Glossary

Use these terms and definitions to understand CORL's acronyms.

Acronym Term^ Definition
Asmt: Preparing Assessment Results: Preparing Summary Program Metrics Assessment Status: Assessment. For more information, see CORL Assessment Status.
Asmt: Ready Assessment Results: Ready for Review  Program Metrics Assessment Status: Remediation. For more information, see CORL Assessment Status.
  Assurance Independently validated controls by a third party (HITRUST, SOC auditors, etc.)
AOC Attestation of Compliance The AOC is a form for merchants and service providers to attest to the results of a PCI DSS assessment, as documented in the Self-Assessment Questionnaire or Report on Compliance.
BOQ Business Owner Questionnaire

Used interchangeably with the term "IRQ" Inherent Risk Questionnaire.

Cert: Vendor Certification Evidence: Awaiting vendor response Program Metrics Assessment Status: Assessment. For more information, see CORL Assessment Status.
CISO Chief Information Security Officer A qualified individual responsible for overseeing and implementing the organization’s cybersecurity program and enforcing its cybersecurity policy. The CISO has authority to ensure cybersecurity risks are appropriately managed, including the ability to direct sufficient resources to implement and maintain an effective cybersecurity program.
Complete Complete: Awaiting guidance Program Metrics Assessment Status: Remediation. For more information, see CORL Assessment Status.
Complete Complete: No action required Program Metrics Assessment Status: Remediation. For more information, see CORL Assessment Status.
CAP Corrective Action Plan A CAP outlines steps for addressing issues.
CXM Customer Experience Manager

The CORL CXM is the client’s main point of contact to discuss strategy, deliver feedback, and other business-related matters. The CXM helps ensure that the client has a successful experience with CORL.

CXMs present the Quarterly Business Review (QBR) and maintain the client’s playbook to ensure all preferences are documented.

CVR CORL Vendor Report Pre-assessment report
DRU Data Reuse Data Reuse is providing the vendor with previously answered security questions for their review, edit, and modification to current client specifics. This process can reduce turnaround time and burden on the vendor.
DSS Data Security Standard The PCI DSS designates four levels of compliance based on transaction volume.
ES Executive Summary The main CORL assessment deliverable. The first section is an “Executive Summary”, and the remaining sections dive deeply into risks and the corresponding remediation activities and time frames.
Gap: Vendor Gap Validation: Awaiting vendor response Program Metrics Assessment Status: Assessment. For more information, see CORL Assessment Status.
Gap: Processing Gap Validation: Processing vendor response Program Metrics Assessment Status: Assessment. For more information, see CORL Assessment Status.
GRC Governance, Risk, and Compliance An organization's approach for managing GRC using a suite of software tools.
  Impact The magnitude of harm that can be expected to result from the consequences of unauthorized disclosure of information, unauthorized modification of information, unauthorized destruction of information, or loss of information or information system availability. https://csrc.nist.gov/glossary/term/impact.
  Impact Rating

CORL calculates the Impact based on the volume and type of sensitive data that a vendor stores, transmits, or has access to for an organization. The Impact ranges from Very Low (Non-sensitive company data - training materials, etc.) to Very High (Regulated or Sensitive date for all patients or employees - EHR, claims system, etc.).

Impact Rating numbers are mapped as following:

  • Very Low = 2
  • Low = 4
  • Medium = 6
  • High = 8
  • Very High = 10
  Information System

A discrete set of electronic information resources organized for the collection, processing, maintenance, use, sharing, dissemination or disposition of electronic information, as well as any specialized system such as industrial/process controls systems, telephone switching and private branch exchange systems, and environmental control systems.

IRP Initial Risk Profile The IRP is a risk-ranked list of client vendors that prioritizes vendors for CORL assessment. 
IRQ Inherent Risk Questionnaire

Used interchangeably with the term “BOQ” Business Owner Questionnaire.

IRQ: Client Inherent Risk Questionnaire: Awaiting client response

Program Metrics Assessment Status: Inherent Risk Questionnaire. For more information, see CORL Assessment Status.

IRQ: Processing Inherent Risk Questionnaire: Processing client response

Program Metrics Assessment Status: Inherent Risk Questionnaire. For more information, see CORL Assessment Status.

IRQ: Ready Inherent Risk Questionnaire: Preparing Summary

Program Metrics Assessment Status: Inherent Risk Questionnaire. For more information, see CORL Assessment Status.

IVPQ Initial Vendor Profile Questionnaire The “scoping questionnaire.” The IVPQ is made up of the Vendor Profile Questionnaire and Scope tabs from the "VSQ" or Vendor Security Questionnaires. It is the first thing CORL sends to a client’s vendor to understand scope of services / products in use as well as the environment (on premise, cloud, etc.). 
  Likelihood Chance of something happening; A weighted factor based on a subjective analysis of the probability that a given threat is capable of exploiting a given vulnerability or a set of vulnerabilities. https://csrc.nist.gov/glossary/term/likelihood.
  Likelihood / CORL Confidence Score

The Likelihood Score (represented by CORL Confidence Score on an A to F scale) is based on the capabilities of a vendor to protect an organization’s data and avoid a breach.

