Glossary

GRC, TPRM, and AI safety — defined plainly.

116+ terms across third-party risk, compliance, audit integrity, and AI safety. Maintained by the Thirdsentry team — written for practitioners, not consultants.

A
9

Access Control

Security

Policies and mechanisms regulating who can view or use which resources. Foundational for both internal security and the vendor access lifecycle.

Adaptive Confidence Scoring

AI & Safety

ThirdSentry's confidence model that only penalizes dimensions where the organization actually has data — never phantom-penalizing for empty or inactive capabilities.

AI Governance

AI & Safety

The discipline of inventorying, tiering, monitoring, and controlling AI use within an organization. Includes risk classification, model selection oversight, change management, and incident response — analogous to GRC for AI systems.

AI Hallucination

AI & Safety

When an AI model generates a confident-sounding answer that is factually incorrect or fabricated. Mitigated through RAG (grounding answers in real evidence), citations (showing the source for every claim), and confidence scoring (flagging low-confidence answers for review).

AI Use Case Inventory

AI & Safety

A registry of every AI use case in an organization with its risk tier, attached policies, and approval status. Required by emerging AI governance standards and increasingly by enterprise procurement teams.

Assessed Posture

ThirdSentry Concepts

A vendor's reported security posture as captured through completed security questionnaires, supporting evidence, and reviewer-validated responses. The second of the three layers in ThirdSentry's vendor scoring model.

Asset Inventory

Foundational

A maintained list of an organization's hardware, software, data, and third-party services. Foundational for both internal control monitoring and vendor risk programs.

AuditLog

Audit & Integrity

An append-only record of every mutation performed in a system, including the actor, timestamp, action, and (for AI systems) the tool called. ThirdSentry writes an AuditLog row on every change, including every Effy AI tool call.

AUDITOR Role

Audit & Integrity

ThirdSentry's read-only role enforced at the database layer (not just UI permissions). An AUDITOR can view, comment, and submit reviews — but cannot edit any record, accidentally or otherwise.

B
3

Background Screening

Assessment

Pre-engagement checks on a vendor's reputation, ownership, financial stability, and regulatory standing. Increasingly automated through vendor intelligence services.

Business Continuity Plan (BCP)

Resilience

A documented strategy for maintaining business operations during disruption — including responses to vendor failures and other third-party incidents.

Business Impact Analysis (BIA)

Resilience

An assessment of which business functions are critical and what dependencies — including third parties — they rely on. Drives RTO/RPO targets and continuity priorities.

C
15

CAIQ (Consensus Assessments Initiative Questionnaire)

Assessment

A vendor security questionnaire from the Cloud Security Alliance specifically designed for cloud service providers. Aligned to the CSA Cloud Controls Matrix.

Cascading Risk

Risk

Risk that propagates from a single fourth-party incident to multiple of your vendors and ultimately to your business processes. Visualization tools map the dependency graph so the blast radius is visible before an incident.

Certification and Accreditation

Compliance

Formal third-party evaluation that attests to compliance with a standard or framework — examples include SOC 2, ISO 27001 certification, and HITRUST validation.

CIS Controls v8.1

Frameworks & Regulations

Center for Internet Security Critical Security Controls — a prioritized, defense-in-depth control set widely adopted as a starting baseline for security programs.

Citation

AI & Safety

A reference to the specific source (policy, control, evidence file) an AI used to draft an answer. Inline citations make AI-drafted responses verifiable by a reviewer and defensible to an auditor.

Cloud Security Posture Management (CSPM)

Security

Tools and practices that continuously assess cloud-environment configurations against security baselines and best practices.

Compliance Audit

Assessment

A formal evaluation determining whether an organization or vendor adheres to a specified regulation, framework, or contractual requirement. Conducted by internal or external auditors.

Compliance Calendar

Lifecycle

A scheduling view of recurring compliance obligations — control reviews, framework audits, vendor reassessments, and policy refresh cycles.

Concentration Risk

Risk

Risk arising from over-reliance on a small number of vendors or sub-processors. Common pattern: many of your vendors all depend on the same fourth-party (e.g., a major cloud provider), turning their concentration into your concentration.

Confidence Score

AI & Safety

A numeric or qualitative measure of how strongly an AI-generated answer is supported by retrieved evidence. Low-confidence answers are flagged for closer reviewer attention rather than auto-approved.

Configuration Management

Security

Process for establishing and maintaining the configuration of systems and applications consistent with policy and baseline expectations.

Continuous Control Monitoring

Assessment

Automated, ongoing verification that controls are operating effectively — replacing or supplementing periodic manual audits. Generates evidence and triggers alerts when control health degrades.

