45 terms
Cybersecurity governance terms
Cybersecurity governance defines how a company runs security: who is accountable, which policies apply, and how results are checked. It covers roles like the chief information security officer (CISO) and data owners, frameworks such as the NIST Cybersecurity Framework and ISO/IEC 27001, control objectives, risk appetite, and audit evidence: logs, reports, and screenshots that show how controls work.
Yellow hat hacker
A yellow hat hacker is a cybersecurity expert who tests systems for vulnerabilities with the permission of the owner.
Virtual office
A virtual office provides a physical address and office-related services without physical space's long-term commitments and costs.
User authentication
User authentication constitutes confirming a user's identity when they strive to access a system or network.
Supply chain security
Supply chain security is the practice of keeping goods and information safe as they move from the manufacturer to the consumer.
Source code escrow
Source code escrow is a licensing agreement where a third-party agent holds the source code of the software.
SOC as a service
SOC as a service is a security solution when a business outsources their cybersecurity operations to a dedicated cybersecurity center.
Separation of duties
Separation of duties is the process of dividing various critical tasks among different people or departments to prevent one person or a particular group from having complete control to reduce the risk of conducting malicious activities or other fraudulent actions.
Security policy
A security policy is the approach an organization has towards maintaining the security of its data.
Security domain
A security domain is a set of resources and permissions, protected by a common security policy, that applies to specific applications, groups of objects, or environments.
Proprietary information
Proprietary information refers to personal or exclusive knowledge, data, or intellectual property owned by a specific individual, organization, or company.
Operational level agreement
An operational level agreement is an agreement between departments detailing how they work together to support a company’s services.
IT Asset Life Cycle Management
IT Asset Life Cycle Management oversees an IT asset's entire lifespan in an organization.
Insider attack
An insider attack is a malicious act conducted by someone within an organization, such as an employee or contractor.
Information security policy
An information security policy is a set of rules and guidelines that define how an organization protects its information and technology resources from unauthorized access, misuse, and other security risks.
Information security management system
An information security management system helps organizations to protect their sensitive data.
Identity proofing
Identity proofing is verifying a user's claimed identity to ensure it aligns with the actual identity.
Identity orchestration
Identity orchestration is the coordinated management and synchronization of user identities across various systems and applications.
Identity life cycle
An identity life cycle is the stages an individual's digital identity goes through in a given system.
Identity fabric
Identity fabric is a centralized system designed to securely manage user identities and control system access within an organization.
Identity and access management
Identity and access management (IAM) is a framework of policies, processes, and technologies designed to manage digital identities and people's access to systems, applications, and data within an organization.
Human firewall
A human firewall is the practice of empowering employees in an organization to recognize and respond effectively to cybersecurity threats.
Gamification
Gamification incorporates game elements and mechanics into environments like websites, apps, online communities, business intranets, and learning management systems to boost participation.
Enterprise security architecture
Enterprise security architecture is a structured strategy organizations create to protect themselves from cyber threats and unauthorized access.
Enterprise application security
Enterprise application security refers to various practices protecting critical business applications.
Endpoint security
Endpoint security is a means of protecting a network by securing the phones, laptops, and other devices that access it.
Digitalization
Digitalization is using digital technology to modify current or create new business processes, culture, and customer experiences.
Digital trust
Digital trust is the confidence users have in an organization to handle their digital data.
Deprovisioning
Deprovisioning is about taking away or limiting a user's access to IT tools and data.
Deperimeterization
Deperimeterization is a concept in information security that suggests a move away from a traditional, perimeter-based security model (where security measures are focused primarily on the outer boundaries of an organization) to a model that emphasizes data protection no matter where it resides.
Declassification
Generally, declassification is removing the “classified“ label from information or documents that were once kept secret for privacy or national security reasons.
Data governance framework
A data governance framework is a set of policies, procedures, standards, and guidelines that define how an organization manages its data assets.
Data custodian
A data custodian is a person or entity responsible for managing and protecting an organization’s data.
Cybersecurity framework
A cybersecurity framework provides organizations with guidelines, best practices, and standards to manage and enhance their cybersecurity.
Cybersecurity ecosystem
A cybersecurity ecosystem is a safety network that includes people, rules, tools, and devices all working together to protect our computers and online information.
Cyber insurance
Cyber insurance is an insurance policy protecting holders from the financial fallout of cyber attacks or data breaches.
Critical infrastructure and key resources
Critical infrastructure and key resources are the assets that a nation requires to properly function, including the services needed to process, procure, and protect them.
Control framework
A control framework is a comprehensive set of policies, processes, and procedures organizations use to implement adequate security controls aligned with their business objectives and manage their cybersecurity risks.
Compartmented security mode
The compartmented security mode is a way to handle classified information by dividing it into “compartments.”
CIA triad
CIA triad refers to a popular model used to guide policies for information security within an organization.
C-SCRM
C-SCRM (cybersecurity supply chain risk management) refers to strategies, processes, and technical measures designed to mitigate risks related to the supply chain.
Automation platform
An automation platform is a system or tool that can automatically handle, control, and simplify different tasks and processes all by itself.
Application sprawl
Application sprawl is an out-of-control proliferation of software within an organization that threatens the efficiency of its operations.
Acceptable use policy
An acceptable use policy is a set of rules users must agree to if they want to access a corporate network, website, or the internet.
Certified Information Systems Security Professional
CISSP stands for Certified Information Systems Security Professional. It's a respected global certification in cybersecurity offered by (ISC)².
The importance of cybersecurity governance terminology
Shared terminology prevents gaps between leadership, IT, and compliance. It clarifies who owns risk, what controls apply, and how proof is collected.
Set enforceable rules
Distinguishing policy, standard, procedure, and guideline helps set requirements, document steps, and hold owners accountable.
Pass audits faster
Terms like “control objective,” “evidence,” “scope,” “exception,” and “change control” make it easier to gather the right proof and close findings on time.
Report risk consistently
Understanding KPI vs. KRI, risk appetite vs. tolerance, and what belongs in a risk register keeps priorities and status clear.
Online security starts with a click.
Stay safe with the world’s leading VPN
Explore related glossary categories
Can’t find an answer to your question?
Ask the questions that matter to you — and get answers from our cybersecurity experts.