Skip to content
AuditFront

Compliance Glossary

Key terms from ISO 27001, SOC 2, GDPR, and information security — explained in plain language.

A

Acceptable Use Policy

A document that defines the rules and guidelines for how employees and other authorized users may use the organization's information assets, systems, networks, and data, including permitted activities, prohibited behaviors, and consequences for violations.

iso-27001 soc-2 nis2 tech-dd

Access Control

The set of policies, procedures, and technical mechanisms that govern who can access which information assets, systems, and resources. Access control ensures that only authorized individuals can view, modify, or interact with sensitive data and systems.

iso-27001 soc-2 gdpr nis2 tech-dd

Annex A

The appendix to ISO 27001 that contains a reference set of 93 information security controls organized into four themes: Organizational, People, Physical, and Technological. Organizations use Annex A as a checklist to ensure their ISMS addresses all relevant control areas.

iso-27001

API Security

The practices and technologies used to protect Application Programming Interfaces (APIs) from malicious attacks, unauthorized access, and data exposure, encompassing authentication, authorization, rate limiting, input validation, and monitoring of API traffic.

iso-27001 soc-2 gdpr nis2 tech-dd

Asset Management

The process of identifying, classifying, documenting, and managing the lifecycle of information assets — including hardware, software, data, and cloud services — to ensure they are appropriately protected according to their value and sensitivity.

iso-27001 soc-2 nis2 tech-dd

Audit Evidence

The documented records, observations, test results, and other verifiable information collected during an audit to determine whether the organization's controls and processes conform to the specified requirements and are operating effectively.

iso-27001 soc-2 gdpr nis2

Audit Trail

A chronological record of system activities that provides documentary evidence of the sequence of events — including who accessed what, when, and what actions were taken. Audit trails are essential for security monitoring, incident investigation, and compliance evidence.

iso-27001 soc-2 gdpr nis2 tech-dd

B

C

Certification Body

An accredited third-party organization authorized to conduct audits and issue certifications confirming that an organization's management system conforms to a specific standard, such as ISO 27001. Certification bodies must be accredited by a national accreditation body to ensure their competence and impartiality.

iso-27001

Change Management

A structured process for evaluating, approving, implementing, and documenting changes to information systems, infrastructure, and processes in a controlled manner that minimizes the risk of unintended disruptions or security vulnerabilities.

iso-27001 soc-2 nis2 tech-dd

Cloud Security

The comprehensive set of policies, controls, technologies, and practices designed to protect cloud-based infrastructure, applications, and data from threats, ensuring confidentiality, integrity, and availability in cloud computing environments.

iso-27001 soc-2 gdpr nis2 tech-dd

Compliance Automation

The use of technology tools and platforms to automate the collection, management, and reporting of compliance evidence, control monitoring, policy management, and audit preparation, reducing manual effort and enabling continuous compliance assurance.

iso-27001 soc-2 gdpr nis2 tech-dd

Compliance Gap Analysis

A structured assessment that compares an organization's current security posture and practices against the requirements of a specific compliance framework. Gap analysis identifies areas where the organization falls short and helps prioritize remediation efforts.

iso-27001 soc-2 gdpr nis2 tech-dd

Consent Management

The processes, tools, and policies an organization uses to collect, record, manage, and honor individuals' consent for the processing of their personal data, ensuring compliance with requirements for freely given, specific, informed, and unambiguous consent.

gdpr iso-27001 soc-2

Container Security

The practices and tools used to protect containerized applications throughout their lifecycle, from securing container images and registries to runtime protection, orchestration security (e.g., Kubernetes), and network policies within container environments.

iso-27001 soc-2 nis2 tech-dd

Continuous Monitoring

An ongoing, automated process of observing and evaluating the security posture, compliance status, and operational health of an organization's systems and controls in real time or near-real time, enabling rapid detection of deviations, vulnerabilities, and threats.

iso-27001 soc-2 gdpr nis2 tech-dd

Control Objective

A statement describing what a specific security control is intended to achieve. Control objectives define the desired outcome — such as preventing unauthorized access or ensuring data integrity — while allowing organizations flexibility in how they implement the control to meet that objective.

iso-27001 soc-2

Corrective Action

A documented action taken to eliminate the root cause of a detected nonconformity or other undesirable situation, preventing its recurrence. Corrective actions go beyond simply fixing the immediate problem to address the underlying systemic issue.

iso-27001 soc-2 nis2

Cross-Border Data Transfer

The transmission or making available of personal data from one jurisdiction to another, which under GDPR and similar regulations requires specific legal mechanisms to ensure adequate data protection standards are maintained when data leaves the originating country or region.

