Compliance Glossary

Key terms and definitions for compliance, cybersecurity, and regulatory frameworks.

Access Control

Technical

The selective restriction of access to resources, systems, and data based on user identity and authorization. Access control is a fundamental security control required by ISO 27001, SOC 2, DORA, and GDPR to ensure that only authorized personnel can access sensitive information.

AML/KYC

Audit

The process of verifying the identity of customers and assessing their risk profile to prevent money laundering and terrorist financing.

Asset Discovery

Technical

The process of identifying and cataloging all hardware, software, and network devices within an organization's IT infrastructure.

Audit Evidence

Governance

Information obtained by auditors during an audit to provide a reasonable basis for their conclusions about the subject matter.

Audit Opinion

Governance

The formal statement by an auditor regarding the fairness and accuracy of an organization's financial statements.

Audit Readiness

Audit

The state of being prepared for a compliance audit at any time, with all necessary documentation, evidence, and controls in place. Continuous audit readiness replaces the traditional 'audit scramble' approach with always-on compliance monitoring and evidence collection.

Audit Trail

Audit

A chronological record of all system activities, data changes, and user actions that provides documentary evidence of compliance. Audit trails are required by DORA, ISO 27001, and SOC 2 to demonstrate accountability, detect anomalies, and support forensic investigations.

BaFin (Federal Financial Supervisory Authority)

Governance

Germany's integrated financial regulatory authority responsible for supervising banks, insurance companies, and securities trading. BaFin is the primary competent authority for DORA compliance in Germany, receiving incident reports and conducting supervisory reviews.

BAIT (Banking Supervisory Requirements for IT)

Governance

BaFin's regulatory framework specifying IT requirements for German banks. BAIT translates MaRisk into concrete IT security standards covering information security management, user access management, IT projects, application development, IT operations, and outsourcing.

Binding Corporate Rules

Framework

A set of company-wide data protection policies and rules that are legally binding on all group companies.

Business Continuity

Governance

The capability of an organization to continue delivering products or services at acceptable predefined levels following a disruptive incident. Business continuity planning is a core component of both DORA and ISO 27001 requirements.

Business Impact Analysis (BIA)

Audit

A systematic process to evaluate the potential impact of a disaster on an organization's operations and to identify critical business functions that require support to maintain business continuity.

Carbon Accounting

Framework

The process of measuring, managing, and reporting an organization's carbon emissions to track its carbon footprint and inform carbon reduction strategies.

Certificate Management

Technical

The process of issuing, distributing, managing, and revoking digital certificates within an organization.

Chain of Custody

Audit

A chronological record documenting the handling, control, storage, and transfer of evidence or records to ensure their integrity and admissibility in legal proceedings.

Change Management (IT)

Governance

A structured process for requesting, reviewing, approving, and implementing changes to IT systems and infrastructure. Required by ISO 27001 (Annex A.12.1.2), SOC 2, and DORA to minimize disruption and ensure changes don't introduce new vulnerabilities.

Cloud Access Security Broker

Technical

A software tool or service that acts as an intermediary between cloud-based services and enterprise IT to provide security, compliance, and governance.

Cloud Security

Technical

The set of policies, technologies, and controls designed to protect data, applications, and infrastructure in cloud computing environments. With financial services increasingly adopting cloud solutions, cloud security is critical for DORA, ISO 27001, and GDPR compliance.

Code Review

Technical

The process of examining and evaluating a software program's source code by peers, with the aim of identifying and fixing errors, vulnerabilities, and improving code quality.

Compliance Automation

Audit

The use of technology to streamline and automate compliance processes including evidence collection, control monitoring, risk assessment, policy management, and audit preparation. Compliance automation significantly reduces manual effort and improves accuracy.

Compliance Culture

Governance

The collective attitude, values, and behaviors that demonstrate a commitment to ethical conduct and adherence to laws, regulations, and internal policies within an organization.

Compliance Gap

Audit

The difference between the current state of compliance and the desired state as defined by regulatory requirements or best practices.

