Indicates that an organization has automated and recurring backup procedures.
See complete definitionIndicates that an organization has specific policies related to the notification of users following unauthorized access to data.
See complete definitionEncryption and protection for data as it moves from one location to another.
See complete definitionA contract between data controllers and data processors or data processors and subprocessors.
See complete definitionA designated role in an organization for ensuring compliance regarding privacy laws and regulations on personal data.
See complete definitionThe email address to reach a Data Protection Officer.
See complete definitionIndicates that the same data is stored in two or more separate places.
See complete definitionThe right of individuals to have their personal data erased upon request.
See complete definitionA policy concerning what data should be stored or archived, where that should happen, and for exactly how long.
See complete definitionMeasures taken to protect against Denial of Service attacks, wherein attackers flood the target host/network with incoming traffic until the target is unable to respond or crashes.
See complete definitionA document that contains outlines a company's response to unplanned incidents such as natural disasters.
See complete definitionA method of security testing that emphasizes attacking an application from the outside to find security vulnerabilities.
See complete definitionA framework for regulating transatlantic exchanges of personal data for commercial purposes between the European Union and the United States.
See complete definitionEmployers run background checks to avoid hiring someone who may pose a threat to the workplace or become a liability to the employer.
See complete definitionA strategy used by IT and security professionals to prevent and mitigate user risk.
See complete definitionThe policy of automatically locking employee devices after a period of inactivity and requiring a password to unlock it.
See complete definitionThe policy of encrypting employee hard drives to prevent unauthorized access to data stored on their devices.
See complete definitionIndicates that a company utilizes environmental and physical controls that work together to protect physical and digital assets from theft and damage.
See complete definitionIndicates a processor's data center implements environmental safeguards.
See complete definitionThe FDA's regulations for electronic documentation and electronic signatures.
See complete definitionThe Federal Information Security Management Act (FISMA) of 2002 is a framework of security standards to protect government information that is handled by third-party vendors, contractors, and partners.
See complete definitionIndicates that a processor's data storage solution is protected by a security infrastructure that meets the standards of the FISMA framework.
See complete definitionA compliance level reserved for third-parties handling the highest-impact data, or that which if compromised would have severe or catastrophic implications.
See complete definitionIndicates that a processor's data storage solution is protected by a security infrastructure that meets the standards of the FISMA - High certification.
See complete definitionThe Cloud Computing Compliance Criteria Catalogue, also referred to as C5:2020.
See complete definitionA report issued by an independent third-party that acts as verification of an organization's compliance with C5 requirements.
See complete definitionThe California Consumer Privacy Act is a state statute intended to enhance privacy rights and consumer protections for residents of California, in the United States.
See complete definitionThe Children's Online Privacy Protection Act (COPPA) is a policy on the collection of data of users under the age of 13, relating to the laws surrounding marketing to underage individuals.
See complete definitionA robust third party independent assessment of the security of a cloud service provider for the Greater China market that harmonizes CSA best practices with Chinese national standards.
See complete definitionA certification based on a third-party evaluation of the compliance of a cloud services provider's services to the GDPR.
See complete definitionA self-assessment that can be completed by a cloud service provider to evaluate the compliance of its services to the GDPR.
See complete definitionThe Cloud Security Alliance's Security, Trust & Assurance Registry Certification is a rigorous third-party independent assessment of the security of a cloud service provider.
See complete definitionA free way for any CSP to provide their customers with the security assurances that a STAR certification offers.
See complete definitionA continuously audited version of the CSA STAR - Level 1 certification.
See complete definitionHelps cloud service providers offer more transparency and assurance than Level 1.
See complete definitionA continuously audited version of the the CSA STAR - Level 2 certification.
See complete definitionAutomating the process of validating security control effectiveness in real-time.
See complete definitionProvides guidelines for CPAs to use to conduct SOC 2 engagements.
See complete definitionBased on a third-party audit of a cloud service provider's security.
See complete definitionUsed to document the security controls provided by cloud computing offerings.
See complete definitionThe Consensus Assessments Initiative Questionnaire (CAIQ) is a survey provided by the Cloud Security Alliance (CSA) for cloud consumers and auditors to assess the security capabilities of a cloud service provider.
See complete definitionA framework for regulating transatlantic exchanges of personal data for commercial purposes between the European Union and the United States.
See complete definitionThe FDA's regulations for electronic documentation and electronic signatures.
See complete definitionThe Federal Information Security Management Act (FISMA) of 2002 is a framework of security standards to protect government information that is handled by third-party vendors, contractors, and partners.
See complete definitionIndicates that a processor's data storage solution is protected by a security infrastructure that meets the standards of the FISMA framework.
See complete definitionA compliance level reserved for third-parties handling the highest-impact data, or that which if compromised would have severe or catastrophic implications.
