Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » NIST » NIST Risk Management Framework (RMF)

NIST Risk Management Framework (RMF)

NIST Risk Management Framework (RMF) is a seven-step repeatable process to manage and mitigate risks related to information systems. Developed by the National Institute of Standards and Technology (NIST), the framework was originally developed for federal agencies but has since been adopted by various industries to achieve compliance and manage cybersecurity risks.


The framework integrates security, privacy and cybersecurity supply chain risks into system development lifecycle to enable organizations to take a risk-based approach throughout the control implementation process.

The seven key steps in the NIST RMF include:

  • Prepare aims to enable the organizations to understand their risk profiles and prepare for security risks by assessing data, networks and other infrastructure
  • Categorize focuses on sensitivity of information processes and grouping systems accordingly to understand the impact of potential risks
  • Select aims to choose the right security measures to mitigate the identified risks
  • Implement ensures that the chosen controls are implemented and documented
  • Assess evaluates if the implemented controls are functioning as intended to protect the information systems
  • Authorize aims to promote accountability and ensures that the senior management oversees the implementation and assessment of controls to minimize risks
  • Monitor involves continuous oversight of the risk environment and updating the controls as required

Additional reading

ISO Training

ISO 27001 Training Program [How to get started]

Like it or not, your employees are your first line of defence in the event of cyber attacks, data breaches, and hacks. You must, therefore, never shy away from investing in establishing a robust organization-wide security culture. Whether you are implementing ISO 27001 or are already certified, investing in building a security-savvy workforce will generate…
Security assessment

Security Assessment: Key Types and How to Get Started

Hackers today are constantly upgrading and using advanced techniques to exploit weaknesses and get their hands on data. As a CISO or founder, it is your responsibility to proactively develop countermeasures and protect your organization. The agility to respond however, comes with the understanding of your deficiencies. And that’s where security assessments come in.  Security…
gdpr guide for dummies

GDPR for Dummies: Simple GDPR Guide for Beginners

To be or not to be. In this context, understanding whether or not to be GDPR (General Data Protection Regulation) compliant for your organization is the biggest challenge. As a business owner who spends a lot of time on product development and business expansion, the challenge is the compliance process know-how.  GDPR for Dummies,  aims…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.