gdpr nis2

Cryptographic Controls

The policies, procedures, and technical mechanisms governing the use of cryptography to protect the confidentiality, integrity, and authenticity of information, including encryption algorithms, key management, digital signatures, and certificate management.

iso-27001 soc-2 gdpr nis2 tech-dd

D

Data Breach Notification

The legal obligation to report personal data breaches to supervisory authorities and, in cases of high risk, to affected individuals within mandated timeframes. GDPR requires notification to authorities within 72 hours of becoming aware of a qualifying breach.

gdpr nis2 iso-27001 soc-2

Data Controller

Under GDPR, the entity that determines the purposes and means of processing personal data. The data controller decides why personal data is collected and how it will be used, and bears primary responsibility for compliance with data protection obligations.

gdpr

Data Loss Prevention

A set of strategies, tools, and processes designed to detect and prevent the unauthorized transmission, exfiltration, or leakage of sensitive data outside an organization's controlled environment.

iso-27001 soc-2 gdpr nis2 tech-dd

Data Minimization

The principle that organizations should collect, process, and retain only the minimum amount of personal data necessary to fulfill a specific, stated purpose. Data minimization limits exposure risk by ensuring unnecessary data is never gathered in the first place.

gdpr iso-27001 soc-2

Data Portability

The right of data subjects under GDPR (Article 20) to receive their personal data in a structured, commonly used, and machine-readable format, and to transmit that data to another controller without hindrance.

gdpr soc-2

Data Processor

Under GDPR, an entity that processes personal data on behalf of a data controller. The processor acts on the controller's instructions and must not process data for its own purposes. A Data Processing Agreement (DPA) governs the relationship between controller and processor.

gdpr

Data Protection Impact Assessment

A structured process required by GDPR for assessing the potential impact of a data processing activity on individuals' privacy. DPIAs are mandatory when processing is likely to result in a high risk to the rights and freedoms of natural persons.

gdpr

Data Protection Officer

A designated role within an organization responsible for overseeing data protection strategy and compliance with GDPR. Appointment of a DPO is mandatory for public authorities, organizations conducting large-scale systematic monitoring, and those processing special category data at scale.

gdpr

Disaster Recovery

The strategies, plans, and procedures for restoring IT infrastructure, systems, and data following a catastrophic disruption such as a natural disaster, cyberattack, hardware failure, or other event that renders primary systems unavailable.

iso-27001 soc-2 gdpr nis2 tech-dd

E

F

I

Identity and Access Management

The framework of policies, processes, and technologies that manages digital identities and controls user access to critical systems and data. IAM encompasses identity lifecycle management, authentication, authorization, single sign-on, directory services, and privileged access management.

iso-27001 soc-2 gdpr nis2 tech-dd

Incident Response

The organized approach to detecting, containing, investigating, and recovering from security incidents. An incident response plan defines roles, procedures, and communication protocols to minimize the impact of security breaches and other adverse events.

iso-27001 soc-2 gdpr nis2

Incident Response Plan

A documented, structured set of procedures that defines how an organization will detect, respond to, contain, eradicate, and recover from security incidents, including roles and responsibilities, communication protocols, escalation procedures, and post-incident review processes.

iso-27001 soc-2 gdpr nis2 tech-dd

Information Security Management System

A systematic framework of policies, processes, and controls that an organization establishes to manage and protect its information assets. An ISMS addresses people, processes, and technology to ensure the confidentiality, integrity, and availability of information.

iso-27001

Information Security Policy

A high-level document approved by top management that establishes the organization's overall direction and principles for information security, defines the scope of the ISMS, demonstrates management commitment, and sets the framework for establishing security objectives and controls.

iso-27001 soc-2 nis2 tech-dd

Internal Audit

A systematic, independent evaluation conducted by an organization's own personnel or contracted auditors to assess the effectiveness of its management system, controls, and processes against defined criteria such as ISO 27001 requirements or internal policies.

iso-27001 soc-2 nis2

Intrusion Detection System

A security technology that monitors network traffic or system activities for malicious behavior, policy violations, or suspicious patterns, and generates alerts when potential threats are detected.

iso-27001 soc-2 nis2 tech-dd

M

N

P

R

Residual Risk

The level of risk that remains after security controls and risk treatment measures have been applied. Residual risk must be formally evaluated and accepted by management to ensure it falls within the organization's defined risk appetite.