Number ranges from 0 to 10 mapped to the A to F scale are adjusted for threshold of assessment.

MDS2 Manufacturer Disclosure Statement for Medical Device Security The MDS2 is part of the security procurement process. The MDS2 clarifies roles and responsibilities of manufacturers and healthcare delivery organizations for the upkeep and maintenance of a connected device security posture. The form is completed by the manufacturer and provided to healthcare delivery organizations upon request. For more information, see https://www.nema.org/Standards/view/Manufacturer-Disclosure-Statement-for-Medical-Device-Security
MFA Multi-Factor Authentication Authentication through verification of at least two of the following types of authentication factors:
(1) Knowledge factors, such as a password; or
(2) Possession factors, such as a token or text message on a mobile phone; or
(3) Inherence factors, such as a biometric characteristic.
NDA Non-Disclosure Agreement Non-disclosure agreements are legal contracts that prohibit someone from sharing information deemed confidential. The confidential information is defined in the agreement which includes, but not limited to, proprietary information, trade secrets, and any other details which may include personal information or events.
NDA: Vendor NDA: Awaiting vendor response Program Metrics Assessment Status: Assessment. For more information, see CORL Assessment Status.
PCI Payment Card Industry The PCI Security Standards Council (PCI SSC) is a global forum that brings together payment industry stakeholders to develop and drive adoption of data security standards and resources for safe payments worldwide.
  Penetration Testing Testing the security of information systems by attempting to circumvent or defeat the security features of an information system by attempting penetration of databases or controls from outside or inside the organization.
Pre: Preparing Pre-Assessment: Preparing Summary Program Metrics Assessment Status: Pre-Assessment. For more information, see CORL Assessment Status.
PHI Protected Health Information
PHI is any information that applies to a health condition now, in the past, or in the future. If health information includes data that would let somebody identify the patient, it is classified as PHI (18 elements total)
(1) Patient Name
(2) Patient Addresses
(3) Dates (birth, etc.)
(4) Phone Numbers
(5) Fax Numbers
(6) E-mail Addresses
(7) Social Security #s
(8) Medical Record Numbers
(9) Health Plan Beneficiary #s
(10) Account Numbers
(11) Certificate/license #s
(12) Vehicle identifiers/serial #s
(13) Device identifiers/serial #s
(14) Web URLs 
(15) IP Addresses
(16) Biometric identifiers (fingerprints, etc.)
(17) Full face/comparable photos 
(18) Other unique Identifying number, characteristic, or code
POC Point of Contact Vendors point of contact information is required for CORL to engage with and email the vendor to initiate and complete risk assessments.
  Privileged Account Any authorized user account or service account that can be used to perform security-relevant functions that ordinary users are not authorized to perform, including but not limited to the ability to add, change or remove other accounts, or make configuration changes to information systems to make them more or less secure.
PSQ Product Security Questionnaire  
QA Quality Assurance QA is a process to ensure the confidence of results.
QBR Quarterly Business Review This deliverable is presented quarterly to show progress of the assessments and overall risk reduction to the client organization.
QSA Quality Security Assessor A qualification issued by the PCI Security Standards Council.
Rem: Vendor Remediation: Awaiting vendor response Program Metrics Assessment Status: Remediation. For more information, see CORL Assessment Status.
Rem: Preparing Remediation: Preparing Summary Program Metrics Assessment Status: Remediation. For more information, see CORL Assessment Status.
Rem: Processing Remediation: Processing vendor response Program Metrics Assessment Status: Remediation. For more information, see CORL Assessment Status.
RA Risk Advisor The Risk Advisor Team is responsible for all technical reviews and knowledge of vendor assessments. They are available to answer security questions related to the CORL Assessment deliverables. The RA has knowledge of the VSQs and evidence reviews, and process documented via the Client Playbook. RAs present the QBR and serve as the CORL technical security expert.
  Risk Rating A measure of the extent to which an entity is threatened by a potential circumstance or event, and typically a function of: (i) the adverse impacts that would arise if the circumstance or event occurs; and (ii) the likelihood of occurrence https://csrc.nist.gov/glossary/term/risk.
RBAC Role-Based Access Control Role-based access control is based on a person's role within the organization. 
REM Remediation The process of correcting security risks.
RFP Request for Proposal A request for proposal (RFP) seeks out vendors and contractors that can supply a company with necessary products and services that fall outside of what the soliciting organization can provide internally. The RFP, then, is a document to source that work and allow vendors and contractors to bid for the work.
RoC Report on Compliance A PCI Report on Compliance (RoC) is an assessment that tests security controls that protect cardholder data. The report details whether the company meets all 12 requirements of the PCI DSS standard and notes any deficiencies discovered during the assessment.
  Risk Assessment The process of identifying, estimating and prioritizing cybersecurity risks to organizational operations (including mission, functions, image and reputation), organizational assets, individuals, customers, consumers, other organizations and critical infrastructure resulting from the operation of an information system. Risk assessments incorporate threat and vulnerability analyses, and consider mitigations provided by security controls planned or in place.
  Risk Rating (Qualitative) 
  • Managed: Controls are implemented and aligned with reasonable industry practice. The likelihood of a breach is minimized to a level where no remediation is necessary, and the organization should continue to maintain the controls that are in place.
  • Low: Controls are partially aligned with reasonable industry practice. Remediation is encouraged although there is a low likelihood of an immediate breach.
  • Medium: Controls are partially implemented and partially aligned with reasonable industry practice. Remediation activities should be identified and planned with corrections implemented in the near term to avoid a potential breach in the future.
  • High: Few controls are implemented and aligned with industry best practice. Remediation activities should be identified and planned with corrections implemented as soon as possible because there is a high likelihood of an imminent breach.
  • Very High: The assessment identified a vulnerability that indicates an existing or imminent breach. Incident response activities should be activated.
  Risk Rating (Quantitative)

