Absolute Session Timeout
Absolute session timeout is the maximum total lifetime of a session before it must end or require reauthentication, regardless of user activity....
Read definition →Browse CyberExperts' glossary of cybersecurity terms, threats, controls, and defensive concepts. This archive is designed to help readers quickly understand common security language and connect related topics across modern cyber risk, compliance, and incident response.
Use the search box or jump by letter to find definitions for topics like malware, phishing, supply chain attacks, cloud security, and defense-in-depth.
Absolute session timeout is the maximum total lifetime of a session before it must end or require reauthentication, regardless of user activity....
Read definition →An acceptable use policy (AUP) defines how users are expected to use organizational systems, devices, networks, and data responsibly....
Read definition →Access certification is the formal review and attestation process used to confirm that users and systems still need the access they hold....
Read definition →Access control is the process of restricting who or what can view, use, or change systems, applications, data, and physical resources....
Read definition →An access review is a structured check of who has access to which systems, roles, or data and whether that access is still appropriate....
Read definition →An access token is a credential issued after authentication that allows a user, application, or service to access specific resources for a limited time....
Read definition →Account recovery is the process used to restore account access when a user is locked out, loses a factor, or can no longer authenticate normally....
Read definition →Account takeover (ATO) is the unauthorized control of a user account by an attacker who gains access to the victim’s credentials or session....
Read definition →Adaptive access control is a security model that changes authentication or authorization requirements based on real-time context and risk signals....
Read definition →Admin tiering is the separation of administrative accounts, systems, and tasks into trust tiers to reduce privilege exposure and lateral compromise....
Read definition →An advanced persistent threat (APT) is a stealthy, sustained intrusion campaign designed to gain access and remain undetected over time....
Read definition →Adversary emulation is a security testing approach that recreates the tactics, techniques, and procedures of real-world threat actors in a controlled way....
Read definition →An adversary-in-the-middle (AiTM) attack uses a real-time phishing proxy or interception layer to capture credentials, sessions, or tokens between a victim and a legitimate se...
Read definition →Adware is software that displays advertising, but some forms also track users, degrade privacy, or create security exposure....
Read definition →An air gap is a security isolation approach in which a system or network is separated from untrusted or internet-connected environments to reduce exposure....
Read definition →Alert fatigue is the reduced effectiveness of analysts caused by large volumes of noisy, repetitive, or low-value security alerts....
Read definition →Antimalware is security software designed to detect, block, quarantine, and remove malicious programs from devices and networks....
Read definition →API abuse is the misuse of an application programming interface to extract data, automate attacks, bypass controls, or cause operational harm....
Read definition →API authentication is the process of verifying the identity of a user, application, or service attempting to access an application programming interface....
Read definition →API authorization is the process of determining what an authenticated user, app, or service is allowed to do through an API....
Read definition →API discovery is the process of identifying known, unknown, documented, and undocumented APIs across an organization’s environment....
Read definition →API gateway security is the use of a gateway layer to enforce authentication, authorization, rate control, inspection, and policy for API traffic....
Read definition →API inventory is the maintained record of an organization’s APIs, endpoints, versions, owners, and exposure details....
Read definition →API key management is the process of issuing, storing, rotating, restricting, and revoking API keys used for service access....
Read definition →API schema validation is the process of checking whether API requests and responses match the expected structure, types, and constraints defined by the service....
Read definition →API security is the practice of protecting application programming interfaces from unauthorized access, abuse, data exposure, and logic flaws....
Read definition →API versioning is the practice of managing changes to an API through distinct versions so clients can evolve without immediate breakage....
Read definition →App consent governance is the set of controls used to review, restrict, approve, and monitor application permission grants in cloud and SaaS environments....
Read definition →Application allowlisting is a security control that permits only approved software, scripts, or binaries to run on a system or within a defined environment....
Read definition →Application security (AppSec) is the practice of designing, building, testing, and maintaining software to reduce security weaknesses and abuse....
Read definition →Asset management is the practice of identifying, tracking, and governing systems, devices, software, and data that an organization relies on....
Read definition →Attack path analysis is the process of identifying how attackers could chain together identities, systems, privileges, and weaknesses to reach a high-value target....
Read definition →An attack surface is the total set of systems, services, identities, applications, and exposures that an attacker could potentially target....
Read definition →Attack surface management (ASM) is the ongoing practice of discovering, monitoring, and reducing internet-exposed assets and weaknesses that attackers could target....
Read definition →Attack surface reduction (ASR) is the practice of limiting the number of ways attackers can access, abuse, or move through systems and applications....
Read definition →An attack vector is the path, method, or weakness an attacker uses to gain access, deliver malicious activity, or move toward a target....
Read definition →Attribute-Based Access Control (ABAC) is an authorization model that makes access decisions based on attributes of users, resources, actions, and context....
Read definition →Audit logging is the recording of system, user, administrative, or application actions in a way that supports review, investigation, and accountability....
Read definition →An audit trail is a chronological record of actions, changes, or events that supports accountability, investigation, and review....
Read definition →Authentication is the process of verifying that a user, device, or system is genuinely who or what it claims to be....
Read definition →Authentication assurance level (AAL) is a measure of confidence in an authentication event based on the strength and security of the methods used....
