Glossary of Terms
A framework of policies and technologies to ensure the right individuals have the right access to the right resources at the right times for the right reasons.
The process of verifying a user's claimed identity to establish trust. Methods include document verification, biometrics, and knowledge-based authentication (KBA).
A system of trust between two parties (organizations) to authenticate users and authorize their access to resources, enabling concepts like Single Sign-On (SSO).
An authentication scheme that allows a user to log in with a single set of credentials to multiple independent software systems.
An open standard for exchanging authentication and authorization data between an identity provider (IdP) and a service provider (SP). It is a key protocol for enabling web-based SSO.
An open standard for access delegation, commonly used to grant websites or applications access to information on other websites without giving them the passwords.
A vendor-neutral application protocol for accessing and maintaining distributed directory information services over an IP network. Active Directory is a common example of a directory service that uses LDAP.
Solutions that help secure, control, and monitor access to an organization's critical assets. Features include password vaulting and just-in-time permissions.
The selective restriction of access to a place or other resource. Models include MAC, DAC, RBAC, and ABAC.
A security concept requiring that a user be given only the minimum levels of access – or permissions – needed to perform their job functions.
A set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by unauthorized users.
Advanced security solutions that provide continuous monitoring and response to advanced threats on endpoints (EDR) and across multiple security layers like network, email, and cloud (XDR).
Network security tools that monitor network or system activities for malicious activity. An IDS only detects and alerts, while an IPS can actively block or prevent the detected intrusions.
A security process that tests and checks operating system, database, and application software files to determine whether or not they have been tampered with or corrupted.
A cybersecurity process that analyzes user activity data to detect anomalies and potential threats, such as insider threats or compromised accounts.