CSPM Definitions

CSPM Definitions

Here you can find all the terminology used in CSPM:

  • Address Details - The ‘Address Details’ section within CSPM allows you to log any address details of your organisation.

  • CE - CE is an acronym for Cyber Essentials. Cyber Essentials is a government backed scheme aimed at helping organisations to protect themselves against the most common types of cyber attacks. CE states the basic controls an organisation should have in place to mitigate the risk from common cyber threats.

  • Contributor - A contributor is an organisation that is submitting data to Pervade for cyber security accreditation.

  • CSPM - CPSM, the name of this application, is an acronym for Cyber Security Policy Monitor.

  • Event - An event is a collection of tasks which support your organisations Cyber Security processes. Events can be considered task workflows, organised according to best practices for the type of process you would like your organisation to undertake.

  • Event Group - Event groups are sets of related events that can be easily generated in one click. Where all events in an event group are complete, your organisation will have increased assurance in Cyber Security processes.

  • Event Schedule - Your event schedule is a customisable itinerary which you can add events to. These events can be scheduled for particular dates in the future and can be assigned a repeat frequency.

  • External Partner - External Partners can be any organisation which your organisation works closely with or any organisation whose performance your organisation is concerned with or affected by.

  • HIPAA - HIPAA is a type of US security regulatory standard

  • IASME - IASME is an acronym for Information Assurance for Small and Medium Enterprises Consortium. IASME is a certifying body who assesses organisations on both their cyber security and counter fraud processes.

  • Location Details - The ‘Location Details’ section within CSPM allows you to enter more specific details of each address you have recorded, including location name, location description and office description. For example, if you wanted to specify and record particular department groups within one address.

  • KPI - KPI stands for ‘Key Performance Indicator’ and is a quantifiable measure of performance over time. In CSPM, we use the KPI dashboard to give a graphical overview of how your organisation is performing with tasks over time so that you can quickly gauge progress.

  • Organisation Details - The ‘Organisation Details’ section within CSPM allows you to record the name, employee count, home-worker count, annual revenue, registration number and website for your organisation.

  • Pervade - Pervade is the name of the global software provider of dedicated compliance tracking software with monitoring & reporting capabilities.

  • Plan/Process - A Plan is a group of Events.

  • Qualys - Qualys is a cloud-based solution that detects vulnerabilities on all networked assets, including servers, network devices (e.g. routers, switches, firewalls, etc.), peripherals (such as IP-based printers or fax machines) and workstations. Qualys can assess any device that has an IP address.

  • Requirements - These are the actions or steps that need to be taken to complete a task.

  • Task - Tasks are processes that will train you and help you set up your information security and policies.

  • Task Input - These are resources that may be helpful to reference in the completion of a task.

  • Task Output - This is the evidence that is expected the demonstrate task completion.

 

Related content