Compliance Monitoring

Governance

The ongoing process of tracking and evaluating an organization's adherence to internal policies, procedures, and external regulatory requirements.

Configuration Management

Technical

The process of standardizing, controlling, and maintaining the configuration of IT systems and applications.

Configuration Management Database (CMDB)

Technical

A database used in IT service management to store and manage information about an organization's IT infrastructure, including hardware, software, and network components.

Continuous Monitoring

Audit

An ongoing process of observing, evaluating, and maintaining awareness of information security controls, vulnerabilities, and threats. Continuous monitoring ensures that compliance status is maintained between formal audits and enables rapid detection of control failures.

Control Activity

Audit

Actions or tasks performed by an organization to monitor and ensure the effectiveness of its control framework.

Control Deficiency

Governance

A deviation from an established internal control that could lead to a misstatement of an organization's financial statements.

Control Effectiveness

Risk

The measure of how well a control, such as a policy or procedure, operates to achieve its intended risk management objective.

Control Framework

Audit

A set of policies, procedures, and controls implemented by an organization to manage risk and ensure regulatory compliance.

Control Objective

Audit

A specific goal or purpose for implementing a control within an organization's control framework.

Control Testing

Audit

The process of evaluating the effectiveness of internal controls within an organization to ensure they are operating as intended.

Corrective Action

Governance

A specific measure taken to address and eliminate the cause of a control deficiency or weakness in an organization's internal control system.

Crisis Communication

Audit

The strategic process of managing communication during a crisis to ensure accurate, timely, and consistent information is provided to stakeholders and the public.

Crisis Management

Audit

The process of planning for and managing a crisis or emergency situation to minimize negative impacts on an organization, its stakeholders, and the public.

CSIRT

Framework

Computer Security Incident Response Teams, which are specialized units that handle cybersecurity incidents and threats.

Cybersecurity Risk Management

Framework

Cybersecurity Risk Management is the process of identifying, assessing, and prioritizing cybersecurity risks to protect data and systems against threats.

Data Breach Notification

Framework

Data Breach Notification refers to the requirement under data protection laws for organizations to report security breaches involving personal data to relevant authorities and, in some cases, to the individuals affected.

Data Loss Prevention

Technical

A set of strategies and tools used to detect and prevent unauthorized access to, use of, or disclosure of sensitive information.

Data Processing Agreement (DPA)

Governance

A legally binding contract between a data controller and data processor that governs the processing of personal data. Required by GDPR Article 28, a DPA specifies the scope, purpose, and duration of processing, as well as the obligations of each party.

Data Protection Officer (DPO)

Governance

A designated role within an organization responsible for overseeing data protection strategy and GDPR compliance. Under GDPR, certain organizations are required to appoint a DPO, particularly public bodies and organizations that process sensitive data at scale.

Data Residency

Governance

The requirement that data be stored and processed within specific geographic boundaries. Under GDPR and German data protection law, personal data of EU residents must be adequately protected when transferred outside the EU, making EU/German data residency a competitive advantage for compliance platforms.

Data Subject Rights

Framework

Data Subject Rights refer to the rights granted to individuals under data protection laws, allowing them to control their personal data.

Demilitarized Zone (DMZ)

Technical

A separate network segment that is isolated from the internal network but exposed to the internet, used to host publicly accessible services.

DevSecOps

Technical

An approach that integrates security practices into the DevOps process, ensuring that security is considered throughout the software development lifecycle.

Digital Operational Resilience

Framework

The ability of an organization to withstand and recover from digital disruptions, ensuring the continuity of its operations and safeguarding its digital assets.

Disaster Recovery Plan

Audit

A documented process or set of procedures to recover and protect a business IT infrastructure in the event of a disaster.

Document Retention

Audit

The policy and process of retaining documents and records for a specified period to meet legal, regulatory, and business requirements.

DORA (Digital Operational Resilience Act)

Framework

An EU regulation that establishes uniform requirements for the security of network and information systems in the financial sector. DORA became mandatory on January 17, 2025, and applies to banks, insurance companies, investment firms, and their critical ICT service providers.