See complete definitionIndicates that a processor's data storage solution is protected by a security infrastructure that meets the standards of the FISMA - High certification.
See complete definitionA compliance level reserved for third parties handling information that, if compromised, would have minimally-impactful implications.
See complete definitionIndicates that a processor's data storage solution is protected by a security infrastructure that meets the standards of the FISMA - Low certification.
See complete definitionA compliance level reserved for third parties handling information that, if compromised, would have moderately severe implications.
See complete definitionIndicates that a processor's data storage solution is protected by a security infrastructure that meets the standards of the FISMA - Moderate certification.
See complete definitionA government-wide program that promotes the adoption of secure cloud services across the United States federal government.
See complete definitionHigh (Impact) data is usually in Law Enforcement and Emergency Services systems, Financial systems, Health systems, and any other system where loss of confidentiality, integrity, or availability could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals.
See complete definitionLow (Impact) is most appropriate for cloud security offerings where the loss of confidentiality, integrity, and availability would result in limited adverse effects on an agency’s operations, assets, or individuals.
See complete definitionModerate (Impact) is most appropriate for cloud security offerings where the loss of confidentiality, integrity, and availability would result in serious adverse effects on an agency’s operations, assets, or individuals.
See complete definitionA report which is comprised of two parts: first, a full security assessment which is an independent audit focused on a number of parameters, and secondly, an agency authorization process is undergone.
See complete definitionIndicates an organization is compliant with the FedRAMP set of security standards.
See complete definitionA regulation in EU law on data protection and privacy in the European Union and the European Economic Area.
See complete definitionThe Health Insurance Portability and Accountability Act designed to protect patient personally identifiable information and healthcare information from nonconsensual disclosure.
See complete definitionThe Health Information Technology for Economic and Clinical Health Act (HITECH) of 2009 was enacted to promote and expand the adoption of electronic health records.
See complete definitionAn international standard that provides a robust framework for developing effective incident response and recovery procedures to ensure your organization can recover quickly in the event of a disruption.
See complete definitionA security standard developed for cloud service providers and users to make a safer cloud-based environment and reduce the risk of security problems.
See complete definitionThe first international standard created specifically for data privacy in cloud computing.
See complete definitionAn international standard that provides guidance for improving the state of Cybersecurity.
See complete definitionSignifies that the processor's data storage satisfies the Payment Card Industry Data Security Standard,
See complete definitionSignifies that the processor's data storage satisfies Level 1 of the Payment Card Industry Data Security Standard.
See complete definitionSignifies that the processor's data storage satisfies Level 2 of the Payment Card Industry Data Security Standard.
See complete definitionSignifies that the processor's data storage satisfies Level 3 of the Payment Card Industry Data Security Standard.
See complete definitionSignifies that the processor's data storage satisfies Level 4 of the Payment Card Industry Data Security Standard.
See complete definitionA UK law also known as the Privacy and Electronic Communications Regulations.
See complete definitionA South African regulation also known as the Protection of Personal Information Act
See complete definitionA set of compliance requirements that applies to companies' internal control over financial reporting.
See complete definitionSignifies that a processor's data storage has undergone and passed a SOC 1 audit and obtained the corresponding report.
See complete definitionAn audit and corresponding report focus on describing a service organization’s control processes.
See complete definitionSignifies that a processor's data storage has undergone and passed a SOC 1 Type I audit and obtained the corresponding report.
See complete definitionA document detailing the SOC 1 Type I audit of a company by an independent entity.
See complete definitionSignifies that a processor's data storage has undergone and passed a SOC 1 Type II audit and obtained the corresponding report.
See complete definitionA document detailing the SOC 1 Type II audit of a company by an independent entity.
See complete definitionA set of compliance requirements that applies to companies' handling of cloud-based customer data.
See complete definitionSignifies that a processor's data storage has undergone and passed a SOC 2 audit and obtained the corresponding report.
See complete definitionA certification describing a service organization’s control processes.
See complete definitionSignifies that a processor's data storage has undergone and passed a SOC 2 Type I audit and obtained the corresponding report.
See complete definitionA document detailing the SOC 2 Type I audit of a company by an independent entity.
See complete definitionA certification describing how a product safeguards customer data and how effective those measures are.
See complete definitionSignifies that a processor's data storage has undergone and passed a SOC 2 Type II audit.
See complete definitionA document detailing the SOC 2 Type II audit of a company by an independent entity.
See complete definitionA standard outlining a service organization's internal controls for the AICPA's five Trust Principles.
See complete definitionSignifies that a processor's data storage solution has a SOC 3 report.
See complete definitionA framework for regulating transatlantic exchanges of personal data.
See complete definitionAn EU directive focused on protecting the confidentiality of electronic communication that occurs between parties.
See complete definitionActive Directory Federation Services (ADFS) is a Single Sign-On (SSO) solution created by Microsoft....
