Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary Β» NIST Β» NIST 800-145

NIST 800-145

NIST Special Publication 800-145, titled The NIST Definition of Cloud Computing, provides standardized terminology for cloud computing to ensure uniformity across organizations and industries. It outlines the key characteristics, deployment models, and service models associated with cloud computing to enhance understanding and cloud adoption.

NIST 800-145 outlines five essential characteristics of cloud computing: on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service.

  1. On-demand self-service: This means that users can allocate cloud resources on demand without manual intervention
  2. Broad network access: It indicates that cloud services can be accessed from a wide range of devices using standard methods such as browsers.
  3. Resource pooling: This indicates that cloud computing resources are pooled to provide service to multiple customers
  4. Rapid elasticity: This means that cloud capabilities can be scaled up and down based on requirements
  5. Measured service: It indicates that the usage of cloud resources is monitored and reported

Three Service models: Cloud service models include Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS).Four deployment models: The deployment models are categorized as public cloud, private cloud, hybrid cloud and community cloud.

Additional reading

11 Most Common Security Vulnerabilities & Tips To Manage Them [2024]

You have antivirus software installed on all devices in your network, you track access control, you implement MFA, and you regularly back up your data. So, are you confident that your system is 100% secure? To err is human, but lately, we’ve become more dependent on codes and applications, which leaves less room for error,…

ISO 27004 Standard: Key to Evaluating Information Security

Most organizations are aware of the ISO 27001 standard that lists guidelines for establishing and managing an Information Security Management System (ISMS). Businesses implement ISMS controls and devise new policies to improve security posture. So, what does an ISO 27004 standard have to do with all this? Is it a subset or security requirement that…

HIPAA Certification Cost [Updated 2026 + Free Checklist Download]

TL;DR The most common HIPAA budgeting mistakes include underestimating the costs of certification, overlooking the need for and costs of ongoing compliance, and failing to update budgets regularly. This, in turn, poses a challenge for founders to balance HIPAA certification costs with other business priorities. From preliminary prep work to audit expenses and post-audit maintenance,…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.