Securden PAM &
Cybersecurity Glossary

A comprehensive glossary of essential cybersecurity terms commonly used in the industry.

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

A

Access Management

Access management is the comprehensive process of identifying, tracking, and controlling access to systems and resources within an organization. It ensures users have appropriate levels of access based on their roles and responsibilities.

Account Management

Account management is the process of creating, maintaining, monitoring, and terminating user accounts within an organization’s systems. It includes defining access rights, implementing security controls, and ensuring proper documentation of user privileges.

Active Directory

Active Directory (AD) is Microsoft’s directory and identity management service for Windows networks. AD works as a centralized system for user authentication, authorization, and resource management, storing essential information about user accounts, applications, and network resources in a structured format. It simplifies network administration by allowing IT teams to manage user access and security policies across the organization efficiently.

API Management

API management is a systematic approach to securing, controlling, and monitoring application programming interfaces throughout their lifecycle. The practice includes access control implementation, usage monitoring, and security policy enforcement for data exchange between applications.

Application Control

Application control is a practice used to manage and regulate software application execution on a computer or a network. The process includes defining and implementing policies that define which applications can run and how they may execute. It focuses on enhancing security by mitigating risks associated with unauthorized or malicious applications.

Application Gateway

An application gateway is an enterprise solution that simplifies and secures access to web applications, whether hosted in a corporate or the cloud. The solution allows users to access this application using the same login credentials that are used for mobile apps and cloud services. Application gateways reduce IT complexities and eliminate the requirement for expensive VPNs by consolidating access methods.

Application Whitelisting

Application Whitelisting is a security method that allows only pre-approved applications to run on a system. It blocks unauthorized or malicious software, enhancing protection against cyber threats.

Audit Log

An audit log is a chronological record of events related to system activities, including user actions and changes made within an application or network. Maintaining detailed audit logs helps organizations track access and modifications, facilitating accountability and compliance with regulatory requirements.

Authentication

Authentication is the process of verifying the identity of a user, system, or entity. It ensures that users are who they claim to be through various methods such as passwords, biometrics, or security tokens.

Automated Provisioning

Automated Provisioning is the process of automating the entire process of creating, managing, and revoking user accounts or access with the help of software-driven workflows. By automating the lifecycle of access based on predefined roles, policies, and workflows, automated provisioning reduces admin workload, improves overall efficiency, and reduces errors.

B

Brute Force Attack

A brute force attack is a cybersecurity breach attempt where attackers take a trial-and-error approach to systematically try all possible combinations of passwords or encryption keys until finding the correct one. These attacks can be prevented through strong password policies and account lockout mechanisms.

C

CCPA

CCPA (California Consumer Privacy Act) is a state law that enhances privacy rights and consumer protection for California residents. It regulates how businesses collect, store, and use personal information, giving consumers rights over their data.

Cloud Infrastructure Entitlement Management

Cloud Infrastructure Entitlement Management (CIEM) is the cloud security solution that manages and controls user access to cloud resources by defining and implementing permissions and entitlements. It adheres to the “Least privilege” principle that ensures only authorized individuals have the right level of access to cloud environments. CIEM helps reduce vulnerabilities caused by unnecessary permissions on cloud platforms like AWS and Azure.

Cloud Security

Cloud security is a comprehensive framework of protective measures designed to protect cloud computing environments from internal and external threats. The framework combines specialized technologies, access controls, and security policies to defend cloud-based assets from cyber threats. Security teams use these tools to protect sensitive data, enforce compliance standards, and prevent unauthorized system access across public, private, and hybrid cloud deployments.

CMMC Compliance

CMMC (Cybersecurity Maturity Model Certification) is a unified security standard established by the Department of Defense (DoD) for Defense Industrial Base (DIB) contractors. It consists of five maturity levels of cybersecurity practices and processes, ensuring adequate protection of controlled unclassified information within the defense supply chain.

Continuous Monitoring

Continuous monitoring is an ongoing security process that provides real-time assessment of system security controls, vulnerabilities, and threats. This practice enables rapid threat detection, compliance verification, and security posture measurement through constant system surveillance.

