Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » PCI DSS » CSRF

CSRF

Cross-Site Request Forgery (CSRF) is a security vulnerability that allows a cyber threat actor to perform actions on behalf of the user without their knowledge or consent. The CSRF attack occurs when the user clicks on a malicious link or visits a malicious website. This action makes the user’s browser send requests to legitimate websites where the user is logged in. These requests are generally actions such as deleting data, making purchases, changing passwords, sending messages, and so on. As the request comes from the user’s browser, it is considered legitimate, allowing the cybercriminals to perform unauthorized actions.

Additional reading

defense in depth

Defense In Depth (DiD): A Castle Approach To GRC With Layered Defenses

In 2016, the U.S. Department of Homeland Security (DHS) listed Defense in Depth (DiD) as a recommended strategy for improving ‘industrial control system cybersecurity’ practices. This was done in a bid to make systems less attractive to attackers during a period experiencing a sharp increase in cyber incidents.  So, is DiD a new concept or…
Guide to Privacy Compliance

Guide to Privacy Compliance [Examples, Challenges, & How to Comply]

As cloud adoption accelerates, privacy compliance regulations like GDPR or CCPA are no longer just a sales blocker but compulsory. Designed to protect customers’ sensitive data, these compliance frameworks can become costly if ignored. Let’s take Yakima Valley Memorial Hospital, for example. After an investigation by the Office for Civil Rights, they paid $240,000 in…
HIPAA Breach Notification Rule

HIPAA Breach Notification Rule: Reporting Data Breaches

HIPAA (Health Insurance Portability and Accountability Act) is a federal law in the United States regulated by the Department of Health and Human Services to ensure the integrity of patient’s Protected Health Information (PHI). The HIPAA breach notification rule specifies the mandatory protocols healthcare orgs must follow in the event of a data breach. Implementing…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.