Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » NIST » NIST 800-145

NIST 800-145

NIST Special Publication 800-145, titled The NIST Definition of Cloud Computing, provides standardized terminology for cloud computing to ensure uniformity across organizations and industries. It outlines the key characteristics, deployment models, and service models associated with cloud computing to enhance understanding and cloud adoption.

NIST 800-145 outlines five essential characteristics of cloud computing: on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service.

  1. On-demand self-service: This means that users can allocate cloud resources on demand without manual intervention
  2. Broad network access: It indicates that cloud services can be accessed from a wide range of devices using standard methods such as browsers.
  3. Resource pooling: This indicates that cloud computing resources are pooled to provide service to multiple customers
  4. Rapid elasticity: This means that cloud capabilities can be scaled up and down based on requirements
  5. Measured service: It indicates that the usage of cloud resources is monitored and reported

Three Service models: Cloud service models include Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS).Four deployment models: The deployment models are categorized as public cloud, private cloud, hybrid cloud and community cloud.

Additional reading

IT Audits: A Walkthrough of the Key Phases

IT teams have come a long way from being seen as buried in technical jargon and disconnected from business objectives to gaining a strategic voice in the boardroom. At the forefront of everything technology, compliance, and cybersecurity, IT is now seen as a powerful business tool influencing critical decisions. Well-executed IT audits are key strategic…
cybersecurity governance

Cybersecurity Governance: Building Secure Frameworks

The evolving threat landscape is giving rise to several new problems like end-point vulnerabilities, third-party attacks, IoT threats, social engineering exploits, etc. While companies cannot eliminate such incidents, they can prepare and minimize the impact of these threats.  This is where cybersecurity governance comes in—it helps companies formulate security strategies, enable business continuity, meet stakeholder…
7 Best security compliance software

7 Best Compliance Software Tools for 2025

Every business strives to portray a strong security posture with a significant amount of effort going into making clients feel secure. Customers are more likely to consider a company that takes cybersecurity seriously. And this appeals to both new and returning clients.  One of the aspects that helps companies achieve this level of comfort and…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.