Glossary
Defence-in-Depth: A security strategy that employs multiple layers of defense mechanisms to protect information and systems.
Zero-Trust Principles: A security concept where no entity inside or outside the network is trusted by default, and verification is required from everyone trying to access resources in the network.
Deny by Default Principle: A security measure where access to resources is denied unless explicitly allowed.
Least Privilege Model: The principle of providing users only the access necessary to perform their tasks, minimizing potential access to sensitive information.
Secured Jump Hosts: Secure systems that act as a controlled entry point for users to access a network, providing an additional layer of security.
Intrusion Detection Systems (IDS): Systems designed to detect unauthorized access or attacks on a network or computer system.
Intrusion Prevention Systems (IPS): Security measures that not only detect but also prevent unauthorized access or attacks on networks or computer systems.
Web Application Firewalls (WAF): Security devices designed to protect web applications by filtering and monitoring HTTP traffic between a web application and the Internet.
Endpoint Detection and Response (EDR): Security solutions focused on detecting, investigating, and responding to threats on endpoint devices.
Security Information and Event Management (SIEM): Tools that provide real-time analysis of security alerts generated by applications and network hardware.
Penetration Tests: Simulated cyberattacks on a computer system to check for exploitable vulnerabilities.
Assume Breach Tests: Security tests that assume a system is already compromised to evaluate the effectiveness of security measures.
Contingency Planning: Preparing strategies and actions to respond to and recover from potential IT security incidents or disasters.
IT Service Management (ITSM): The process of designing, delivering, managing, and improving the way IT services are used within an organization.
Configuration Management Databases (CMDBs): Databases that store information about IT assets and their configurations within an organization.
Four-Eyes Principle: A security principle that requires two individuals to review and approve an action before it can be taken.
Infrastructure as Code (IaC): The management of infrastructure (networks, virtual machines, load balancers, and connection topology) in a descriptive model, using code.
Continuous Integration/Continuous Deployment (CI/CD): A software development practice where code changes are automatically built, tested, and deployed to production.