Trust Operations

Answer Library

Security glossary terms and narrative operating answers in one archive.

Core Acronyms

  • BAA

    Business Associate Agreement

    A required contract when a vendor handles patient health data on your behalf.

  • BCP / DR

    Business Continuity Plan / Disaster Recovery

    Plans that keep the business running and restore systems after a major failure.

  • CWE / CVE / CVSS

    Common Weakness Enumeration / Common Vulnerabilities and Exposures / Common Vulnerability Scoring System

    Standard systems for naming and scoring the severity of known security vulnerabilities.

  • DLP

    Data Loss Prevention

    Controls that prevent sensitive data from being sent or copied outside the organization.

  • DPA

    Data Processing Addendum

    A contract defining exactly how a vendor may use your customers' personal data.

  • DPIA

    Data Protection Impact Assessment

    A formal risk assessment required before starting any high-risk data processing activity.

  • DPO

    Data Protection Officer

    A designated officer responsible for ensuring an organization handles personal data legally.

  • EDR / MDM

    Endpoint Detection & Response / Mobile Device Management

    Tools that monitor and control employee devices to detect and stop threats.

  • IdP

    Identity Provider

    A service like Okta that manages who you are and what you can access.

  • IR

    Incident Response

    The plan for detecting, containing, and recovering from a security incident.

  • ISO 27001

    An international certification for companies with a formal, audited information security program.

  • KMS

    Key Management Service

    A secure service that manages the encryption keys protecting stored data.

  • MFA

    Multi-Factor Authentication

    Logging in requires two proofs of identity, not just a password.

  • PHI

    Protected Health Information

    Medical or health information tied to a specific person, protected by law.

  • PII

    Personally Identifiable Information

    Any data that can identify a specific person, like a name or email.

  • PoLP

    Principle of Least Privilege

    Users are given only the minimum access they need to do their job.

  • RBAC

    Role-Based Access Control

    Access to systems is determined by a user's role, not individual permissions.

  • ROPA

    Record of Processing Activities

    A required log of every way an organization collects and uses personal data.

  • RoR / Break-glass

    Read-Only Role / Break-glass Access

    Emergency production access, granted rarely and only with strict logging and oversight.

  • RTO / RPO

    Recovery Time Objective / Recovery Point Objective

    How fast systems recover, and how much data can be lost, in an outage.

  • SAML / OIDC

    Security Assertion Markup Language / OpenID Connect

    Protocols that let your company's login system connect securely with third-party apps.

  • SCCs

    Standard Contractual Clauses

    EU-approved legal clauses that allow personal data to be sent outside Europe legally.

  • SIEM

    Security Information and Event Management

    A central system that collects logs and alerts when something suspicious happens.

  • SLA / SLO / SLI

    Service Level Agreement / Objective / Indicator

    The agreed targets and measurements that define how reliable a service must be.

  • SOC 2

    Service Organization Control 2

    An independent audit confirming a company's security controls actually work as claimed.

  • SSO

    Single Sign-On

    One login grants access to multiple apps without re-entering credentials each time.

  • TLS

    Transport Layer Security

    The encryption standard that scrambles data while it travels across a network.

Core Concepts

  • Backups

    How often data is copied and how long those copies are kept.

  • Change Management

    The review and approval process governing all changes to production systems.

  • Controller vs Processor

    The Controller decides why data is used; the Processor handles it on their behalf.

  • Data Residency

    Where your data is physically stored and where it may travel or be replicated.

  • Data Subject Rights

    Legal rights letting individuals view, correct, or delete their personal data.

  • Deletion

    How and when customer data is permanently removed after an account is closed.

  • Secure SDLC

    Secure Software Development Lifecycle

    Building security checks into every stage of the software development lifecycle.

  • Subprocessors

    Third-party vendors a company uses to process customer data on its behalf.

  • Vulnerability Management

    The ongoing process of finding, tracking, and patching security weaknesses in systems.

Mini Glossary

  • Access Review

    A periodic check ensuring only the right people still have access to systems.

  • Anonymization

    Anonymization permanently removes identity; pseudonymization hides it but can be reversed.

  • Audit Log

    An immutable record of every security-relevant action taken in a system.

  • Backup Purge

    When deleted data finally disappears after aging out of all backup copies.

  • CIS Benchmarks

    Center for Internet Security Benchmarks

    Widely trusted security configuration guides for servers, cloud systems, and operating systems.

  • Data Minimization

    Collecting only the data strictly necessary for a specific, defined purpose.

  • DLP

    Data Loss Prevention

    Technical controls that prevent sensitive data from leaking outside the organization.

  • GRC

    Governance, Risk, and Compliance

    The combined strategy for managing security, risk, and compliance across an organization.

  • Pentest

    Penetration Test

    An authorized simulated attack on your systems to find real security weaknesses.

  • Policy vs Procedure

    Policy says what must happen; procedure explains exactly how to carry it out.

  • Secrets Mgmt

    Secrets Management

    Storing API keys and passwords securely, completely separate from source code.

  • SOP

    Standard Operating Procedure

    A documented step-by-step process ensuring routine tasks are done consistently every time.

Platforms & Portals

  • Ariba / Coupa

    Enterprise procurement platforms often used to collect and review vendor security information.

  • Drata / Vanta / Secureframe

    Platforms that automate collecting evidence for security compliance audits.

  • GitLeaks / TruffleHog

    Tools that detect passwords or API keys accidentally committed to a code repository.

  • OneTrust

    A software suite for managing privacy compliance, vendor risk, and data assessments.

  • Snyk / Dependabot / Trivy

    Automated tools that scan code and dependencies for known security vulnerabilities.

  • Whistic

    A platform where vendors host security documentation and respond to buyer questionnaires.