Double Materiality

Framework

An approach in sustainability reporting that considers both the financial materiality of issues to the company and their societal impact.

DPIA (Data Protection Impact Assessment)

Governance

A process designed to systematically analyze, identify, and minimize data protection risks of a project or plan. DPIAs are required under GDPR Article 35 when data processing is likely to result in a high risk to the rights and freedoms of individuals.

Due Diligence

Governance

A comprehensive investigation or assessment conducted before entering into a business relationship or transaction. In compliance contexts, due diligence refers to the thorough evaluation of third-party providers, business partners, or acquisition targets for regulatory and security risks.

EDR - Endpoint Detection and Response

Technical

A security solution that monitors and analyzes endpoint activity to detect and respond to potential threats.

Encryption

Technical

The process of converting data into a coded form that can only be read by authorized parties with the correct decryption key. Encryption protects data both at rest and in transit, and is a fundamental requirement across all major compliance frameworks.

Endpoint Security

Technical

The practice of securing end-user devices such as laptops, desktops, and mobile devices from cybersecurity threats. Endpoint security is critical for DORA compliance, covering device management, malware protection, and ensuring corporate data remains protected on employee devices.

ENISA

Framework

The European Union Agency for Cybersecurity, responsible for supporting EU member states in improving their cybersecurity capabilities.

ESAs

Framework

European Supervisory Authorities, which are three independent authorities responsible for the supervision and regulation of financial markets in the EU.

Essential Entities

Framework

Entities identified as critical to the continuity and stability of digital operational services within the European Union.

European Sustainability Reporting Standards

Framework

A set of standards being developed by the European Financial Reporting Advisory Group (EFRAG) to establish a comprehensive framework for sustainability reporting.

Evidence Collection

Audit

The process of gathering, organizing, and maintaining documentation that demonstrates compliance with specific controls and requirements. Automated evidence collection integrates with IT systems to continuously capture proof of control effectiveness.

Evidence Management

Audit

The systematic collection, evaluation, and maintenance of evidence to support audit findings and conclusions.

External Audit

Governance

An independent examination of an organization's financial statements, operations, and compliance with laws and regulations conducted by an external auditor.

Gap Analysis (Compliance)

Audit

A systematic assessment comparing an organization's current security and compliance posture against the requirements of a target framework (e.g., DORA, ISO 27001, SOC 2). Gap analysis identifies missing controls, insufficient processes, and remediation priorities.

GDPR (General Data Protection Regulation)

Framework

The EU regulation governing the processing of personal data of individuals within the European Economic Area. GDPR establishes strict rules for data collection, storage, processing, and transfer, with penalties of up to 4% of annual global turnover for violations.

Governance, Risk, and Compliance

Governance

An integrated framework that encompasses the governance structure, risk management processes, and compliance requirements of an organization.

ICT Concentration Risk

Framework

The risk associated with the over-reliance on a single or limited number of ICT service providers, potentially leading to system vulnerabilities and disruptions.

ICT Risk Management

Risk

The process of identifying, assessing, and mitigating risks associated with information and communication technology systems. Under DORA, financial entities must maintain a comprehensive ICT risk management framework covering identification, protection, detection, response, and recovery.

Identity and Access Management (IAM)

Technical

A framework for ensuring appropriate access to resources and data within an organization, while minimizing security risks.

Important Entities

Framework

Entities that are designated as important due to their significant impact on the digital operational services within the European Union.

Incident Reporting

Governance

The formal process of detecting, classifying, and reporting ICT-related incidents to competent authorities. DORA Articles 17-23 establish specific requirements for incident classification, initial notification, intermediate reports, and final reports to supervisory authorities.

Incident Severity Levels

Audit

A classification system used to categorize the severity of incidents, typically based on their impact on business operations, security, and legal compliance.

Indicators of Compromise (IoC)

Technical

Specific evidence used to detect potential security breaches or cyber attacks, such as IP addresses, domain names, or file hashes.