Credential Stuffing

Credential stuffing is a cyberattack where stolen account credentials (usually from data breaches) are automatically inputted into multiple websites to gain unauthorized access. Attackers exploit users who reuse passwords across different services.

Cyber Insurance

Cyber insurance is a type of insurance coverage that protects organizations from losses related to cyber incidents such as data breaches, ransomware attacks, and other cybersecurity events. It can cover the costs of recovery, legal fees, and business interruption.

Cybersecurity

Cybersecurity is the practice of protecting systems, networks, programs, and sensitive data from cyberattacks and unauthorized access. It encompasses technologies, processes, and controls designed to secure digital assets and maintain confidentiality, integrity, and availability of information.

D

DevOps Security

DevOps Security (DevSecOps), which is a combination of development, operations, and security, refers to the practice of integrating security measures and controls throughout the entire DevOps lifecycle. It ensures the integration of security into each phase of software development from planning to the maintenance part. This approach focuses on automation and constant monitoring to identify and address vulnerabilities at an earlier stage.

Digital Identity

Digital identity is the online representation of an individual or entity, encompassing all electronically captured and stored identity attributes. It includes credentials, access rights, and relationships that authenticate users across digital systems and services.

Domain Admin Accounts

A domain admin account is a user account that grants full control over all domain management tasks in a networked environment within Microsoft Active Directory. It includes handling user accounts, group policies, and network resources. The account offers full access to the domain, which allows the user to adjust system settings and implement security policies throughout the domain.

DORA Compliance

Digital Operational Resilience Act (DORA) Compliance is a European Union (EU) regulation that ensures financial institutions and third-party service providers withstand, respond to, and recover from Information and Communication Technology (ICT) disruptions and cyber threats. DORA mandates standardized risk management and third-party oversight within the EU financial sector to improve operational resilience and cybersecurity.

Dynamic Access Control

Dynamic access control is a Windows Security feature that allows administrators to network resources depending on the dynamic variables. It focuses on conditional access control which allows permissions to be set according to dynamic factors like user roles, device security status, and the sensitivity of the resources being accessed.

E

Endpoint Privilege Management

Endpoint Privilege Management is a cybersecurity practice that grants access to end users on network devices like laptops or servers while adhering to the principle of least privilege. It ensures that only authorized users or applications receive privileged access to perform high-risk actions, reducing the risk of misuse or cyberattacks.

Endpoint Security

Endpoint security is the practice of securing end-user devices such as desktops, laptops, mobile devices, and servers from cybersecurity threats. It includes antivirus software, encryption, and other security measures to protect endpoints from malicious attacks.

Enterprise Password Management

Enterprise Password Management (EPM) is a system that securely manages and controls access to passwords and sensitive credentials within the organization. The system centralizes password storage in encrypted vaults and integrates easily with multi-factor authentication (MFA). Enterprise password management also offers role-based access controls and audit trails to ensure regulatory compliance and reduce cybersecurity risks.

Ephemeral Environments

An ephemeral environment is a temporary computing environment created for a specific task like testing, development, or staging. It is automatically created for a specific purpose and removed when the task is done to save resources and prevent system interference. Ephemeral environments are used in continuous integration and continuous deployment (CI/CD) pipelines and cloud-based development processes.

F

FedRAMP

FedRAMP (Federal Risk and Authorization Management Program) is a U.S. government program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services used by federal agencies.

FIDO2

Fast IDentity Online 2 (FIDO2) is an open authentication standard that enables passwordless secure user verification through public key cryptography, biometrics, and security keys. The protocol supports cross-platform authentication while eliminating password-related vulnerabilities.

FISMA

FISMA (Federal Information Security Management Act) is a U.S. federal law that requires federal agencies to develop and implement information security programs to protect government information and systems. It establishes a framework for managing cybersecurity risks across federal information systems.

G

GDPR

GDPR (General Data Protection Regulation) is a comprehensive EU data protection law that sets guidelines for collecting and processing the personal information of EU residents. It gives individuals control over their data and requires organizations to implement appropriate security measures.