iso-27001 soc-2 nis2 tech-dd

Right to Erasure

A data subject's right under GDPR (Article 17) to request the deletion of their personal data when it is no longer necessary, when consent is withdrawn, or when the data was unlawfully processed. Also commonly known as the 'right to be forgotten.'

gdpr

Risk Appetite

The level and type of risk an organization is willing to accept in pursuit of its objectives. Risk appetite defines the boundaries within which the organization operates and guides decision-making about which risks to accept, mitigate, transfer, or avoid.

iso-27001 soc-2 nis2 tech-dd

Risk Assessment

A structured process for identifying, analyzing, and evaluating information security risks. Risk assessments determine the likelihood and potential impact of threats to an organization's information assets, guiding decisions about which controls to implement.

iso-27001 soc-2 gdpr nis2

Risk Register

A structured document or database that records all identified risks, their assessment details (likelihood, impact, rating), assigned risk owners, selected treatment options, current control status, and residual risk levels. It serves as the central repository for an organization's risk management activities.

iso-27001 soc-2 nis2 tech-dd

Risk Treatment

The process of selecting and implementing measures to modify identified risks. The four primary risk treatment options are risk mitigation (applying controls to reduce risk), risk acceptance (acknowledging and tolerating the risk), risk transfer (sharing risk with a third party such as an insurer), and risk avoidance (eliminating the risk by ceasing the activity).

iso-27001 soc-2 nis2 tech-dd

Role-Based Access Control

An authorization model that assigns permissions to users based on their organizational roles rather than individual identities. RBAC simplifies access management by grouping permissions into roles such as administrator, editor, or viewer, and assigning users to the appropriate roles.

iso-27001 soc-2 gdpr nis2 tech-dd

Root Cause Analysis

A systematic investigation methodology used to identify the fundamental underlying cause of a security incident, system failure, or nonconformity, going beyond surface-level symptoms to determine why the event occurred and how to prevent its recurrence.

iso-27001 soc-2 nis2

S

Secure Software Development

A methodology that integrates security practices throughout the entire software development lifecycle (SDLC), from requirements and design through coding, testing, deployment, and maintenance, ensuring that security is built into applications rather than added afterward.

iso-27001 soc-2 nis2 tech-dd

Security Awareness Training

A structured program designed to educate employees and other authorized users about information security threats, policies, and best practices, equipping them to recognize and respond appropriately to security risks in their daily work.

iso-27001 soc-2 gdpr nis2 tech-dd

Security Information and Event Management

A technology platform that aggregates, correlates, and analyzes security log data from across an organization's infrastructure to detect threats, support incident investigation, and meet compliance requirements for centralized security monitoring.

iso-27001 soc-2 nis2 tech-dd

Segregation of Duties

A governance control that divides critical functions and responsibilities among different individuals to prevent any single person from having the ability to authorize, execute, and conceal errors or fraud. Also known as separation of duties (SoD).

iso-27001 soc-2 nis2 tech-dd

Service Level Agreement

A formal contract between a service provider and a customer that defines the expected level of service, including measurable metrics such as uptime guarantees, response times, support availability, and the remedies or penalties for failing to meet these commitments.

iso-27001 soc-2 gdpr nis2 tech-dd

SOC 2 Type 1

A SOC 2 audit report that evaluates whether an organization's security controls are suitably designed at a specific point in time. Type 1 provides a snapshot of control design without testing whether controls operate effectively over a period.

soc-2

SOC 2 Type 2

A SOC 2 audit report that evaluates whether an organization's security controls are both suitably designed and operating effectively over a defined observation period, typically 3 to 12 months. Type 2 is the gold standard for third-party assurance in the US market.

soc-2

Statement of Applicability

A key ISO 27001 document that lists all 93 Annex A controls and states whether each is applicable to the organization, along with justification for inclusion or exclusion and a description of how applicable controls are implemented.

iso-27001

Supply Chain Risk

The potential for security breaches, service disruptions, or compliance failures arising from an organization's dependence on third-party suppliers, vendors, service providers, and their sub-contractors throughout the technology and business supply chain.

iso-27001 soc-2 gdpr nis2 tech-dd

Surveillance Audit

A periodic audit conducted by a certification body between initial certification and recertification to verify that an organization continues to maintain and improve its management system in conformity with the standard. Surveillance audits typically occur annually during the three-year certification cycle.

iso-27001

T

V

Z

Put these terms into practice

Run structured self-assessments for ISO 27001, SOC 2, GDPR, NIS2, and Tech DD — and see how these concepts apply to your organization.

Start free assessment