Read definition →Authorization is the process of deciding what an authenticated user, device, or system is allowed to access or do....
Read definition →Authorization code flow is an OAuth pattern in which a client first receives an authorization code and then exchanges it for tokens through a back-channel request....
Read definition →An authorization server is the component that authenticates, evaluates consent or policy, and issues tokens to clients in OAuth or OIDC-based systems....
Read definition →Backup and recovery is the practice of copying, protecting, and restoring data and systems after loss, corruption, or disruption....
Read definition →Backup integrity is the assurance that backup data is complete, uncorrupted, unmodified in unauthorized ways, and actually usable for recovery....
Read definition →Banner grabbing is the practice of collecting service and software details from exposed systems to support reconnaissance and assessment....
Read definition →Behavioral biometrics are patterns in how a person interacts with devices or systems that can be used as a signal for identity confidence or fraud detection....
Read definition →Birthright access is the baseline set of permissions automatically granted to users based on role, department, or employment status....
Read definition →Blast radius is the scope of systems, identities, data, or operations that can be affected when a security control fails or an attacker gains access....
Read definition →Bot mitigation is the set of controls used to detect, limit, and block harmful automated traffic or scripted abuse....
Read definition →A botnet is a network of compromised devices that attackers remotely control to launch coordinated malicious activity at scale....
Read definition →Breach and attack simulation (BAS) is the controlled testing of security defenses using simulated attacker behavior to validate whether protections and detections work as expe...
Read definition →Breach password screening is the practice of checking whether a password appears in known breach datasets and blocking or flagging it if it does....
Read definition →A break glass account is an emergency-access account reserved for exceptional situations when normal administrative access is unavailable or unsuitable....
Read definition →Break-fix access is temporary elevated access granted to troubleshoot, repair, or restore a system during an operational issue or outage....
Read definition →Broken Object Level Authorization (BOLA) is an API security flaw where a system fails to enforce whether a user can access a specific object or record....
Read definition →Browser security is the practice of protecting web browsers, browser data, and browsing activity from malicious content, abuse, and exploitation....
Read definition →A brute force attack is an attempt to gain access by systematically guessing passwords, keys, or login combinations until one works....
Read definition →A bug bounty program is a security initiative that rewards eligible researchers for finding and responsibly reporting vulnerabilities in defined systems or applications....
Read definition →Business continuity is the capability to keep critical operations running during and after disruption through planning, resilience, and coordinated response....
Read definition →Business email compromise (BEC) is a fraud tactic that uses deceptive email or account compromise to trick people into sending money, data, or sensitive information....
Read definition →A business impact analysis (BIA) is a structured assessment of which business processes matter most and what happens if they are disrupted....
Read definition →A business logic flaw is a weakness in how an application’s intended workflow, rules, or decision logic can be manipulated to achieve unauthorized outcomes....
Read definition →A canary token is a planted digital artifact designed to trigger an alert when someone accesses, moves, or uses it unexpectedly....
Read definition →Case management is the structured tracking of security investigations, incidents, tasks, evidence, ownership, and decisions from intake through closure....
Read definition →Certificate management is the process of issuing, tracking, renewing, rotating, and revoking digital certificates used for identity and encryption....
Read definition →Chain of custody is the documented record of how evidence is collected, handled, transferred, stored, and accessed over time....
Read definition →Client certificate authentication is a method in which a device, user, or application proves identity using a certificate and associated private key....
Read definition →Client credentials flow is an OAuth pattern in which a client authenticates as itself to obtain tokens for machine-to-machine access....
Read definition →A cloud access security broker (CASB) is a security control layer that helps organizations monitor and enforce policy across cloud applications and services....
Read definition →Cloud detection and response (CDR) is a security capability focused on detecting, investigating, and responding to threats in cloud environments....
Read definition →Cloud security refers to the controls, policies, and technologies used to protect data, workloads, and identities in cloud environments....
Read definition →Cloud security posture management (CSPM) is the practice of finding and reducing misconfigurations, policy drift, and exposure in cloud environments....
Read definition →A cloud workload protection platform (CWPP) is a security approach for protecting workloads such as virtual machines, containers, and cloud-hosted servers....
Read definition →A cloud-native application protection platform (CNAPP) is a security approach that combines multiple cloud security capabilities to protect applications and workloads across t...
Read definition →Code signing is the practice of digitally signing software, scripts, or binaries so recipients can verify the publisher and detect tampering....
Read definition →A compensating control is an alternative safeguard used to reduce risk when the preferred or standard control cannot be implemented directly....
Read definition →Conditional access is a policy-based identity control that allows, blocks, or limits access based on factors such as user, device, location, risk, or application context....
Read definition →A confidential client is an OAuth or OIDC client that can securely protect long-term credentials such as a client secret or private key....
Read definition →Configuration drift is the gradual divergence of systems or services from their intended, approved, or secure configuration state over time....
Read definition →Container security is the practice of protecting container images, runtimes, orchestration environments, and supporting pipelines from compromise and misuse....
Read definition →Context-aware access is an access control approach that evaluates signals such as user, device, location, risk, and behavior before allowing or limiting access....
