Categories

Governance Risk Compliance

Browse Governance Risk Compliance terms for cybersecurity professionals.

Languages

Audit-Logging

The systematic recording of events and user actions in information systems to enable traceability, accountability, and forensic investigations.

View term

Audit-Trail

A chronological record of system activities and user actions, providing documented evidence to support accountability, traceability, and compliance.

View term

Aufbewahrungsrichtlinie

A documented set of rules defining how long information or records must be retained to comply with regulatory, legal, or business requirements, and the procedures for their eventual destruction or archival.

View term

Aufgabentrennung

A risk management control principle that divides critical tasks and privileges among multiple individuals to reduce opportunities for fraud or error in business processes.

View term

Aufsichtsgremium

A governing committee or group responsible for strategic direction, oversight, and monitoring of the organization’s risk management, compliance, and cybersecurity frameworks.

View term

Ausnahmenbehandlung

The systematic process of identifying, logging, resolving, and reporting deviations from expected information security or operational processes.

View term

Ausnahmenmanagement

A formal process for documenting, assessing, approving, and monitoring deviations from standard policies or controls, ensuring appropriate risk evaluation and accountability.

View term

Auswirkungsanalyse

The process of identifying and evaluating the potential consequences and business impacts of threats, incidents, or policy changes.

View term

Auswirkungsbewertung

A systematic analysis of the consequences that an identified risk or incident could have on business operations, assets, or individuals.

View term

Awareness-Schulung

Education provided to personnel to raise awareness about security risks, threats, and safe practices, often as part of compliance requirements.

View term

Bedrohungsbewertung

A structured process for identifying, evaluating, and prioritizing potential threats to an organization's assets, operations, or individuals.

View term

Bedrohungsmodellierung

A structured methodology to identify, analyze, and address potential threats and vulnerabilities in information systems throughout their lifecycle.

View term

Benutzerbereitstellung

The process of creating, managing, and assigning user accounts and privileges within an organization's IT systems in accordance with security and compliance requirements.

View term

Betroffene Person

An individual whose personal data is collected, held or processed by a data controller or processor as defined by privacy laws (e.g., GDPR).

View term

Compliance-Audit

A systematic, independent review to determine whether activities and related results comply with planned arrangements, policies, and regulatory requirements in information security and GRC frameworks.

View term

Compliance-Aufsicht

Ongoing supervision and review of an organization's compliance with laws, regulations, policies, and contractual obligations.

View term

Compliance-Berichterstattung

The process of preparing and delivering evidence-based reports to demonstrate adherence to regulatory, legal, and contractual requirements.

View term

Compliance-Kontrolle

A specific policy, process, or technical measure implemented to ensure an organization meets applicable legal, regulatory, and contractual requirements in its operations and information systems.

View term

Compliance-Management

The coordinated set of processes and controls designed to ensure adherence to legal, regulatory, and internal policy requirements.

View term

Compliance-Rahmenwerk

An integrated system of standards, guidelines, and procedures designed to help an organization meet all relevant legal, regulatory, and contractual obligations.

View term

Compliance-Validierung

The formal process of testing and confirming that systems, processes, and controls meet regulatory, contractual, and policy requirements.

View term

Datenaufbewahrung

The set of policies and procedures governing how long organizational data must be kept, archived, or deleted in compliance with legal, regulatory, or business requirements.

View term

Datenhoheit

The concept that digital data is subject to the laws and governance structures within the nation where it is collected or stored.

View term

Datenhoheit

The formal assignment of authority and accountability for data assets to specific individuals or roles within an organization, defining responsibility for data integrity, security, and compliance.

View term

Datenklassifizierung

The process of categorizing data based on its sensitivity, value, and the impact to the organization if disclosed, altered, or destroyed, as required by security policies and compliance frameworks.

View term

Datenklassifizierung

The systematic process of categorizing information based on sensitivity, criticality, and regulatory requirements to determine appropriate protection and handling procedures.

