Term Definition Applies to
Assessment (1) the process of determining whether an outcome meets the actor’s intent; or (2) an atomic process within an Evaluation used to determine a resource’s Compliance with an Assessment Requirement Layer 5
Assessment Requirement a tightly scoped, verifiable condition that must be satisfied and confirmed by an evaluator Layer 2
Audit a formal, opinionated review of an organization’s Policies and posture, conducted at a specific point in time to verify that established requirements are met Layer 7
Behavior Evaluation an opinionated observation of simulated or real-world activities Layer 5
Capability a feature or function of a system; the primary component comprising an attack surface Layer 2
Catalog a structured set of related prose and relevant metadata Layer 1
Layer 2
Layer 3
Continuous Monitoring a multi-system process designed to collect Evaluation and operational data on an ongoing basis to better detect malicious action and non-compliance, enable Remediative Enforcement, and observe trends over time Layer 7
Control (1) an organization’s ability to fully assert desired state on a system, resource, or state; or (2) a mechanism, such as a safeguard or countermeasure, that asserts desired state; or (3) prose describing the Objective and Assessment Requirements associated with a desired state Layer 2
Compliance adherence to a Rule or set of Rules  
Evaluation the manual or automated process of forming an opinion on the state of Compliance, guided by a set of Assessment Requirements Layer 5
Enforcement an action taken in response to non-compliance findings and their causes Layer 6
Evaluation Finding the evidence and opinionated result of an Assessment Layer 5
Guidance prose intended to help bring about a desired outcome for a topic or generalized scenario, based on knowledge of relevant Vectors Layer 1
Guideline atomic element of a Guidance Catalog; often includes explanatory context and recommendations for designing optimal implementations Layer 1
GRC (1) the Governance, Risk, and Compliance domain within the cybersecurity field; or (2) a coordinated program dedicated to these elements within a business unit  
Governance strategic oversight of an organization and its activities  
Intent Evaluation an Evaluation ensuring that a resource is prepared in alignment with Policy, such as through proper training, configuration, or code Layer 5
Organization any logical grouping of human, physical, virtual, and information resources such as a company, business unit, or team Layer 3
Threat a circumstance or event where the concepts of a vector are applied to a Capability in a specific context, resulting in the potential for negative impact Layer 2
Objective a unified statement of intent, which may encompass multiple situationally applicable statements or requirements Layer 2
Opinion a firmly held approximation of reality formed within the constraints of an evaluator’s philosophy, perspective, and capabilities Layer 5
Layer 6
Layer 7
Policy a clearly-scoped set of rules based on an organization’s Risk Appetite Layer 3
Preventive Enforcement any action that interrupts another process which would otherwise cause non-compliance Layer 6
Remediative Enforcement corrective action in response to non-compliance in a deployed activity Layer 6
Residual Risk the Risk remaining after Risk Mitigation and Enforcement actions have been implemented Layer 3
Risk the potential for loss or damage when a Threat is actualized, determined by calculating the impact of an event to an organization and the likelihood of its occurrence Layer 3
Risk Catalog a group of related Risks relevant to an organization; used to determine when and how Policies are created for the organization Layer 3
Risk Appetite the level of Risk an organization is willing to accept in pursuit of its objectives Layer 3
Risk Assessment the process of identifying the potential or actual Risks introduced by a system Layer 3
Risk Mitigation the process of developing actions to prevent Threats or reduce their impact on organization objectives Layer 3
Risk Acceptance a clearly documented decision to accept an unmitigated Risk as necessary or unavoidable Layer 3
Rule an active, enforceable Policy, regulation, or law Layer 1
Layer 2
Layer 3
Sensitive Activity a type of action that introduces Risk to an organization Layer 4
Vector (1) an opportunity for an attacker to exploit a vulnerability in the system; or (2) a path by which neglect could result in unintentional negative outcomes Layer 1
Vulnerability (1) a weakness in a system inherent in or associated with a Capability that can be exploited when used in unintended ways; or (2) a lack of Control or gap in defense, introduced intentionally or unintentionally, which can be leveraged to cause harm Layer 2
Layer 4

Continue Reading