Read definition →Continuous access evaluation is the real-time reassessment of whether an active session or token should continue to grant access as conditions change....
Read definition →Continuous authentication is the ongoing reassessment of trust during a user or system session rather than relying only on the initial login event....
Read definition →Continuous threat exposure management (CTEM) is an ongoing security approach for discovering, validating, prioritizing, and reducing exposures that attackers could exploit....
Read definition →A control framework is an organized set of control objectives, requirements, and practices used to structure security and risk management efforts....
Read definition →Control plane security is the protection of the administrative, orchestration, and management layers that govern systems, cloud services, and platforms....
Read definition →Credential hygiene is the practice of creating, storing, rotating, and protecting passwords, keys, and tokens in ways that reduce misuse and exposure....
Read definition →Credential rotation is the process of replacing passwords, keys, tokens, certificates, or other secrets on a controlled schedule or after a risk event....
Read definition →Credential stuffing is an attack in which stolen username-password pairs are automatically tested across many sites and services....
Read definition →Credential vaulting is the secure storage and controlled release of passwords, keys, and other secrets used for privileged or sensitive access....
Read definition →Cross-site scripting (XSS) is a client-side web attack that injects malicious code into a trusted page or application....
Read definition →Cyber hygiene is the routine practice of maintaining systems, identities, devices, and user behavior in ways that reduce common security risks over time....
Read definition →Cyber resilience is the ability to prepare for, withstand, respond to, and recover from cyber incidents while keeping critical operations running....
Read definition →A cyber risk register is a structured record of identified cybersecurity risks, their status, owners, treatments, and business impact....
Read definition →A cyberattack is a deliberate attempt to access, disrupt, damage, or misuse systems, networks, or digital information....
Read definition →Cybersecurity is the practice of protecting systems, networks, applications, and data from unauthorized access, disruption, and digital attacks....
Read definition →A data breach is an incident in which sensitive, confidential, or protected information is exposed, stolen, or accessed without authorization....
Read definition →Data classification is the practice of labeling information by sensitivity, value, or handling requirements so it can be protected appropriately....
Read definition →Data exfiltration is the unauthorized movement or theft of data from a system, application, cloud environment, or organization-controlled network....
Read definition →Data governance is the framework of policies, ownership, standards, and controls used to manage data quality, use, protection, and accountability....
Read definition →Data loss prevention (DLP) is a set of policies and technologies used to detect, monitor, and restrict sensitive data from leaving approved control....
Read definition →Data masking is the practice of obscuring sensitive data so it remains useful for a limited purpose without exposing the original values fully....
Read definition →Data minimization is the practice of collecting, storing, sharing, and retaining only the data that is genuinely necessary for a defined purpose....
Read definition →Data retention is the practice of keeping information for defined periods based on business, legal, operational, and security needs....
Read definition →Data security posture management (DSPM) is the practice of identifying, classifying, and reducing the exposure of sensitive data across modern environments....
Read definition →Data tokenization is the process of replacing a sensitive data value with a non-sensitive token that represents it without exposing the original value directly....
Read definition →Deception technology uses decoys, traps, and false assets to detect, slow, or mislead attackers inside an environment....
Read definition →Defense in depth is a layered security strategy that uses multiple controls so one failure does not expose the entire environment....
Read definition →Delegated administration is the practice of assigning limited administrative authority to specific people or teams for defined systems, users, or tasks....
Read definition →A denial-of-service (DoS) attack overwhelms or disrupts a system or service so legitimate users cannot access it normally....
Read definition →A deprecated endpoint is an API route or interface that is still available but marked for retirement and no longer considered the preferred supported path....
Read definition →Deprovisioning is the process of removing or disabling identities, accounts, credentials, and access when they are no longer needed....
Read definition →Detection coverage is the extent to which a security program can identify relevant attacker behaviors, risks, and incident types across its environment....
Read definition →Detection engineering is the practice of designing, testing, tuning, and maintaining security detections so meaningful attacker behavior can be identified with high confidence...
Read definition →Detection tuning is the process of refining alerts, rules, thresholds, and logic so detections are more accurate, useful, and actionable....
Read definition →Device attestation is the process of verifying security-related claims about a device, such as hardware state, integrity, or management posture....
Read definition →Device code flow is an OAuth pattern that lets devices with limited input capabilities obtain authorization through a separate trusted user device....
Read definition →Device compliance is the state in which an endpoint meets an organization’s defined security, configuration, and management requirements....
Read definition →Device posture is the assessed security condition of a device based on factors such as configuration, compliance, health, and management state....
Read definition →Device registration is the process of enrolling a device with an identity or management system so it can be recognized and governed for access decisions....
Read definition →Device trust is the confidence that a device meets defined security and management requirements before it is allowed to access protected resources....
Read definition →Digital forensics is the practice of collecting, preserving, analyzing, and documenting digital evidence for investigation and response....
Read definition →A directory service is a system that stores and organizes identity information such as users, groups, devices, and related access attributes....
Read definition →Directory synchronization is the process of keeping identity data such as users, groups, and attributes aligned between connected directory systems....
Read definition →Disaster recovery is the process of restoring systems, applications, and data after serious disruption, failure, or destructive events....