Risk Rating = Likelihood x Impact

0 to 100 scale (0 to 10 Likelihood multiplied by 0 to 10 Impact)

0 least risky to 100 riskiest

Scope: Processing Scoping Questionnaire: Processing vendor response

Program Metrics Assessment Status: Assessment. For more information, see CORL Assessment Status.

Scope: Vendor Scoping Questionnaire: Awaiting vendor response

Program Metrics Assessment Status: Assessment. For more information, see CORL Assessment Status.

  Sector The detailed level industry that the vendor works within (e.g., Business Services – Security/Privacy, Software – Mobile Device Applications, etc.).
  Sector Group The high-level industry the vendor works within (e.g., Business Services, Software, Consulting, etc.).
Sec: Vendor Security Questionnaire: Awaiting vendor response Program Metrics Assessment Status: Assessment. For more information, see CORL Assessment Status.
Sec: Processing Security Questionnaire: Processing vendor response Program Metrics Assessment Status: Assessment. For more information, see CORL Assessment Status.
  Senior Governing Body The board of directors (or an appropriate committee thereof) or equivalent governing body or, if neither of those exist, the senior officer or officers responsible for the cybersecurity program. 
  Senior Officer The senior individual (acting collectively or as a committee) responsible for the management, operations, security, information systems, compliance and/or risk.
SLA Service Level Agreement An SLA functions as a documented understanding between the entity providing the service and the entity receiving the benefits of the service. Although traditional SLAs define service expectations between vendors and customers, they may also be employed between departments within the same organization.
SBOM Software Bill of Materials A software bill of materials is a list of components in a piece of software. Software vendors often create products by assembling open source and commercial software components. The SBOM describes the components in a product.
SDLC Software (or System)  Development Life Cycle The SDLC is a process for planning, creating, testing, and deploying an information system.
SOW Statement of Work A statement of work is the description of a project's work requirements that defines project-specific activities, deliverables, and timelines.
Terminated Complete: Terminated Program Metrics Assessment Status: Remediation. For more information, see CORL Assessment Status.
TPRM Third Party Risk Management Third-Party Risk Management (TPRM) is the process of analyzing and minimizing risks associated with outsourcing to third-party vendors or service providers.
  Threshold
  • Pre-Assessment: Review of a vendor's security practices based on publicly available information.
  • Unvalidated Information: Review of a vendor's questionnaire responses.
  • Validated Key Controls: An audit of evidence and review of third-party assurances for a subset of key controls.
  • Validated Program: An audit of evidence and review of third-party assurances for the vendor's entire security program and all key controls.
  Threshold 1
Publicly available information obtained without vendor's input (company size from the company's website) 
  Threshold 2
No evidence tested or no assurance about the response to a questionnaire completed by the vendor. 
  Threshold 3
We have assurance (tested or certification) regarding a portion of the control environment. 
  Threshold 4
We have assurance about the vendor's security program.  For some clients this is a certification, for other clients this is a certification + testing of key controls. 
  Vendor
A company that is assessed by CORL.
VPQ Vendor Profile Questionnaires
 
VRAS Vendor Risk Assessment Summary A vendor risk assessment is a questionnaire used to identify and evaluate the liability associated with buying goods and services from third parties.
VSQ Vendor Security Questionnaire  
VSRM Vendor Security Risk Management Vendor security risk management is a risk management discipline that focuses on pinpointing and mitigating risks associated with vendors.
Was this article helpful?
0 out of 0 found this helpful