Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » NIST » NIST SP 800-53

NIST SP 800-53

NIST SP 800-53 is a special publication by the National Institute of Standards and Technology; titled–Security and Privacy Controls for Information Systems and Organizations. It provides a comprehensive set of security and privacy controls organized into control families that support the development of safe and secure information systems.

Primarily developed for federal agencies, it can be used by any organization willing to strengthen its cybersecurity.

Controls catalog falls into three types:

  • Technical Controls: These include advanced solutions such as encryption and access controls.
  • Operational Controls: These focus on solving security issues relating to everyday operations, including physical security.
  • Management Controls: These highlight policies and procedures and governance initiatives.

NIST 800-53 also provides control baselines which are classified into categories that are low, moderate, and high class. Such baselines outline the potential impact security breaches could have on the information system so that organizations can decide what controls would be most applicable. The framework also gives supplemental guidance to assist the organization in implementing the controls effectively.

NIST 800-53 integrates with other NIST frameworks and is updated to keep organizations in pace with the changing technological and threat landscape. Revision 5 enhances a focus on privacy, expands control families, and generally makes it applicable to more orgs and use cases.

Additional reading

Cyber Insurance Companies: Protecting Your Business from Cyber Risks

Cyber insurance offers much more than protection alone. It covers expenses for things like, legal and investigative services, crisis communication and even compensation for those affected. For some companies, the absence of this coverage has meant shutting operations completely following a breach. As global tensions rise, with various conflicts like Russia-Ukraine, Palestine-Israel, insurers are rethinking “acts of war”…

GDPR Data Processor vs Data Controller (Main Differences)

Key Points  Introduction Is your cloud-hosted company a data processor or controller? It’s important to understand the main differences because it defines your responsibilities under the GDPR.  Trying to obtain GDPR compliance can be confusing and frustrating if there is confusion about the different roles. When comparing GDPR data processor vs controller, there are some…

AI in the Crosshairs: Google Uncovers Its First AI-Powered Zero-Day Vulnerability

“Patch procrastination leaves 50000 Fortinet firewalls vulnerable to zero-day” “New Windows warning: Zero-day with no official fix for all users” Such alarming headlines continue to loom large in the cybersecurity space—and with valid cause. Vulnerability discovery and patch management are painstakingly time-consuming, and most organizations struggle to keep up. But today, there’s some good news!…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.