Skip to main content
CoBiT - Control Objectives for Information and Related Technologies

Control Objectives for Information and Related Technologies


CoBiT - Control Objectives for Information and Related Technologies

CoBiT is an IT management framework first developed in 1996 published by the IT Governance Institute and the Information Systems Audit and Control Association (ISACA) to help businesses develop, organize and implement strategies around information management and governance.

The objective is to provide a common language for business executives to communicate with each other about goals, objectives and results. The latest version was published in 2013 and emphasizes the value that information governance can provide to a business's success. It also provides guidance about enterprise risk management. CoBiT 5 is based on five key principles for governance and management of enterprise IT: Meeting stakeholder needs, covering the enterprise end-to-end, applying a single, integrated framework, enabling a holistic approach, and separating governance from management.

Seeking Clarity?

View the Cybersecurity Dictionary for top terms searched by your peers.

Explore the Dictionary

Related Assets

October 22, 2018

PCI Compliance Does Not Always Equal Security

Learn how a risk-centric approach can be applied to each PCI requirement.

See Details

February 16, 2017

In Focus: Governance, Risk and Compliance

Federal News Radio | February 16, 2017 Stewardship and management of the federal government’s many missions requires a sound approach to governance, ...

See Details

Optiv Leadership Perspective – Compliance

When looking at major regulations, including GDPR, HIPPA, SOX, etc., there are several commonalities as it relates to visibility, control and governan...

See Details

How Can We Help?

Let us know what you need, and we will have an Optiv professional contact you shortly.

Privacy Policy

Stay in the Know

For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.


Join our Email List

We take your privacy seriously and promise never to share your email with anyone.

Stay Connected

Find cybersecurity Events in your area.