Skip to content
GDFN domain marketplace banner

Data Protection Glossary

A working glossary for protection programs: classification, access control, encryption, backup, detection, response, and assurance.

Term: Security Operations Center (SOC) Definition: Security Operations Center (SOC) is the people, processes, and tools responsible for monitoring, …

Data Protection Glossaryprotection-term-security-operations-center-soc

Term: Security Policy and Standards Definition: Security Policy and Standards is documented requirements that define baseline security expectations, …

Data Protection Glossaryprotection-term-security-policy-and-standards

Term: Software Bill of Materials (SBOM) Definition: Software Bill of Materials (SBOM) is an inventory of software components and dependencies used to …

Data Protection Glossaryprotection-term-software-bill-of-materials-sbom

Term: Static Application Security Testing (SAST) Definition: Static Application Security Testing (SAST) is automated analysis of source code to …

Data Protection Glossaryprotection-term-static-application-security-testing-sast

Term: Supply Chain Security Definition: Supply Chain Security is controls that protect against risks introduced by vendors, dependencies, build …

Data Protection Glossaryprotection-term-supply-chain-security

Term: Third-Party Risk Management (TPRM) Definition: Third-Party Risk Management (TPRM) is the process of assessing, contracting, and monitoring …

Data Protection Glossaryprotection-term-third-party-risk-management-tprm

Term: Threat Modeling Definition: Threat Modeling is a structured method to identify threats, attack paths, and mitigations for a system before it is …

Data Protection Glossaryprotection-term-threat-modeling

Term: Tokenization Definition: Tokenization is replacing sensitive values with non-sensitive tokens, storing the mapping in a secured vault to reduce …

Data Protection Glossaryprotection-term-tokenization

Term: Vulnerability Management Definition: Vulnerability Management is the lifecycle of discovering, prioritizing, remediating, and verifying security …

Data Protection Glossaryprotection-term-vulnerability-management

Term: Zero Trust Architecture Definition: Zero Trust Architecture is a security approach that assumes no implicit trust based on network location and …

Data Protection Glossaryprotection-term-zero-trust-architecture