Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » NIST » NIST 800-115

NIST 800-115

NIST Special Publication 800-115, Technical Guide to Information Security Testing and Assessment aims at assisting the organization in discovering the system vulnerabilities through risk assessment and periodic penetration testing. This helps understand the effectiveness of security controls and the flaws that could be exploited by an attacker.

This guide has been divided into some chapters dealing with varied aspects of the security test:

  • Overview of Security Testing and Examination: This introduces basic concepts and principles of security testing.
  • Overview of the Techniques: The methods to analyze controls and configurations are discussed.
  • Target Identification and Analysis: These are techniques to identify target systems and analyze the state of security of the identified systems. The activities include network discovery, vulnerability scanning, and wireless scans.
  • Validation Techniques of Target Vulnerability: These are the processes to validate the existence of an identified vulnerability with impact using penetration testing techniques.
  • Security Assessment Planning: This involves patch management and incident response activities for identified vulnerabilities, ensuring that the software maintains its integrity and security after release.
  • Conducting the Security Assessment: It entails conducting safety and security assessments and detailing exactly how it would be done by making tests and evaluations.
  • Activities Post-Testing: This entails reporting and remediation post-testing

NIST SP 800-115 also accommodates baseline competencies to be used to execute these types of assessments as well as methods of testing.

Additional reading

AI cybersecurity companies

Top 8 AI Cybersecurity Companies – Tips to Choose the Best Company

AI is no longer a buzzword—it’s a new participant in digital transformation. It is altering the world and bringing new ideas and roles into light—its participation in cybersecurity being one of them. In the past, cybersecurity was mainly about doing repetitive, labor-intensive tasks that consumed a lot of time and bandwidth. Things like threat detection,…
Top GDPR Compliance Tools for Data Privacy

Best GDPR Compliance Software in 2025

Companies processing, collecting, storing, and accessing personal data are mandated to be GDPR compliant to work with European clientele. Given that it is one of the most challenging data regulatory protocols, using a GDPR compliance software can significantly simplify processes and reduce manual workload.  In this article, we’ll go into more detail about some of…
ISO 27701 certification

An Overview of ISO 27701,The Privacy Information Systems Standard

Bruce Schneier says, “Data is the pollution problem of the information age, and protecting privacy is the environmental challenge.” This quote double-clicks the importance of keeping data and privacy on the highest pedestal of protection. This is where the ISO 27701 certification comes in. ISO/IEC 27701:2019 serves as an essential tool for organizations. It is…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.