<?xml version="1.0" encoding="utf-8" standalone="yes"?><feed xmlns="http://www.w3.org/2005/Atom"><title>Information Security on Sinetris's viewpoints</title><id>https://sinetris.info/glossary-contexts/information-security/</id><link href="https://sinetris.info/glossary-contexts/information-security/index.atom.xml" rel="self" type="application/atom+xml" hreflang="en" title="Information Security on Sinetris's viewpoints"/><link href="https://sinetris.info/glossary-contexts/information-security/" rel="alternate" type="text/html" hreflang="en" title="Information Security on Sinetris's viewpoints"/><link href="https://sinetris.info/glossary-contexts/information-security/index.atom.xml" rel="alternate" type="application/atom+xml" hreflang="en" title="Information Security on Sinetris's viewpoints"/><link href="https://sinetris.info/glossary-contexts/information-security/index.rss.xml" rel="alternate" type="application/rss+xml" hreflang="en" title="Information Security on Sinetris's viewpoints"/><subtitle>Recent content in Information Security on Sinetris's viewpoints</subtitle><generator uri="https://github.com/sinetris/sine-die/">Sine Die theme for Hugo</generator><author><name>Duilio Ruggiero</name><email>duilio@sinetris.info</email></author><rights type="html">&amp;copy; 2023 - 2026, Duilio Ruggiero</rights><updated>2025-12-07T23:58:31Z</updated><entry><title>Risk Owner</title><link href="https://sinetris.info/glossary/risk-owner/" rel="alternate" type="text/html" hreflang="en" title="Information Security on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/risk-owner/" type="text/html"/><published>2025-12-07T23:58:31+00:00</published><updated>2025-12-07T23:58:31Z</updated><id>https://sinetris.info/glossary/risk-owner/#atom</id><summary type="html">Person directly responsible for identifying, assessing, monitoring, reporting,
responding to, and defining intervention strategies in relation to risks associated
with an &lt;a class="glossary-term" href="/glossary/information-technology-asset/"&gt;IT asset&lt;/a&gt;.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/><category term="/contexts/grc" label="context: GRC"/></entry><entry><title>Information Technology Asset</title><link href="https://sinetris.info/glossary/information-technology-asset/" rel="alternate" type="text/html" hreflang="en" title="Information Security on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/information-technology-asset/" type="text/html"/><published>2025-12-07T23:19:32+00:00</published><updated>2025-12-07T23:19:32Z</updated><id>https://sinetris.info/glossary/information-technology-asset/#atom</id><summary type="html">Hardware and software (e.g., applications, systems, virtual resources, data) that
an organization uses to support its business objectives.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/><category term="/contexts/grc" label="context: GRC"/></entry><entry><title>Responsive Controls</title><link href="https://sinetris.info/glossary/responsive-controls/" rel="alternate" type="text/html" hreflang="en" title="Information Security on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/responsive-controls/" type="text/html"/><published>2025-12-07T21:35:56+00:00</published><updated>2025-12-07T21:35:56Z</updated><id>https://sinetris.info/glossary/responsive-controls/#atom</id><summary type="html">Measures designed to respond to and rectify security violations or incidents after they have been identified.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/></entry><entry><title>Detective Controls</title><link href="https://sinetris.info/glossary/detective-controls/" rel="alternate" type="text/html" hreflang="en" title="Information Security on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/detective-controls/" type="text/html"/><published>2025-12-07T21:23:57+00:00</published><updated>2025-12-07T21:23:57Z</updated><id>https://sinetris.info/glossary/detective-controls/#atom</id><summary type="html">Measures designed to identify, record, and report a security incident after it has occurred.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/></entry><entry><title>Entitlements</title><link href="https://sinetris.info/glossary/entitlements/" rel="alternate" type="text/html" hreflang="en" title="Information Security on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/entitlements/" type="text/html"/><published>2025-12-01T11:17:25+00:00</published><updated>2025-12-01T11:17:25Z</updated><id>https://sinetris.info/glossary/entitlements/#atom</id><summary type="html">The access rights an account has on an asset.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/></entry><entry><title>Access Recertification Campaigns</title><link href="https://sinetris.info/glossary/access-recertification-campaigns/" rel="alternate" type="text/html" hreflang="en" title="Information Security on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/access-recertification-campaigns/" type="text/html"/><published>2025-12-01T10:25:02+00:00</published><updated>2025-12-01T10:25:02Z</updated><id>https://sinetris.info/glossary/access-recertification-campaigns/#atom</id><summary type="html">Periodic review of user &lt;a class="glossary-term" href="/glossary/entitlements/"&gt;entitlements&lt;/a&gt;
to enforce the &lt;a class="glossary-term" href="/glossary/principle-of-least-privilege/"&gt;Principle of Least Privilege&lt;/a&gt;,
ensure &lt;a class="glossary-term" href="/glossary/orphaned-account/"&gt;orphaned accounts&lt;/a&gt; are removed,
