Access Recertification Campaigns
Contexts
Periodic review of user entitlements to enforce the Principle of Least Privilege, ensure orphaned accounts are removed, and reduce internal threats and compliance violations.
Glossary Context
A glossary is a list of terms, abbreviations, or expressions in a particular context or field of knowledge with their respective definitions.
Periodic review of user entitlements to enforce the Principle of Least Privilege, ensure orphaned accounts are removed, and reduce internal threats and compliance violations.
A user-initiated process to gain permission to access an IT asset within an organization’s infrastructure.
A security feature typically used to prevent a Brute-Force Attack by temporarily disabling a user account after a set number of failed login attempts.
Gaining unauthorized access to a user account.
Current and factual condition of a system or its data as opposed to the Desired State.
Manages user roles, account assignments, and performs access reviews and audits for an IT asset.
Person or group responsible for an IT asset.
NIST standard to assess the degree of confidence and reliability of an authentication process.
Entitlements automatically granted to a user when they join an organization or change roles within it.
Often used to guess authentication credentials or discover hidden content/pages within a web application using a trial-and-error method.
Protocol developed by the FIDO Alliance and complementary to the W3C's WebAuthn specification that allows a client (for example, an operating system, browser, or application) to communicate with a device designed to authenticate the user.
The process of removing Personally Identifiable Information from a dataset in an irreversible and permanent manner. This can serve as a mechanism of privacy protection. In the context of data governance, anonymized data is no longer considered Personally Identifiable Information according to the current regulatory interpretation.
The planned state of a system, usually defined as data or code in a SSOT.
Measures designed to identify, record, and report a security incident after it has occurred.
The difference between the Desired State of a system and its Actual State.
The access rights an account has on an asset.
A set of open standards published by the FIDO Alliance for stronger, simpler, and phishing-resistant user authentication.
Regulation that governs how the personal data of individuals in the EU may be processed and transferred.
Identity and access management is a framework of policies, technologies, and business processes aimed at facilitating the management of digital identities and their access.
Cybersecurity discipline that includes tools and best practices for protecting user identities and identity systems from cyber threats.
The practice of assuring information quality and managing risks related to the use, processing, storage, and transmission of information.
Hardware and software (e.g., applications, systems, virtual resources, data) that an organization uses to support its business objectives.
Systems to manage the lifecycle of IT assets, including tracking, maintaining and disposing of hardware and software.
Identity belonging to a machine, service account, containerized workload, or autonomous agent.
Account that retains access to an asset without an active owner.
Designed to prevent an event or an unauthorized action from occurring.
Security concept whereby a user or service is granted the minimum levels of access and authorization necessary to perform the requested task.
A strategy designed to prevent attacks and identify vulnerabilities before they are exploited.
Measures designed to respond to and rectify security violations or incidents after they have been identified.
Person directly responsible for identifying, assessing, monitoring, reporting, responding to, and defining intervention strategies in relation to risks associated with an IT asset.
Safeguards and countermeasures that help protect an organization’s assets, systems, and data from potential risks and threats.
Mechanism designed to prevent errors and fraud by dividing the actions required to complete a task among different employees.
Practice of centralizing all of an organization’s data related to a given subject in a single, reliable location, ensuring that every person and every system operates with the same up-to-date information.
A professional with in-depth, specialized knowledge in a particular field, process, or technology who acts as a trusted advisor, guiding teams, validating information, and solving complex problems to ensure accuracy, efficiency, and successful project outcomes.
Specification that defines an API enabling the creation and use of strong, attested, scoped, public key-based credentials by web applications, for the purpose of strongly authenticating users.
Security framework that requires all users, devices, and systems, whether inside or outside the organization’s network, to be continuously authenticated, authorized, and validated before gaining access to applications and data.