Term: Hardware Security Module (HSM) Definition: Hardware Security Module (HSM) is tamper-resistant hardware designed to generate and protect …
Data Protection Glossary
A working glossary for protection programs: classification, access control, encryption, backup, detection, response, and assurance.
Term: High Availability (HA) Definition: High Availability (HA) is architectures that reduce downtime through redundancy and failover, often measured …
Term: Identity and Access Management (IAM) Definition: Identity and Access Management (IAM) is systems and processes that manage identities, …
Term: Immutable Backups Definition: Immutable Backups is backups that cannot be altered or deleted for a defined period, reducing ransomware tampering …
Term: Incident Response Plan (IRP) Definition: Incident Response Plan (IRP) is a documented, practiced plan for detecting, containing, eradicating, …
Term: Key Management Service (KMS) Definition: Key Management Service (KMS) is a managed system for generating, storing, rotating, and authorizing …
Term: Least Privilege Definition: Least Privilege is the principle of granting only the minimum access necessary to perform a task and removing access …
Term: Logging and Audit Trails Definition: Logging and Audit Trails is records of system activity used to prove what happened, support compliance, and …
Term: Microsegmentation Definition: Microsegmentation is fine-grained segmentation (often workload-level) to enforce least-privilege communication …
Term: Multi-Factor Authentication (MFA) Definition: Multi-Factor Authentication (MFA) is an authentication method requiring two or more factors …









