Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » NIST » NIST 800-145

NIST 800-145

NIST Special Publication 800-145, titled The NIST Definition of Cloud Computing, provides standardized terminology for cloud computing to ensure uniformity across organizations and industries. It outlines the key characteristics, deployment models, and service models associated with cloud computing to enhance understanding and cloud adoption.

NIST 800-145 outlines five essential characteristics of cloud computing: on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service.

  1. On-demand self-service: This means that users can allocate cloud resources on demand without manual intervention
  2. Broad network access: It indicates that cloud services can be accessed from a wide range of devices using standard methods such as browsers.
  3. Resource pooling: This indicates that cloud computing resources are pooled to provide service to multiple customers
  4. Rapid elasticity: This means that cloud capabilities can be scaled up and down based on requirements
  5. Measured service: It indicates that the usage of cloud resources is monitored and reported

Three Service models: Cloud service models include Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS).Four deployment models: The deployment models are categorized as public cloud, private cloud, hybrid cloud and community cloud.

Additional reading

How SOCaaS Transforms Security Operations for Modern Businesses

In 2023, a Coro survey of 500 cybersecurity experts revealed that 73% had missed or ignored high-priority alerts, and 26% had muted them outright. Security teams receive an average of 11,000 alerts per day, and 28% of those are never addressed, resulting in a cost of over $626 million annually to US organizations. Faced with…

Guide to Privacy Compliance [Examples, Challenges, & How to Comply]

As cloud adoption accelerates, privacy compliance regulations like GDPR or CCPA are no longer just a sales blocker but compulsory. Designed to protect customers’ sensitive data, these compliance frameworks can become costly if ignored. Let’s take Yakima Valley Memorial Hospital, for example. After an investigation by the Office for Civil Rights, they paid $240,000 in…

Corporate Compliance Program: Framework and Implementation

If you’re considering building a corporate compliance program, it’s likely driven by a few key factors. Perhaps a prospect has requested proof of your company’s ethics and security standards. Maybe regulatory requirements apply based on the services you provide, or you simply want to elevate your organization’s culture, ethics, and security practices. Whatever the motivation,…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.