View term

Datenmapping

The structured process of identifying, documenting, and connecting the flow of data elements across systems, applications, and business processes, primarily for compliance, privacy, or integration requirements.

View term

Datenminimierung

The principle and practice of limiting personal or sensitive data collection, processing, and retention to only what is necessary for a specified purpose.

View term

Datenschutz-Auswirkung

The effect of a process, project, or system on the privacy of individuals, often measured and documented through a formal assessment (PIA).

View term

Datenschutzhinweis

A formal document that informs individuals about how their personal data is collected, used, stored, and protected by the organization, in compliance with privacy regulations.

View term

Datenverarbeitung

The processes and procedures for collecting, processing, storing, transmitting, and disposing of data in a secure and compliant manner.

View term

Datenverlust

The unintended or unauthorized destruction, corruption, or loss of data, potentially resulting in business disruption or compliance violations.

View term

Datenverwaltung

The assignment of responsibility for the management, oversight, and protection of data assets to designated individuals or teams to ensure data quality, compliance, and lifecycle integrity.

View term

Drittparteirisiko

The exposure to potential harm or loss resulting from external vendors, suppliers, contractors, or service providers who have access to the organization’s systems, data, or operations.

View term

Ethik-Hotline

A confidential reporting mechanism that allows employees and third parties to report ethical or compliance concerns anonymously.

View term

Geschäftsauswirkung

The effect or consequence an incident, risk, or change has on an organization's operations, assets, individuals, or reputation, often measured in terms of financial loss, legal exposure, or operational disruption.

View term

Geschäftskontinuität

A holistic management process that identifies potential threats and ensures organizational resilience by planning for continued operation during and after a disruptive incident.

View term

Gesetzliche Compliance

The state of adhering to all applicable laws, regulations, and legal obligations relevant to an organization's business and operations.

View term

Governance-Ausschuss

A formal group of executives and stakeholders responsible for overseeing information security, compliance, and risk management governance processes within an organization.

View term

Governance-Modell

A documented structure that defines roles, responsibilities, decision-making processes, and authority for managing information security, risk, and compliance within an organization.

View term

Kontinuierliche Überwachung

Ongoing real-time observation and analysis of security controls and risks to ensure timely detection of threats and compliance violations.

View term

Kontrollbewertung

A formal evaluation of the design and effectiveness of security controls to determine whether they are operating as intended within an organization’s environment.

View term

Kontrolldefizit

A weakness in the design or operation of a control that prevents it from effectively mitigating risk or achieving compliance.

View term

Kontrollprozess

A series of coordinated actions and procedures implemented to manage and mitigate risk by enforcing policies and security requirements.

View term

Kontrollrahmenwerk

A structured set of governance, risk, and compliance (GRC) policies, processes, and controls aligned to industry standards for managing and mitigating organizational risks.

View term

Kontrollreife

A measure of how well an internal control is designed, implemented, and operating as intended to mitigate risk and meet compliance objectives.

View term

Kontrollziel

A specific statement of the desired result or purpose that a control is intended to achieve, forming the basis for assessing the effectiveness of risk management and compliance controls.

View term

Kontrollzuordnung

The process of linking controls to regulatory, policy, or framework requirements to demonstrate compliance and facilitate audits.

View term

Kontrollüberprüfung

An assessment of security controls to determine their effectiveness, adequacy, and proper implementation within the organizational environment.

View term

Legal Hold

A directive to preserve all forms of relevant information when litigation or investigation is reasonably anticipated.

View term

Lieferantenbewertung

A structured evaluation of third-party providers’ security, compliance, and risk management practices prior to and during their engagement with the organization.

View term

Lückenbewertung

A structured review that compares current security controls and practices against required standards or frameworks to identify deficiencies.

View term

Managementbewertung

A formal evaluation conducted by senior management to assess the adequacy and effectiveness of security, compliance, and risk management processes.

View term

Maßnahmenplan

A formal strategy that outlines actions, responsibilities, and timelines to correct identified security or compliance deficiencies.

View term

Maßnahmenplan

A documented strategy detailing specific actions and controls to reduce the likelihood or impact of identified risks.

