Security Service Edge (SSE), is the security component of SASE that unifies all security services, including Secure Web Gateway (SWG), Cloud Access Security Broker (CASB), and Zero Trust Network Access (ZTNA), to secure access to web, cloud services, and private applications. WAN Edge Infrastructure, the networking component in the SASE framework, focuses on the network connectivity element by transforming network architectures to enable a more efficient direct-to-cloud connectivity.
CNAPP (Cloud-Native Application Protection Platform) is a security solution designed to safeguard applications and workloads in cloud-native environments, incorporating features such as workload protection, vulnerability management, and compliance monitoring to ensure robust security across the entire application lifecycle.
CIEM (Cloud Infrastructure Entitlement Management) is a security solution that helps organizations manage and enforce user permissions and entitlements across multi-cloud environments, ensuring least-privilege access and reducing the risk of unauthorized access or breaches.
DSPM (Data Security and Privacy Management) is a comprehensive approach to safeguarding an organization's sensitive data and user privacy by implementing robust security measures, policies, and practices to prevent unauthorized access, misuse, or breaches.
Application Programming Interface
Advanced Threat Protection
Anti-Virus
Amazon Web Services commonly referred to as AWS is a cloud computing service it provides software as a service platform as a service and infrastructure as a service
Tunneling all the traffic towards a gateway
Technology to identify and then block/allow Internet applications
Microsoft Azure commonly referred to as Azure is a cloud computing service it provides software as a service platform as a service and infrastructure as a service
Bring your own device
Technology used to control the amount of traffic flowing between two network endpoints.
Service that runs a remote browser and provides streaming or "read-only" type of service for the end-user such capability is isolating the user from any internet harm while browsing
Stands for Command and Control used by attackers to retain communications with compromised systems within a target network and submit commands for execution by the malware
Certification Authority
Cloud Access Security Broker
Common Event Format
A method to frequently deliver apps to customers by introducing automation into the stages of app development aka agile development. Specifically CI/CD introduces ongoing automation and continuous monitoring throughout the lifecycle of apps from integration and testing phases to delivery and deployment.
Cloud Security Posture Management is a process of continuous monitoring and improvement of the cloud system security.
Cloud Security Web Gateway
Dynamic Application Security Testing demonstrates the attack and provides a proof of exploit for every risk uncovered
Domain Controller or Data Center
Data Leak Prevention — Technology to stop data exfiltration
Domain Name Service
Process of organizing data into categories that make it is easy to retrieve sort and store for future use. A well-planned data classification system makes essential data easy to find and retrieve.
DoH stands for DNS over HTTPS and is a standard DNS protocol that uses HTTPS transport to keep the DNS exchange data protected from eavesdropping. Web browsers like Mozilla's Firefox Microsoft's Edge and Google's Chrome all have the ability to use DoH with the goal of increasing data privacy and security for the users.
Endpoint Detection and Response is a technology used to detect malicious activity on the endpoints
Endpoint Protection Platform most of the time refers to traditional Anti-Virus companies or NGAV vendors
A permission (allowed action) and a scope that allowed action applies to (e.g. read files in folder start a VM in a specific project)
Google Cloud Platform offered by Google is a suite of cloud computing services that runs on the same infrastructure that Google uses internally for its end-user products
## H
Host IDS Intrusion Detection System
Identity Access Governance the practice of managing access granted to identities
Identity and Access Management a wide field covering things like IGA SSO PAM MFA IDM and others
Interactive Application Security Testing analyzes code for security vulnerabilities while the app is run by an automated test human tester or any activity with the application functionality.
Industrial Control Systems
Intrusion Detection System technology used for detection of network threats unable to prevent this threats but cable of sending alerts upon detection (passive)
Identity Governance and Administration products used to govern and manage identities and their access (coarse or granular)
Integrnet Gateway
Industrial Internet of Things
Intrusion Prevention System technology used for detection and prevention of network threats (active)
Internet Protocol Security — one of the technologies used for traffic encryption between peers
Infrastructure as a Service
Infrastructure as a Service are mainly public cloud services such as AWSAZURE and GCP
Internet of Medical Things
Internet of Things
Log Event Extended Format
Managed Detection and Response is a managed security service providing threat intelligence from incident detection and response to incident monitoring and analysis
Multi-Factor Authentication
Manufacturer Usage Descriptions a file containing YANG-based JSON that describes a Thing and associated suggested specific network behavior. RFC [8520](https://tools.ietf.org/html/rfc8520)
Software designed to intentionally cause damage to a computer server client or computer network. A wide variety of Malware types exists including computer viruses worms Trojan horses ransomware spyware adware and more
Network access control is a method of enhancing the security of a private organizational network by restricting the availability of network resources to endpoint devices that comply with the organization’s security policy
Network Traffic Analysis/Network Behavior Analysis describe technologies that use rule based analysis tools machine learning or other tools for suspicions network activity detection.