Read definition →A distributed denial-of-service (DDoS) attack overwhelms a target with traffic or requests from many systems at once to disrupt availability....
Read definition →DNS security is the practice of protecting domain name resolution and related infrastructure from abuse, manipulation, and attack....
Read definition →A drive-by download is the unwanted delivery or execution of malicious content when a user visits a site or interacts with web content....
Read definition →Dynamic application security testing (DAST) evaluates a running application by interacting with it from the outside to identify security weaknesses in behavior and responses....
Read definition →Eavesdropping is the unauthorized interception of communications between people, systems, or devices....
Read definition →Email security is the set of controls, policies, and practices used to protect email accounts, messages, and users from abuse, fraud, and compromise....
Read definition →Encryption is the process of converting readable data into protected ciphertext so only authorized parties can access it....
Read definition →Endpoint detection and response (EDR) is a security capability that monitors endpoint activity and helps teams investigate and respond to threats....
Read definition →Endpoint security is the practice of protecting laptops, desktops, servers, mobile devices, and other endpoints from compromise and misuse....
Read definition →Entitlement management is the process of defining, granting, reviewing, and removing permissions so access stays aligned to real business need....
Read definition →Cyber espionage is the covert theft of sensitive information or intellectual property for political, military, or commercial advantage....
Read definition →Evidence preservation is the practice of protecting logs, files, system state, and other artifacts so they remain available and trustworthy for investigation....
Read definition →Exception management is the process of reviewing, approving, documenting, and tracking deviations from security policies, standards, or required controls....
Read definition →Exposure management is the practice of identifying, understanding, prioritizing, and reducing the weaknesses and attack paths that create meaningful cyber risk....
Read definition →An exposure window is the period during which a vulnerability, misconfiguration, stolen credential, or other weakness remains exploitable....
Read definition →Extended detection and response (XDR) is a security approach that connects and analyzes telemetry across multiple control layers to detect and respond to threats more effectiv...
Read definition →Fallback authentication is an alternate method used to verify identity when the primary authentication path is unavailable or fails....
Read definition →Federated identity is an access model in which one trusted identity system can authenticate users for other connected applications or organizations....
Read definition →Federation is an identity and access model in which one trusted system authenticates users for access to another connected system....
Read definition →Fine-grained authorization is the enforcement of highly specific access decisions at the level of actions, fields, resources, or relationships....
Read definition →A firewall is a security control that filters network traffic based on rules to allow safe communications and block suspicious activity....
Read definition →Forensic imaging is the creation of an exact, verifiable copy of digital storage so evidence can be analyzed without altering the original source....
Read definition →Geo-velocity is the calculated speed implied by successive authentication events from different locations, used as a signal for suspicious activity....
Read definition →A golden image is a preapproved, standardized system image used as a trusted starting point for deploying new devices, servers, or workloads....
Read definition →Governance, risk, and compliance (GRC) is the discipline of aligning policies, risk decisions, controls, and regulatory obligations across an organization....
Read definition →GraphQL security is the set of controls used to protect GraphQL APIs from unauthorized access, excessive queries, data exposure, and abuse....
Read definition →A hardening guide is a documented set of recommended steps for configuring a system, application, or platform more securely....
Read definition →A honeypot is a decoy system, service, or resource designed to attract, detect, or study unauthorized access attempts....
Read definition →Identity and access management (IAM) is the set of policies, processes, and technologies used to control who can access systems, applications, and data....
Read definition →Identity attack surface is the collection of identity systems, accounts, credentials, permissions, and trust relationships that attackers can target or abuse....
Read definition →Identity governance is the practice of overseeing how identities, roles, approvals, and access rights are assigned, reviewed, and managed across an organization....
Read definition →Identity governance and administration (IGA) is the discipline of managing identity lifecycle, access approvals, reviews, and policy enforcement across systems....
Read definition →Identity hygiene is the ongoing practice of keeping identity systems, accounts, permissions, and authentication methods clean, current, and well controlled....
Read definition →Identity inventory is the maintained record of user accounts, service accounts, roles, groups, tokens, and identity systems across an environment....
Read definition →Identity lifecycle management is the process of creating, updating, governing, and removing identities and access as users join, change roles, and leave an organization....
Read definition →Identity proofing is the process of verifying that a person or entity is truly who they claim to be before granting trusted access....
Read definition →An identity provider (IdP) is a system that authenticates users and provides identity assertions to applications and services....
Read definition →Identity security posture management (ISPM) is the practice of assessing and improving the configuration, privilege, and exposure posture of identity systems and accounts....
Read definition →Identity threat detection and response (ITDR) is a security approach focused on detecting, investigating, and responding to attacks against identities, authentication flows, a...
Read definition →Idle timeout is the automatic expiration of a session after a period of inactivity....
Read definition →An immutable backup is a backup copy that cannot be altered or deleted for a defined period, even by administrators under normal conditions....
Read definition →Impossible travel is a login anomaly in which a user appears to authenticate from distant locations within a time frame that is unrealistic for normal travel....
Read definition →An incident commander is the person responsible for directing, coordinating, and prioritizing response activities during a security incident....
Read definition →Incident response is the structured process organizations use to detect, contain, investigate, and recover from cybersecurity incidents....