Continuous Monitoring

Assessment

Ongoing observation of a vendor's security posture and operational status throughout the relationship — distinct from point-in-time assessments performed at onboarding or annual review.

Cross-Framework Control Mapping

Frameworks & Regulations

The practice of correlating equivalent controls across different frameworks (e.g., SOC 2 CC6.1 maps to ISO 27001 A.5.18) so that a single control answer satisfies overlapping requirements. Reduces evidence collection across multi-framework audit cycles.

Cyber Insurance

Risk

Insurance covering financial loss from cyber events including breaches, ransomware, and certain third-party incidents. Insurers increasingly require evidence of vendor risk programs as part of underwriting.

D
7

Data Breach Notification

Compliance

A legal or contractual obligation to notify affected parties (and often regulators) when personal data is exposed. Notification timelines vary by jurisdiction — GDPR is 72 hours; many U.S. state laws are similar.

Data Classification

Security

Labeling data by sensitivity (e.g., Public, Internal, Confidential, Restricted) so appropriate controls can be applied automatically and consistently.

Data Encryption

Security

Encoding data so only authorized parties can read it. Required at rest and in transit for any sensitive information across nearly all modern compliance frameworks.

Data Governance

Compliance

Policies and processes ensuring data is managed consistently across its lifecycle — including ownership, quality, access, retention, and third-party sharing.

Data Loss Prevention (DLP)

Security

Technical and policy controls preventing unauthorized exfiltration, sharing, or accidental disclosure of sensitive data.

Data Processing Agreement (DPA)

Contracts

A contract between a data controller and processor specifying processing scope, sub-processor management, security requirements, and breach notification obligations. Required by GDPR Article 28.

Disaster Recovery (DR)

Resilience

Policies, tools, and procedures for recovering or continuing technology infrastructure after a disruptive event.

E
9

Effy AI

ThirdSentry Concepts

ThirdSentry's AI assistant — twelve specialist agents across GRC and TPRM that draft policies, reconcile vendor signals, answer questionnaires with cited evidence, and route decisions to human reviewers. Tenant-isolated by architecture; every tool call is audit-logged.

Endpoint Detection and Response (EDR)

Security

Tooling that monitors endpoint devices for suspicious activity and provides investigation and response capabilities.

Enterprise Risk Management (ERM)

Compliance

An organization-wide approach to identifying, assessing, and managing risks across all categories — strategic, operational, financial, compliance, and third-party.

EU AI Act

AI & Safety

European Union regulation classifying AI systems by risk level (unacceptable, high, limited, minimal) with corresponding obligations. Limited-risk AI systems must disclose AI involvement; high-risk systems require conformity assessments.

Evidence Collection

Assessment

Gathering and validating documentation that proves a vendor or control is operating as claimed — certifications, screenshots, configuration exports, pen-test reports.

Evidence Vault

Audit & Integrity

A centralized, indexed repository of compliance artifacts (policies, certifications, pen-test reports, screenshots) linked to the controls and assessments they support. ThirdSentry's evidence vault is tenant-scoped and indexed for AI retrieval.

Examiner-Defensible

Audit & Integrity

An architecture or workflow that can withstand scrutiny from a regulatory examiner — not just an auditor. Stronger standard than 'audit-ready' because examiners often request raw data and process evidence rather than summaries.

Extended Detection and Response (XDR)

Security

Security platform integrating data across endpoints, network, identity, and cloud to detect and respond to threats holistically rather than per-tool.

External Attack Surface

Security

All externally reachable assets, services, and entry points an attacker could probe — including those exposed by vendors. Continuously monitored to detect new exposure quickly.

F
4

Federated Identity Management

Security

An arrangement where multiple organizations trust each other's authentication assertions, enabling users to access partner systems without separate credentials.

FedRAMP

Frameworks & Regulations

Federal Risk and Authorization Management Program — U.S. government program providing a standardized approach to security assessment, authorization, and continuous monitoring for cloud products used by federal agencies.

FFIEC

Frameworks & Regulations

Federal Financial Institutions Examination Council — issues guidance on cybersecurity, third-party risk management, and authentication for U.S. financial institutions. The FFIEC IT Handbook is a primary reference for bank examiners.

Fourth-Party Risk

Risk

Risk from your vendor's vendors (sub-processors). Often invisible to the contracting organization but a primary source of cascading and concentration risk.

G
3

GDPR

Frameworks & Regulations

EU General Data Protection Regulation. Governs the processing of personal data of EU residents, including specific obligations on data processors and sub-processors via Article 28.

