Access Recertification Campaigns
Contexts
Periodic review of user entitlements to enforce the Principle of Least Privilege, ensure orphaned accounts are removed, and reduce internal threats and compliance violations.
Glossary Context
A glossary is a list of terms, abbreviations, or expressions in a particular context or field of knowledge with their respective definitions.
Periodic review of user entitlements to enforce the Principle of Least Privilege, ensure orphaned accounts are removed, and reduce internal threats and compliance violations.
A user-initiated process to gain permission to access an IT asset within an organization’s infrastructure.
A security feature typically used to prevent a Brute-Force Attack by temporarily disabling a user account after a set number of failed login attempts.
Gaining unauthorized access to a user account.
Manages user roles, account assignments, and performs access reviews and audits for an IT asset.
Person or group responsible for an IT asset.
NIST standard to assess the degree of confidence and reliability of an authentication process.
Entitlements automatically granted to a user when they join an organization or change roles within it.
Protocol developed by the FIDO Alliance and complementary to the W3C's WebAuthn specification that allows a client (for example, an operating system, browser, or application) to communicate with a device designed to authenticate the user.
The process of removing Personally Identifiable Information from a dataset in an irreversible and permanent manner. This can serve as a mechanism of privacy protection. In the context of data governance, anonymized data is no longer considered Personally Identifiable Information according to the current regulatory interpretation.
Incident involving copying, transmitting, viewing, or processing sensitive, protected, or confidential information by unauthorized individuals or for unauthorized purposes.
The planned state of a system, usually defined as data or code in a SSOT.
Measures designed to identify, record, and report a security incident after it has occurred.
The access rights an account has on an asset.
A set of open standards published by the FIDO Alliance for stronger, simpler, and phishing-resistant user authentication.
The practice of assuring information quality and managing risks related to the use, processing, storage, and transmission of information.
Hardware and software (e.g., applications, systems, virtual resources, data) that an organization uses to support its business objectives.
Systems to manage the lifecycle of IT assets, including tracking, maintaining and disposing of hardware and software.
Account that retains access to an asset without an active owner.
Designed to prevent an event or an unauthorized action from occurring.
Security concept whereby a user or service is granted the minimum levels of access and authorization necessary to perform the requested task.
A strategy designed to prevent attacks and identify vulnerabilities before they are exploited.
Measures designed to respond to and rectify security violations or incidents after they have been identified.
Person directly responsible for identifying, assessing, monitoring, reporting, responding to, and defining intervention strategies in relation to risks associated with an IT asset.
Safeguards and countermeasures that help protect an organization’s assets, systems, and data from potential risks and threats.
A professional with in-depth, specialized knowledge in a particular field, process, or technology who acts as a trusted advisor, guiding teams, validating information, and solving complex problems to ensure accuracy, efficiency, and successful project outcomes.
Specification that defines an API enabling the creation and use of strong, attested, scoped, public key-based credentials by web applications, for the purpose of strongly authenticating users.