Information Sharing (Cyber Threat Intelligence)

Technical

The exchange of threat intelligence, vulnerability information, and best practices between organizations and authorities. DORA Article 45 encourages financial entities to participate in information sharing arrangements to improve collective cybersecurity resilience.

Inherent Risk

Risk

The level of risk that exists before any controls or mitigation actions are put in place.

Internal Audit

Governance

An independent, objective assurance and consulting activity designed to add value and improve an organization's operations by evaluating and improving the effectiveness of risk management, control, and governance processes.

Intrusion Detection and Prevention Systems (IDS/IPS)

Technical

Network security systems that monitor and analyze network traffic to detect and prevent unauthorized access or malicious activities.

ISMS (Information Security Management System)

Governance

A systematic approach to managing sensitive company information to keep it secure, consisting of policies, procedures, and technical controls. An ISMS is the core requirement of ISO 27001 and provides the organizational framework for information security governance.

ISO 27001

Framework

The international standard for information security management systems (ISMS). ISO 27001 provides a systematic approach to managing sensitive company information, ensuring it remains secure through a framework of policies, processes, and technical controls.

Key Risk Indicator

Risk

Quantitative or qualitative measures used to identify the occurrence of risk events and assess the effectiveness of risk management.

Least Privilege

Technical

A security principle that limits user access to the bare minimum permissions necessary to perform their job functions.

Legitimate Interest

Framework

Legitimate Interest is a lawful basis for processing personal data under data protection laws, where processing is necessary for the legitimate interests of a controller or a third party, except where such interests are overridden by the interests or fundamental rights and freedoms of the data subject.

Material Weakness

Governance

A significant deficiency in internal control over financial reporting that could result in a material misstatement of the financial statements.

Maturity Model

Audit

A framework used to assess the maturity of an organization's processes, typically in the context of governance, risk management, and compliance.

Mean Time to Detect (MTTD)

Audit

The average time it takes to identify the occurrence of an incident or a breach in security.

Mean Time to Recover (MTTR)

Audit

The average time required to restore normal operations after an incident.

Mean Time to Respond (MTTR)

Audit

The average time taken after detecting an incident to begin an organized response to address the issue.

MFA (Multi-Factor Authentication)

Technical

A security mechanism that requires users to provide two or more verification factors to gain access to a system. MFA significantly reduces the risk of unauthorized access and is recommended or required by DORA, ISO 27001, SOC 2, and GDPR security measures.

Network Segmentation

Technical

The practice of dividing a network into separate segments to enhance security and performance by isolating different network traffic.

NIS2 (Network and Information Security Directive)

Framework

The updated EU directive on cybersecurity that expands the scope of the original NIS Directive to cover more sectors and entities. NIS2 introduces stricter security requirements, incident reporting obligations, and enforcement measures with significant penalties for non-compliance.

Off-Site Monitoring

Audit

The process of monitoring an organization's compliance with regulations without physically being present at the organization's premises.

On-Site Inspection

Audit

An in-person examination conducted by regulatory or supervisory authorities at the premises of an organization to verify compliance.

Operational Resilience

Risk

The ability of an organization to deliver critical operations through disruption. In the context of DORA, it specifically refers to digital operational resilience — the capacity of financial entities to build, assure, and review their technological operational integrity.

Patch Management

Technical

The process of identifying, acquiring, installing, and verifying patches for software vulnerabilities to maintain system security.

Penetration Testing

Technical

A simulated cyberattack against a system, network, or application to evaluate its security. Penetration testing identifies vulnerabilities that could be exploited by real attackers and is required under DORA's digital operational resilience testing framework.

PEP Screening

Audit

The process of identifying and assessing the risk associated with politically exposed persons (PEPs) to prevent corruption and money laundering.

Policy Management

Governance

The process of creating, implementing, and maintaining policies within an organization to ensure compliance with legal and regulatory requirements.

Privacy by Design

Framework

An approach to systems design that incorporates privacy considerations throughout the development process.

