<?xml version="1.0" encoding="utf-8" standalone="yes"?><feed xmlns="http://www.w3.org/2005/Atom"><title>GRC on Sinetris's viewpoints</title><id>https://sinetris.info/glossary-contexts/grc/</id><link href="https://sinetris.info/glossary-contexts/grc/index.atom.xml" rel="self" type="application/atom+xml" hreflang="en" title="GRC on Sinetris's viewpoints"/><link href="https://sinetris.info/glossary-contexts/grc/" rel="alternate" type="text/html" hreflang="en" title="GRC on Sinetris's viewpoints"/><link href="https://sinetris.info/glossary-contexts/grc/index.atom.xml" rel="alternate" type="application/atom+xml" hreflang="en" title="GRC on Sinetris's viewpoints"/><link href="https://sinetris.info/glossary-contexts/grc/index.rss.xml" rel="alternate" type="application/rss+xml" hreflang="en" title="GRC on Sinetris's viewpoints"/><subtitle>Recent content in GRC on Sinetris's viewpoints</subtitle><generator uri="https://github.com/sinetris/sine-die/">Sine Die theme for Hugo</generator><author><name>Duilio Ruggiero</name><email>duilio@sinetris.info</email></author><rights type="html">&amp;copy; 2023 - 2026, Duilio Ruggiero</rights><updated>2025-12-07T23:58:31Z</updated><entry><title>Risk Owner</title><link href="https://sinetris.info/glossary/risk-owner/" rel="alternate" type="text/html" hreflang="en" title="GRC on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/risk-owner/" type="text/html"/><published>2025-12-07T23:58:31+00:00</published><updated>2025-12-07T23:58:31Z</updated><id>https://sinetris.info/glossary/risk-owner/#atom</id><summary type="html">Person directly responsible for identifying, assessing, monitoring, reporting,
responding to, and defining intervention strategies in relation to risks associated
with an &lt;a class="glossary-term" href="/glossary/information-technology-asset/"&gt;IT asset&lt;/a&gt;.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/><category term="/contexts/grc" label="context: GRC"/></entry><entry><title>Information Technology Asset</title><link href="https://sinetris.info/glossary/information-technology-asset/" rel="alternate" type="text/html" hreflang="en" title="GRC on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/information-technology-asset/" type="text/html"/><published>2025-12-07T23:19:32+00:00</published><updated>2025-12-07T23:19:32Z</updated><id>https://sinetris.info/glossary/information-technology-asset/#atom</id><summary type="html">Hardware and software (e.g., applications, systems, virtual resources, data) that
an organization uses to support its business objectives.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/><category term="/contexts/grc" label="context: GRC"/></entry><entry><title>Access Recertification Campaigns</title><link href="https://sinetris.info/glossary/access-recertification-campaigns/" rel="alternate" type="text/html" hreflang="en" title="GRC on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/access-recertification-campaigns/" type="text/html"/><published>2025-12-01T10:25:02+00:00</published><updated>2025-12-01T10:25:02Z</updated><id>https://sinetris.info/glossary/access-recertification-campaigns/#atom</id><summary type="html">Periodic review of user &lt;a class="glossary-term" href="/glossary/entitlements/"&gt;entitlements&lt;/a&gt;
to enforce the &lt;a class="glossary-term" href="/glossary/principle-of-least-privilege/"&gt;Principle of Least Privilege&lt;/a&gt;,
ensure &lt;a class="glossary-term" href="/glossary/orphaned-account/"&gt;orphaned accounts&lt;/a&gt; are removed,
and reduce internal threats and compliance violations.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/><category term="/contexts/grc" label="context: GRC"/></entry><entry><title>Birthright Access</title><link href="https://sinetris.info/glossary/birthright-access/" rel="alternate" type="text/html" hreflang="en" title="GRC on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/birthright-access/" type="text/html"/><published>2025-11-29T15:32:02+00:00</published><updated>2025-11-29T15:32:02Z</updated><id>https://sinetris.info/glossary/birthright-access/#atom</id><summary type="html">&lt;a class="glossary-term" href="/glossary/entitlements/"&gt;Entitlements&lt;/a&gt; automatically granted to a user when
they join an organization or change roles within it.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/><category term="/contexts/grc" label="context: GRC"/></entry><entry><title>Subject Matter Expert</title><link href="https://sinetris.info/glossary/subject-matter-expert/" rel="alternate" type="text/html" hreflang="en" title="GRC on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/subject-matter-expert/" type="text/html"/><published>2025-11-24T07:28:53+00:00</published><updated>2025-11-24T07:28:53Z</updated><id>https://sinetris.info/glossary/subject-matter-expert/#atom</id><summary type="html">A professional with in-depth, specialized knowledge in a particular field, process,
