Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » NIST » NIST 800-145

NIST 800-145

NIST Special Publication 800-145, titled The NIST Definition of Cloud Computing, provides standardized terminology for cloud computing to ensure uniformity across organizations and industries. It outlines the key characteristics, deployment models, and service models associated with cloud computing to enhance understanding and cloud adoption.

NIST 800-145 outlines five essential characteristics of cloud computing: on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service.

  1. On-demand self-service: This means that users can allocate cloud resources on demand without manual intervention
  2. Broad network access: It indicates that cloud services can be accessed from a wide range of devices using standard methods such as browsers.
  3. Resource pooling: This indicates that cloud computing resources are pooled to provide service to multiple customers
  4. Rapid elasticity: This means that cloud capabilities can be scaled up and down based on requirements
  5. Measured service: It indicates that the usage of cloud resources is monitored and reported

Three Service models: Cloud service models include Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS).Four deployment models: The deployment models are categorized as public cloud, private cloud, hybrid cloud and community cloud.

Additional reading

proactive risk management

Proactive Risk Management Vs Reactive [How to Implement It]

In September 2017, Equifax, one of the largest credit reporting agencies, reported a data breach. Sensitive personal data of 147 million people, such as Social Security numbers, birth dates, addresses, driver’s license numbers, and credit card information, was exposed. Investigations pinpointed the incident to a failure to address a known vulnerability in their web application…
cybersecurity risk management

Cybersecurity Risk Management: Process, Frameworks & Examples

When it comes to staying safe online, cyber security risk management is the key. But the idea of creating a thoughtful plan and process may sound intimidating—especially if you’re unsure where to begin.  That’s why we’ve taken the time to research and outline what a cybersecurity risk management process is and why it is important….
NIST Risk Assessment: What You Need to Know

NIST Risk Assessment: Identifying and Managing Security Risks

The National Institute of Standards and Technology (NIST) is considered the gold standard for data security among US federal agencies. The framework enables you to strengthen your security posture by implementing strong security measures to safeguard sensitive data.  Companies aren’t mandated to become NIST-certified. However, companies that fall under the federal information systems must be…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.