IT Assessment Glossary
Key terms from the world of IT assessments and maturity models - clearly explained.
Assessment
AssessmentA structured evaluation where a subject (e.g., IT infrastructure, security measures, processes) is systematically analyzed and rated against defined criteria. The goal is to capture the current state and derive actionable recommendations.
Backup & Disaster Recovery (BDR)
InfrastructureStrategies and technologies for data backup and recovery in case of disaster. A BDR assessment evaluates backup processes, recovery times (RTO/RPO), and resilience against data loss.
Benchmark
AssessmentA reference value or comparison standard that serves as orientation for evaluation. Benchmarks can be industry-specific and help position your own IT maturity relative to best practices or competitors.
Catalog
AssessmentA structured collection of evaluation criteria, categories, and questions that serves as a template for an assessment. A catalog defines which areas are evaluated and which questions are asked.
Cloud Readiness
InfrastructureThe assessment of how ready an organization is for cloud migration. Considers technical, organizational, and financial aspects as well as the compatibility of existing applications and processes.
Cloud Security
SecurityThe totality of all measures, technologies, and policies for protecting data, applications, and infrastructure in cloud environments. Covers areas such as access control, encryption, network security, and compliance.
CMMI®
MaturityCapability Maturity Model Integration - a widely used maturity model for assessing and improving business processes. Defines five maturity levels from "Initial" to "Optimizing".
Compliance
ComplianceAdherence to legal regulations, regulatory requirements, and internal policies in the IT domain. Compliance assessments verify whether organizations meet applicable standards and laws (e.g., GDPR, NIS2).
Endpoint Security
SecuritySecurity measures to protect endpoints such as laptops, smartphones, and servers from threats. Includes antivirus, EDR (Endpoint Detection and Response), disk encryption, and patch management.
Gap Analysis
AssessmentThe comparison between the current state and a defined target state. In the IT assessment context, gap analysis reveals which areas have improvement potential and where action is needed.
Identity & Access Management (IAM)
SecurityProcesses and technologies for managing digital identities and their access rights. IAM ensures that only authorized individuals can access the right resources.
ISO 27001
ComplianceThe international standard for Information Security Management Systems (ISMS). Defines requirements for establishing, implementing, maintaining, and continuously improving an ISMS.
IT Audit
ComplianceA formal review of an organization's IT systems, processes, and controls. Unlike an assessment, an audit focuses more strongly on compliance with defined standards and guidelines.
Key Performance Indicator (KPI)
ManagementMeasurable metrics that quantify success or progress in a specific area. In the IT assessment context, KPIs help track maturity over time and demonstrate improvements.
Managed Service Provider (MSP)
ManagementAn IT service provider that proactively manages and monitors its clients' IT infrastructure and systems. MSPs use assessments to evaluate the state of client IT and identify optimization potential.
Maturity Level
MaturityThe current development stage of an assessed area within a maturity model. Typical levels are: 1 (Not Present), 2 (Initial), 3 (Repeatable), 4 (Defined), 5 (Optimized).
Maturity Model
MaturityA framework that defines various development stages (typically 1-5) to measure the maturity of processes, technologies, or organizations. Each level describes clearly defined capabilities and characteristics.
Network Segmentation
InfrastructureThe division of a network into smaller, isolated areas (segments). Limits the spread of security incidents and enables granular access controls between segments.
NIS2 Directive
ComplianceThe EU directive on measures for a high common level of cybersecurity. It obliges companies in critical sectors to implement comprehensive security measures, incident reporting obligations, and regular risk assessments.
Patch Management
InfrastructureThe structured process for identifying, evaluating, distributing, and verifying software updates and security patches. Mature patch management reduces vulnerabilities and improves system stability.
Remediation
ManagementThe implementation of corrective measures to address identified vulnerabilities or gaps. Remediation plans typically result from an assessment and prioritize actions by urgency.
Risk Assessment
ManagementThe systematic identification, analysis, and evaluation of risks to IT infrastructure. Considers probability of occurrence and potential impact to prioritize risk mitigation measures.
Scoring
AssessmentThe quantitative evaluation of an assessment through point allocation. Scoring can be weighted, where different categories or questions are assigned different importance (weighting).
Service Level Agreement (SLA)
ManagementA contractual agreement between service provider and customer that defines the quality, availability, and responsibilities of an IT service. SLAs contain measurable metrics such as availability (e.g., 99.9%) and response times.
Vulnerability Assessment
SecurityA systematic review of IT systems for known vulnerabilities and security gaps. Identifies risks and prioritizes them by severity to enable targeted countermeasures.
Zero Trust
SecurityA security model that fundamentally trusts no user, device, or network - neither inside nor outside the corporate perimeter. Every access is verified and authorized before it is granted.
Get Started Free
All catalog templates are free. The first custom catalog is also free.
Get Started Free