Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » NIST » NIST 800-145

NIST 800-145

NIST Special Publication 800-145, titled The NIST Definition of Cloud Computing, provides standardized terminology for cloud computing to ensure uniformity across organizations and industries. It outlines the key characteristics, deployment models, and service models associated with cloud computing to enhance understanding and cloud adoption.

NIST 800-145 outlines five essential characteristics of cloud computing: on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service.

  1. On-demand self-service: This means that users can allocate cloud resources on demand without manual intervention
  2. Broad network access: It indicates that cloud services can be accessed from a wide range of devices using standard methods such as browsers.
  3. Resource pooling: This indicates that cloud computing resources are pooled to provide service to multiple customers
  4. Rapid elasticity: This means that cloud capabilities can be scaled up and down based on requirements
  5. Measured service: It indicates that the usage of cloud resources is monitored and reported

Three Service models: Cloud service models include Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS).Four deployment models: The deployment models are categorized as public cloud, private cloud, hybrid cloud and community cloud.

Additional reading

A checklist for security essentials

The Ultimate Guide to Security Essentials for Organizations

Security essentials for organizations aren’t just about stopping cyberattacks – they are about making sure that organizations withstand evolving threats, prevent regulatory fines with security diligence, and maintain customer and stakeholder trust with strong security fundamentals rooted across the organization’s culture.  But here’s the catch – most of the security breaches, don’t happen because of…

Cybersecurity Framework: All You Need To Know

Hackers are becoming increasingly creative. They now use sophisticated wares to access and steal sensitive information. Cloud intrusions have increased by 75% while 72% organisations have faced ransomware attacks highlighting the urgent need for cybersecurity defenses. The financial impact of cybercrime is expected to reach $10.5 trillion in 2025! These cybersecurity trends show that regardless…
NIST compliance

NIST Compliance: A Comprehensive Guide

NIST asserts significant influence on a number of standards. It provides a framework for security teams to identify, detect, and respond to threats. As a widely recognized security standard, it specifies guidelines for federal security systems. One of its most widely used publications is the 800 series, concerned with computer security.  In this article, we…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.