General Terms
Compliance
Security
Risk
100

This is applied to requirements, an activity that makes a 1:1 comparison between one requirement and another to determine if they're related.

What is Crosswalk

100

Set of related requirements, guidelines, or standards intended to influence the governance of an organization.

What is Program

100

This is a security principle that data or systems should only be accessed by those who are authorized.

What is Confidentiality

100

These are a collection of activities intended to identify risks including their likelihood and impact on the organization if realized.

What is a Risk Assessment
200

This is documentation owned by an auditor as evidence of how an audit was performed, the evidence collected upon which evaluation is based, and comprises both the current and permanent audit file.

What is working papers.

200

This is an independent test of our compliance against specific requirements, demonstrated by our controls and the evidence presented in our defense.

What is an Audit

200

This is a security principle that data or systems can be accessed when needed.

What is Availability.

200

This is a documented inventory of an organization's known risks.

What is a Risk Register

300

This is the effort and evaluation a reasonable person makes to ensure successful outcomes.

What is Due Diligence

300

This is substantiation provided to an auditor that demonstrates our compliance with requirements.  Can take many forms (observation, testing, walkthroughs) but is more often than not some type of file (screenshot, video, pdf, log file, etc.).

What is Evidence

300

This is a security principle that data or systems exist in an unaltered, trustworthy state.

What is integrity

300

Avoid, Accept, Transfer, and Mitigate are all examples of...

What is (Risk) Response or Treatment

400

These are activities intended to assess a current and future state between two objectives.  Can be applied to a number of use cases.

What is Gap Analysis

400

These are activities, processes, procedures, technologies, written and implemented to 1) satisfy program requirements, and 2) mitigate risk.

What is a Control
400

This is a security principle that defeats Availability - the absence of data, resources, or systems at the time of access.

What is a Destruction

400

The maximum amount of risk variance management is willing to accept on behalf of an organization.

What is Risk Tolerance 

500

This is the practice of implementing what was determined as part of the due diligence effort.

What is Due Care

500

These are guidelines, standards, criteria, sometimes called controls, can be either normative or prescriptive - essentially a collection of obligations or expectations set forth in a program.

What is a Requirement

500

This is a security principle that defeats Confidentiality - the unauthorized distribution of otherwise protected data.

What is a Disclosure

500

This is the amount of risk management is willing to accept on behalf of an organization.

What is a Risk Appetite

M
e
n
u