View term

Nachverfolgung der Abhilfemaßnahmen

The ongoing process of monitoring and managing corrective actions taken to resolve identified security or compliance issues.

View term

Policy Enforcement

The process of ensuring that policies, standards, and procedures are implemented and followed within the organization, with mechanisms for monitoring and remediation.

View term

Policyausnahme

A formally approved, documented deviation from an established security policy, typically granted on a temporary basis with compensating controls.

View term

Policyeinhaltung

The degree to which organizational personnel follow established internal policies, procedures, and standards.

View term

Prozessabbildung

A systematic technique for visually documenting and analyzing business or IT processes, their sequence, stakeholders, inputs, outputs, and control points, supporting compliance, risk, and security management.

View term

Prozessabbildung

A structured method of visually documenting and analyzing processes, including their steps, controls, and responsible parties, to support compliance and risk management.

View term

Prüfungsausschuss

A formally established group within an organization tasked with oversight of financial reporting, internal controls, risk management, and compliance auditing.

View term

Regulatorische Ausrichtung

The degree to which organizational controls, processes, and policies conform to laws, regulations, and relevant industry standards.

View term

Regulatorische Compliance

Adherence to laws, regulations, and standards applicable to the organization's operations and information security practices.

View term

Regulatorische Lücke

Any deficiency or mismatch between current organizational controls, policies, or processes and those required by relevant laws, regulations, or standards.

View term

Regulatorische Überprüfung

A systematic evaluation of processes, policies, and controls to ensure alignment with applicable regulatory requirements and standards.

View term

Regulatorisches Risiko

The potential for losses or legal penalties resulting from non-compliance with laws, regulations, or mandatory standards governing business operations and information security.

View term

Resilienzplanung

The strategic process of designing and implementing measures to ensure an organization can adapt, recover, and continue operating through adverse events or disruptions.

View term

Rezertifizierung von Zugriffsrechten

A formal process to periodically review and validate user access rights to systems and data to ensure only authorized personnel retain access, as required by regulatory and security policies.

View term

Richtliniendokumentation

The comprehensive collection and maintenance of all written policies, procedures, and standards governing security, risk, and compliance within an organization.

View term

Richtlinienrahmen

A structured set of overarching policies, standards, and guidelines that governs how information security, compliance, and risk are managed across an organization.

View term

Richtlinienverstoß

An act or omission that breaches or contradicts an established organizational policy, potentially leading to disciplinary action or compliance failure.

View term

Richtlinienüberprüfung

A formal and systematic evaluation of organizational policies to ensure their adequacy, effectiveness, and compliance with relevant standards, laws, and regulations. Policy reviews are scheduled or ad hoc assessments conducted by GRC teams as part of governance cycles.

View term

Richtlinienüberprüfung

A formal and systematic evaluation of organizational policies to ensure their adequacy, effectiveness, and compliance with relevant standards, laws, and regulations.

View term

Risiko-Eigentum

The assignment of accountability and authority for managing identified risks to a specific individual or organizational role.

View term

Risikoanalyse

The systematic process of identifying, evaluating, and prioritizing risks to organizational assets, considering likelihood and potential impact.

View term

Risikobereitschaft

The level and type of risk an organization is willing to accept in pursuit of its objectives, as formally defined by senior management or the board.

View term

Risikobereitschaft

A formal decision to acknowledge and accept the consequences of a specific risk, typically documented and approved by authorized management.

View term

Risikoberichterstattung

The process of collecting, analyzing, and communicating information about risk exposures, controls, and mitigation activities to organizational stakeholders.

View term

Risikobewertung

The process of quantifying and prioritizing risks by assigning numerical or qualitative values based on likelihood, impact, and organizational context.

View term

Risikobewertung

The process of assessing the potential impact and likelihood of identified risks to determine their significance and guide mitigation efforts.

View term

Risikomatrix

A graphical tool that maps risk likelihood and impact to prioritize mitigation and support risk management decisions.

