Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » NIST » NIST Secure Software Development Framework (SSDF)

NIST Secure Software Development Framework (SSDF)

The NIST Secure Software Development Framework, or NIST SP 800-218, is a set of practices employed by NIST to be embedded in the development cycle of software. The framework promotes the concept of “security-by-design,” which supports developers in discovering and solving vulnerabilities at every stage of development. This approach reduces the chances that released software harbors undiscovered vulnerabilities and actively addresses the root causes of those vulnerabilities to make the software more resilient.

There are four core activities of the SSDF:

  1. Prepare the Organization: It focuses on establishing a culture that is security-oriented and preparing training programs for the security teams based on security best practices.
  2. Protect the Software: This phase of the handbook tells organizations what should be done to protect the software throughout its lifecycle and includes secure coding practices, code review, and more.
  3. Produce Well-Secured Software: In this phase, defects are discovered and fixed at design stage and tested continuously at the time of development.
  4. Address Vulnerabilities: This involves patch management and incident responses in a way that every vulnerability found can be solved and addressed to maintain the integrity and security of the software even after release.

The SSDF accommodates other NIST frameworks into its system to thereby create a holistic approach for software security.

Additional reading

100+ Phishing Attack Statistics You Should Know

Phishing attacks have become a menacing threat in today’s digital landscape, jeopardizing the security and privacy of organizations and individuals alike. Understanding the scope as well as the impact of these threats is critical for avoiding potentially debilitating financial loss or implementing effective cybersecurity measures. Here we analyze the impact of phishing attacks globally:  Phishing…
soc 2 audit cost

How much does a SOC 2 Audit Cost in 2025

When you look to pitch for high-value projects in new markets, having a robust organization-wide security culture and a SOC 2 compliance report can be a significant advantage. Your security compliance could become the deciding factor that tips the scales in your favor. But a SOC 2 doesn’t come cheap.  Did you know a good…
cybersecurity governance

Cybersecurity Governance: Leading Security with Strong Policies

The evolving threat landscape is giving rise to several new problems like end-point vulnerabilities, third-party attacks, IoT threats, social engineering exploits, etc. While companies cannot eliminate such incidents, they can prepare and minimize the impact of these threats.  This is where cybersecurity governance comes in—it helps companies formulate security strategies, enable business continuity, meet stakeholder…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.