nexalign DecisionOS logo

Glossary

Glossary

Definitions of the core Decision Infrastructure concepts in DecisionOS: decision memo, readiness score, NIS2 Art. 20, DORA ICT risk, stakeholder alignment, sovereign cloud, zero trust and more.

A

B

C

Compliance mapping

Also: Regulatory mapping, Control mapping

The explicit link between a decision (vendor, architecture, control) and the specific regulatory articles, controls or standards it satisfies. Without compliance mapping, a memo cannot be defended under audit against a named clause.

CVE

Also: Common Vulnerabilities and Exposures

Global identifier for publicly known security vulnerabilities in software and hardware. Format CVE-YYYY-NNNN, run by MITRE on behalf of CISA. More than 200,000 CVEs as of 2025.

CVSS

Also: Common Vulnerability Scoring System

Standardised scoring system for vulnerabilities with a 0-10 score. Current version CVSS v4.0 (2023). Measures Base, Temporal and Environmental Metrics. Often criticised for lack of exploitability signal.

CSPM

Also: Cloud Security Posture Management

Software category for continuous review of cloud configurations against security benchmarks (CIS, NIST, BSI cloud requirements). Finds misconfigurations like open S3 buckets, missing encryption, insecure IAM policies.

CWPP

Also: Cloud Workload Protection Platform

Software category for protecting cloud workloads (VMs, containers, serverless) at runtime. Combines vulnerability scanning, config review, runtime monitoring, container and K8s security.

CNAPP

Also: Cloud Native Application Protection Platform

Gartner platform category that combines CSPM, CWPP, CIEM, KSPM, DSPM and IaC scanning into one tool. Answer to tool fragmentation in cloud security stacks.

CASB

Also: Cloud Access Security Broker

Security layer between users and SaaS providing visibility (shadow IT discovery), data protection (DLP), compliance, and threat protection across SaaS apps. Four functions per Gartner: visibility, compliance, data security, threat protection.

Confidential Computing

Also: Trusted Execution Environment, TEE

Hardware-based isolation that keeps data encrypted during processing (data-in-use). Complements encryption at rest and in transit. Technologies: Intel SGX, Intel TDX, AMD SEV-SNP, ARM CCA, Nvidia H100 Confidential Computing.

Cyber Resilience Act (CRA)

Also: EU Cyber Resilience Act, Regulation (EU) 2024/2847, CRA

EU Regulation 2024/2847 setting horizontal cybersecurity requirements for products with digital elements. Entered into force on 10 December 2024. Main obligations apply from 11 December 2027. Reporting duties for actively exploited vulnerabilities apply from 11 September 2026.

Critical ICT Third-Party Provider (CTPP)

Also: DORA CTPP, Lead Overseer-supervised provider

ICT third-party provider designated critical by the European Commission under DORA Art. 31, falling under direct supervision of one of the three European Supervisory Authorities (EBA, EIOPA, ESMA). First CTPP designations expected in 2025/2026.

D

Decision memo

Also: Entscheidungsmemo, Decision record

A short structured document that captures why a decision was made, the options considered, the criteria and trade-offs, the stakeholders involved and the accepted risks. A good decision memo is auditable months later.

DORA ICT risk management

Also: Digital Operational Resilience Act, DORA Art. 28, ICT third-party risk

The EU Digital Operational Resilience Act regulates the operational resilience of financial entities against ICT risks, with particularly prescriptive expectations around ICT third-party risk management (Art. 28) and contractual arrangements (Art. 30).

Defensible record

Also: Audit trail, Decision of record

A single versioned artefact that captures a decision in enough structure, with enough evidence and stakeholder context, that it can be defended under audit, in a board review, or 12 months later when the original team is no longer in place.

Dealbreaker

Also: Knock-out criterion, Ausschlusskriterium

A hard requirement that immediately disqualifies an option if not met, independent of weighted scoring. Dealbreakers enforce non-negotiable constraints (EU hosting, specific certifications, data residency) and prevent weak options from winning on aggregate scores.

