IAM Glossary

What is Access Discovery? Access Discovery in the context of cloud environments involves identifying, cataloging, and analyzing all access points,...

What is Access Management? Access Management is the process of controlling and monitoring who has access to the organization’s information...

What is Access Provisioning Access Provisioning is the process of creating, managing, and removing user accounts and permissions within an...

What is ABAC, RBAC, and PBAC ABAC (Attribute-Based Access Control), RBAC (Role-Based Access Control), and PBAC (Policy-Based Access Control) are...

What is Account Takeover (ATO)? Account takeover (ATO) is a form of identity theft where cybercriminals gain unauthorized access to...

What is Approval Workflows Approval workflows are structured processes that require one or more levels of authorization before a specific...

What is Adaptive Multi-Factor Authentication (MFA) Adaptive Multi-Factor Authentication (MFA) is an advanced security mechanism that adjusts the required authentication...

What is Authentication and Authorization? Authentication: The process of verifying the identity of a user, device, or system. It ensures...

What is Blast Radius In the context of cybersecurity, the term “Blast Radius” refers to the potential impact or extent...

What is Birthright Access Birthright Access refers to the automatic provisioning of baseline access rights to new employees, contractors, or...

What is Cloud IAM Permissions Cloud Identity and Access Management (IAM) Permissions refer to the policies and rules that define...

What is Cloud Identity Security? Cloud Identity Security involves protecting and managing user identities and their access to cloud resources....

What is CIEM – Cloud Infrastructure Entitlement Management? Cloud Infrastructure Entitlement Management (CIEM) refers to the process of managing and...

What is Cyber Insurance? Cyber Insurance, also known as cybersecurity insurance or cyber liability insurance, is a type of insurance...

What is a Data Breach? A data breach is a security incident where unauthorized individuals gain access to confidential, sensitive,...

What is Defense-in-Depth? Defense-in-depth is a cybersecurity strategy that employs a layered approach to security. Rather than relying on a...

What is FedRAMP? FedRAMP, or the Federal Risk and Authorization Management Program, is a government-wide program established to provide a...

What is Identity and Access Management (IAM)? Identity and Access Management (IAM) is a framework of policies, processes, and technologies...

What is AWS IAM Identity Center? AWS IAM Identity Center (Identity Center) is a cloud service that provides centralized management...

What is Identity Governance and Administration (IGA)? Identity Governance and Administration (IGA) is a comprehensive framework that combines identity management...

What is Identity Security? Identity Security encompasses a set of practices, technologies, and policies designed to protect digital identities and...

What is Identity Orchestration? Identity Orchestration refers to the automated coordination and management of identity-related processes across various systems and...

What is Identity Lifecycle Management (ILM)? Identity Lifecycle Management (ILM) is the process of managing user identities and their access...

What is Identity Threat Detection and Response (ITDR)? Identity Threat Detection and Response (ITDR) is a set of practices and...

What is Just-In-Time Access? Just-In-Time (JIT) access is a security approach that grants users access to resources only for a...

What is Kubernetes Access Control? Kubernetes Access Control involves managing and enforcing policies that determine which users and services can...

What is Least Privilege? The principle of Least Privilege (PoLP) refers to the security practice of granting users, applications, and...

What is On-call Access Provisioning? On-call access provisioning is the process of granting temporary, time-limited access to IT systems, applications,...

What is a Phishing Attack? A phishing attack is a type of cyber attack where attackers impersonate legitimate entities to...

Our Privileged Access Management (PAM) system is designed to empower organizations with a dynamic and automated approach to permission management....

What is Break-Glass Access? Break-glass access refers to an emergency mechanism that allows authorized personnel to gain immediate access to...

What is Secret Management? Secret management involves the secure handling of sensitive information used in software applications and IT infrastructure....

What is Security Assertion Markup Language (SAML)? Security Assertion Markup Language (SAML) is an XML-based standard for exchanging authentication and...

What is Single Sign-On (SSO)? Single Sign-On (SSO) is an authentication process that allows a user to access multiple applications...

What is SOC 2? SOC 2 is a framework developed by the American Institute of CPAs (AICPA) for managing customer...

What is Zero Standing Privileges (ZSP)? Zero Standing Privileges (ZSP) is a security strategy that eliminates permanent, long-term access rights...

What is Zero Trust Network Access (ZTNA)? Zero Trust Network Access (ZTNA) is a security model that assumes no implicit...

This website uses cookies. By continuing to browse this site, you agree to this use.