and reduce internal threats and compliance violations.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/><category term="/contexts/grc" label="context: GRC"/></entry><entry><title>Access Request</title><link href="https://sinetris.info/glossary/access-request/" rel="alternate" type="text/html" hreflang="en" title="Information Security on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/access-request/" type="text/html"/><published>2025-12-01T10:22:15+00:00</published><updated>2025-12-01T10:22:15Z</updated><id>https://sinetris.info/glossary/access-request/#atom</id><summary type="html">A user-initiated process to gain permission to access an &lt;a class="glossary-term" href="/glossary/information-technology-asset/"&gt;IT asset&lt;/a&gt; within an organization&amp;rsquo;s infrastructure.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/></entry><entry><title>Birthright Access</title><link href="https://sinetris.info/glossary/birthright-access/" rel="alternate" type="text/html" hreflang="en" title="Information Security on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/birthright-access/" type="text/html"/><published>2025-11-29T15:32:02+00:00</published><updated>2025-11-29T15:32:02Z</updated><id>https://sinetris.info/glossary/birthright-access/#atom</id><summary type="html">&lt;a class="glossary-term" href="/glossary/entitlements/"&gt;Entitlements&lt;/a&gt; automatically granted to a user when
they join an organization or change roles within it.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/><category term="/contexts/grc" label="context: GRC"/></entry><entry><title>Orphaned Account</title><link href="https://sinetris.info/glossary/orphaned-account/" rel="alternate" type="text/html" hreflang="en" title="Information Security on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/orphaned-account/" type="text/html"/><published>2025-11-29T15:24:33+00:00</published><updated>2025-11-29T15:24:33Z</updated><id>https://sinetris.info/glossary/orphaned-account/#atom</id><summary type="html">Account that retains access to an asset without an active owner.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/></entry><entry><title>Data Breach</title><link href="https://sinetris.info/glossary/data-breach/" rel="alternate" type="text/html" hreflang="en" title="Information Security on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/data-breach/" type="text/html"/><published>2025-11-27T22:08:23+00:00</published><updated>2025-11-27T22:08:23Z</updated><id>https://sinetris.info/glossary/data-breach/#atom</id><summary type="html">Incident involving copying, transmitting, viewing, or processing sensitive,
protected, or confidential information by unauthorized individuals or for
unauthorized purposes.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/information-security" label="context: Information Security"/></entry><entry><title>Data Anonymization</title><link href="https://sinetris.info/glossary/data-anonymization/" rel="alternate" type="text/html" hreflang="en" title="Information Security on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/data-anonymization/" type="text/html"/><published>2025-11-24T14:47:49+00:00</published><updated>2025-11-24T14:47:49Z</updated><id>https://sinetris.info/glossary/data-anonymization/#atom</id><summary type="html">The process of removing Personally Identifiable Information from a dataset in an irreversible and permanent manner.
This can serve as a mechanism of privacy protection. In the context of data governance,
anonymized data is no longer considered Personally Identifiable Information
according to the current regulatory interpretation.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/></entry><entry><title>Proactive Controls</title><link href="https://sinetris.info/glossary/proactive-controls/" rel="alternate" type="text/html" hreflang="en" title="Information Security on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/proactive-controls/" type="text/html"/><published>2025-11-24T12:56:03+00:00</published><updated>2025-11-24T12:56:03Z</updated><id>https://sinetris.info/glossary/proactive-controls/#atom</id><summary type="html">&lt;p&gt;Proactive Controls are a strategy designed to prevent attacks and identify vulnerabilities
before they are exploited, focusing on prediction and prevention rather than simply
reacting, anticipating potential problems or targets and taking action to prepare
in advance, rather than waiting for them to occur.&lt;/p&gt;</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/></entry><entry><title>Preventative Controls</title><link href="https://sinetris.info/glossary/preventative-controls/" rel="alternate" type="text/html" hreflang="en" title="Information Security on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/preventative-controls/" type="text/html"/><published>2025-11-24T11:42:20+00:00</published><updated>2025-11-24T11:42:20Z</updated><id>https://sinetris.info/glossary/preventative-controls/#atom</id><summary type="html">Designed to prevent an event or an unauthorized action from occurring.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/></entry><entry><title>Security Controls</title><link href="https://sinetris.info/glossary/security-controls/" rel="alternate" type="text/html" hreflang="en" title="Information Security on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/security-controls/" type="text/html"/><published>2025-11-24T11:36:55+00:00</published><updated>2025-11-24T11:36:55Z</updated><id>https://sinetris.info/glossary/security-controls/#atom</id><summary type="html">Safeguards and countermeasures that help protect an organization&amp;rsquo;s assets, systems,
