Security & Compliance Glossary
Clear definitions for SOC 2, ISO 27001, GDPR, and security terminology. Everything you need to understand compliance.
DevSecOps & Application Security
14 termsTerms related to secure software development and application security testing
Related:DAST / Dynamic Application Security Testing, SCA / Software Composition Analysis, CI/CD Pipeline Security +1 more
Related:SAST / Static Application Security Testing, Penetration Testing, OWASP Top 10 +1 more
Related:SBOM / Software Bill of Materials, CVE / Common Vulnerabilities and Exposures, Open Source Dependencies +1 more
Related:SCA / Software Composition Analysis, Open Source Dependencies, Software Supply Chain Security +1 more
Related:SAST / Static Application Security Testing, DAST / Dynamic Application Security Testing, Secrets Detection +1 more
Related:CI/CD Pipeline Security, SAST / Static Application Security Testing, Encryption at Rest
Related:Cloud Misconfiguration, CSPM / Cloud Security Posture Management, CI/CD Pipeline Security
Related:SCA / Software Composition Analysis, CVE / Common Vulnerabilities and Exposures, CI/CD Pipeline Security +1 more
Related:SCA / Software Composition Analysis, SBOM / Software Bill of Materials, Software Supply Chain Security +1 more
Related:SBOM / Software Bill of Materials, SCA / Software Composition Analysis, Open Source Dependencies +1 more
Related:SAST / Static Application Security Testing, Vulnerability Scanning, DAST / Dynamic Application Security Testing
Related:SCA / Software Composition Analysis, Open Source Dependencies, SBOM / Software Bill of Materials
Related:CI/CD Pipeline Security, SAST / Static Application Security Testing, DevSecOps
Related:CI/CD Pipeline Security, Shift-Left Security, SAST / Static Application Security Testing +1 more
Vulnerabilities & Threats
9 termsCommon vulnerability types and security threat terminology
Related:SQL Injection, XSS / Cross-Site Scripting, SAST / Static Application Security Testing +1 more
Related:SCA / Software Composition Analysis, Vulnerability Scanning, SBOM / Software Bill of Materials +1 more
Related:OWASP Top 10, SAST / Static Application Security Testing, DAST / Dynamic Application Security Testing +1 more
Related:OWASP Top 10, SQL Injection, SAST / Static Application Security Testing +1 more
Related:OWASP Top 10, Cloud Misconfiguration, DAST / Dynamic Application Security Testing
Related:CVE / Common Vulnerabilities and Exposures, Vulnerability Scanning, Penetration Testing +1 more
Related:CVE / Common Vulnerabilities and Exposures, Technical Vulnerability Management, Vulnerability Scanning
Related:Technical Vulnerability Management, Vulnerability Scanning, Risk Assessment
Related:Encryption at Rest, Encryption in Transit, OWASP Top 10 +1 more
Cloud Security
6 termsTerms related to securing cloud infrastructure and services
Related:Cloud Misconfiguration, IaC Scanning, Compliance Framework
Related:CSPM / Cloud Security Posture Management, IaC Scanning, Encryption at Rest
Related:CSPM / Cloud Security Posture Management, Cloud Misconfiguration, SOC 2 +1 more
Related:RBAC / Role-Based Access Control, MFA / Multi-Factor Authentication, Least Privilege +1 more
Related:Cloud Controls Matrix (CCM), CSPM / Cloud Security Posture Management, Compliance Framework
Related:Cloud Security Alliance (CSA), CSPM / Cloud Security Posture Management, Compliance Framework +1 more
SOC 2
15 termsTerms related to SOC 2 compliance and auditing
Related:Trust Services Criteria (TSC), SOC 2 Type 1, SOC 2 Type 2 +3 more
Learn article available
Related:SOC 2, Common Criteria (CC), AICPA
Learn article available
Related:SOC 2, SOC 2 Type 2, Observation Period
Learn article available
Related:SOC 2, SOC 2 Type 1, Observation Period +1 more
Learn article available
Related:SOC 2 Type 2, Evidence Collection, AICPA
Learn article available
Related:SOC 2, Trust Services Criteria (TSC), Control
Related:SOC 2, Trust Services Criteria (TSC), SOC 1 +1 more
Related:SOC 2, Observation Period, SOC 2 Type 2
