Term: Security Operations Center (SOC) Definition: Security Operations Center (SOC) is the people, processes, and tools responsible for monitoring, …
Data Protection Glossary
A working glossary for protection programs: classification, access control, encryption, backup, detection, response, and assurance.
Term: Security Policy and Standards Definition: Security Policy and Standards is documented requirements that define baseline security expectations, …
Term: Software Bill of Materials (SBOM) Definition: Software Bill of Materials (SBOM) is an inventory of software components and dependencies used to …
Term: Static Application Security Testing (SAST) Definition: Static Application Security Testing (SAST) is automated analysis of source code to …
Term: Supply Chain Security Definition: Supply Chain Security is controls that protect against risks introduced by vendors, dependencies, build …
Term: Third-Party Risk Management (TPRM) Definition: Third-Party Risk Management (TPRM) is the process of assessing, contracting, and monitoring …
Term: Threat Modeling Definition: Threat Modeling is a structured method to identify threats, attack paths, and mitigations for a system before it is …
Term: Tokenization Definition: Tokenization is replacing sensitive values with non-sensitive tokens, storing the mapping in a secured vault to reduce …
Term: Vulnerability Management Definition: Vulnerability Management is the lifecycle of discovering, prioritizing, remediating, and verifying security …
Term: Zero Trust Architecture Definition: Zero Trust Architecture is a security approach that assumes no implicit trust based on network location and …










