Term: Access Control Definition: Access Control is mechanisms that restrict who or what can view, use, or modify data based on identity, policy, and …
Data Protection Glossary
A working glossary for protection programs: classification, access control, encryption, backup, detection, response, and assurance.
Term: Air-Gapped Backup Definition: Air-Gapped Backup is a backup copy isolated from production networks (physically or logically) to withstand …
Term: Attribute-Based Access Control (ABAC) Definition: Attribute-Based Access Control (ABAC) is an authorization approach that uses attributes (user, …
Term: Business Continuity Planning (BCP) Definition: Business Continuity Planning (BCP) is planning to maintain critical business functions during and …
Term: Business Impact Analysis (BIA) Definition: Business Impact Analysis (BIA) is an assessment that identifies critical processes, dependencies, and …
Term: Cloud Access Security Broker (CASB) Definition: Cloud Access Security Broker (CASB) is a control layer that enforces security policies for cloud …
Term: Cloud Infrastructure Entitlement Management (CIEM) Definition: Cloud Infrastructure Entitlement Management (CIEM) is tools that analyze and …
Term: Cloud Security Posture Management (CSPM) Definition: Cloud Security Posture Management (CSPM) is tools that detect misconfigurations and …
Term: Confidentiality, Integrity, Availability (CIA Triad) Definition: Confidentiality, Integrity, Availability (CIA Triad) is the foundational …
Term: Configuration Management Definition: Configuration Management is the discipline of defining, enforcing, and auditing secure configuration …









