Your security and compliance glossary

All the terms you need to know when you’re trying to get compliance audit ready, fast.

Show filters

What is the NIST Cybersecurity Framework (CSF)?

NIST is a federal agency within the US Department of Commerce that creates guidelines, frameworks, and policies that support innovation in science and technology. It was created in response to Presidential Executive Order 13636, The National Institute of Standards and Technology (NIST) created a Cybersecurity Framework (CSF) in 2014. 

The NIST Cybersecurity Framework provides guidance to organizations on how to mitigate, handle, and monitor security threats. Only federal agencies and their vendors, contractors, and partners are mandated to comply with NIST CSF. 

Many private organizations voluntarily implement NIST CSF principles into their compliance and security programs. Self-attestation does not require an audit, and there is no accrediting body that awards certificates for compliance. 

NIST CSF is based on five core functions intended to holistically safeguard organizations from security risks. 

  • Identify: Develop an understanding of possible security risks as they relate to a company’s people, processes, and technology.

  • Protect: Establish cybersecurity protocols and principles that actively and passively defend a company’s infrastructure from security breaches.

  • Detect: Continuously monitor a company’s infrastructure for anomalous events, malicious activity, and system weaknesses.

  • Respond: Ensure a proper response strategy that effectively eliminates a security threat while also keeping company production on track.
  • Recover: Maintain the integrity of all systems so that a company’s people, processes, and technologies can return to a stronger, more efficient state of operations.

{{cta_simple3="/cta-modules"}}

Additional resources you might like:

Security
Blog
Beyond security theater: How automated trust closes the AI readiness gap

AI risks are accelerating, but manual compliance can’t keep up.

ISO 27001
Blog
The Australian startups guide to ISO 27001

Understand the benefits, steps to certification, and how Vanta simplifies the journey.

SOC 2
Blog
What is SOC 2 and why Australian startups need it

SOC 2 for Aussie startups.

Additional resources you might like:

Security
Blog
Beyond security theater: How automated trust closes the AI readiness gap

AI risks are accelerating, but manual compliance can’t keep up.

ISO 27001
Blog
The Australian startups guide to ISO 27001

Understand the benefits, steps to certification, and how Vanta simplifies the journey.

SOC 2
Blog
What is SOC 2 and why Australian startups need it

SOC 2 for Aussie startups.

Compliance
Events
3 Steps to Kick Off First-Time Compliance in 2026

Join us for a session on how to make compliance work at your pace, without slowing momentum, stalling deals, or putting revenue at risk.

Vendor Risk Management
Events
Office Hour: Transform how you manage third-party and internal risk

Join us for a live, interactive Office Hour as we dive deeper into Vanta’s vision for unified, continuous, AI-powered risk management, and what it means for your business today.

Compliance
Events
Live Demo: Accelerate Security and Compliance Workflows with AI

Join us for a live demo to see how Vanta AI streamlines your security and compliance workflows.

SOC 2
Events
Live Demo: Automating SOC 2, ISO 27001 & More with Vanta

Join our demo to see how leading startups and security teams are automating compliance across 35+ frameworks, including SOC 2, ISO 27001, and HIPAA.

Compliance
Events
Navigating Fintech Compliance in an Evolving Regulatory Landscape

Watch on-demand to hear from Vanta and Codat on how to future-proof your fintech’s compliance strategy and transform it into a competitive advantage. 

Comparisons and reviews
Blog
Why enterprise leaders choose Vanta over Drata to prove and manage trust

Learn how Vanta is uniquely equipped to meet the needs of large, complex organizations.