Privileged Access Management (PAM)

Technical

A subset of Identity and Access Management (IAM) focused on managing and controlling access to critical systems and sensitive data by privileged users.

Record Keeping

Audit

The systematic process of recording, maintaining, and preserving records to ensure their availability for future reference and use.

Recovery Point Objective (RPO)

Audit

The maximum acceptable amount of data loss measured in time that can be tolerated in the event of a disaster. It is a critical component of disaster recovery planning.

Recovery Time Objective (RTO)

Audit

The maximum acceptable duration of time within which a business process must be restored after a disaster or disruption. It is a critical component of disaster recovery planning.

Red Team Blue Team

Audit

A method of testing an organization's security posture by having an 'attack team' (Red Team) attempt to breach security measures while a 'defending team' (Blue Team) tries to prevent them.

Register of Information

Framework

A comprehensive list maintained by an organization that contains all relevant information about its data assets, processing activities, and compliance with data protection regulations.

Regulatory Change Management

Governance

The systematic approach to identifying, evaluating, and implementing changes in response to regulatory updates or new legal requirements.

Regulatory Examination

Audit

A thorough review conducted by regulatory authorities to assess an organization's compliance with laws and regulations.

Remediation Plan

Governance

A strategic plan to address and correct identified control deficiencies or weaknesses in an organization's internal control framework.

Residual Risk

Risk

The remaining risk after implementing risk treatment measures. It is the risk that persists despite controls being in place.

Risk Appetite

Risk

The level of risk an organization is willing to accept in pursuit of its strategic objectives.

Risk Assessment

Risk

A systematic process of identifying potential threats, evaluating vulnerabilities, and determining the likelihood and impact of risks to an organization's information assets and operations. Risk assessments are foundational to ISO 27001, DORA, and virtually every compliance framework.

Risk Heat Map

Risk

A visual representation of risks, using colors to indicate the level of risk, helping to quickly identify areas of high, medium, and low risk.

Risk Owner

Risk

The individual or team accountable for managing a specific risk within an organization, ensuring appropriate risk treatment and monitoring.

Risk Register

Risk

A document or database that systematically records all risks identified within an organization, along with their potential impacts and proposed mitigation strategies.

Risk Tolerance

Risk

The maximum level of risk that an organization is prepared to accept in pursuit of its objectives.

Risk Treatment

Risk

The process of selecting and implementing actions to modify risk, including avoiding, reducing, sharing, or accepting the risk.

Role-Based Access Control (RBAC)

Technical

An access control method that restricts system access to authorized users by assigning permissions based on their roles within an organization.

RTS ITS

Framework

Regulatory Technical Standards for Information and Communication Technology, which are binding technical regulations developed to implement specific provisions of EU legislation.

Sanctions Screening

Audit

The process of checking individuals or entities against sanctions lists to ensure compliance with international sanctions regulations.

SIEM (Security Information and Event Management)

Technical

A technology platform that collects, analyzes, and correlates security events from across an organization's IT infrastructure to detect threats and support incident response. SIEM is essential for meeting DORA's detection and monitoring requirements.

Single Sign-On

Technical

A system that allows users to log in once and gain access to multiple related, yet independent software systems without logging in again at each of them.

SOAR - Security Orchestration, Automation, and Response

Technical

A cybersecurity practice that integrates and automates various security processes to enhance the efficiency of incident response.

SOC - Security Operations Center

Technical

A centralized unit that monitors and manages an organization's security posture, including incident detection, response, and threat intelligence.

SOC 2 (System and Organization Controls)

Framework

A compliance framework developed by the AICPA that defines criteria for managing customer data based on five Trust Services Criteria: security, availability, processing integrity, confidentiality, and privacy. SOC 2 reports are essential for SaaS companies and service providers.

Standard Contractual Clauses

Framework

A set of model clauses approved by the European Commission to facilitate international data transfers while ensuring adequate protection.

Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST)

Technical

SAST and DAST are two types of application security testing methods used to detect vulnerabilities in software applications.

