# Glossary

This glossary explains key terms used in Sprinto’s **Monitors** section. It includes technical concepts, compliance-related actions, and terminology specific to Sprinto workflows.

<table data-header-hidden><thead><tr><th width="219.69921875"></th><th></th></tr></thead><tbody><tr><td><strong>Term</strong></td><td><strong>Definition</strong></td></tr><tr><td><strong>Monitor</strong></td><td>A compliance check that validates a control, either automatically or manually.</td></tr><tr><td><strong>Workflow Check</strong></td><td>A manual compliance control that requires human verification or evidence upload.</td></tr><tr><td><strong>Failing</strong></td><td>The monitor is not compliant with the control’s expected configuration or policy.</td></tr><tr><td><strong>Passing</strong></td><td>The monitor is compliant with the expected control and requires no action.</td></tr><tr><td><strong>Pending Evidence</strong></td><td>The monitor requires uploaded documentation to confirm compliance.</td></tr><tr><td><strong>Not in Scope</strong></td><td>A user or asset has been marked as out of the control’s applicability.</td></tr><tr><td><strong>Mark as Resolved</strong></td><td>The action used to manually confirm that a failing monitor has been addressed.</td></tr><tr><td><strong>Dr. Sprinto</strong></td><td>A device-level agent used to monitor endpoint compliance (e.g., screen lock, OS updates).</td></tr><tr><td><strong>Decisioning</strong></td><td>The process of marking users or resources as in-scope or excluded from checks.</td></tr><tr><td><strong>Employee Portal</strong></td><td>A user-facing interface for completing tasks like device health reports or confirming compliance actions.</td></tr><tr><td><strong>Evidence Upload</strong></td><td>The process of submitting screenshots, documents, or exports to prove compliance.</td></tr><tr><td><strong>Root User</strong></td><td>A superuser account on platforms like AWS or GitHub that requires strict controls (e.g., MFA).</td></tr><tr><td><strong>Critical System</strong></td><td>A system with access to sensitive data or infrastructure, subject to stricter controls.</td></tr><tr><td><strong>Point-in-Time Recovery (PITR)</strong></td><td>A backup method that allows restoring data to a specific time in the past.</td></tr><tr><td><strong>Access Review</strong></td><td>A review of user permissions to ensure access is aligned with roles and responsibilities.</td></tr><tr><td><strong>Screen Lock Enforcement</strong></td><td>A system policy requiring automatic screen lock after a period of inactivity.</td></tr><tr><td><strong>Branch Protection Rule</strong></td><td>A source control rule that prevents direct changes to production branches without review.</td></tr><tr><td><strong>Dependabot Alerts</strong></td><td>GitHub-native security alerts about vulnerabilities in software dependencies.</td></tr><tr><td><strong>Encryption Key Management</strong></td><td>The process of securely creating, storing, and rotating cryptographic keys.</td></tr><tr><td><strong>CloudTrail</strong></td><td>AWS’s audit logging service that tracks account activity and API usage.</td></tr><tr><td><strong>Flow Logs</strong></td><td>Logs of network traffic for cloud services like AWS VPC, Azure NSG, or GCP VPC.</td></tr><tr><td><strong>Registry Policy</strong></td><td>A Windows system setting defined through the registry to enforce security policies.</td></tr><tr><td><strong>gpupdate</strong></td><td>A Windows command that forces group policy refresh, often used to apply security changes.</td></tr><tr><td><strong>Service Account</strong></td><td>A non-human account used for automation or application access; often excluded from user-level controls.</td></tr><tr><td><strong>Evidence Trail</strong></td><td>The collection of artefacts and logs that demonstrate how controls were implemented.</td></tr><tr><td><strong>Change Management</strong></td><td>A formal process to track, approve, and log changes to systems or processes.</td></tr><tr><td><strong>Disaster Recovery (DR)</strong></td><td>A documented strategy and set of actions to restore systems and data after an outage.</td></tr></tbody></table>
