Trust Operations
Answer Library
Security glossary terms and narrative operating answers in one archive.
Core Acronyms
- BAA
Business Associate Agreement
A required contract when a vendor handles patient health data on your behalf.
- BCP / DR
Business Continuity Plan / Disaster Recovery
Plans that keep the business running and restore systems after a major failure.
- CWE / CVE / CVSS
Common Weakness Enumeration / Common Vulnerabilities and Exposures / Common Vulnerability Scoring System
Standard systems for naming and scoring the severity of known security vulnerabilities.
- DLP
Data Loss Prevention
Controls that prevent sensitive data from being sent or copied outside the organization.
- DPA
Data Processing Addendum
A contract defining exactly how a vendor may use your customers' personal data.
- DPIA
Data Protection Impact Assessment
A formal risk assessment required before starting any high-risk data processing activity.
- DPO
Data Protection Officer
A designated officer responsible for ensuring an organization handles personal data legally.
- EDR / MDM
Endpoint Detection & Response / Mobile Device Management
Tools that monitor and control employee devices to detect and stop threats.
- IdP
Identity Provider
A service like Okta that manages who you are and what you can access.
- IR
Incident Response
The plan for detecting, containing, and recovering from a security incident.
- ISO 27001
An international certification for companies with a formal, audited information security program.
- KMS
Key Management Service
A secure service that manages the encryption keys protecting stored data.
- MFA
Multi-Factor Authentication
Logging in requires two proofs of identity, not just a password.
- PHI
Protected Health Information
Medical or health information tied to a specific person, protected by law.
- PII
Personally Identifiable Information
Any data that can identify a specific person, like a name or email.
- PoLP
Principle of Least Privilege
Users are given only the minimum access they need to do their job.
- RBAC
Role-Based Access Control
Access to systems is determined by a user's role, not individual permissions.
- ROPA
Record of Processing Activities
A required log of every way an organization collects and uses personal data.
- RoR / Break-glass
Read-Only Role / Break-glass Access
Emergency production access, granted rarely and only with strict logging and oversight.
- RTO / RPO
Recovery Time Objective / Recovery Point Objective
How fast systems recover, and how much data can be lost, in an outage.
- SAML / OIDC
Security Assertion Markup Language / OpenID Connect
Protocols that let your company's login system connect securely with third-party apps.
- SCCs
Standard Contractual Clauses
EU-approved legal clauses that allow personal data to be sent outside Europe legally.
- SIEM
Security Information and Event Management
A central system that collects logs and alerts when something suspicious happens.
- SLA / SLO / SLI
Service Level Agreement / Objective / Indicator
The agreed targets and measurements that define how reliable a service must be.
- SOC 2
Service Organization Control 2
An independent audit confirming a company's security controls actually work as claimed.
- SSO
Single Sign-On
One login grants access to multiple apps without re-entering credentials each time.
- TLS
Transport Layer Security
The encryption standard that scrambles data while it travels across a network.
Core Concepts
- Backups
How often data is copied and how long those copies are kept.
- Change Management
The review and approval process governing all changes to production systems.
- Controller vs Processor
The Controller decides why data is used; the Processor handles it on their behalf.
- Data Residency
Where your data is physically stored and where it may travel or be replicated.
- Data Subject Rights
Legal rights letting individuals view, correct, or delete their personal data.
- Deletion
How and when customer data is permanently removed after an account is closed.
- Secure SDLC
Secure Software Development Lifecycle
Building security checks into every stage of the software development lifecycle.
- Subprocessors
Third-party vendors a company uses to process customer data on its behalf.
- Vulnerability Management
The ongoing process of finding, tracking, and patching security weaknesses in systems.
Mini Glossary
- Access Review
A periodic check ensuring only the right people still have access to systems.
- Anonymization
Anonymization permanently removes identity; pseudonymization hides it but can be reversed.
- Audit Log
An immutable record of every security-relevant action taken in a system.
- Backup Purge
When deleted data finally disappears after aging out of all backup copies.
- CIS Benchmarks
Center for Internet Security Benchmarks
Widely trusted security configuration guides for servers, cloud systems, and operating systems.
- Data Minimization
Collecting only the data strictly necessary for a specific, defined purpose.
- DLP
Data Loss Prevention
Technical controls that prevent sensitive data from leaking outside the organization.
- GRC
Governance, Risk, and Compliance
The combined strategy for managing security, risk, and compliance across an organization.
- Pentest
Penetration Test
An authorized simulated attack on your systems to find real security weaknesses.
- Policy vs Procedure
Policy says what must happen; procedure explains exactly how to carry it out.
- Secrets Mgmt
Secrets Management
Storing API keys and passwords securely, completely separate from source code.
- SOP
Standard Operating Procedure
A documented step-by-step process ensuring routine tasks are done consistently every time.
Platforms & Portals
- Ariba / Coupa
Enterprise procurement platforms often used to collect and review vendor security information.
- Drata / Vanta / Secureframe
Platforms that automate collecting evidence for security compliance audits.
- GitLeaks / TruffleHog
Tools that detect passwords or API keys accidentally committed to a code repository.
- OneTrust
A software suite for managing privacy compliance, vendor risk, and data assessments.
- Snyk / Dependabot / Trivy
Automated tools that scan code and dependencies for known security vulnerabilities.
- Whistic
A platform where vendors host security documentation and respond to buyer questionnaires.