Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » PCI DSS » CSRF

CSRF

Cross-Site Request Forgery (CSRF) is a security vulnerability that allows a cyber threat actor to perform actions on behalf of the user without their knowledge or consent. The CSRF attack occurs when the user clicks on a malicious link or visits a malicious website. This action makes the user’s browser send requests to legitimate websites where the user is logged in. These requests are generally actions such as deleting data, making purchases, changing passwords, sending messages, and so on. As the request comes from the user’s browser, it is considered legitimate, allowing the cybercriminals to perform unauthorized actions.

Additional reading

What Is Penetration Testing as a Service (PTaaS)?

Security audits demand proof of resilience. Compliance frameworks expect validation of controls. Customers and regulators want assurance that vulnerabilities aren’t just discovered—but fixed. So, you schedule a penetration test. Ethical hackers probe your systems, document their findings, and deliver a report. Your team patches the vulnerabilities. The auditors check a box. And then? Nothing. For…

SOC 2 for SaaS Companies: A Complete Walkthrough

Imagine you’re about to close a deal with an enterprise customer. They find your product a solid fit. The pilot seems to have gone well. And then, they turn towards the procurement checklist—a full security review, a questionnaire with nearly 70 questions, and one particular requirement that brings you to a screeching halt. “Do you…

What is in SOC 2 Report Example – Detailed Breakdown

Cloud-hosted businesses today are cognizant of the profound impact security has on customer perception. Ensuring the security of customer data as well as maintaining vendor compliance is an important objective. SOC 2, in this context, is a globally-accepted way to secure data, build trust, and unlock growth opportunities. But what exactly does a SOC 2…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.