See complete definitionGive users the ability to sign into applications with their Apple ID.
See complete definitionDescribes an organization's ability to document activities that impact operations, procedures, or events that occur within its software.
See complete definitionA Single Sign-On (SSO) solution created by Facebook. It give users the ability to sign into applications with their Facebook credentials.
See complete definitionA Single Sign-On (SSO) solution created by GitHub. It give users the ability to sign into applications with their GitHub credentials.
See complete definitionA Single Sign-On (SSO) solution created by Google. It give users the ability to sign into applications with their Google credentials.
See complete definitionA control that restricts access to applications or resources based on IP address.
See complete definitionA software protocol for authenticating users on an AD network, and it enables anyone to locate resources on the Internet or on a corporate intranet.
See complete definitionAn electronic authentication method requiring two or more pieces of evidence to an authentication mechanism: knowledge, possession, and inherence.
See complete definitionA useful tool to exemplify the actions being taken to secure a product.
See complete definitionAbility to restrict access based on a person's position.
See complete definitionIndicates that an organization has automated and recurring backup procedures.
See complete definitionIndicates that an organization has specific policies related to the notification of users following unauthorized access to data.
See complete definitionEncryption and protection for data as it moves from one location to another.
See complete definitionA contract between data controllers and data processors or data processors and subprocessors.
See complete definitionA designated role in an organization for ensuring compliance regarding privacy laws and regulations on personal data.
See complete definitionThe email address to reach a Data Protection Officer.
See complete definitionIndicates that the same data is stored in two or more separate places.
See complete definitionThe right of individuals to have their personal data erased upon request.
See complete definitionA policy concerning what data should be stored or archived, where that should happen, and for exactly how long.
See complete definitionThe practice of translating login credentials into a secure format for storage.
See complete definitionExplains how a website or organization will collect, store, protect, and utilize PII.
See complete definitionSmall blocks of data, created by a web server and placed onto a user’s device.
See complete definitionA set of instructions to help employees detect, respond to, and recover from network security incidents in areas like: cybercrime, data loss, and service outages.
See complete definitionA cloud computing pattern/technique for dynamically allocating and deallocating computing resources.
See complete definitionMeasures taken to protect against Denial of Service attacks, wherein attackers flood the target host/network with incoming traffic until the target is unable to respond or crashes.
See complete definitionThe process of adding additional instances of network devices and lines of communication to help ensure network availability and decrease the risk of failure along any critical data paths.
See complete definitionQuality Assurance (QA) testing ensures that an organization delivers the best products or services possible.
See complete definitionA system or set of tools used to check on the health of servers in a network.
See complete definitionOutlines how a business will continue operating during an unplanned disruption in service.
See complete definitionA document that contains outlines a company's response to unplanned incidents such as natural disasters.
See complete definitionIndicates that a company utilizes environmental and physical controls that work together to protect physical and digital assets from theft and damage.
See complete definitionIndicates a processor's data center implements environmental safeguards.
See complete definitionA policy surrounding the potential for individuals to receive recognition or compensation for discovering and reporting bugs.
See complete definitionA method of security testing that emphasizes attacking an application from the outside to find security vulnerabilities.
See complete definitionTesting is a simulated cyberattack on a system performed for the purpose of testing the system's security
See complete definitionStatic Application Security Testing (SAST) is a testing methodology that emphasizes analyzing source code to find security vulnerabilities.
See complete definitionAssesses computers, servers, networks, or applications for known security weaknesses.
See complete definitionIndicates that an organization has procedures and policies relating to NDAs and employee confidentiality agreements.
See complete definitionEmployers run background checks to avoid hiring someone who may pose a threat to the workplace or become a liability to the employer.
See complete definitionA strategy used by IT and security professionals to prevent and mitigate user risk.
See complete definitionThe policy of automatically locking employee devices after a period of inactivity and requiring a password to unlock it.
See complete definitionThe policy of encrypting employee hard drives to prevent unauthorized access to data stored on their devices.
See complete definitionThe idea that at any user, program, or process should have only the bare minimum privileges necessary to perform its function.
See complete definitionThe practice of analyzing the background of job applicants to ensure their credibility and fit for a role.
See complete definitionA system to ensure only authorized individuals are granted access to a company's premises.
See complete definitionA functioning Physical Access Control System for a processor’s data storage.
See complete definitionAny security policy or technology that allows employees to connect to a company's internal network and prevents unauthorized access.
See complete definitionIndicates that a processor’s data storage solution meets the minimum standards of the C5 framework.
See complete definitionAn architecture which allows a single instance of a software application to serve multiple customers.
See complete definitionA single instance of the software and supporting infrastructure serve a single customer.
See complete definitionA security framework requiring all users to be authenticated, authorized, and continuously validated.
See complete definition