Related:SOC 2, SOC 2 Type 2, Trust Services Criteria (TSC) +1 more
Related:SOC 2, SOC 2 Type 2, Trust Services Criteria (TSC)
Related:SOC 2, SOC 1, SOC 3 +1 more
Related:SOC 2, SOC 2 Type 1, SOC 2 Type 2 +3 more
Related:SSAE 16, SOC 2, SOC 1 +1 more
Related:SSAE 18, SOC 2, SOC 1 +1 more
Related:SOC 2 Readiness Assessment, Risk Assessment, Compliance Framework
ISO 27001
22 termsTerms related to ISO 27001 certification
Related:ISMS, Annex A Controls, Statement of Applicability (SoA) +2 more
Learn article available
Related:ISO 27001, Risk Assessment, Statement of Applicability (SoA) +1 more
Learn article available
Related:ISO 27001, Annex A Controls, ISMS +1 more
Learn article available
Related:ISO 27001, Stage 2 Audit, ISMS +1 more
Learn article available
Related:ISO 27001, Stage 1 Audit, Surveillance Audit +1 more
Learn article available
Related:ISO 27001, Stage 2 Audit, ISMS +1 more
Learn article available
Related:ISO 27001, Statement of Applicability (SoA), ISMS +2 more
Learn article available
Related:ISO 27001, Stage 1 Audit, Stage 2 Audit +1 more
Related:ISO 27001, ISMS, Statement of Applicability (SoA)
Related:Business Continuity, ISO 27001, Incident Response +1 more
Related:ISO 27001, Annex A Controls, Control +1 more
Related:ISO 27001, ISMS, ISO 27002 +1 more
Related:ISO 27001, ISMS, ISMS KPIs +2 more
Related:ISO 27001, Risk Assessment, Risk Register +2 more
Related:ISO 27001, Certification Body, Stage 1 Audit +1 more
Related:ISO 27001, Internal Audit, Certification Body +2 more
Related:ISO 27001, ISMS, Stage 1 Audit +2 more
Related:ISO 27001, Risk Assessment, Risk Register +3 more
Related:ISO 27001, ISMS, Internal Audit +2 more
Related:ISO 27001, Internal Audit, Stage 2 Audit +2 more
Related:ISO 27001, ISMS, Management Review +1 more
Related:ISO 27001, ISMS, Management Review +1 more
GDPR & Privacy
14 termsTerms related to data protection and privacy regulations
Related:Personal Data, Data Controller, Data Processor +3 more
Learn article available
Related:GDPR, Data Controller, Data Processor +1 more
Related:GDPR, Data Processor, Data Processing Agreement (DPA) +1 more
Learn article available
Related:GDPR, Data Controller, Data Processing Agreement (DPA) +1 more
Learn article available
Related:GDPR, Data Controller, Data Processor +1 more
Learn article available
Related:GDPR, Personal Data, Data Controller
Learn article available
Related:GDPR, Personal Data, DSAR
Learn article available
Related:GDPR, Data Subject Rights, Personal Data
Learn article available
Related:GDPR, Data Controller, vCISO
Learn article available
Related:GDPR, Privacy by Design, Risk Assessment +1 more
Related:GDPR, DPIA / Data Protection Impact Assessment, Personal Data +1 more
Related:GDPR, Personal Data, Lawful Basis +1 more
Related:GDPR, Data Processor, Data Processing Agreement (DPA) +1 more
Related:GDPR, Personal Data, Data Controller +1 more
Security Controls
18 termsCommon security and technical control terminology
Related:RBAC / Role-Based Access Control, Least Privilege, Control +1 more
Related:Encryption in Transit, Control, SOC 2 +1 more
Related:Encryption at Rest, Control, SOC 2 +1 more
Related:Vulnerability Scanning, SOC 2, Risk Assessment
Related:Penetration Testing, Risk Assessment, Control
Related:Least Privilege, Access Review, MFA / Multi-Factor Authentication +1 more
Related:RBAC / Role-Based Access Control, Access Review, Control
Related:EDR / Endpoint Detection and Response, Control, Encryption at Rest
Related:MDM / Mobile Device Management, SIEM, Incident Response
Related:EDR / Endpoint Detection and Response, Incident Response, Evidence Collection
Related:RBAC / Role-Based Access Control, Least Privilege, IAM / Identity and Access Management +1 more
Related:Control, SOC 2, ISO 27001 +1 more
Related:Security Awareness Training, Control, Evidence Collection
Related:Encryption at Rest, Encryption in Transit, Personal Data +1 more
Related:SIEM, Evidence Collection, Access Review +1 more
Related:Audit Trail, SIEM, Access Review +1 more