or technology who acts as a trusted advisor, guiding teams, validating information,
and solving complex problems to ensure accuracy, efficiency, and successful project
outcomes.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/><category term="/contexts/grc" label="context: GRC"/><category term="/contexts/tech" label="context: Tech"/></entry><entry><title>Asset Administrator</title><link href="https://sinetris.info/glossary/asset-administrator/" rel="alternate" type="text/html" hreflang="en" title="GRC on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/asset-administrator/" type="text/html"/><published>2025-11-24T01:27:13+00:00</published><updated>2025-11-24T01:27:13Z</updated><id>https://sinetris.info/glossary/asset-administrator/#atom</id><summary type="html">Manages user roles, account assignments, and performs access reviews and audits
for an &lt;a class="glossary-term" href="/glossary/information-technology-asset/"&gt;IT asset&lt;/a&gt;.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/><category term="/contexts/grc" label="context: GRC"/></entry><entry><title>Authentication Assurance Level</title><link href="https://sinetris.info/glossary/authentication-assurance-level/" rel="alternate" type="text/html" hreflang="en" title="GRC on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/authentication-assurance-level/" type="text/html"/><published>2025-11-22T08:02:00+00:00</published><updated>2025-11-22T08:02:00Z</updated><id>https://sinetris.info/glossary/authentication-assurance-level/#atom</id><summary type="html">NIST standard to assess the degree of confidence and reliability of an authentication
process.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/><category term="/contexts/grc" label="context: GRC"/></entry><entry><title>Asset Owner</title><link href="https://sinetris.info/glossary/asset-owner/" rel="alternate" type="text/html" hreflang="en" title="GRC on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/asset-owner/" type="text/html"/><published>2025-11-22T08:01:09+00:00</published><updated>2025-11-22T08:01:09Z</updated><id>https://sinetris.info/glossary/asset-owner/#atom</id><summary type="html">Person or group responsible for an &lt;a class="glossary-term" href="/glossary/information-technology-asset/"&gt;IT asset&lt;/a&gt;.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/><category term="/contexts/grc" label="context: GRC"/></entry><entry><title>Information Technology Asset Management</title><link href="https://sinetris.info/glossary/information-technology-asset-management/" rel="alternate" type="text/html" hreflang="en" title="GRC on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/information-technology-asset-management/" type="text/html"/><published>2025-11-10T14:55:30+00:00</published><updated>2025-11-10T14:55:30Z</updated><id>https://sinetris.info/glossary/information-technology-asset-management/#atom</id><summary type="html">Systems to manage the lifecycle of &lt;a class="glossary-term" href="/glossary/information-technology-asset/"&gt;IT assets&lt;/a&gt;, including tracking, maintaining and disposing of hardware
and software.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/><category term="/contexts/grc" label="context: GRC"/></entry><entry><title>Segregation of Duties</title><link href="https://sinetris.info/glossary/segregation-of-duties/" rel="alternate" type="text/html" hreflang="en" title="GRC on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/segregation-of-duties/" type="text/html"/><published>2025-09-04T12:33:22+00:00</published><updated>2025-09-04T12:33:22Z</updated><id>https://sinetris.info/glossary/segregation-of-duties/#atom</id><summary type="html">&lt;h2 id="description"&gt;Description&lt;/h2&gt;
&lt;p&gt;Segregation of Duties (SoD) is a mechanism designed to prevent the risks of errors and fraudulent behavior by dividing the actions required to complete a task among different employees.&lt;/p&gt;
