Access Recertification Campaigns
Contexts
Periodic review of user entitlements to enforce the Principle of Least Privilege, ensure orphaned accounts are removed, and reduce internal threats and compliance violations.
Glossary Context
A glossary is a list of terms, abbreviations, or expressions in a particular context or field of knowledge with their respective definitions.
Periodic review of user entitlements to enforce the Principle of Least Privilege, ensure orphaned accounts are removed, and reduce internal threats and compliance violations.
A user-initiated process to gain permission to access an IT asset within an organization’s infrastructure.
A security feature typically used to prevent a Brute-Force Attack by temporarily disabling a user account after a set number of failed login attempts.
Gaining unauthorized access to a user account.
Current and factual condition of a system or its data as opposed to the Desired State.
A fundamental process in cybersecurity, used to identify events or patterns that deviate from expected behavior within systems, networks, or datasets and that could indicate a security threat, such as a network intrusion, malware, or unauthorized access.
Manages user roles, account assignments, and performs access reviews and audits for an IT asset.
Person or group responsible for an IT asset.
NIST standard to assess the degree of confidence and reliability of an authentication process.
Entitlements automatically granted to a user when they join an organization or change roles within it.
Often used to guess authentication credentials or discover hidden content/pages within a web application using a trial-and-error method.
Protocol developed by the FIDO Alliance and complementary to the W3C's WebAuthn specification that allows a client (for example, an operating system, browser, or application) to communicate with a device designed to authenticate the user.
The process of removing Personally Identifiable Information from a dataset in an irreversible and permanent manner. This can serve as a mechanism of privacy protection. In the context of data governance, anonymized data is no longer considered Personally Identifiable Information according to the current regulatory interpretation.
Incident involving copying, transmitting, viewing, or processing sensitive, protected, or confidential information by unauthorized individuals or for unauthorized purposes.
The planned state of a system, usually defined as data or code in a SSOT.
Measures designed to identify, record, and report a security incident after it has occurred.
The difference between the Desired State of a system and its Actual State.
The access rights an account has on an asset.
A set of open standards published by the FIDO Alliance for stronger, simpler, and phishing-resistant user authentication.
Identity and access management is a framework of policies, technologies, and business processes aimed at facilitating the management of digital identities and their access.
Cybersecurity discipline that includes tools and best practices for protecting user identities and identity systems from cyber threats.
The practice of assuring information quality and managing risks related to the use, processing, storage, and transmission of information.
Hardware and software (e.g., applications, systems, virtual resources, data) that an organization uses to support its business objectives.
Systems to manage the lifecycle of IT assets, including tracking, maintaining and disposing of hardware and software.
Identity belonging to a machine, service account, containerized workload, or autonomous agent.
Account that retains access to an asset without an active owner.
Designed to prevent an event or an unauthorized action from occurring.
Security concept whereby a user or service is granted the minimum levels of access and authorization necessary to perform the requested task.
A strategy designed to prevent attacks and identify vulnerabilities before they are exploited.
Measures designed to respond to and rectify security violations or incidents after they have been identified.
Person directly responsible for identifying, assessing, monitoring, reporting, responding to, and defining intervention strategies in relation to risks associated with an IT asset.
Safeguards and countermeasures that help protect an organization’s assets, systems, and data from potential risks and threats.
Practice of centralizing all of an organization’s data related to a given subject in a single, reliable location, ensuring that every person and every system operates with the same up-to-date information.
A comprehensive inventory of all the components used in a software.
A professional with in-depth, specialized knowledge in a particular field, process, or technology who acts as a trusted advisor, guiding teams, validating information, and solving complex problems to ensure accuracy, efficiency, and successful project outcomes.
Specification that defines an API enabling the creation and use of strong, attested, scoped, public key-based credentials by web applications, for the purpose of strongly authenticating users.
Security framework that requires all users, devices, and systems, whether inside or outside the organization’s network, to be continuously authenticated, authorized, and validated before gaining access to applications and data.