Next Generation Anti Virus
Next-Generation Firewall (Application control User-ID Parallel traffic inspection)
Network Interface Card Network Interface Controller Network Adaptor
Network IDS (Intrusion Detection System)
Network Operations Center NOC is a central point for software distribution and updating performance monitoring coordination with affiliated networks network troubleshooting and router and domain name management.
Network Traffic Analysis/Network Behavior Analysis describe technologies that use rule based analysis tools machine learning or other tools for suspicions network activity detection.
Privileged Access Management is a type of password management used to secure the passwords for login IDs that have elevated security privileges.
Platform as a Service
My secret key that I can use to decrypt data that was sent to me encrypted with the public key I shared with the world
Encryption key that can be shared with the world so they can encrypt data and send to me
Run-time Application Security Protection works inside the application but it is less a testing tool and more a security tool. It’s plugged into an application or its runtime environment and can control application execution.
Secure Access Service Edge is a term defined by Gartner in 2019. This term represents collections of security functions under one umbrella. It focuses on security as a service. Terms such as CASB SWG/CSWG ZTA/SDP Firewall as a Service IAM SDWAN DLP DNS security and many more are all associated with SASE
Static Application Security Testing scans a project at the code level for vulnerabilities which makes it easier for individual team members to make the changes recommended by the technology
Software bill of materials includes analysis of all the software running on the system fingerprinting the files and libraries. Some of the SBOMs can include data about hardware vulnerabilities credentials certificates keys etc.
Software Composition Analysis
Software Defined Perimeter
SD-WAN is an acronym for software-defined networking in a wide area network. SD-WAN simplifies the management and operation of a WAN by decoupling the networking hardware from control pane
Security information and event management
Service Level Agreement
Security Orchestration Automation and Response
Security Operations Center A security operations center is a centralized unit that deals with security issues on an organizational and technical level.
Secure Socket Layer v2(deprecated) v3(deprecated) see TLS
Technology for encrypted traffic inspection (SSL or TLS)
Single Sign On
Network device that inspects user web traffic going towards the internet
Protocol to deliver logs to SIEM (port 514)
Software as a Service
Technology to safety inspect potentially malicious files
Reffering to the practice of investing in countermeasures intended to provide the feeling of improved security while doing little or nothing to achieve it.
Software or hardware solution to capture raw packets exchanged wired or wireless networks
Splitting of traffic between corporate gateway and your standard internet gateway
A network TAP is a system that monitors events on a local network in order to aid administrators (or attackers) in analyzing the network.
Transport Layer Security v1.0(phasing out) v1.1(phasing out) v1.2 (common) v1.3(emerging)
Technology to limit or prioritize certain traffic on the network
User Behavior Analytics
Security control to block malicious URLs or URL blocked by the company’s Policy
User identification
Vulnerability assessment is done on the software source code or a binary file to determine vulnerabilities that can be affecting the software components application or a whole firmware in case of embedded devices
Virtual Private Network
Term that used to describe a tunnel created using IPSEC or TLS technologies
Web Application Firewall a technology that designed to protect websites from malicious actors
Work From Home
Zero Trust Network Access (ZTNA) solutions also referred to as a software-defined perimeter or SDP. ZTNA used to provide secure access to private applications without allowing users to access the whole enterprise network. They are often described as a replacement for traditional technologies like VPN and introduce various methods of authentication to remain identity and context aware of users who are accessing enterprise applications. ZTNA solution types include self-hosted from the cloud and self-managed or as and cloud fully managed.
In cryptography X.509 is a standard defining the format of public key certificates. X.509 certificates are used in many Internet protocols including TLS/SSL which is the basis for HTTPS - the secure protocol for browsing the web. x.509 is also used for offline applications as electronic signatures. RFC [2459](https://tools.ietf.org/html/rfc2459) [4158](https://tools.ietf.org/html/rfc4158) [5280](https://tools.ietf.org/html/rfc5280)