Terminology
Several unique terms are used in IBM Cloud® Security and Compliance Center Workload Protection.
- Control
-
A control identifies a potential issue or violation within the environment and the solution to remediate the situation.
A control describes a rule, the code that is run to evaluate it, and a remediation playbook to fix the violation that might be detected. Different types of controls are used to address business, security, compliance, and operational requirements. For more information, see Posture controls.
- Policy
-
A policy is a group of business, security, compliance, and operations requirements that represent a compliance standard (for example, PCI 3.2.1), benchmark (for example, CIS Kubernetes 1.5.1) or business policy (for example, My corporation policy v1).
A policy includes one or more controls to define a compliance standard, a benchmark, or a business policy.
Policies can be reviewed and new policies created.
- Requirement
-
A requirement includes 1 or more controls.
A requirement exists in a policy and represents a section within the policy that is familiar to compliance officers and auditors.
- Requirement group
-
A requirement group defines the hierarchy and structure of controls in a policy. A requirement group consolidates one or more individual requirements within a policy.
- Risk acceptance
-
Risk acceptance is the ability to review a violation or vulnerability and acknowledge it without remediating it. Risk acceptance allows the policy to pass evaluation with the existing violation or vulnerability for a defined period of time.
- Zone
-
A zone is a group of resources that are associated with a customer's business. Zones are defined by a collection of scopes or resource types.