Read definition →An indicator of attack (IoA) is a sign of suspicious behavior that suggests an attacker may be actively attempting, staging, or carrying out malicious activity....
Read definition →An indicator of compromise (IoC) is a piece of evidence that suggests a system, account, or environment may already have been involved in malicious activity....
Read definition →Infrastructure as code security is the practice of reviewing and protecting infrastructure definitions so insecure cloud or platform configurations are caught before deploymen...
Read definition →An initial access broker (IAB) is a cybercriminal actor who gains or obtains access to victim environments and then sells that access to other threat actors....
Read definition →An insider threat is a security risk posed by someone with legitimate access to an organization's systems, data, or operations....
Read definition →Interactive application security testing (IAST) uses instrumentation inside a running application to identify security weaknesses with deeper runtime context....
Read definition →An intrusion detection system (IDS) is a security capability that monitors activity for signs of malicious behavior or policy violations....
Read definition →An intrusion prevention system (IPS) is a security control that detects and actively blocks malicious traffic or exploit behavior....
Read definition →ISO 27001 is an international standard for establishing, maintaining, and improving an information security management system (ISMS)....
Read definition →An isolation strategy is a planned approach for separating affected systems, identities, or services to contain malicious activity and reduce spread....
Read definition →Joiner mover leaver (JML) is the process for managing access when people join, change roles, or leave an organization....
Read definition →Just Enough Administration (JEA) is an administrative model that gives operators only the specific privileged capabilities needed for a task and nothing more....
Read definition →Just-in-time access (JIT) is a security approach that grants elevated or sensitive access only when needed and only for a limited period....
Read definition →JWKS, or JSON Web Key Set, is a standardized format for publishing the public keys that services use to verify signed tokens....
Read definition →JWT validation is the process of verifying the integrity, issuer, audience, lifetime, and claims of a JSON Web Token before trusting it....
Read definition →Kill chain analysis is the process of examining an attack through sequential stages to understand how the adversary gained access, moved, and achieved objectives....
Read definition →Kubernetes security is the practice of protecting clusters, control planes, workloads, identities, and configurations in Kubernetes environments....
Read definition →Lateral movement is the process attackers use to move from one compromised system, account, or segment to other parts of an environment....
Read definition →Lateral movement detection is the practice of identifying attacker behavior that spreads from one account, host, or system to other internal targets....
Read definition →Least functionality is the security principle of enabling only the features, services, ports, software, and capabilities that are actually needed....
Read definition →Least privilege is the security principle of giving users, systems, and processes only the minimum access needed to perform their functions....
Read definition →Least privilege access is the practice of giving users, applications, and systems only the permissions they need to perform approved tasks and nothing more....
Read definition →Legacy authentication refers to older sign-in methods or protocols that do not support modern security controls such as MFA and conditional access well....
Read definition →Living off the land (LotL) refers to attacker behavior that uses legitimate built-in tools, trusted utilities, or native system features to carry out malicious actions....
Read definition →A load balancer is a system that distributes traffic across multiple servers or services to improve performance, resilience, and availability....
Read definition →Log management is the process of collecting, storing, organizing, and using system and application logs for security, operations, and investigation....
Read definition →Malvertising is the use of malicious online advertising to deliver scams, malware, redirects, or exploit content to users....
Read definition →Malware is malicious software designed to damage systems, steal information, spy on users, or enable unauthorized access....
Read definition →Malware triage is the rapid initial assessment of a suspicious file or sample to determine likely risk, priority, and next investigative steps....
Read definition →A man-in-the-middle (MITM) attack intercepts or manipulates communications between two parties without their knowledge....
Read definition →Managed detection and response (MDR) is a security service that provides outsourced monitoring, detection, investigation, and response support....
Read definition →A managed device is an endpoint that is enrolled, configured, and monitored under an organization’s security and administration controls....
Read definition →Mean time to detect (MTTD) is the average time it takes an organization to discover that a security incident or suspicious event has occurred....
Read definition →Mean time to respond (MTTR) is the average time it takes an organization to act on, contain, remediate, or resolve a detected incident....
Read definition →MFA fatigue is an attack tactic that overwhelms a user with repeated authentication prompts in the hope they will eventually approve one....
Read definition →Microsegmentation is a security approach that divides environments into smaller trust zones to limit lateral movement and reduce blast radius....
Read definition →Mobile device management (MDM) is the practice of controlling, securing, and administering mobile devices used for business access and data....
Read definition →Multi-factor authentication (MFA) is a security control that requires two or more forms of verification before access is granted....
Read definition →Mutual TLS (mTLS) is a communication model in which both the client and the server authenticate each other using certificates....
Read definition →Network access control (NAC) is the practice of controlling which users and devices can connect to a network and under what conditions....
Read definition →Network security is the collection of controls and practices used to protect networks and data in transit from unauthorized access or disruption....
Read definition →The NIST Cybersecurity Framework (CSF) is a widely used framework that helps organizations organize, assess, and improve cybersecurity risk management....
Read definition →A non-human identity is an identity used by applications, services, scripts, devices, or workloads rather than by a human user....
Read definition →Number matching is an MFA mechanism that requires the user to enter or select a displayed number to confirm they initiated the login request....
