Cloudy with a Chance of Acronyms
ISO Intricacies
PCI DSS: You Swipe, You Secure
IT General Controls (ITGC) Nerd Mode
Audit-Ready, Always
100

Pay-as-you-go model where providers give you virtualized hardware and you do the rest—no physical server-hugging required.

What is IaaS (Infrastructure as a Service)?

100

Documented judgments about potential threats, vulnerabilities, and impacts.

What are Risk Assessments?

100

Virtual “moat” PCI requires to protect systems storing cardholder data.

What is a Firewall Configuration? (Or segmentation)

100

These are periodic inspections of access rights with removals if no longer authorized.

What are User Access Reviews?

100

For PCI, this formal document summarizes key findings and provides recommendations.

What is the ROC? (Report on Compliance)

200

This AWS service lets you rent virtual machines—like a vending machine for servers.

What is EC2 (Elastic Compute Cloud)?

200

Document that formally outlines the organization’s intent to maintain an ISMS.

What is the Information Security Policy?

200

PCI mandates this type of testing at least annually or after significant changes to the environment.

What is Penetration Testing?

200

This principle states that no single individual should control all critical aspects of a process.

What is Segregation of Duties (SoD)?

200

These are listed in a matrix within a SOC 2 report and are assumed to be implemented by clients using the audited service—so auditors can sleep at night.

What are Complementary User Entity Controls (CUECs)?

300

This AWS feature distributes traffic across multiple targets, like a digital traffic cop.

What is Elastic Load Balancing (ELB)?

300

ISO 27001’s umbrella framework for organizing security policies and objectives.

What is the Information Security Management System (ISMS)?

300

PCI requires these tests of your defenses at least quarterly.

What are Vulnerability Scans?

300

These automated logs must be protected to prevent unauthorized alteration or deletion.

What are Audit Trails?

300

Complement to "prevent" or "preventative" controls.

What are DETECT (or detective) Controls?

400

Small, geographic chunks of cloud infrastructure help reduce latency and meet local data compliance needs.

What are Availability Zones (or Data Regions)?

400

This is a list of reference security controls for an Information Security Management System.

What is Annex A?

400

PCI’s term for the places where card data is stored, processed, or transmitted.

What is the Cardholder Data Environment (CDE)?

400

This concept evaluates whether a control remains effective despite ITGC failures.

What is control resiliency?

400

For SOC 2, this is a situation where a control did not operate as intended, but the overall objective was still met.

What is a Control Deviation?

500

When you let the cloud provider handle everything from code deployment to scaling to fault tolerance—basically serverless heaven.

What is PaaS (Platform as a Service) or Serverless Architecture?

500

ISO 27001, 27701 and 42001.

What are the 3 ISO certifications AARC-360 delivers to clients?

500

PCI’s “Control Objectives.”

What are the 12 PCI Requirements, or the dirty dozen?

500

These tools detect unusual patterns across admin accounts and elevated access permissions, specifically.

What are Privileged Access Monitoring (PAM) tools?

500

This is a formal statement from the client acknowledging its responsibility for the control environment.

What is a Management Assertion Letter (or Representation Letter) ?