Home Cybersecurity governance terms

45 terms

Cybersecurity governance terms

Cybersecurity governance defines how a company runs security: who is accountable, which policies apply, and how results are checked. It covers roles like the chief information security officer (CISO) and data owners, frameworks such as the NIST Cybersecurity Framework and ISO/IEC 27001, control objectives, risk appetite, and audit evidence: logs, reports, and screenshots that show how controls work.

Yellow hat hacker

A yellow hat hacker is a cybersecurity expert who tests systems for vulnerabilities with the permission of the owner.

Virtual office

A virtual office provides a physical address and office-related services without physical space's long-term commitments and costs.

User authentication

User authentication constitutes confirming a user's identity when they strive to access a system or network.

Supply chain security

Supply chain security is the practice of keeping goods and information safe as they move from the manufacturer to the consumer.

Source code escrow

Source code escrow is a licensing agreement where a third-party agent holds the source code of the software.

SOC as a service

SOC as a service is a security solution when a business outsources their cybersecurity operations to a dedicated cybersecurity center.

Separation of duties

Separation of duties is the process of dividing various critical tasks among different people or departments to prevent one person or a particular group from having complete control to reduce the risk of conducting malicious activities or other fraudulent actions.

Security policy

A security policy is the approach an organization has towards maintaining the security of its data.

The importance of cybersecurity governance terminology

Shared terminology prevents gaps between leadership, IT, and compliance. It clarifies who owns risk, what controls apply, and how proof is collected.

Set enforceable rules

Distinguishing policy, standard, procedure, and guideline helps set requirements, document steps, and hold owners accountable.

Pass audits faster

Terms like “control objective,” “evidence,” “scope,” “exception,” and “change control” make it easier to gather the right proof and close findings on time.

Report risk consistently

Understanding KPI vs. KRI, risk appetite vs. tolerance, and what belongs in a risk register keeps priorities and status clear.

Two women learning cybersecurity terminology.

Online security starts with a click.

Stay safe with the world’s leading VPN

Can’t find an answer to your question?

Ask the questions that matter to you — and get answers from our cybersecurity experts.