Read definition →OAuth 2.0 is a framework for delegated authorization that allows an application to access resources on behalf of a user or client without sharing the user’s password directl...
Read definition →OAuth consent phishing is an attack in which a user is tricked into granting a malicious or deceptive application access to data or account capabilities through an authorizati...
Read definition →An OAuth scope is a defined permission boundary that limits what actions or resources a delegated token or client may access....
Read definition →OpenID Connect (OIDC) is an identity layer built on OAuth 2.0 that enables applications to verify a user’s identity and obtain basic profile information....
Read definition →A passkey is a modern authentication credential that uses public-key cryptography to let users sign in without relying on a traditional password....
Read definition →A password manager is a tool that stores, generates, and helps manage passwords and other secrets more securely than manual reuse or memory alone....
Read definition →A password policy is a set of rules and standards that define how passwords should be created, used, protected, and changed within an organization....
Read definition →Password spraying is an attack in which a small number of common passwords are tried across many accounts to avoid lockouts and find weak credentials....
Read definition →Passwordless authentication is an access approach that verifies users without requiring a traditional reusable password as the primary login factor....
Read definition →Patch management is the process of testing, deploying, and tracking software and system updates to reduce security and stability risk....
Read definition →Penetration testing is an authorized security assessment that simulates real attack techniques to identify exploitable weaknesses....
Read definition →Phishing is a social engineering attack that tricks users into revealing credentials, financial information, or other sensitive data....
Read definition →Phishing-resistant MFA is multi-factor authentication designed to resist credential phishing, replay, and real-time man-in-the-middle attacks....
Read definition →PKCE is an OAuth security extension that protects authorization code flows from interception by binding the code exchange to the original client....
Read definition →Policy as code is the practice of expressing governance and security rules in machine-readable form so they can be tested and enforced automatically....
Read definition →A Policy Decision Point (PDP) is the component that evaluates authorization policies and returns a decision about whether an action should be allowed....
Read definition →A Policy Enforcement Point (PEP) is the component that intercepts a request and applies the authorization decision returned by policy logic....
Read definition →Post-exploitation refers to the actions an attacker takes after gaining initial access in order to expand control, gather data, persist, or achieve their objective....
Read definition →A post-incident review is a structured review conducted after an incident to understand what happened, what failed, and what should improve next....
Read definition →A privacy impact assessment (PIA) is a process for evaluating how a project, system, or data use may affect personal information and privacy risk....
Read definition →Privilege escalation is the act of gaining higher levels of access or authority than a user or process was originally intended to have....
Read definition →Privileged access management (PAM) is the practice of controlling, monitoring, and securing elevated accounts and administrative access....
Read definition →A privileged access review is a focused review of elevated permissions, admin roles, and sensitive accounts to confirm they remain necessary and appropriate....
Read definition →Privileged identity management (PIM) is the practice of controlling, reviewing, and limiting elevated identity roles so privileged access is granted more safely....
Read definition →Privileged session management is the control and monitoring of high-risk administrative sessions to reduce misuse and improve accountability....
Read definition →Privileged task automation is the use of controlled scripts, workflows, or platforms to perform sensitive administrative actions without broad manual standing access....
Read definition →Prompt bombing is an attack in which repeated MFA push requests are sent to a user in hopes they will eventually approve one out of fatigue or confusion....
Read definition →A proof of possession (PoP) token is an access token that requires the holder to demonstrate possession of associated cryptographic material before it can be used....
Read definition →A proxy server is an intermediary system that receives requests and forwards them on behalf of a client or service....
Read definition →A public client is an OAuth or OIDC client that cannot securely keep long-term client credentials confidential....
Read definition →Public key infrastructure (PKI) is the framework of certificates, trust relationships, and cryptographic processes used to support secure digital identity and encryption....
Read definition →A purple team exercise is a collaborative security assessment where offensive and defensive teams work together to test and improve detection and response....
Read definition →Purple teaming is a collaborative security practice in which offensive and defensive teams work together to test, observe, and improve detection and response....
Read definition →Ransomware is a form of malware that encrypts or blocks access to systems and data until a victim pays for recovery....
Read definition →Ransomware-as-a-service (RaaS) is a criminal business model in which ransomware operators provide malware, infrastructure, or support to affiliates who carry out attacks....
Read definition →Rate limiting is the practice of restricting how frequently a user, client, or system can make requests within a given period....
Read definition →Real-time revocation is the ability to invalidate tokens, sessions, or access rights immediately or near-immediately when trust changes....
Read definition →Recovery point objective (RPO) is the maximum amount of data loss an organization can tolerate between the last good recovery point and a disruption....
Read definition →Recovery time objective (RTO) is the target amount of time an organization can tolerate a system, service, or process being unavailable after a disruption....
Read definition →Redirect URI validation is the process of ensuring an OAuth or OIDC authorization response is sent only to an approved and expected redirect destination....
Read definition →A refresh token is a credential used to obtain new access tokens without requiring the user or application to authenticate again each time....
Read definition →Refresh token rotation is the practice of issuing a new refresh token each time one is used and invalidating the previous token to reduce replay risk....
Read definition →Relationship-Based Access Control (ReBAC) is an authorization model that grants or denies access based on the relationships between users, resources, and organizations....