Granular Access Control

Granular access control is the process of granting fine granular access to resources. It allows administrators to assign permissions at a specific level which ensures that users only have access required to perform their tasks. This assists businesses in preventing unauthorized access by limiting exposure to sensitive data and actions.

H

HIPAA

HIPAA (Health Insurance Portability and Accountability Act) is a U.S. federal law that protects the confidentiality of medical records and other sensitive patient health information (PHI). It requires healthcare providers, insurers, and other organizations handling patient data to safeguard PHI by controlling access to it.

I

Identity and Access Management

Identity and Access Management (IAM) is a cybersecurity framework of policies and technologies that ensures the right individuals access the right resources at the right times for the right reasons. It encompasses user authentication, authorization, and privileges management across an organization.

Insider Threat

An insider threat is a security risk that originates from within an organization, typically from employees, contractors, or business partners who have authorized access to systems and data. These threats can be malicious or unintentional, requiring comprehensive monitoring and access controls.

ISO 27001 Compliance

International Organization for Standardization 27001 (ISO 27001) is an international standard that specifies requirements for establishing, implementing, and maintaining information security management systems. The certification validates an organization's systematic approach to protecting sensitive information through documented security controls and risk management.

J

Just-in-Time Access

Just-in-Time (JIT) access is a security practice that provides limited-time access to resources and systems when required. This approach ensures that users or applications are given a minimum level of access that is needed to perform specific tasks or actions and that this access is automatically revoked when they complete the task. JIT access assists in reducing security risks by limiting exposure to sensitive systems & data and preventing unauthorized access or misuse.

L

Least Privilege

Least privilege is a security principle that restricts local admin rights and system access privileges to only those resources required to perform routine, legitimate activities. This minimizes the potential damage from accidents or attacks.

Local Account

A local account refers to a user account on a particular device that allows access to the device’s resources without depending on an internet connection. The login credentials, like username and password, are stored locally on the device and are not synchronized across other devices or platforms. Local accounts are basically used for offline access and are not dependent on cloud-based services.

M

Malware

Malware (malicious software) is any program or code designed to harm computer systems, networks, or users. It can steal data, disrupt operations, or gain unauthorized access to systems. Common types include viruses, worms, and spyware.

Managed Security Service Provider

A Managed Security Service Provider (MSSP) is a third-party company offering outsourced cybersecurity services, including monitoring, managing, and responding to security threats. These providers use advanced technologies and expert teams to protect their clients from cyber threats. MSSPs monitor security events 24/7, manage firewalls, and conduct regular security assessments.

Managed Service Provider

A Managed Service Provider (MSP) is a third-party company that remotely manages and assumes responsibility for a business’s systems, services, and infrastructure. MSPs provide various services like network management, cybersecurity, data backups, and software maintenance via subscription-based contracts. MSP aims to reduce downtime and offer exceptional support, ensuring the smooth functioning of the company’s IT environment.

Multi-factor Authentication

Multi-factor authentication (MFA) is a security measure that verifies a user's identity through multiple independent credentials. MFA often combines a traditional password with additional proofs such as a unique code sent to a mobile device or a biometric scan, enhancing overall protection against unauthorized access.

N

NIS 2 Compliance

Network and Information Security Directive 2 (NIS 2) compliance refers to meeting the requirements set by the NIS 2 Directive, which is an EU regulation aiming to improve the cybersecurity of networks and information systems within the EU. It requires important service providers and digital service providers to integrate strict security measures and ensure strong supply chain security. NIS 2 compliance ensures that businesses in sectors like healthcare and transport meet security standards to prevent cyber threats and protect national security.

NIST Compliance

NIST compliance is adherence to cybersecurity frameworks and guidelines established by the National Institute of Standards and Technology. The frameworks provide structured approaches to risk management, security control implementation, and incident response procedures.

P

Password

A password is a secret authentication credential, typically a string of characters, used to verify a user's identity and grant access to digital resources. Strong passwords combine letters, numbers, and special characters to protect accounts from unauthorized access.