and data from potential risks and threats.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/></entry><entry><title>Subject Matter Expert</title><link href="https://sinetris.info/glossary/subject-matter-expert/" rel="alternate" type="text/html" hreflang="en" title="Information Security on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/subject-matter-expert/" type="text/html"/><published>2025-11-24T07:28:53+00:00</published><updated>2025-11-24T07:28:53Z</updated><id>https://sinetris.info/glossary/subject-matter-expert/#atom</id><summary type="html">A professional with in-depth, specialized knowledge in a particular field, process,
or technology who acts as a trusted advisor, guiding teams, validating information,
and solving complex problems to ensure accuracy, efficiency, and successful project
outcomes.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/><category term="/contexts/grc" label="context: GRC"/><category term="/contexts/tech" label="context: Tech"/></entry><entry><title>Asset Administrator</title><link href="https://sinetris.info/glossary/asset-administrator/" rel="alternate" type="text/html" hreflang="en" title="Information Security on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/asset-administrator/" type="text/html"/><published>2025-11-24T01:27:13+00:00</published><updated>2025-11-24T01:27:13Z</updated><id>https://sinetris.info/glossary/asset-administrator/#atom</id><summary type="html">Manages user roles, account assignments, and performs access reviews and audits
for an &lt;a class="glossary-term" href="/glossary/information-technology-asset/"&gt;IT asset&lt;/a&gt;.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/><category term="/contexts/grc" label="context: GRC"/></entry><entry><title>Authentication Assurance Level</title><link href="https://sinetris.info/glossary/authentication-assurance-level/" rel="alternate" type="text/html" hreflang="en" title="Information Security on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/authentication-assurance-level/" type="text/html"/><published>2025-11-22T08:02:00+00:00</published><updated>2025-11-22T08:02:00Z</updated><id>https://sinetris.info/glossary/authentication-assurance-level/#atom</id><summary type="html">NIST standard to assess the degree of confidence and reliability of an authentication
process.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/><category term="/contexts/grc" label="context: GRC"/></entry><entry><title>Asset Owner</title><link href="https://sinetris.info/glossary/asset-owner/" rel="alternate" type="text/html" hreflang="en" title="Information Security on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/asset-owner/" type="text/html"/><published>2025-11-22T08:01:09+00:00</published><updated>2025-11-22T08:01:09Z</updated><id>https://sinetris.info/glossary/asset-owner/#atom</id><summary type="html">Person or group responsible for an &lt;a class="glossary-term" href="/glossary/information-technology-asset/"&gt;IT asset&lt;/a&gt;.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/><category term="/contexts/grc" label="context: GRC"/></entry><entry><title>Account Lockout</title><link href="https://sinetris.info/glossary/account-lockout/" rel="alternate" type="text/html" hreflang="en" title="Information Security on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/account-lockout/" type="text/html"/><published>2025-11-22T08:00:36+00:00</published><updated>2025-11-22T08:00:36Z</updated><id>https://sinetris.info/glossary/account-lockout/#atom</id><summary type="html">A security feature typically used to prevent a &lt;a class="glossary-term" href="/glossary/brute-force-attack/"&gt;Brute-Force Attack&lt;/a&gt;
by temporarily disabling a user account after a set number of failed login attempts.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/></entry><entry><title>Web Authentication</title><link href="https://sinetris.info/glossary/web-authentication/" rel="alternate" type="text/html" hreflang="en" title="Information Security on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/web-authentication/" type="text/html"/><published>2025-11-10T15:34:37+00:00</published><updated>2025-11-10T15:34:37Z</updated><id>https://sinetris.info/glossary/web-authentication/#atom</id><summary type="html">Specification that defines an API enabling the creation and use of strong, attested,
scoped, public key-based credentials by web applications, for the purpose of strongly
authenticating users.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/></entry><entry><title>Client-to-Authenticator Protocols</title><link href="https://sinetris.info/glossary/client-to-authenticator-protocols/" rel="alternate" type="text/html" hreflang="en" title="Information Security on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/client-to-authenticator-protocols/" type="text/html"/><published>2025-11-10T15:29:40+00:00</published><updated>2025-11-10T15:29:40Z</updated><id>https://sinetris.info/glossary/client-to-authenticator-protocols/#atom</id><summary type="html">Protocol developed by the FIDO Alliance and complementary to the &lt;a class="glossary-term" href="/glossary/web-authentication/"&gt;W3C&amp;#39;s WebAuthn specification&lt;/a&gt; that allows
a client (for example, an operating system, browser, or application) to communicate