DORA

Also: Digital Operational Resilience Act, Regulation (EU) 2022/2554

EU regulation on digital operational resilience in the financial sector. Directly applicable since 17 January 2025. Five pillars: ICT risk management, incident management, resilience testing including TLPT, third-party governance, information sharing.

DLP

Also: Data Loss Prevention, Data Leakage Prevention

Software category for detecting and preventing unauthorised data outflow. Operates on endpoints, network and cloud. Classifies content (regex, fingerprinting, ML) and enforces policies.

DMARC / DKIM / SPF

Also: Email authentication, Email spoofing protection

Three standards that together authenticate email senders and impede spoofing. SPF authenticates the sending IP, DKIM signs the content, DMARC links both via the From header and defines the policy.

DPIA

Also: Data Protection Impact Assessment, DSFA, Datenschutz-Folgenabschätzung

Mandatory assessment under GDPR Art. 35 where processing is likely to result in high risk to the rights and freedoms of natural persons. Required e.g. for systematic evaluation, large-scale processing of special categories and systematic monitoring of public areas.

E

F

G

H

I

K

L

M

N

O

P

R

S

Stakeholder alignment

Also: Buying committee alignment, Decision alignment

The state in which every material stakeholder on a decision has a visible position (support, neutral, block), a named top concern and a documented next step. Without stakeholder alignment, decisions stall or reverse post-signature.

Stakeholder brief

Also: Persona brief, Role-specific memo view

A role-tailored summary of a decision memo written for a specific persona (CISO, CFO, CEO, COO, IT-Leitung). Each brief surfaces the criteria, risks and trade-offs that this role cares about most, without rewriting the underlying memo.

SIEM (Security Information and Event Management)

Also: Log management platform, Security analytics platform

A platform that centralises security logs, enables long-term retention, runs correlation rules and supports investigation. SIEM is the evidence layer under EDR, XDR and SOC operations and the single largest line item in most security budgets.

Sovereign cloud

Also: Souveräne Cloud, EU-sovereign cloud

A cloud deployment model that guarantees operational, legal and technical control of data and workloads within a specific jurisdiction (typically the EU). Sovereign cloud answers the concern that hyperscaler deployments remain exposed to foreign jurisdiction, primarily the US CLOUD Act.

SOC 2 Type 2

Also: Service Organization Control 2, SOC 2 Type II

Audit report by a US public accountant under AICPA SSAE 18 standard, confirming the operating effectiveness of a service organisation's controls over a period (typically 6-12 months). Refers to Trust Service Criteria.

SBOM

Also: Software Bill of Materials

Machine-readable inventory of all components in a software incl. versions, licences and dependencies. Formats: SPDX, CycloneDX, SWID. Mandatory in regulated areas; in the US driven by Executive Order 14028.

SSPM

Also: SaaS Security Posture Management

Software category for reviewing SaaS configurations (Microsoft 365, Salesforce, Google Workspace, Slack, GitHub). Finds over-privileged apps, weak sharing settings, MFA gaps, external data flows.

SASE

Also: Secure Access Service Edge

Gartner architecture category combining network (SD-WAN) and security functions (SWG, CASB, ZTNA, FWaaS, RBI) on a single cloud platform. SSE is the variant without SD-WAN.

SSE

Also: Security Service Edge

Subset of SASE without SD-WAN. Bundles SWG, CASB, ZTNA and (increasingly) DLP/RBI in a cloud platform. Stand-alone Gartner Magic Quadrant exists.

Schrems II

Also: CJEU C-311/18, Privacy Shield ruling

CJEU ruling of 16 July 2020 that invalidated the EU-US Privacy Shield and only allowed Standard Contractual Clauses (SCC) under additional safeguards. Consequence: third-country data transfers need a Transfer Impact Assessment (TIA) plus additional protective measures.

Supply Chain Risk

Also: Software Supply Chain Risk

Risks from the software and hardware supply chain: compromised open-source packages, build-pipeline attacks, updates with backdoors, sub-suppliers without audit trail. Mandatory under NIS2 Art. 21 (d) and DORA Art. 28 (sub-outsourcing).

T

V

W

X

Z