3 Terminology
Last updated
Last updated
Apache-2.0 license
Term or Acronym
Meaning and Expansion
Comments and Links
Access
A general term that describes the granting and
restriction of access to resources for subjects.
Authentication
The validation of user credentials for the purpose of system login and basic access.
Authentication is the process of recognizing a user’s identity.
https://economictimes.indiatimes.com/definition/authentication
Authorization
The granting of privileges or rights for accessing the various resources hosted by a system, to a subject via a role or group for example.
Authorization is the process of giving someone permission to do or have something.
https://searchsoftwarequality.techtarget.com/definition/authorization
CIS
The Center for Internet Security (CIS) benchmarks are a set of best-practice cybersecurity standards for a range of IT systems and products. CIS Benchmarks provide the baseline configurations to ensure compliance with industry-agreed cybersecurity standards.
CIS is an independent nonprofit organization with a mission to create a confidence in a connected world.
CSPM
Cloud Security Posture Management is a solution suite that enables administrators to keep track of the way in which both home grown and 3rd party services and applications access public cloud provider resources from a security perspective and enables vulnerabilities to be resolved.
CSPM is a market segment for IT security tools that are designed to identify misconfiguration issues and compliance risks in the cloud.
https://searchcloudsecurity.techtarget.com/definition/Cloud-Security-Posture-Management-CSPM
CUI
Confidential Unclassified Information as defined by NIST 800-171 Rev 2
Controlled Unclassified Information (CUI) is information that requires safeguarding or dissemination controls consistent with applicable laws, regulations, and Government-wide policies.
CVE
Common Vulnerabilities and Exposures - a known vulnerability in a system or network component which can be exploited by a malicious attacker to gain access or create havoc.
CVE, short for Common Vulnerabilities and Exposures, is a list of publicly disclosed computer security flaws.
https://www.redhat.com/en/topics/security/what-is-cve
DevOps and DevSecOps
A set of principles and practices used along with tools that fully integrates and expedites the process of building, securing and deploying code on a scheduled and/or demand basis with the goals of reduced errors, reduced time-to-market, increased security and increased accuracy among others.
DevOps focuses on collaboration between application teams throughout the app development and deployment process.
DevSecOps evolved from DevOps as development teams began to realize that the DevOps model didn’t adequately address security concerns.
https://www.appdynamics.com/blog/product/devops-vs-devsecops
DLP
Data Leakage Prevention - a solution typically used to prevent confidential or private information from leaking outside the organization to unauthorized 3rd parties.
Data loss prevention (DLP) is a set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by unauthorized users.
https://digitalguardian.com/blog/what-data-loss-prevention-dlp-definition-data-loss-prevention
Federation
Federated security allows for clean separation between the service a client is accessing and the associated authentication and authorization procedures. Federated security also enables collaboration across multiple systems, networks, and organizations in different trust realms.
Federated identity is a method of linking a user's identity across multiple separate identity management systems.
https://www.okta.com/identity-101/what-is-federated-identity
GLBA
The Gramm-Leach-Bliley Act (GLB Act or GLBA) is also known as the Financial Modernization Act of 1999. It is a United States federal law that requires financial institutions to explain how they share and protect their customers' private information. It is also a generally accepted global standard.
The Gramm-Leach-Bliley Act requires financial institutions – companies that offer consumers financial products or services like loans, financial or investment advice, or insurance – to explain their information-sharing practices to their customers and to safeguard sensitive data.
https://www.ftc.gov/tips-advice/business-center/privacy-and-security/gramm-leach-bliley-act
HIPAA
Established United States federal standard to protect individuals' medical records and other personal health information and applies to health plans, health care clearinghouses, and those health care providers that conduct certain health care transactions electronically. It is a generally accepted standard globally.
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is a federal law that requires the creation of national standards to protect sensitive patient health information from being disclosed without the patient’s consent or knowledge.
IAM
Identity and Access Management - typically refers to a security suite that implements the infrastructure required for Authentication and Authorization plus the management of identities, roles, groups and access.
Identity and access management (IAM) is the discipline that enables the right individuals to access the right resources at the right times for the right reasons. IAM addresses the mission-critical need to ensure appropriate access to resources across increasingly heterogeneous technology environments and to meet increasingly rigorous compliance requirements
https://www.gartner.com/en/information-technology/glossary/identity-and-access-management-iam
IMAP
Internet Message Access Protocol is a mail client. protocol used for retrieval of email messages from a mail server. For the purposes of this document IMAP refers to IMAP4 which is defined by the IETF with multiple RFCs.
Internet Message Access Protocol (IMAP) is a protocol for accessing email or bulletin board messages from a (possibly shared) mail server or service.
https://www.gartner.com/en/information-technology/glossary/imap-internet-message-access-protocol
OAuth2
An open standards based protocol used for Authentication that uses bearer tokens and is specifically designed to work across HTTP. OAuth provides clients a "secure delegated access" to server resources on behalf of a resource owner. It specifies a process for resource owners to authorize third-party access to their server resources without providing credentials. OAuth2 is the second major release of OAuth which has been hardened based on known attacks such as “AS MixUp”. Not all implementations of OAuth2 are equal and some have been found to have security flaws.
