Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » NIST » NIST Framework Profile

NIST Framework Profile

A NIST Framework Profile is an organization-specific configuration of the NIST Cybersecurity Framework (CSF) based on its business requirements, goals, and appetite for risks. 

Thus, it functions as an adaptation of how such an organization applies the five functional models of the framework – Identify, Protect, Detect, Respond, and Recover.

There are two ways a profile can be used: 

  1. Current profile: The current cybersecurity controls are already implemented in the organization, a fact which is illustrated in this paper. 
  2. Target profile: Describes what the goals require the cybersecurity posture to become in the future. 

The difference between current and target profile will help organizations to define security weaknesses, determine what steps should be taken first, and to create an actionable plan to enhance their security policies. NIST Framework Profile can be adapted to accommodate businesses of any size or type so that all can improve their cybersecurity posture.

Additional reading

HIPAA Minimum Necessary Rule Standard

How to Comply with the HIPAA Minimum Necessary Rule

Much of the administrative simplification rule of HIPAA focuses on preventing unauthorized disclosure of protected health information (PHI). A good practice that helps to protect PHI is applying the HIPAA minimum necessary rule standard.  This article details what this rule entails, how it works, cases where it is not applicable, and what happens when you…

Building Stronger Partnerships: Vendor Management Lifecycle Explained

In a recent Gartner survey, 84% of risk committee members reported that gaps in third-party risk management significantly disrupted their business operations. This statistic underscores the critical importance of adopting a structured process to manage risks and operations associated with external vendors. For organizations relying on third-party vendors for essential business functions, establishing and maintaining…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.