with a device designed to authenticate the user.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/></entry><entry><title>FIDO Specifications</title><link href="https://sinetris.info/glossary/fido-specifications/" rel="alternate" type="text/html" hreflang="en" title="Information Security on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/fido-specifications/" type="text/html"/><published>2025-11-10T15:10:26+00:00</published><updated>2025-11-10T15:10:26Z</updated><id>https://sinetris.info/glossary/fido-specifications/#atom</id><summary type="html">A set of open standards published by the 
&lt;a href="https://fidoalliance.org/" rel="external"&gt;FIDO Alliance&lt;/a&gt;
for stronger, simpler, and phishing-resistant user authentication.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/></entry><entry><title>Information Technology Asset Management</title><link href="https://sinetris.info/glossary/information-technology-asset-management/" rel="alternate" type="text/html" hreflang="en" title="Information Security on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/information-technology-asset-management/" type="text/html"/><published>2025-11-10T14:55:30+00:00</published><updated>2025-11-10T14:55:30Z</updated><id>https://sinetris.info/glossary/information-technology-asset-management/#atom</id><summary type="html">Systems to manage the lifecycle of &lt;a class="glossary-term" href="/glossary/information-technology-asset/"&gt;IT assets&lt;/a&gt;, including tracking, maintaining and disposing of hardware
and software.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/><category term="/contexts/grc" label="context: GRC"/></entry><entry><title>Desired State</title><link href="https://sinetris.info/glossary/desired-state/" rel="alternate" type="text/html" hreflang="en" title="Information Security on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/desired-state/" type="text/html"/><published>2025-11-10T13:47:45+00:00</published><updated>2025-11-10T13:47:45Z</updated><id>https://sinetris.info/glossary/desired-state/#atom</id><summary type="html">The planned state of a system, usually defined as data or code in a
&lt;a class="glossary-term" href="/glossary/single-source-of-truth/"&gt;&lt;abbr title="Single Source of Truth"&gt;SSOT&lt;/abbr&gt;&lt;/a&gt;.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/><category term="/contexts/gitops" label="context: GitOps"/><category term="/contexts/tech" label="context: Tech"/></entry><entry><title>Account Takeover</title><link href="https://sinetris.info/glossary/account-take-overs/" rel="alternate" type="text/html" hreflang="en" title="Information Security on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/account-take-overs/" type="text/html"/><published>2025-06-25T11:55:55+00:00</published><updated>2025-06-25T11:55:55Z</updated><id>https://sinetris.info/glossary/account-take-overs/#atom</id><summary type="html">Gaining unauthorized access to a user account.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/></entry><entry><title>Information Assurance</title><link href="https://sinetris.info/glossary/information-assurance/" rel="alternate" type="text/html" hreflang="en" title="Information Security on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/information-assurance/" type="text/html"/><published>2025-03-17T10:43:09+00:00</published><updated>2025-03-17T10:43:09Z</updated><id>https://sinetris.info/glossary/information-assurance/#atom</id><summary type="html">&lt;p&gt;Information Assurance (IA) is the practice of assuring information quality and managing risks related to the use, processing, storage, and transmission of information.&lt;/p&gt;
&lt;p&gt;The 5 pillars of information assurance includes protection of the &lt;strong&gt;Confidentiality&lt;/strong&gt;, &lt;strong&gt;Integrity&lt;/strong&gt;, &lt;strong&gt;Availability&lt;/strong&gt;, &lt;strong&gt;Authenticity&lt;/strong&gt;, and &lt;strong&gt;Non-repudiation&lt;/strong&gt; of information.&lt;/p&gt;
&lt;p&gt;In IT systems, when possible, assets should be tagged/labeled with proper Information Assurance level.&lt;/p&gt;
&lt;h2 id="confidentiality"&gt;Confidentiality&lt;/h2&gt;
&lt;p&gt;The property that information is not made available or disclosed to unauthorized individuals, entities, or processes.&lt;/p&gt;</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/><category term="/contexts/grc" label="context: GRC"/><category term="/tags/compliance" label="tag: Compliance"/><category term="/tags/confidentiality" label="tag: Confidentiality"/><category term="/tags/integrity" label="tag: Integrity"/><category term="/tags/availability" label="tag: Availability"/><category term="/tags/authenticity" label="tag: Authenticity"/><category term="/tags/non-repudiation" label="tag: Non-Repudiation"/></entry><entry><title>Principle of Least Privilege</title><link href="https://sinetris.info/glossary/principle-of-least-privilege/" rel="alternate" type="text/html" hreflang="en" title="Information Security on Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/principle-of-least-privilege/" type="text/html"/><published>2023-08-06T10:10:15+00:00</published><updated>2023-08-06T10:10:15Z</updated><id>https://sinetris.info/glossary/principle-of-least-privilege/#atom</id><summary type="html">Security concept whereby a user or service is granted the minimum levels of access
and authorization necessary to perform the requested task.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/></entry></feed>