GLBA

Frameworks & Regulations

Gramm-Leach-Bliley Act — U.S. law requiring financial institutions to safeguard customer information and explain their information-sharing practices. The Safeguards Rule includes vendor management requirements.

Governance, Risk, and Compliance (GRC)

Foundational

An integrated discipline covering corporate governance, enterprise risk management, and regulatory compliance. In modern platforms, internal GRC and TPRM increasingly run on a unified data model.

H
3

HIPAA Security Rule

Frameworks & Regulations

U.S. Health Insurance Portability and Accountability Act administrative simplification provisions covering the protection of electronic Protected Health Information (ePHI). Applies to covered entities and their business associates.

HITRUST CSF

Frameworks & Regulations

Health Information Trust Alliance Common Security Framework. A certifiable framework that maps to multiple healthcare regulations and standards, popular among healthcare service providers.

Human-in-the-Loop

AI & Safety

An AI workflow design where a human reviewer must approve, edit, or reject an AI-generated artifact before it ships. ThirdSentry applies this on every drafted policy, scored assessment, and outbound questionnaire response.

I
11

Identity Provider (IdP)

Security

A service that authenticates users and issues identity assertions to other applications. Foundational for SSO and federated access architectures.

Immutable PolicyVersion

Audit & Integrity

When a policy is published, ThirdSentry creates a PolicyVersion record that cannot be modified. Drafts and approved-but-unpublished content are kept separate so an auditor can see exactly what was published, when, and by whom.

Incident Response Plan

Resilience

A documented playbook for detecting, responding to, and recovering from security incidents — including incidents involving vendors and sub-processors.

Information Security Policy

Foundational

A documented set of rules governing how an organization protects its information assets — including requirements for vendors and other third parties handling sensitive data.

Inherent Risk

Risk

The level of risk that exists before any controls or mitigating factors are applied. For vendors, the baseline risk implied by the data and access scope they have, before evaluating their security measures.

Insider Threat

Risk

Risk posed by individuals inside the organization or vendor with privileged access who may misuse it. Mitigated through access controls, monitoring, and least-privilege policies.

Insider Threat Program

Security

A coordinated set of policies, monitoring, and response procedures aimed at detecting and mitigating risk from individuals with authorized access.

Internal Assessment Engine

Assessment

A workflow that runs structured questionnaires against the organization's own controls (rather than against vendors). AI-scored, reviewer-validated, and automatically generates risks and remediation tasks for failed controls.

ISO 27001:2022

Frameworks & Regulations

International standard for Information Security Management Systems (ISMS). The 2022 revision introduces 11 new controls (including threat intelligence, secure coding, and cloud security) and reorganizes the Annex A control set.

ISO/IEC 42001

AI & Safety

International standard for AI Management Systems. Establishes requirements for governing AI systems across their lifecycle — model selection, change management, performance monitoring, and incident response.

IT General Controls (ITGC)

Compliance

Foundational IT controls covering access management, change management, system operations, and computer-operations practices. Frequently in scope for SOC 2 and financial-statement audits.

J
1

Just-in-Time (JIT) Access

Security

Granting privileged access only when needed and for a limited duration, then automatically revoking it. Reduces standing privilege as an attack surface.

K
1

Key Risk Indicator (KRI)

Risk

A measurable signal that provides early warning of increasing risk exposure — for example, a vendor's certificate expiring, patch backlog growing, or assessed posture diverging from live exposure.

L
2

Legal Liability

Contracts

Contractual or regulatory consequences a party may face for failing to meet obligations — typically defined and capped through indemnification, limitation-of-liability, and insurance clauses.

Live External Exposure

ThirdSentry Concepts

Real-time, externally observable security posture of a vendor — including exposed services, certificate health, patch hygiene, and known incidents. One of the three layers in ThirdSentry's vendor scoring model.

M
2

Managed Security Service Provider (MSSP)

Security

A third-party provider delivering ongoing cybersecurity monitoring, detection, and response — frequently for organizations without large in-house security teams.

Multi-Factor Authentication (MFA)

Security

Authentication requiring two or more independent verification factors — typically something you know (password) plus something you have (token) or are (biometric).

N
6

NIST AI Risk Management Framework (AI RMF)

AI & Safety

A voluntary framework from the U.S. National Institute of Standards and Technology for managing AI risk across four functions: Govern, Map, Measure, and Manage. Increasingly referenced in U.S. AI procurement and audit contexts.

NIST CSF 2.0

Frameworks & Regulations

National Institute of Standards and Technology Cybersecurity Framework. Version 2.0 (released 2024) added Govern as a sixth function alongside Identify, Protect, Detect, Respond, and Recover.

