3 Terminology

Term or Acronym

Meaning and Expansion

Comments and Links

Access

A general term that describes the granting and

restriction of access to resources for subjects.

Authentication

The validation of user credentials for the purpose of system login and basic access.

Authentication is the process of recognizing a user’s identity.

https://economictimes.indiatimes.com/definition/authentication

Authorization

The granting of privileges or rights for accessing the various resources hosted by a system, to a subject via a role or group for example.

Authorization is the process of giving someone permission to do or have something.

https://searchsoftwarequality.techtarget.com/definition/authorization

CIS

The Center for Internet Security (CIS) benchmarks are a set of best-practice cybersecurity standards for a range of IT systems and products. CIS Benchmarks provide the baseline configurations to ensure compliance with industry-agreed cybersecurity standards.

CIS is an independent nonprofit organization with a mission to create a confidence in a connected world.

https://www.cisecurity.org

CSPM

Cloud Security Posture Management is a solution suite that enables administrators to keep track of the way in which both home grown and 3rd party services and applications access public cloud provider resources from a security perspective and enables vulnerabilities to be resolved.

CSPM is a market segment for IT security tools that are designed to identify misconfiguration issues and compliance risks in the cloud.

https://searchcloudsecurity.techtarget.com/definition/Cloud-Security-Posture-Management-CSPM

CUI

Confidential Unclassified Information as defined by NIST 800-171 Rev 2

Controlled Unclassified Information (CUI) is information that requires safeguarding or dissemination controls consistent with applicable laws, regulations, and Government-wide policies.

https://www.epa.gov/cui/controlled-unclassified-information-cui-program-frequently-asked-questions-faqs

CVE

Common Vulnerabilities and Exposures - a known vulnerability in a system or network component which can be exploited by a malicious attacker to gain access or create havoc.

CVE, short for Common Vulnerabilities and Exposures, is a list of publicly disclosed computer security flaws.

https://www.redhat.com/en/topics/security/what-is-cve

DevOps and DevSecOps

A set of principles and practices used along with tools that fully integrates and expedites the process of building, securing and deploying code on a scheduled and/or demand basis with the goals of reduced errors, reduced time-to-market, increased security and increased accuracy among others.

DevOps focuses on collaboration between application teams throughout the app development and deployment process.

DevSecOps evolved from DevOps as development teams began to realize that the DevOps model didn’t adequately address security concerns.

https://www.appdynamics.com/blog/product/devops-vs-devsecops

DLP

Data Leakage Prevention - a solution typically used to prevent confidential or private information from leaking outside the organization to unauthorized 3rd parties.

Data loss prevention (DLP) is a set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by unauthorized users.

https://digitalguardian.com/blog/what-data-loss-prevention-dlp-definition-data-loss-prevention

Federation

Federated security allows for clean separation between the service a client is accessing and the associated authentication and authorization procedures. Federated security also enables collaboration across multiple systems, networks, and organizations in different trust realms.

Federated identity is a method of linking a user's identity across multiple separate identity management systems.

https://www.okta.com/identity-101/what-is-federated-identity

GLBA

The Gramm-Leach-Bliley Act (GLB Act or GLBA) is also known as the Financial Modernization Act of 1999. It is a United States federal law that requires financial institutions to explain how they share and protect their customers' private information. It is also a generally accepted global standard.

The Gramm-Leach-Bliley Act requires financial institutions – companies that offer consumers financial products or services like loans, financial or investment advice, or insurance – to explain their information-sharing practices to their customers and to safeguard sensitive data.

https://www.ftc.gov/tips-advice/business-center/privacy-and-security/gramm-leach-bliley-act

HIPAA

Established United States federal standard to protect individuals' medical records and other personal health information and applies to health plans, health care clearinghouses, and those health care providers that conduct certain health care transactions electronically. It is a generally accepted standard globally.

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is a federal law that requires the creation of national standards to protect sensitive patient health information from being disclosed without the patient’s consent or knowledge.

https://www.cdc.gov/phlp/publications/topic/hipaa.html

IAM

Identity and Access Management - typically refers to a security suite that implements the infrastructure required for Authentication and Authorization plus the management of identities, roles, groups and access.

Identity and access management (IAM) is the discipline that enables the right individuals to access the right resources at the right times for the right reasons. IAM addresses the mission-critical need to ensure appropriate access to resources across increasingly heterogeneous technology environments and to meet increasingly rigorous compliance requirements

https://www.gartner.com/en/information-technology/glossary/identity-and-access-management-iam

IMAP

Internet Message Access Protocol is a mail client. protocol used for retrieval of email messages from a mail server. For the purposes of this document IMAP refers to IMAP4 which is defined by the IETF with multiple RFCs.

Internet Message Access Protocol (IMAP) is a protocol for accessing email or bulletin board messages from a (possibly shared) mail server or service.

https://www.gartner.com/en/information-technology/glossary/imap-internet-message-access-protocol

OAuth2

An open standards based protocol used for Authentication that uses bearer tokens and is specifically designed to work across HTTP. OAuth provides clients a "secure delegated access" to server resources on behalf of a resource owner. It specifies a process for resource owners to authorize third-party access to their server resources without providing credentials. OAuth2 is the second major release of OAuth which has been hardened based on known attacks such as “AS MixUp”. Not all implementations of OAuth2 are equal and some have been found to have security flaws.

