✨ Glossary

GRC TermDescription
Access ControlA security technique used to regulate who or what can view or use resources.
AccountabilityThe obligation of an individual or organization to account for activities and accept responsibility.
Adverse SelectionA market situation where asymmetric information leads to high-risk selections.
Agile GovernanceA flexible governance approach that adapts quickly to changes.
AML (Anti-Money Laundering)Laws, regulations, and procedures aimed at preventing financial crimes.
Annual Risk AssessmentAn annual evaluation of risks affecting an organization.
Asset ManagementThe systematic process of managing an organization’s assets.
Audit CommitteeA governing body responsible for overseeing audit processes.
Audit LogA record of events related to system security and activities.
Audit TrailA chronological record of system activities for audit purposes.
AuthenticationThe process of verifying user identity.
AuthorizationThe process of granting or denying access to resources.
Baseline SecurityMinimum security requirements set as a standard.
BenchmarkingComparing organizational performance against industry standards.
Board OversightOversight function ensuring responsible decision-making.
Business Continuity Plan (BCP)A plan to ensure business operations continue after disruptions.
Business Impact Analysis (BIA)An analysis of potential disruptions and their business impact.
BYOD (Bring Your Own Device) PolicyA policy for managing employee-owned devices in the workplace.
CAPA (Corrective and Preventive Action)A process to identify and correct deficiencies in operations.
CISO (Chief Information Security Officer)An executive responsible for cybersecurity and information security.
Cloud GovernancePolicies and practices for managing cloud computing risks.
Compliance AuditAn examination of adherence to laws and regulations.
Compliance FrameworkA structure of rules ensuring compliance with laws and regulations.
Compliance RiskThe potential for failing to comply with regulations.
ConfidentialityEnsuring information is only accessible by authorized parties.
Conflict of InterestA situation where personal interests conflict with organizational duties.
Continuous MonitoringOngoing evaluation of systems and activities for compliance.
Control DeficiencyA weakness in an internal control system.
Control EnvironmentThe policies and procedures governing risk management.
Control Self-Assessment (CSA)A process for self-evaluating internal control effectiveness.
Corporate GovernanceThe framework that governs corporate decision-making.
COSO (Committee of Sponsoring Organizations)A framework for internal controls and risk management.
Crisis ManagementPlanning and responding to crises effectively.
Cyber RiskThe potential harm resulting from cyber threats.
Cybersecurity FrameworkA structured approach to managing cybersecurity risks.
Data ClassificationThe classification of data based on sensitivity levels.
Data GovernanceThe process of managing data-related risks and policies.
Data Leakage Prevention (DLP)Security measures to prevent unauthorized data leaks.
Data PrivacyProtecting personal data from unauthorized access.
Data ProtectionSafeguarding information through encryption and controls.
Data Retention PolicyPolicies defining how long data is retained.
Digital RiskThe risk associated with digital transformation and automation.
Disaster Recovery Plan (DRP)A plan to restore operations after a disaster.
Due DiligenceA thorough investigation before engaging in business relationships.
Enterprise Risk Management (ERM)A holistic approach to managing enterprise-wide risks.
Ethical HackingSimulated cyberattacks to test security controls.
Ethics HotlineA reporting mechanism for unethical behavior.
Event LoggingRecording system events for security and compliance.
Exception HandlingManaging unexpected errors and exceptions in processes.
Exit StrategyA planned approach for discontinuing operations responsibly.
External AuditAn independent review of financial and operational practices.
Fair DealingEnsuring fair treatment of customers and stakeholders.
FCPA (Foreign Corrupt Practices Act)A law preventing corruption in business transactions.
Financial ComplianceCompliance with financial laws and regulations.
Financial RiskManaging financial exposure and uncertainties.
Fraud PreventionMethods to detect and prevent fraudulent activities.
GAP AnalysisIdentifying gaps between current and desired states.
GDPR (General Data Protection Regulation)A European regulation for data protection and privacy.
Governance ModelA structured approach to governance processes.
Governance RiskRisks related to governance structures and decisions.
HIPAA (Health Insurance Portability and Accountability Act)A US law ensuring medical data privacy.
Identity and Access Management (IAM)Managing access rights and user identities.
Incident ManagementHandling security incidents in an organization.
Incident Response Plan (IRP)A structured plan to respond to security incidents.
Information Security Management System (ISMS)A system for managing security risks systematically.
Information Security PolicyA formal policy guiding security controls.
Internal AuditAn internal function evaluating risks and controls.
Internal ControlsProcedures ensuring operational integrity and accountability.
IT ComplianceEnsuring IT systems comply with regulations.
IT GovernanceThe system of rules governing IT management.
IT Risk ManagementIdentifying and mitigating IT-related risks.
Key Performance Indicators (KPIs)Metrics for assessing business performance.
Key Risk Indicators (KRIs)Indicators measuring potential risks in operations.
Legal RiskLegal obligations and associated risks.
Log ManagementProcesses managing system logs and activities.
Loss PreventionStrategies to prevent financial and security losses.
Malware ProtectionProtection against malicious software threats.
Market RiskRisks associated with market fluctuations.
Material WeaknessA significant weakness in an internal control system.
Mitigation StrategyA strategy to reduce or eliminate risks.
Monitoring ControlsControls designed to continuously track risks.
Multi-Factor Authentication (MFA)Using multiple authentication factors for security.
NDA (Non-Disclosure Agreement)A legal contract ensuring confidentiality.
Network SecurityProtecting organizational networks from cyber threats.
Operational ResilienceThe ability to adapt to operational disruptions.
Operational RiskRisks related to daily business operations.
Outsourcing RiskManaging risks from outsourced services.
Penetration TestingTesting security defenses through simulated attacks.
Personal Data ProtectionEnsuring personal information remains secure.
Phishing AwarenessTraining employees on phishing risks.
Policy EnforcementEnsuring compliance with policies and procedures.
Policy ManagementManaging policies effectively across the organization.
Privacy Impact Assessment (PIA)Assessing privacy risks in processes.
Process AutomationAutomating compliance and risk management tasks.
Ransomware ProtectionPreventing and mitigating ransomware attacks.
Regulatory ComplianceEnsuring adherence to regulatory requirements.
Regulatory ReportingReporting regulatory compliance data to authorities.
Residual RiskThe remaining risk after mitigation.
Risk AcceptanceAccepting a level of risk within an organization.
Risk AppetiteThe amount of risk an organization is willing to take.
Risk AssessmentIdentifying potential risks before they occur.
Risk AvoidanceEliminating potential risks where possible.
Risk CultureThe culture that influences risk management.
Risk GovernanceA governance approach to handling risks.
Risk IdentificationDetecting and identifying emerging risks.
Risk MitigationReducing or controlling risks effectively.
Third-Party Risk ManagementAssessing risks associated with third parties.
Whistleblower PolicyA policy encouraging ethical reporting of issues.