&lt;h3 id="examples"&gt;Examples&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;To prevent financial fraud: the person approving an invoice cannot be the same person who issued it.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Reason:&lt;/strong&gt; they could potentially approve and pay fraudulent invoices to themselves or a fictitious supplier.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;To prevent both fraud and errors: the software engineer that approve code changes to critical assets cannot be the same person who submitted the changes.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Reason:&lt;/strong&gt; they could miss mistakes made by them (prevent errors) or abuse the system to their own advantage (prevent fraud).&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/li&gt;
&lt;/ul&gt;</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/grc" label="context: GRC"/></entry><entry><title>Information Assurance</title><link href="https://sinetris.info/glossary/information-assurance/" rel="alternate" type="text/html" hreflang="en" title="GRC on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/information-assurance/" type="text/html"/><published>2025-03-17T10:43:09+00:00</published><updated>2025-03-17T10:43:09Z</updated><id>https://sinetris.info/glossary/information-assurance/#atom</id><summary type="html">&lt;p&gt;Information Assurance (IA) is the practice of assuring information quality and managing risks related to the use, processing, storage, and transmission of information.&lt;/p&gt;
&lt;p&gt;The 5 pillars of information assurance includes protection of the &lt;strong&gt;Confidentiality&lt;/strong&gt;, &lt;strong&gt;Integrity&lt;/strong&gt;, &lt;strong&gt;Availability&lt;/strong&gt;, &lt;strong&gt;Authenticity&lt;/strong&gt;, and &lt;strong&gt;Non-repudiation&lt;/strong&gt; of information.&lt;/p&gt;
&lt;p&gt;In IT systems, when possible, assets should be tagged/labeled with proper Information Assurance level.&lt;/p&gt;
&lt;h2 id="confidentiality"&gt;Confidentiality&lt;/h2&gt;
&lt;p&gt;The property that information is not made available or disclosed to unauthorized individuals, entities, or processes.&lt;/p&gt;</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/><category term="/contexts/grc" label="context: GRC"/><category term="/tags/compliance" label="tag: Compliance"/><category term="/tags/confidentiality" label="tag: Confidentiality"/><category term="/tags/integrity" label="tag: Integrity"/><category term="/tags/availability" label="tag: Availability"/><category term="/tags/authenticity" label="tag: Authenticity"/><category term="/tags/non-repudiation" label="tag: Non-Repudiation"/></entry><entry><title>Recovery Point Objective</title><link href="https://sinetris.info/glossary/recovery-point-objective/" rel="alternate" type="text/html" hreflang="en" title="GRC on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/recovery-point-objective/" type="text/html"/><published>2023-08-06T10:10:15+00:00</published><updated>2023-08-06T10:10:15Z</updated><id>https://sinetris.info/glossary/recovery-point-objective/#atom</id><summary type="html">Targeted duration of time between the event of failure and the point where operations resume.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/tech" label="context: Tech"/><category term="/contexts/grc" label="context: GRC"/></entry><entry><title>Recovery Time Objective</title><link href="https://sinetris.info/glossary/recovery-time-objective/" rel="alternate" type="text/html" hreflang="en" title="GRC on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/recovery-time-objective/" type="text/html"/><published>2023-08-06T10:10:15+00:00</published><updated>2023-08-06T10:10:15Z</updated><id>https://sinetris.info/glossary/recovery-time-objective/#atom</id><summary type="html">Agreed maximum time, based on risk analysis, between the failure event and the restoration of operations.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/tech" label="context: Tech"/><category term="/contexts/grc" label="context: GRC"/></entry><entry><title>Software Bill of Materials</title><link href="https://sinetris.info/glossary/software-bill-of-materials/" rel="alternate" type="text/html" hreflang="en" title="GRC on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/software-bill-of-materials/" type="text/html"/><published>2023-08-06T10:10:15+00:00</published><updated>2023-08-06T10:10:15Z</updated><id>https://sinetris.info/glossary/software-bill-of-materials/#atom</id><summary type="html">&lt;p&gt;A Software Bill of Materials (SBOM) is a comprehensive inventory of all the components,
including dependencies and related installed tools, used in a software.&lt;/p&gt;</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/tech" label="context: Tech"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/grc" label="context: GRC"/></entry></feed>