NIST SP 800-53 Rev 5

Frameworks & Regulations

U.S. federal control catalog with 298 controls covering security and privacy. Used for FedRAMP, FISMA, and many regulated-industry programs as the canonical control library.

Non-Disclosure Agreement (NDA)

Contracts

A contract restricting disclosure of confidential information shared between parties. Often a prerequisite to receiving sensitive evidence (pen-test reports, SOC 2 Type II) from a vendor.

NYDFS 23 NYCRR Part 500

Frameworks & Regulations

New York Department of Financial Services cybersecurity regulation requiring covered financial institutions to maintain a cybersecurity program, including third-party service-provider controls and CISO accountability.

NYSDOH 10 NYCRR 405.46

Frameworks & Regulations

New York State Department of Health regulation establishing cybersecurity program requirements for hospitals — including risk assessments, multi-factor authentication, and incident response capabilities.

O
2

OECD AI Principles

AI & Safety

International principles for trustworthy AI: inclusive growth, human-centred values, transparency, robustness, and accountability. Endorsed by 40+ countries and increasingly cited in AI procurement contracts.

Operational Risk

Risk

Risk arising from inadequate or failed internal processes, people, or systems — including the operational risk introduced by vendor dependencies.

P
5

Patch Management

Security

Process for applying security updates and patches to systems and applications on a defined cadence. Patch hygiene is one of the most common signals in vendor external-exposure scoring.

PCI DSS v4.0.1

Frameworks & Regulations

Payment Card Industry Data Security Standard. The 4.0 release added customized validation, expanded MFA requirements, and tightened web-application security controls.

Penetration Testing

Assessment

A simulated attack against systems or applications to identify exploitable vulnerabilities. Often required as evidence in vendor security reviews and many regulatory frameworks.

Posture Divergence Detection

ThirdSentry Concepts

ThirdSentry's GTM-defining capability. Continuously compares each vendor's assessed posture (questionnaire-based) against live external exposure (continuous monitoring). When the gap exceeds threshold, severity is tiered Minor / Moderate / Severe, the parent risk record is updated, and a remediation task is generated automatically.

Posture Drift

ThirdSentry Concepts

A measurable change in a vendor's posture between two points in time, typically detected through continuous external monitoring. Drift can be temporary (e.g., a brief misconfiguration) or material (e.g., an exposed service that persists), with severity tiering applied before alerts fire.

R
8

Remediation Lifecycle

Lifecycle

The end-to-end workflow for resolving an identified risk or control failure: assignment, ownership, target date, status updates, and closure verification with evidence.

Residual Risk

Risk

The risk that remains after controls have been applied. Represents what the organization or vendor relationship still exposes you to despite the security measures in place.

Retrieval-Augmented Generation (RAG)

AI & Safety

An AI architecture that retrieves relevant documents from a tenant-scoped knowledge base and includes them in the model prompt, so generated answers are grounded in real data and can cite their sources. Reduces hallucination and improves auditability.

Reviewer Override

AI & Safety

A reviewer's authoritative decision that supersedes an AI-generated score or recommendation. The original AI output is preserved alongside the override so the reasoning trail is complete.

Right to Audit

Contracts

A contractual clause permitting the customer to audit the vendor's controls, processes, and security measures. Frequency, scope, and notice provisions vary by contract.

Risk Appetite

Risk

The amount and type of risk an organization is willing to accept in pursuit of its objectives. Drives both vendor selection thresholds and ongoing-monitoring sensitivity.

Risk Register

Risk

A documented inventory of identified risks, their assessment, ownership, and treatment plans. ThirdSentry's risk register tracks both internal and vendor risks on the same data model.

Risk Scoring

Risk

A methodology for quantifying risk on a numeric or categorical scale to enable prioritization and comparison across vendors, controls, or assessments.

S
11

Security Information and Event Management (SIEM)

Security

A platform that collects, correlates, and analyzes log data across systems to detect security events and support incident investigation.

Security Questionnaire

Assessment

A standardized set of questions used to assess a vendor's security posture, controls, and practices. Common formats include SIG, SIG Lite, CAIQ, and custom enterprise questionnaires.

Service Level Agreement (SLA)

Contracts

A contractual commitment to specified service levels — uptime, response time, support hours, recovery time objectives. Breach typically triggers remedies or service credits.

SIG (Standardized Information Gathering)

Assessment

A questionnaire developed by Shared Assessments covering 18 risk-control areas. SIG Core is the comprehensive form; SIG Lite is a shorter screening version. Widely used in enterprise vendor security review.

