An audit log is a record of relevant actions and events that helps organizations review activity, support investigations, and demonstrate accountability.
An acceptable use policy defines the rules for how employees, contractors, or other users are allowed to use organizational systems, accounts, devices, and data.
An asset inventory is the maintained record of the systems, devices, applications, identities, and other resources an organization needs to track and protect.
Third-party risk is the security risk introduced by vendors, service providers, partners, contractors, and other outside parties that connect to the organization or handle its data.
Vendor risk management is the ongoing process of evaluating, monitoring, and reducing the security risk introduced by third-party vendors and service providers.
Control mapping is the process of linking security controls to specific risks, policies, standards, or compliance requirements they are meant to address.
Log retention is the policy and practice of keeping security-relevant logs for a defined period so they remain available for monitoring, investigation, and evidence needs.
Shadow IT is the use of technology systems, services, applications, or infrastructure outside the organization’s approved security and governance processes.
Data loss prevention is the combination of policies and controls used to reduce the chance that sensitive data is exposed, moved, or shared in ways the organization did not intend.
Security debt is the accumulated burden created when security improvements, hardening, or design cleanup are deferred and the unresolved issues continue to add risk over time.