ERM Framework: Key Components and Implementation Guide

In March 2024, cloud service giant Microsoft had their head hung in shame after the Cyber Safety Review Board (CSRB) provided a 30-page review of its inadequate security culture.  The CSRP report read “..troubling examples of decision-making processes within the company that did not prioritize security risk management at a level commensurate with the threat.”…

Privacy by Design Principles

Target discovered a teenage girl was pregnant before her father was aware, Cambridge Analytica harvested 87 million Facebook accounts to influence elections, and Equifax lost access to 147 million Americans’ most private financial information—these were not merely data breaches. They were profound betrayals of trust that radically impacted our perception of data privacy. Now, think…

ISO 9001 Audit Explained: Types, Cost, How to Prepare, & More

TL;DR An ISO 9001 audit reviews whether your QMS is defined, followed, and documented in day-to-day operations, not just on paper. There are three audit types: internal (in-house readiness checks), external (customer or regulator-driven), and certification (formal third-party review), with surveillance audits annually and recertification every three years. Audit prep comes down to seven steps:…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.