Single Point of Failure (SPOF)

Risk

A component whose failure would disrupt the entire system. In TPRM, identifying critical vendor dependencies that lack alternatives.

Single Sign-On (SSO)

Security

Authentication mechanism that lets a user sign in once to access multiple applications. Centralizes credential management and enables consistent access policy enforcement.

SOC 2

Frameworks & Regulations

Service Organization Control 2 — an AICPA auditing standard that evaluates a service organization's controls across the five Trust Services Criteria (Security, Availability, Processing Integrity, Confidentiality, Privacy). Type I evaluates control design; Type II evaluates operating effectiveness over a period.

Soft Delete

Audit & Integrity

A deletion approach that marks a record as deleted (e.g., setting `isDeleted: true`) rather than removing it from the database. Preserves the audit trail and enables recovery — required for any record with audit significance.

Specialist Agent

ThirdSentry Concepts

An AI agent scoped to a single domain (vendor, policy, risk, evidence, etc.) with its own tool set, rather than a general-purpose chatbot. ThirdSentry's Effy assistant uses twelve specialist agents routed by a classifier so the right specialist handles each request.

Sub-Processor

Contracts

A vendor's vendor — a third party engaged by your direct vendor to process data on their behalf. GDPR Article 28 requires disclosure and prior approval. In risk terms, a sub-processor is your fourth party.

Subcontractor Insights

ThirdSentry Concepts

Visibility into fourth-party (sub-processor) dependencies across your vendor base. Surfaces concentration risk (when many vendors rely on the same sub-processor) and cascading risk (when a fourth-party incident affects multiple of your vendors).

T
5

Tenant Isolation

Audit & Integrity

An architectural property where one customer's data is fully separated from another's at every layer — database queries, vector retrieval, AI tool calls. ThirdSentry enforces tenant isolation server-side via context variables, so the LLM cannot supply or override the org_id.

Tenant-Scoped Vector Embeddings

AI & Safety

Numerical representations of your organization's documents stored in a vector index that is filtered to your organization at query time. Ensures the AI never retrieves another customer's data, regardless of how the model is prompted.

Third-Party Risk Management (TPRM)

Foundational

The discipline of identifying, assessing, monitoring, and controlling risks introduced by external parties — vendors, suppliers, contractors, service providers, and the sub-processors those parties depend on.

Three-Layer Risk Model

ThirdSentry Concepts

A vendor scoring approach that evaluates three independent dimensions: (1) business criticality assigned at onboarding, (2) assessed posture from completed questionnaires, and (3) live external exposure from continuous monitoring. The composite score plus per-layer breakdown gives reviewers full context.

Trust Center

Lifecycle

A public-facing portal where an organization shares its security posture, certifications, sub-processor list, and policies with prospects and customers. Reduces inbound questionnaire burden.

V
7

Vendor Dual-Signal Risk Intelligence

ThirdSentry Concepts

ThirdSentry's three-layer vendor risk model combining business criticality, assessed posture, and live external exposure. Replaces single-signal (questionnaire-only or scorecard-only) approaches with a unified score across both internal and external sources.

Vendor Due Diligence

Assessment

Comprehensive evaluation of a potential vendor before contracting — including security posture, financial stability, regulatory standing, and operational maturity.

Vendor Intelligence

ThirdSentry Concepts

Auto-enriched vendor profiles combining funding, ownership, headcount, tech stack, news events, and security incidents — refreshed continuously from multiple data sources. Replaces manual vendor research with a maintained, cited record per vendor.

Vendor Lifecycle Management

Lifecycle

End-to-end management of a vendor relationship from sourcing and onboarding through monitoring, renewal, and offboarding.

Vendor Offboarding

Lifecycle

Formal process of terminating a vendor relationship — revoking access, retrieving or destroying data, closing accounts, and ensuring continuity of dependent operations.

Vendor Risk Management Program

Foundational

A structured approach to identifying, assessing, mitigating, and monitoring risks from vendors and other third parties across the relationship lifecycle.

Vendor Tiering

Assessment

Categorizing vendors into risk levels based on data sensitivity, service criticality, and integration depth. Determines the depth of due diligence and frequency of ongoing review.

Z
2

Zero Trust Architecture (ZTA)

Security

A security model that assumes no implicit trust based on network location. Every request is authenticated, authorized, and encrypted regardless of origin.

Zero-Day Exploit

Security

A vulnerability exploited before a patch is available. Material zero-days affecting vendor systems often appear as posture divergence events before the vendor formally discloses.

Missing a term you'd like defined?

We maintain this glossary actively. Send a suggestion and we'll add it.