Related:GDPR, Personal Data, Control +1 more
Related:ISMS, Control, ISO 27001 +2 more
Compliance & Governance
21 termsGeneral compliance and governance terminology
Related:SOC 2, ISO 27001, GDPR +2 more
Related:DPO, Risk Assessment, Compliance Framework
Related:Risk Register, Control, SOC 2 +2 more
Learn article available
Related:Risk Assessment, Control, ISO 27001 +1 more
Related:Risk Assessment, Annex A Controls, Trust Services Criteria (TSC) +1 more
Related:SOC 2 Type 2, Observation Period, Control +1 more
Learn article available
Related:RBAC / Role-Based Access Control, Least Privilege, Control
Related:SIEM, EDR / Endpoint Detection and Response, Business Continuity
Related:Incident Response, Risk Assessment, ISO 27001 +1 more
Related:Data Processor, Data Processing Agreement (DPA), Risk Assessment +1 more
Related:Vendor Risk Management, Vendor Due Diligence, Security Questionnaires +1 more
Related:Vendor Risk Assessment, Vendor Risk Management, Security Questionnaires +1 more
Related:Vendor Risk Assessment, Vendor Due Diligence, SOC 2 +1 more
Related:Risk Assessment, Compliance Framework, Control +1 more
Related:Risk Assessment, Gap Analysis, Compliance Framework +1 more
Related:Evidence Collection, Compliance Framework, GRC / Governance, Risk, and Compliance +1 more
Related:Continuous Compliance, SIEM, CSPM / Cloud Security Posture Management +1 more
Related:Risk Register, Control, Risk Assessment +1 more
Related:Control, Risk Assessment, GRC / Governance, Risk, and Compliance +1 more
Related:Control, SOC 2, SOC 1 +1 more
Related:Evidence Collection, Continuous Compliance, SOC 2 +2 more
Other Frameworks
29 termsAdditional compliance frameworks and standards
Related:ISO 27001, Compliance Framework, Control
Learn article available
Related:PHI / Protected Health Information, HIPAA Covered Entity, HIPAA Business Associate +2 more
Related:HIPAA, HIPAA Business Associate, PHI / Protected Health Information +1 more
Related:HIPAA, HIPAA Covered Entity, PHI / Protected Health Information +1 more
Related:HIPAA, HIPAA Business Associate, HIPAA Covered Entity +1 more
Related:Compliance Framework, Cardholder Data (CHD), Cardholder Data Environment (CDE) +2 more
Related:PCI DSS, Report on Compliance (ROC), Cardholder Data Environment (CDE) +1 more
Related:PCI DSS, Qualified Security Assessor (QSA), Attestation of Compliance (AoC) +1 more
Related:PCI DSS, Report on Compliance (ROC), Attestation of Compliance (AoC) +1 more
Related:PCI DSS, Cardholder Data Environment (CDE), Encryption at Rest +1 more
Related:PCI DSS, Cardholder Data (CHD), Qualified Security Assessor (QSA) +1 more
Related:NIS 2, Business Continuity, Incident Response +1 more
Related:DORA, GDPR, Compliance Framework +1 more
Related:ISO 27001, HIPAA, Personal Data +1 more
Related:SOC 2, SOC 3, AICPA
Learn article available
Related:SOC 2, SOC 1, AICPA
Learn article available
Related:Compliance Framework, Risk Assessment, Control +2 more
Related:NIST Cybersecurity Framework (CSF), Compliance Framework, SOC 2 +1 more
Related:NIST Cybersecurity Framework (CSF), FedRAMP, Compliance Framework +1 more
Related:GDPR, Personal Data, Data Subject Rights +1 more
Learn article available
Related:ISO 27001, Compliance Framework, Vendor Risk Assessment
Related:Penetration Testing, Vulnerability Scanning, Technical Vulnerability Management +1 more
Related:Penetration Testing, VAPT / Vulnerability Assessment and Penetration Testing, Continuous Compliance
Related:PCI DSS, Vulnerability Scanning, Compliance Framework
Related:HIPAA, Personal Data, Encryption at Rest +1 more
Related:GRC / Governance, Risk, and Compliance, Risk Assessment, Compliance Framework
Related:PCI DSS, Compliance Framework, SOC 2 +1 more
Related:Risk Assessment, Continuous Monitoring, Vulnerability Scanning +1 more
Related:Access Control Policy, Control, ISMS +1 more
Learn More
Other platforms check the box
We secure the box
Get in touch and learn why hundreds of companies trust Bastion to manage their security and fast-track their compliance.
Get Started