Password Management

Password management is used to securely create, store, organize, and share passwords within various online accounts and systems. It includes the usage of specialized tools or software to generate strong as well as unique passwords. Password management helps users manage access to multiple accounts while minimizing unauthorized access and data breaches.

Password Management Tools

Password management tools are software applications that help securely store and manage passwords for various online services. These tools generate and autofill online account passwords to ensure users access their accounts quickly. Password management tools use encryption to secure stored data, providing capabilities like multi-factor authentication and secure password sharing.

Password Rotation

Password rotation is the practice of periodically changing passwords within a firm or system to improve security. The approach includes updating passwords at intervals, like every 30 or 90 days to minimize the risk of unauthorized access if a password is compromised. The goal here is to limit the window of time in which a compromised password can be used. Also, during the password rotation, security measures like MFA are combined to improve security.

Password Vaulting

Password vaulting is the method of securely storing and managing passwords in an encrypted digital repository, which is also known as a password vault. This vault is built to secure sensitive login information by using encryption to ensure only authorized users access the stored credentials. The method includes functionalities like password generation and multi-factor authentication to improve convenience and security.

PCI DSS Compliance

The Payment Card Industry Data Security Standard (PCI DSS) is a set of security requirements designed to protect credit card data throughout payment processing systems. This standard mandates specific controls for network security, encryption, access management, and regular security testing.

Policy-Based Access Control

Policy-Based Access Control (PBAC) is a dynamic access control model that applies rules or policies to manage who can access specific resources. It is centralized and flexible, allowing it to adapt to organizational changes. PBAC ensures consistent, automated enforcement of security protocols based on defined criteria, such as roles or tasks.

Principle Of Least Privilege

The Principle of Least Privilege is an access security concept that ensures users or systems have only the minimal access rights needed to perform their tasks. It helps prevent unauthorized access or accidental changes to sensitive systems by restricting the levels of permissions granted.

Privilege Elevation and Delegation Management

Privilege Elevation and Delegation Management (PEDM) refers to managing temporary privileged access rights or permission to users and assigning particular access rights or tasks to other users within the IT infrastructure. It grants elevated privileges only when necessary, under strict supervision, and manages who can delegate specific responsibilities.

Privileged Access Governance

Privileged Access Governance (PAG) is a strategic framework that controls, monitors, and manages access rights to privileged accounts within the digital infrastructure. Enforcing rigorous access policies, PAG minimizes risks tied to elevated privileges while ensuring adherence to internal guidelines and regulatory standards.

It leverages real-time monitoring, periodic access reviews, and advanced analytics to detect anomalies and prevent misuse, fostering a secure and compliant environment.

Privileged Access Management

Privileged Access Management (PAM) is a cybersecurity strategy that controls and monitors access to systems and data by users with high-level privileges like administrators or root users. PAM assists in minimizing the risk of unauthorized access and misuse by integrating strict policies around who can access information or data, when, and how. It also helps businesses implement the principle of least privilege to ensure users have only the necessary access to perform tasks.

Privileged Access Management as a Service

Privileged Access Management as a Service (PAMaaS) is a cloud-based security solution that allows businesses to control, monitor, and secure access to systems and sensitive data by privileged users. It centralizes privileged account management and provides real-time monitoring & auditing of privileged sessions to reduce risks of security breaches. This service ensures that privileged access is granted only to authorized users under strict policies.

Privileged Access Management Tool

A Privileged Access Management (PAM) Tool is a cybersecurity solution that controls and secures access to sensitive systems and data by managing privileged accounts. These accounts are those with high-level permission, like administrators. PAM tools implement access policies, track and log user actions, manage and rotate passwords, and also ensure that privileged access is granted only to authorized users to minimize the risk of misuse and insider threats.

Privileged Access Workstation

A Privileged Access Workstation is a secure, dedicated device used exclusively for performing sensitive administrative tasks. It reduces exposure to cyber threats by isolating privileged activities, such as managing identity systems, servers, databases, and other critical resources from regular operations like checking mail and web browsing.

