<?xml version="1.0" encoding="utf-8" standalone="yes"?><feed xmlns="http://www.w3.org/2005/Atom"><title>Sinetris's viewpoints</title><id>https://sinetris.info/</id><link href="https://sinetris.info/index.atom.xml" rel="self" type="application/atom+xml" hreflang="en" title="Sinetris's viewpoints"/><link href="https://sinetris.info/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><link href="https://sinetris.info/index.atom.xml" rel="alternate" type="application/atom+xml" hreflang="en" title="Sinetris's viewpoints"/><link href="https://sinetris.info/index.rss.xml" rel="alternate" type="application/rss+xml" hreflang="en" title="Sinetris's viewpoints"/><subtitle>Recent content on Sinetris's viewpoints</subtitle><generator uri="https://github.com/sinetris/sine-die/">Sine Die theme for Hugo</generator><author><name>Duilio Ruggiero</name><email>duilio@sinetris.info</email></author><rights type="html">&amp;copy; 2023 - 2026, Duilio Ruggiero</rights><updated>2025-12-07T23:58:31Z</updated><entry><title>Frameworks</title><link href="https://sinetris.info/topics/iam/grc/frameworks/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/topics/iam/grc/frameworks/" type="text/html"/><published>2025-03-17T10:39:53+00:00</published><updated>2025-03-17T10:39:53Z</updated><id>https://sinetris.info/topics/iam/grc/frameworks/#atom</id><summary type="html">&lt;h2 id="requirements-and-regulations"&gt;Requirements and Regulations&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://gdpr-info.eu/" rel="external"&gt;GDPR&lt;/a&gt;: General Data Protection Regulation&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.bafin.de/" rel="external"&gt;BaFin&lt;/a&gt;: Bundesanstalt für Finanzdienstleistungsaufsicht
&lt;blockquote&gt;
&lt;p&gt;English translation: 
&lt;a href="https://www.bafin.de/EN/" rel="external"&gt;Federal Financial Supervisory Authority&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.bafin.de/SharedDocs/Veroeffentlichungen/DE/Rundschreiben/2023/rs_05_2023_MaRisk_BA.html" rel="external"&gt;MaRisk&lt;/a&gt;: Mindestanforderungen an das Risikomanagement
&lt;blockquote&gt;
&lt;p&gt;English translation: 
&lt;a href="https://www.bafin.de/SharedDocs/Downloads/EN/Rundschreiben/dl_rs_0523_marisk_ba_en.html" rel="external"&gt;Minimum Requirements for Risk Management&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.bafin.de/dok/10171052" rel="external"&gt;BAIT&lt;/a&gt;: Bankaufsichtliche Anforderungen an die IT
&lt;blockquote&gt;
&lt;p&gt;English translation: 
&lt;a href="https://www.bafin.de/SharedDocs/Downloads/EN/Rundschreiben/dl_rs_1710_ba_BAIT_en.html" rel="external"&gt;Supervisory Requirements for IT in Financial Institutions&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.iso.org/standard/27001" rel="external"&gt;ISO/IEC 27001&lt;/a&gt;: Information security management systems - Requirements&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://standards.iso.org/ittf/PubliclyAvailableStandards/c077582_ISO_IEC_24760-1_2019(E).zip" rel="external"&gt;ISO/IEC 24760&lt;/a&gt;: IT Security and Privacy -
A framework for identity management&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.bsi.bund.de/DE/Themen/Regulierte-Wirtschaft/Kritische-Infrastrukturen/kritis_node.html" rel="external"&gt;KRITIS&lt;/a&gt;: Kritische Infrastrukturen
&lt;blockquote&gt;
&lt;p&gt;English translation: 
&lt;a href="https://www.bsi.bund.de/EN/Themen/Regulierte-Wirtschaft/Kritische-Infrastrukturen/kritis_node.html" rel="external"&gt;Critical Infrastructures&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32023R1114" rel="external"&gt;MiCA&lt;/a&gt;: Markets in Crypto-Assets Regulation&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.eiopa.europa.eu/digital-operational-resilience-act-dora_en" rel="external"&gt;DORA&lt;/a&gt;: Digital Operational Resilience Act&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="good-reads-and-presentations"&gt;Good reads and presentations&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://www.kuppingercole.com/blog/reinwarth/bait-clearer-guidelines-as-a-basis-for-more-effective-implementation" rel="external"&gt;BAIT: Clearer Guidelines as a Basis for More Effective Implementation&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</summary><category term="/types/topic" label="type: topic"/><category term="/categories/iam" label="category: IAM"/><category term="/categories/grc" label="category: GRC"/><category term="/tags/frameworks" label="tag: Frameworks"/><category term="/tags/compliance" label="tag: Compliance"/></entry><entry><title>Compliance as Code</title><link href="https://sinetris.info/topics/iam/grc/compliance-as-code/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/topics/iam/grc/compliance-as-code/" type="text/html"/><published>2025-03-17T10:45:42+00:00</published><updated>2025-03-17T10:45:42Z</updated><id>https://sinetris.info/topics/iam/grc/compliance-as-code/#atom</id><summary