Read definition →Remote access is the ability to connect to systems, applications, or networks from outside the normal local environment....
Read definition →Remote browser isolation (RBI) is a security approach that executes web browsing activity in a separate remote environment instead of directly on the user’s device....
Read definition →A resource server is the API or service that hosts protected data or functions and enforces access based on presented tokens or credentials....
Read definition →Restore testing is the process of verifying that backup data can actually be recovered successfully into usable systems, files, or services....
Read definition →Risk acceptance is the deliberate decision to tolerate a known security risk instead of fully remediating, transferring, or avoiding it....
Read definition →A risk assessment is the process of identifying threats, vulnerabilities, likelihood, and business impact to prioritize security decisions....
Read definition →Risk-based authentication is an adaptive login approach that changes authentication requirements based on the assessed risk of a sign-in attempt....
Read definition →Role mining is the analysis of existing access patterns to identify useful role structures and reduce ad hoc permission complexity....
Read definition →Role-based access control (RBAC) is an access model that assigns permissions according to job roles or functional responsibilities....
Read definition →Root cause analysis is the process of identifying the underlying technical, human, or process failures that allowed an incident or security issue to occur....
Read definition →Runtime application self-protection (RASP) is a security approach in which an application or embedded component monitors and helps block malicious activity during execution....
Read definition →SaaS security posture management (SSPM) is the practice of monitoring and improving the security configuration, access posture, and risk settings of SaaS applications....
Read definition →Sandbox analysis is the examination of suspicious files, links, or code inside an isolated environment to observe behavior without risking production systems....
Read definition →SCIM provisioning is the automated creation, update, and removal of identities and groups between connected systems using the SCIM standard....
Read definition →A scoped token is an access token that grants only a defined subset of permissions or resource access rather than broad unrestricted use....
Read definition →Secret scanning is the process of searching code, repositories, logs, files, and workflows for exposed passwords, API keys, tokens, and other sensitive credentials....
Read definition →Secret zero is the initial credential or trust mechanism needed to obtain other secrets securely in a system or automation workflow....
Read definition →Secrets management is the practice of securely storing, controlling, rotating, and using sensitive credentials such as API keys, tokens, and passwords....
Read definition →Secrets sprawl is the uncontrolled spread of passwords, API keys, tokens, certificates, and other sensitive credentials across systems, code, documents, and user workflows....
Read definition →Secure Access Service Edge (SASE) is a cloud-delivered model that combines networking and security services for distributed users, devices, and locations....
Read definition →Secure by default means products, platforms, and systems should ship with baseline settings that reduce risk without requiring users to discover and enable protection on their...
Read definition →Secure by design is the principle of building products, systems, and architectures so security is part of the design from the start rather than bolted on later....
Read definition →A secure software development lifecycle (SSDLC) is a development approach that builds security activities into planning, design, coding, testing, release, and maintenance....
Read definition →A secure web gateway (SWG) is a security control that monitors and filters web traffic to enforce policy and reduce access to malicious or risky web content....
Read definition →Security awareness training is the process of teaching users how to recognize threats, follow security practices, and avoid risky behavior....
Read definition →A security baseline is a defined set of minimum security settings and controls that systems, devices, or applications are expected to meet....
Read definition →A security champion is a team member embedded in a business, engineering, or operations function who helps promote and reinforce security practices locally....
Read definition →A security data lake is a centralized repository used to store large volumes of raw and processed security telemetry for analysis, investigation, and detection....
Read definition →Security debt is the accumulated future risk and remediation burden created by postponed security work, weak design choices, or repeated short-term tradeoffs....
Read definition →Security information and event management (SIEM) is a platform approach that collects, correlates, and analyzes security logs and events from multiple sources....
Read definition →Security misconfiguration is a weakness created when systems, applications, cloud services, or security controls are set up in an unsafe or incomplete way....
Read definition →A security operations center (SOC) is the team and operating function responsible for monitoring, detecting, investigating, and responding to security events....
Read definition →Security orchestration is the coordination of security tools, data, and workflows so tasks and responses can be executed more consistently across systems....
Read definition →Security orchestration, automation, and response (SOAR) is a technology and workflow approach for coordinating security tools and automating response tasks....
Read definition →Security validation is the practice of testing whether security controls actually work as intended against relevant threats and scenarios....
Read definition →A service account is a non-human account used by applications, services, scripts, or automated processes to authenticate and perform tasks....
Read definition →Service mesh security is the set of controls used to secure communication, identity, policy, and observability between services in a microservices environment....
Read definition →Session binding is the practice of tying an authenticated session to expected attributes such as device, browser, network, or cryptographic context....
Read definition →Session hijacking is the abuse of a valid user session so an attacker can act as the user without needing the original password....
Read definition →Session management is the set of controls used to create, maintain, protect, and end authenticated user sessions in applications and services....
Read definition →Session revocation is the process of invalidating active authentication sessions or tokens so they can no longer be used for access....
Read definition →Session risk scoring is the process of evaluating an active authenticated session for suspicious signals that may justify additional controls or termination....
Read definition →A shadow API is an undocumented, unmanaged, forgotten, or poorly governed application interface that exists outside normal security visibility and control....