Privileged Account

A privileged account is a user account with high-level permissions that allows the user to perform administrative functions and access sensitive systems or data beyond standard user accounts. These accounts are assigned to system administrators or IT personnel who need high-level control over business infrastructure or networks. Privileged accounts easily configure system settings and manage user access to maintain and secure the IT environment.

Privileged Account and Session Management

Privileged Account and Session Management (PASM) is a security framework developed to regulate, monitor, and oversee access to privileged accounts and their active sessions. PASM ensures that privileged access is granted only when needed and logs all the activities during these sessions to avoid unauthorized actions and identify security threats. This process helps protect sensitive systems and data from insider threats and external cyberattacks.

Privileged Account Management

Privileged account management is a security framework that manages and secures access to accounts with high-level permissions like super admins, admins, auditors, account managers, or superusers. PAM minimizes security risks by managing access, enforcing the least privilege principle, and implementing strong monitoring to identify and address unauthorized activities.

Privileged Password Management

Privileged Password Management is a cybersecurity practice that secures and manages passwords for sensitive accounts. It includes password rotation, access monitoring, and secure storage to protect sensitive credentials from misuse.

Privileged Session Management

Privileged session management is a cybersecurity practice that helps businesses monitor, manage, and secure sessions initiated by users with elevated access rights. PSM helps mitigate risks associated with the misuse of privileged access by implementing strict governance over privileged accounts, passwords, and sessions.

Privileged Threat Analytics

Privileged Threat Analytics (PTA) is a cybersecurity solution that monitors and analyzes the actions of privileged accounts like system administrators or super admins within the company’s network. PTA tools use machine learning and behavioral monitoring to identify abnormal or suspicious activities involving these elevated access accounts. PTA improves the security posture of the business and minimizes the risk of data breaches or other security incidents.

Privileged User Behavior Analytics

Privileged User Behavior Analytics (PUBA) is a security practice that uses advanced analytics to monitor and assess privileged user’s activities within IT systems. PUBA helps identify abnormal or suspicious behaviors that indicate security threats or misuse of access. It allows businesses to identify, prevent, and respond to security incidents involving privileged users by analyzing those behaviors.

R

Ransomware

Ransomware is a type of malware that encrypts a victim's files or systems and blocks the user’s access, demanding a ransom (usually in cryptocurrency) for the decryption key. It can severely impact business operations and has become a significant threat to organizations worldwide.

Remote Access

Remote access is the ability to connect to and use resources on a network or computer system from a distant location, remotely. It enables workers to access corporate systems securely from outside the office, requiring proper security controls to prevent unauthorized access.

Organizations deploy secure methods such as virtual private networks (VPNs) and zero-trust models to ensure data protection and system integrity.

Remote Privileged Access Management

Remote Privileged Access Management (RPAM) is a cybersecurity practice that controls, monitors, and secures privileged access to systems and sensitive information for remote users. It ensures that users with privileged access rights, like system administrators or third-party vendors securely connect to business networks and resources from remote locations.

Role-Based Access Control

Role-Based Access Control (RBAC) is a method of restricting system access to users depending on their roles in the organization. In RBAC, permissions are assigned to roles, and users are placed in roles based on their job responsibilities. This ensures that users only have access to resources and actions required as per the role which reduces the risk of unauthorized access and improves system security.

S

SAML

SAML (Security Assertion Markup Language) is an open standard for exchanging authentication and authorization data between parties, particularly between identity providers and service providers. It enables single sign-on (SSO) across different systems.

Secure File Transfer Protocol

Secure File Transfer Protocol (SFTP) is a network protocol that offers secure file transfer functionality over a secure connection, which is mostly done using SSH (Secure Shell) encryption. This ensures the confidentiality and authenticity of data during transmission by ensuring the overall session, like the authentication process. SFTP is used for transferring files securely between remote systems to prevent unnecessary access and data breaches.

Secure Remote Access

Secure remote access is a cybersecurity strategy that allows authenticated users to securely connect to an organization’s network, system, or application from any location. The process includes the use of encrypted protocols like Transport Layer Security (TLS) and Internet Protocol Security (IPSec) to ensure data confidentiality, while multi-factor authentication (MFA) and identity management systems restrict unauthorized entry.