type="html">&lt;h2 id="standards"&gt;Standards&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://scap.nist.gov/" rel="external"&gt;SCAP&lt;/a&gt;: Security Content Automation Protocol&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://pages.nist.gov/OSCAL/" rel="external"&gt;OSCAL&lt;/a&gt;: Open Security Controls Assessment Language&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.omg.org/spec/BPMN" rel="external"&gt;BPMN&lt;/a&gt;: Business Process Model and Notation&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.omg.org/spec/DMN" rel="external"&gt;DMN&lt;/a&gt;: Decision Model and Notation&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="guidelines"&gt;Guidelines&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://complianceascode.readthedocs.io/" rel="external"&gt;ComplianceAsCode&lt;/a&gt;: The ComplianceAsCode project
&lt;blockquote&gt;
&lt;p&gt;Previously known as SCAP Security Guide (SSG)&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="tools"&gt;Tools&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://www.open-scap.org/" rel="external"&gt;OpenSCAP&lt;/a&gt;: open source security compliance toolkit
&lt;blockquote&gt;
&lt;p&gt;NIST certified for SCAP 1.2&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://github.com/IBM/compliance-trestle" rel="external"&gt;Trestle&lt;/a&gt;: Manage compliance as code using NIST&amp;rsquo;s OSCAL standard&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.openpolicyagent.org/" rel="external"&gt;Open Policy Agent (OPA)&lt;/a&gt;: Declarative Policies
&lt;blockquote&gt;
&lt;p&gt;Context-aware, Expressive, Fast, Portable&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://github.com/permitio/opal" rel="external"&gt;OPAL&lt;/a&gt;: Open Policy Administration Layer&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="good-reads-and-presentations"&gt;Good reads and presentations&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://pages.nist.gov/OSCAL/learn/presentations/mini-workshop/" rel="external"&gt;OSCAL Mini Workshop Series&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</summary><category term="/types/topic" label="type: topic"/><category term="/categories/grc" label="category: GRC"/><category term="/categories/automation" label="category: Automation"/><category term="/tags/compliance" label="tag: Compliance"/><category term="/tags/compliance-as-code" label="tag: Compliance as Code"/><category term="/tags/scap" label="tag: SCAP"/><category term="/tags/oscal" label="tag: OSCAL"/><category term="/tags/opa" label="tag: OPA"/></entry><entry><title>Disaster Recovery</title><link href="https://sinetris.info/topics/iam/grc/disaster-recovery/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/topics/iam/grc/disaster-recovery/" type="text/html"/><published>2025-03-17T10:53:28+00:00</published><updated>2025-03-17T10:53:28Z</updated><id>https://sinetris.info/topics/iam/grc/disaster-recovery/#atom</id><summary type="html">&lt;h3 id="have-a-plan-b-for-disaster-recovery"&gt;Have a Plan B for disaster recovery&lt;/h3&gt;
&lt;p&gt;During a disaster recovery you want to be fast to respect your 
&lt;a href="/glossary/recovery-time-objective/"&gt;RTO&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;It is possible, for example, to restore the operation of a service using snapshots (both volumes and instances).&lt;/p&gt;
&lt;p&gt;Restoring snapshots may fail for unforeseen reasons (e.g., you need to restore the service on a different cloud provider), so you should make sure that you can restore from scratch (ability to recreate the service, use database dump, etc.).&lt;/p&gt;</summary><category term="/types/topic" label="type: topic"/><category term="/categories/grc" label="category: GRC"/><category term="/tags/disaster-recovery" label="tag: Disaster Recovery"/><category term="/tags/business-continuity" label="tag: Business Continuity"/><category term="/tags/compliance" label="tag: Compliance"/></entry><entry><title>Accessibility</title><link href="https://sinetris.info/topics/iam/grc/accessibility/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/topics/iam/grc/accessibility/" type="text/html"/><published>2025-03-17T10:43:09+00:00</published><updated>2025-03-17T10:43:09Z</updated><id>https://sinetris.info/topics/iam/grc/accessibility/#atom</id><summary type="html">&lt;h2 id="accessibility-directives-and-guidelines"&gt;Accessibility Directives and Guidelines&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://digital-strategy.ec.europa.eu/en/policies/web-accessibility" rel="external"&gt;European Commission - Web Accessibility&lt;/a&gt;: Overview of
the European Commission Web Accessibility Directive
