Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » PCI DSS » PCI DSS Rules

PCI DSS Rules

PCI DSS rules are global security standards for any organization dealing with cardholder data to reduce security incidents, information theft, and data breaches in the payment industry. 

Here are the 12 PCI compliance requirements or rules you need to know:

  • Install and maintain a firewall to secure network connections
  • Change default passwords and security settings provided by vendors
  • Protect stored cardholder data with policies for data disposal
  • Encrypt cardholder data when transmitting it over public networks
  • Use and keep antivirus software updated
  • Develop security systems and processes to address vulnerabilities
  • Restrict access to cardholder data based on roles and privileges
  • Assign user IDs for computer access and implement authentication measures
  • Restrict physical access to cardholder data with monitoring tools
  • Track and monitor network and data access, maintaining audit trails
  • Regularly test systems and processes, including wireless access points
  • Have an information security policy outlining technology usage rules and responsibilities

Additional reading

The-Ultimate-SOC-2-Compliance-Questionnaire

The Ultimate SOC 2 Compliance Questions

The hardest thing about SOC 2 is knowing where to start. What makes it even tougher is the fact there’s no easy template to follow – every SOC 2 audit is unique to the organization carrying it out. However, there’s no need to despair! “While there’s no one size fits all answer, there are several…
ISO 42001

What is ISO 42001? And Why Are We Talking About It Now?

If you’ve been paying attention to the news, you’ve probably noticed that AI regulation is a hot topic in everyone’s mind — from government officials to business leaders to customers. And with good reason. The rapid rise of Generative AI (GenAI) tools, such as large language models (LLMs), facial recognition systems, and real-time geolocation technology,…

Compliance Best Practices: How to Stay Ahead of Regulatory Challenges 

Running compliance projects is pretty much like a circus. You are juggling multiple things at once—all goes fine until an important bit fails, and chaos unfolds. Before you know it, your team is putting out fires, trying to put broken systems back together, and not knowing how to keep things in motion.  While there is…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.