Modern implementations also integrate Zero Trust Network Access (ZTNA), continuously assessing device compliance and user behavior. This layered approach minimizes cyber threats and maintains data integrity even on unsecured networks.

Security Information and Event Management

Security Information and Event Management (SIEM) is a security solution that offers real-time monitoring and management of security events and data within the IT infrastructure. The solution combines the functionalities of Security Information Management (SIM) and Security Event Management (SEM) to store and analyze log data from diverse sources for threat detection and response.

Service Account

A service account is a non-human privileged account used by systems, applications, and automated processes. They help you assign a digital identity for systems and other IT services running in the background. Service accounts facilitate machine-to-machine and machine-to-human interactions within an organization.

Service Account Management

Service Account Management is a security practice involving the governance and overall management of privileged accounts used by applications or services, also known as service accounts, to interact with systems. It secures these non-human privileged accounts (service accounts) by managing passwords, permissions, and monitoring their activities to prevent misuse.

SOC 2

SOC 2 (Service Organization Control 2) is an auditing framework that verifies how service organizations manage and protect customer data. It evaluates security controls based on five trust principles: security, availability, processing integrity, confidentiality, and privacy.

SSH Key Management

Secure Socket Shell (SSH) Key Management is the process of managing SSH keys throughout their lifecycle, which includes creating, distributing, storing, using, rotating, and revocating the keys to ensure authentication. The process ensures that only authorized users access resources by handling private-public key pairs for SSH authentication. Effective SSH key management involves secure generation, periodic key rotation, and auditing to maintain security.

U

User Account Control

User account control is a security feature of Windows operating systems that helps businesses monitor and restrict applications and processes from making unauthorized modifications. This feature strengthens system security by keeping most tasks under standard privileges. It only elevates to administrative permissions when necessary which is based on the approval.

User and Entity Behavior Analytics

User and Entity Behavior Analytics (UEBA) is a cybersecurity solution that uses advanced analytics and machine learning for monitoring and analyzing the behavior of users or entities. UEBA builds a baseline of normal behavior and tracks deviations to identify suspicious or anomalous activities like insider attacks or APTs. Not just like other traditional tools relying on predefined rules or signatures, UEBA detects unusual behavior patterns for threat detection.

V

Vendor Privileged Access Management

Vendor Privileged Access Management (VPAM) is a security framework that helps control, monitor, and manage privileged access granted to third-party providers or contractors. This approach ensures that vendors only have the necessary access to the system and data to perform tasks. It includes access control, monitoring, auditing, credential management, and temporary access policies to protect vendor interactions with the IT infrastructure.

Vulnerability Scanning

A vulnerability scan is a systematic examination of systems, networks, and applications that identifies security weaknesses, misconfigurations, and potential entry points for attackers. Automated scanning tools assess systems against known vulnerability databases to prioritize security patches.

Z

Zero Standing Privileges

Zero Standing Privileges is a security principle where no user or system retains permanent administrative access. Instead, all elevated privileges and permissions are granted temporarily or on a “just-in-time” basis whenever required, reducing the risk of misuse or attacks.

Zero Trust Network Access

Zero Trust Network Access (ZTNA) is a security model based on the principle of “never trust”, assuming that no user or device whether inside or outside the company’s network can be trusted by default. It implements strict verification of every user, device, and application that attempts to access resources. ZTNA authenticates constantly and authorizes access based on identity, device health, and behavior which ensures only authorized entities access resources.

Zero Trust Security

Zero Trust Security is a network security model where no device or user is trusted by default, even within the network. Verification is a must for every access request, thereby enforcing strict protection that’ll safeguard you against unauthorized access.

See it in action

Take the best first step in access security with Securden privileged access management software.

Enter a proper email address.
Securden Help Assistant
What's next?
Request a Demo Get a Price Quote

Thanks for sharing your details.
We will be in touch with you shortly

Thanks for sharing your details.
We will be in touch with you shortly