Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » NIST » NIST 800-145

NIST 800-145

NIST Special Publication 800-145, titled The NIST Definition of Cloud Computing, provides standardized terminology for cloud computing to ensure uniformity across organizations and industries. It outlines the key characteristics, deployment models, and service models associated with cloud computing to enhance understanding and cloud adoption.

NIST 800-145 outlines five essential characteristics of cloud computing: on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service.

  1. On-demand self-service: This means that users can allocate cloud resources on demand without manual intervention
  2. Broad network access: It indicates that cloud services can be accessed from a wide range of devices using standard methods such as browsers.
  3. Resource pooling: This indicates that cloud computing resources are pooled to provide service to multiple customers
  4. Rapid elasticity: This means that cloud capabilities can be scaled up and down based on requirements
  5. Measured service: It indicates that the usage of cloud resources is monitored and reported

Three Service models: Cloud service models include Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS).Four deployment models: The deployment models are categorized as public cloud, private cloud, hybrid cloud and community cloud.

Additional reading

A Quick Walk-Through of NIST CSF Maturity Levels and Models

Former U.S. Deputy Attorney General Paul McNulty once said, “If you think compliance is expensive, try non-compliance.” And we firmly believe that, and we know you believe that too, as you are serious about implementing NIST CSF maturity levels. So, without beating around the bush, let’s dive in and understand NIST CSF maturity levels and…

Best Compliance Management Software: The Buyer’s Guide

Regulatory expectations have tightened, making compliance management software a practical necessity. Public companies must disclose material cyber incidents within four business days of determining their materiality, while multiple state privacy laws have turned the audit season into a year-round demand for provable controls, policies, training, and vendor diligence. With the average global data‑breach cost at…

ISO 27001 Certification: A Complete Guide to Process, Costs, and Benefits

TL; DR ISO 27001 certification is a document issued by an accreditation body after the audit that confirms that the organization’s ISMS meets all the requirements under ISO 27001. ISO 27001 certification steps include defining scope, conducting risk assessment, implementing controls, evaluating performance, and auditing controls.  An ISO 27001 certification helps build customer trust by…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.