Read definition →Shadow identity is an unmanaged or poorly governed account, identity, or access path that exists outside normal security visibility and control....
Read definition →Single sign-on (SSO) is an authentication approach that lets users access multiple applications with one primary login session....
Read definition →Single-factor authentication is a login method that relies on only one category of proof, such as a password, to verify identity....
Read definition →SOC 2 is an attestation framework used to evaluate controls relevant to security, availability, processing integrity, confidentiality, and privacy....
Read definition →Social engineering is the use of deception and manipulation to trick people into revealing information or taking unsafe actions....
Read definition →A software bill of materials (SBOM) is a structured inventory of the components, libraries, and dependencies that make up a software product or application....
Read definition →Software composition analysis (SCA) is the process of identifying and evaluating third-party libraries, packages, and open-source components used in software....
Read definition →Spam is unsolicited bulk messaging often used for advertising, fraud, phishing, and large-scale malicious delivery....
Read definition →Spyware is malware that secretly monitors users, gathers sensitive information, or tracks behavior without consent....
Read definition →SQL injection is a web attack that manipulates database queries through unsafe input handling in an application....
Read definition →Static application security testing (SAST) analyzes source code, bytecode, or compiled artifacts to find potential security weaknesses without running the application....
Read definition →Step-up authentication is the requirement for stronger or additional verification when a login or action is considered higher risk....
Read definition →A supply chain attack is a cyberattack that compromises a target through a trusted vendor, software dependency, or outside service relationship....
Read definition →A tabletop exercise is a structured discussion-based simulation used to test how people, teams, and leaders would respond to a cybersecurity incident or crisis....
Read definition →Tamper protection is a security control that helps prevent unauthorized users or malware from disabling, modifying, or weakening security protections....
Read definition →Tenant isolation is the separation of customer data, permissions, and operations so one tenant cannot access or affect another tenant’s environment....
Read definition →Third-party due diligence is the process of reviewing external vendors, partners, or providers before and during a relationship to understand risk and trustworthiness....
Read definition →Third-party risk is the security, operational, and compliance exposure created by vendors, suppliers, contractors, and other outside relationships....
Read definition →Threat hunting is the proactive practice of searching for signs of attacker activity that automated alerts may have missed....
Read definition →Threat intelligence is collected and analyzed information about threats, threat actors, tactics, and indicators used to support better security decisions....
Read definition →A threat intelligence platform (TIP) is a system used to collect, organize, enrich, and distribute threat intelligence for security operations and analysis....
Read definition →Threat modeling is the structured process of identifying how a system could be attacked, what matters most to protect, and which safeguards should be prioritized....
Read definition →Token binding is the practice of associating a token with a specific client or cryptographic context so the token is harder to reuse elsewhere....
Read definition →Token introspection is the process of asking an authorization service for the current validity and metadata of a token before trusting it....
Read definition →Token replay is the reuse of a captured authentication token to impersonate a legitimate user or service....
Read definition →Token theft is the unauthorized capture or reuse of authentication or session tokens that allow access to systems or applications....
Read definition →A toxic combination of access is a set of permissions that should not be held together because they create excessive fraud, abuse, or control-bypass risk....
Read definition →A trojan horse is malware that disguises itself as legitimate software or content so a victim will install or run it....
Read definition →A trusted device is an endpoint that an organization recognizes as meeting the conditions required for higher-confidence access decisions....
Read definition →User and entity behavior analytics (UEBA) is a detection approach that looks for abnormal or risky patterns in how users, devices, systems, or service accounts behave over tim...
Read definition →Vendor risk management is the process of evaluating, monitoring, and governing security and business risk introduced by third parties....
Read definition →A virtual private network (VPN) creates an encrypted connection that helps protect traffic, improve privacy, and secure remote access....
Read definition →A computer virus is a type of malware that attaches to files or programs and spreads when infected content is executed....
Read definition →A vulnerability is a weakness in software, hardware, configuration, or process that attackers can exploit to gain access or cause harm....
Read definition →A vulnerability disclosure program (VDP) is a structured process that tells security researchers how to report vulnerabilities safely and responsibly to an organization....
Read definition →Vulnerability management is the ongoing process of identifying, assessing, prioritizing, remediating, and tracking security weaknesses over time....
Read definition →Vulnerability scanning is the automated process of checking systems, applications, or environments for known weaknesses, missing patches, or insecure configurations....
Read definition →A watering hole attack compromises or imitates a website that a target group is likely to visit so the attacker can infect, monitor, or exploit those visitors....
Read definition →A web application firewall (WAF) is a security control that filters and monitors HTTP traffic to help protect web applications from common attacks....
Read definition →Workload identity is the mechanism by which an application, service, or compute workload proves its identity to access other systems securely....
Read definition →Workload identity federation is a trust model that lets external or federated workloads obtain access without storing long-lived static credentials....
Read definition →A worm is self-replicating malware that spreads across devices or networks by exploiting vulnerabilities or weak security controls....
Read definition →Zero Trust is a security model that assumes no user, device, or connection should be inherently trusted without continuous verification....
Read definition →A zero-day vulnerability is a flaw that attackers can exploit before a vendor or defender has a reliable patch or mitigation in place....
Read definition →