Supervisory Review

Audit

An evaluation by supervisory authorities to ensure that financial institutions and other regulated entities are operating in compliance with regulations.

Supply Chain Security

Risk

The management of cybersecurity risks throughout the supply chain, including all third-party vendors, software providers, and service partners. Both DORA and NIS2 mandate supply chain security measures to protect against cascading failures and targeted attacks.

Supply Chain Security NIS2

Framework

NIS2 is a regulatory framework that sets standards for the security of digital operational technology and supply chains within the EU. It aims to enhance the overall security of network and information systems.

Suspicious Activity Report

Audit

A report filed by financial institutions when they suspect a transaction may involve money laundering, terrorist financing, or other illegal activities.

Sustainability Reporting

Framework

The practice of disclosing an organization's environmental, social, and governance (ESG) performance to stakeholders.

Tabletop Exercise

Audit

A simulated emergency management exercise conducted to practice and evaluate the effectiveness of an organization's response to potential incidents.

Taxonomy Alignment

Framework

The process of aligning an organization's reporting and classification systems with a specific taxonomy to ensure consistency and comparability.

Third-Party Risk Management

Risk

The process of identifying, assessing, and controlling risks arising from outsourcing to third-party service providers. Under DORA Article 28, financial entities must maintain a register of all ICT third-party providers and conduct thorough due diligence on critical providers.

Threat Intelligence

Technical

The process of gathering, analyzing, and disseminating information about threats to an organization's security posture.

Threat-Led Penetration Testing

Framework

A penetration testing approach that focuses on identifying and exploiting vulnerabilities that are most likely to be targeted by specific threats.

Three Lines of Defense

Governance

A model that separates an organization's risk management and control functions into three distinct lines of defense to ensure effective oversight and governance.

TLPT (Threat-Led Penetration Testing)

Governance

An advanced form of security testing mandated by DORA Articles 26-27 for significant financial entities. TLPT uses real-world threat intelligence to simulate adversary tactics and test an organization's detection, response, and recovery capabilities against realistic attack scenarios.

Tone at the Top

Governance

The behavior and attitudes set by the highest-level executives and board members that establish the ethical and compliance standards for an organization.

Transaction Monitoring

Audit

The process of continuously monitoring transactions for suspicious activity to detect and report potential money laundering or fraud.

Trust Services Criteria

Framework

A set of criteria for electronic transactions to ensure trust, security, and confidence in digital services.

Type I vs Type II

Framework

Distinct categories of attestation engagements in assurance services, where Type I assesses a system's description and operation, and Type II evaluates the effectiveness of controls over a period.

VAIT (Insurance Supervisory Requirements for IT)

Governance

BaFin's IT regulatory framework for insurance companies in Germany. VAIT mirrors BAIT's structure but addresses insurance-specific requirements for IT governance, security, and outsourcing, and has been updated to align with DORA.

Vendor Risk Assessment

Risk

A structured evaluation of the security posture and compliance status of third-party vendors before and during a business relationship. DORA Article 28 mandates specific due diligence requirements for ICT service providers used by financial entities.

Vulnerability Management

Technical

The continuous process of identifying, classifying, prioritizing, remediating, and mitigating software vulnerabilities. Effective vulnerability management is a key requirement of DORA, ISO 27001, and SOC 2 to maintain system security and operational resilience.

Web Application Firewall

Technical

A firewall specifically designed to protect web applications by filtering and monitoring HTTP traffic between a web application and the Internet.

Whistleblowing

Audit

The act of reporting misconduct or illegal activities within an organization, typically by an employee or insider.

XDR - Extended Detection and Response

Technical

A security framework that unifies multiple detection and response technologies across an organization's IT environment to provide a more comprehensive view of threats.

Zero Trust Architecture

Technical

A security model based on the principle of 'never trust, always verify' that requires strict identity verification for every person and device attempting to access resources, regardless of their network location. Zero Trust is increasingly recommended for DORA and NIS2 compliance.