View term

Risikopriorisierung

The process of ranking identified risks based on their likelihood, potential impact, and organizational risk appetite to inform resource allocation and response strategies.

View term

Risikoregister

A central repository listing identified organizational risks, their likelihood, impact, mitigation actions, and responsible parties, maintained as part of risk management processes.

View term

Risikotoleranz

The amount and type of risk an organization is willing to accept in pursuit of its objectives, as defined in risk management policies.

View term

Rollenmanagement

The process of defining, assigning, and controlling user roles and associated privileges within systems to enforce least privilege and separation of duties.

View term

Sanktionsbewertung

The formal process of determining and imposing financial or legal penalties for non-compliance with regulatory or contractual obligations.

View term

Schlüsselmanagement

The set of processes and mechanisms used for the secure generation, distribution, storage, rotation, and destruction of cryptographic keys throughout their lifecycle.

View term

Schwachstellenoffenlegung

The process by which security vulnerabilities are reported to the relevant organization, vendor, or public, typically following a responsible or coordinated disclosure protocol.

View term

Selbstbewertung von Kontrollen

Short for 'Control Self-Assessment'—an internal process where departments evaluate the design and effectiveness of their own controls.

View term

Sicherheitsaudit

A formal, systematic review of an organization’s information systems, controls, and procedures to verify their effectiveness and compliance with security policies and regulations.

View term

Sicherheitsaufsicht

The ongoing supervision and review of security policies, controls, and processes to ensure effective risk management and regulatory compliance.

View term

Sicherheitsbasislinie

A documented set of minimum security controls or configurations established as a standard for systems, services, or processes to ensure a consistent level of risk mitigation.

View term

Sicherheitsbewertung

A systematic evaluation of the security posture of systems, networks, and processes to identify vulnerabilities, threats, and weaknesses.

View term

Sicherheitscharta

A formal document that defines the scope, authority, and responsibilities of the security function within an organization.

View term

Sicherheitsklassifizierung

The categorization of data or assets based on sensitivity, value, and required level of protection, typically in alignment with legal, regulatory, and organizational requirements.

View term

Sicherheitslage

The overall status of an organization’s cybersecurity policies, controls, capabilities, and readiness to detect, prevent, and respond to threats.

View term

Sicherheitsschulung

Instructional activities designed to equip personnel with the knowledge and skills to recognize, prevent, and respond to cybersecurity threats and incidents.

View term

Sicherheitsstrategie

A high-level plan that defines how an organization will protect its information assets, meet regulatory obligations, and manage cybersecurity risks in alignment with business objectives.

View term

Verantwortlichkeitsrahmen

A structured set of responsibilities, roles, and processes that ensure individuals and teams are answerable for security and compliance obligations.

View term

Verhaltenskodex

A formal set of ethical and behavioral guidelines that define acceptable and unacceptable actions for personnel within an organization.

View term

Vermögensinventar

A comprehensive list of all information assets within an organization, including hardware, software, data, and supporting infrastructure, used for risk and compliance management.

View term

Vorfallmanagement

A structured process for identifying, assessing, responding to, and recovering from security incidents to minimize impact and restore normal operations promptly.

View term

Vorfallmeldung

The formal process of documenting and communicating information about detected security incidents to relevant stakeholders.

View term

Vorfallreaktion

The structured approach to managing and addressing cybersecurity incidents, with processes for detection, containment, eradication, recovery, and post-incident review.

View term

Zertifizierung von Zugriffen

A formal, periodic review process in which managers or data owners attest that users have the appropriate levels of access to systems and information according to their roles and responsibilities.

View term

Änderungskontrolle

A formal process used to ensure that all modifications to systems, processes, or documents are introduced in a controlled and coordinated manner, minimizing security and compliance risks.

View term

Überwachungsplan

A documented approach outlining processes, tools, and responsibilities for continuously observing and assessing security controls, compliance, and risk indicators within an organization.

View term
Termify Get Termify on the App Store OPEN
AI Free AI Search Source-backed aviation answers