The OAuth (open authorization) protocol was developed by the Internet Engineering Task Force and enables secure delegated access.

https://oauth.net/2

OpenIDConnect

A simple open standards based identity layer on top of the OAuth 2.0 protocol. It allows Clients to verify the identity of a party based on the authentication performed by an Authorization Server, as well as to obtain basic profile information about the party in an interoperable and REST-like manner

OpenID Connect lets developers authenticate their users across websites and apps without having to own and manage password files.

https://openid.net/connect/faq

OWASP

The Open Web Application Security Project is an online community that produces freely-available articles, methodologies, documentation, tools, and technologies in the field of web application security.

The Open Web Application Security Project, or OWASP, is an international non-profit organization dedicated to web application security.

https://www.cloudflare.com/learning/security/threats/owasp-top-10

PaaS

Platform As A Service: A suite of software components that is fully integrated to provide a secure, convenient and rapid application development and deployment platform for cloud style applications.

PaaS (Platform as a Service), as the name suggests, provides you computing platforms which typically includes operating system, programming language execution environment, database, web server

https://stackoverflow.com/questions/16820336/what-is-saas-paas-and-iaas-with-examples

PCI DSS

A set of standards used by the payment card industry to secure payment card data and card holder information including primary account numbers (PAN), credit/debit card numbers, and sensitive authentication data (SAD) such as CVVs and PINs.

The Payment Card Industry Data Security Standard (PCI DSS) is required by the contract for those handling cardholder data, whether you are a start-up or a global enterprise.

https://www.controlcase.com/what-are-the-12-requirements-of-pci-dss-compliance

POP

Post Office Protocol - a standard email protocol used by clients to access email once delivered to a mail server in a specific DNS domain. Various versions of this protocol exist but for the purposes of this document POP refers to POP3 as defined by RFC1939 and the extension mechanism in RFC2449 and an authentication mechanism defined in RFC1734

The post office protocol (POP) is the most commonly used message request protocol in the Internet world for transferring messages from an e-mail server to an email client.

https://www.sciencedirect.com/topics/computer-science/post-office-protocol

Provisioning

A way of propagating the joining or leaving of users from the system and creating/removing the accounts and access rights for users based on their target profile/role.

In general, provisioning means "providing" or making something available. In a storage area network (SAN), storage provisioning is the process of assigning storage to optimize performance. In telecommunications terminology, provisioning means providing a product or service, such as wiring or bandwidth.

https://whatis.techtarget.com/definition/provisioning

Realm

A realm is a security policy domain defined for a web or application server. A realm contains a collection of users, who may or may not be assigned to a group. An application will often prompt for a username and password before allowing access to a protected resource. Access for realms can be federated.

A realm is a security policy domain defined for a web or application server. The protected resources on a server can be partitioned into a set of protection spaces, each with its own authentication scheme and/or authorization database containing a collection of users and groups.

https://stackoverflow.com/questions/8468075/what-is-the-exact-uses-of-realm-term-in-security

SAML

Security Assertion Markup Language. SAML and SAML2 are XML markup protocols (a suite of XMLSchema message types) designed for federation of identities across identity providers and service providers. Its main use case is for web single-sign-on.

Security Assertion Markup Language (SAML) is an open standard for sharing security information about identity, authentication and authorization across.

https://www.techtarget.com/searchsecurity/definition/SAML

SCEP

Simple Certificate Enrolment Protocol used to enroll users and issue digital certificates. Typically supported by the certificate authority server.

Simple Certificate Enrollment Protocol (SCEP) is an open source protocol that is widely used to make digital certificate issuance at large organizations easier, more secure, and scalable.

https://www.hypr.com/simple-certificate-enrollment-protocol

Single Sign On (SSO)

A way of ensuring that users only need to enter credentials once in order to gain policy access to resources across security realms.

Single sign-on (SSO) is an authentication method that enables users to securely authenticate with multiple applications and websites by using just one set of credentials.

https://www.onelogin.com/learn/how-single-sign-on-works

SMTP

Simple Mail Transfer Protocol - a protocol used to route email between gateways to the server responsible for final delivery to a specific DNS mail domain.

The Simple Mail Transfer Protocol (SMTP) is used to deliver e-mail messages over the Internet. This protocol is used by most email clients to deliver messages to the server, and is also used by servers to forward messages to their final destination.

https://www.sciencedirect.com/topics/computer-science/simple-mail-transfer-protocol

Subject

In a security context, a subject is any entity that requests access to an object. These are generic terms used to denote the thing requesting access and the thing the request is made against. When you log onto an application you are the subject and the application is the object

The term subject to represent the source of a request. A subject may be any entity, such as a person or service. A subject is represented by the javax. security. auth.

https://stackoverflow.com/questions/4989063/what-is-the-meaning-and-difference-between-subject-user-and-principal

XACML

eXtensible Access Control Markup Language The XACML standard defines a declarative fine-grained, attribute-based access control policy language, an architecture, and a processing model describing how to evaluate access requests according to the rules defined in policies all in XMLSchema.

XACML (Extensible Access Control Markup Language) is an open standard XML-based language used to express security policies and access rights to information.

https://searchcio.techtarget.com/definition/XACML

Last updated

Copyright © 2024