The OAuth (open authorization) protocol was developed by the Internet Engineering Task Force and enables secure delegated access.
OpenIDConnect
A simple open standards based identity layer on top of the OAuth 2.0 protocol. It allows Clients to verify the identity of a party based on the authentication performed by an Authorization Server, as well as to obtain basic profile information about the party in an interoperable and REST-like manner
OpenID Connect lets developers authenticate their users across websites and apps without having to own and manage password files.
OWASP
The Open Web Application Security Project is an online community that produces freely-available articles, methodologies, documentation, tools, and technologies in the field of web application security.
The Open Web Application Security Project, or OWASP, is an international non-profit organization dedicated to web application security.
https://www.cloudflare.com/learning/security/threats/owasp-top-10
PaaS
Platform As A Service: A suite of software components that is fully integrated to provide a secure, convenient and rapid application development and deployment platform for cloud style applications.
PaaS (Platform as a Service), as the name suggests, provides you computing platforms which typically includes operating system, programming language execution environment, database, web server
https://stackoverflow.com/questions/16820336/what-is-saas-paas-and-iaas-with-examples
PCI DSS
A set of standards used by the payment card industry to secure payment card data and card holder information including primary account numbers (PAN), credit/debit card numbers, and sensitive authentication data (SAD) such as CVVs and PINs.
The Payment Card Industry Data Security Standard (PCI DSS) is required by the contract for those handling cardholder data, whether you are a start-up or a global enterprise.
https://www.controlcase.com/what-are-the-12-requirements-of-pci-dss-compliance
POP
Post Office Protocol - a standard email protocol used by clients to access email once delivered to a mail server in a specific DNS domain. Various versions of this protocol exist but for the purposes of this document POP refers to POP3 as defined by RFC1939 and the extension mechanism in RFC2449 and an authentication mechanism defined in RFC1734
The post office protocol (POP) is the most commonly used message request protocol in the Internet world for transferring messages from an e-mail server to an email client.
https://www.sciencedirect.com/topics/computer-science/post-office-protocol
Provisioning
A way of propagating the joining or leaving of users from the system and creating/removing the accounts and access rights for users based on their target profile/role.
In general, provisioning means "providing" or making something available. In a storage area network (SAN), storage provisioning is the process of assigning storage to optimize performance. In telecommunications terminology, provisioning means providing a product or service, such as wiring or bandwidth.
Realm
A realm is a security policy domain defined for a web or application server. A realm contains a collection of users, who may or may not be assigned to a group. An application will often prompt for a username and password before allowing access to a protected resource. Access for realms can be federated.
A realm is a security policy domain defined for a web or application server. The protected resources on a server can be partitioned into a set of protection spaces, each with its own authentication scheme and/or authorization database containing a collection of users and groups.
https://stackoverflow.com/questions/8468075/what-is-the-exact-uses-of-realm-term-in-security
SAML
Security Assertion Markup Language. SAML and SAML2 are XML markup protocols (a suite of XMLSchema message types) designed for federation of identities across identity providers and service providers. Its main use case is for web single-sign-on.
Security Assertion Markup Language (SAML) is an open standard for sharing security information about identity, authentication and authorization across.
SCEP
Simple Certificate Enrolment Protocol used to enroll users and issue digital certificates. Typically supported by the certificate authority server.
Simple Certificate Enrollment Protocol (SCEP) is an open source protocol that is widely used to make digital certificate issuance at large organizations easier, more secure, and scalable.
Single Sign On (SSO)
A way of ensuring that users only need to enter credentials once in order to gain policy access to resources across security realms.
Single sign-on (SSO) is an authentication method that enables users to securely authenticate with multiple applications and websites by using just one set of credentials.
SMTP
Simple Mail Transfer Protocol - a protocol used to route email between gateways to the server responsible for final delivery to a specific DNS mail domain.
The Simple Mail Transfer Protocol (SMTP) is used to deliver e-mail messages over the Internet. This protocol is used by most email clients to deliver messages to the server, and is also used by servers to forward messages to their final destination.
https://www.sciencedirect.com/topics/computer-science/simple-mail-transfer-protocol
Subject
In a security context, a subject is any entity that requests access to an object. These are generic terms used to denote the thing requesting access and the thing the request is made against. When you log onto an application you are the subject and the application is the object
The term subject to represent the source of a request. A subject may be any entity, such as a person or service. A subject is represented by the javax. security. auth.
XACML
eXtensible Access Control Markup Language The XACML standard defines a declarative fine-grained, attribute-based access control policy language, an architecture, and a processing model describing how to evaluate access requests according to the rules defined in policies all in XMLSchema.
XACML (Extensible Access Control Markup Language) is an open standard XML-based language used to express security policies and access rights to information.