&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://data.europa.eu/eli/dec_impl/2021/1339" rel="external"&gt;EN 301 549&lt;/a&gt;: Accessibility requirements for ICT products and services&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.w3.org/WAI/" rel="external"&gt;WAI&lt;/a&gt;: W3C Web Accessibility Initiative
&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://www.w3.org/WAI/intro/wcag" rel="external"&gt;WCAG&lt;/a&gt;: Web Content Accessibility Guidelines&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.w3.org/WAI/intro/aria" rel="external"&gt;ARIA&lt;/a&gt;: Accessible Rich Internet Applications suite of web standards&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.w3.org/WAI/standards-guidelines/act/" rel="external"&gt;ACT&lt;/a&gt;: Accessibility Conformance Testing&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.w3.org/WAI/intro/earl" rel="external"&gt;EARL&lt;/a&gt;: Evaluation and Report Language&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.w3.org/WAI/policies/" rel="external"&gt;policies&lt;/a&gt;: Web Accessibility Laws &amp;amp; Policies&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;</summary><category term="/types/topic" label="type: topic"/><category term="/categories/grc" label="category: GRC"/><category term="/tags/accessibility" label="tag: Accessibility"/><category term="/tags/compliance" label="tag: Compliance"/></entry><entry><title>Risk Owner</title><link href="https://sinetris.info/glossary/risk-owner/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/risk-owner/" type="text/html"/><published>2025-12-07T23:58:31+00:00</published><updated>2025-12-07T23:58:31Z</updated><id>https://sinetris.info/glossary/risk-owner/#atom</id><summary type="html">Person directly responsible for identifying, assessing, monitoring, reporting,
responding to, and defining intervention strategies in relation to risks associated
with an &lt;a class="glossary-term" href="/glossary/information-technology-asset/"&gt;IT asset&lt;/a&gt;.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/><category term="/contexts/grc" label="context: GRC"/></entry><entry><title>Information Technology Asset</title><link href="https://sinetris.info/glossary/information-technology-asset/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/information-technology-asset/" type="text/html"/><published>2025-12-07T23:19:32+00:00</published><updated>2025-12-07T23:19:32Z</updated><id>https://sinetris.info/glossary/information-technology-asset/#atom</id><summary type="html">Hardware and software (e.g., applications, systems, virtual resources, data) that
an organization uses to support its business objectives.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/><category term="/contexts/grc" label="context: GRC"/></entry><entry><title>Responsive Controls</title><link href="https://sinetris.info/glossary/responsive-controls/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/responsive-controls/" type="text/html"/><published>2025-12-07T21:35:56+00:00</published><updated>2025-12-07T21:35:56Z</updated><id>https://sinetris.info/glossary/responsive-controls/#atom</id><summary type="html">Measures designed to respond to and rectify security violations or incidents after they have been identified.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/></entry><entry><title>Detective Controls</title><link href="https://sinetris.info/glossary/detective-controls/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/detective-controls/" type="text/html"/><published>2025-12-07T21:23:57+00:00</published><updated>2025-12-07T21:23:57Z</updated><id>https://sinetris.info/glossary/detective-controls/#atom</id><summary type="html">Measures designed to identify, record, and report a security incident after it has occurred.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/></entry><entry><title>General Data Protection Regulation</title><link href="https://sinetris.info/glossary/general-data-protection-regulation/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/general-data-protection-regulation/" type="text/html"/><published>2025-12-07T21:22:17+00:00</published><updated>2025-12-07T21:22:17Z</updated><id>https://sinetris.info/glossary/general-data-protection-regulation/#atom</id><summary type="html">Regulation that governs how the personal data of individuals in the EU may be processed and transferred.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/iam" label="context: IAM"/></entry><entry><title>Entitlements</title><link href="https://sinetris.info/glossary/entitlements/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/entitlements/" type="text/html"/><published>2025-12-01T11:17:25+00:00</published><updated>2025-12-01T11:17:25Z</updated><id>https://sinetris.info/glossary/entitlements/#atom</id><summary type="html">The access rights an account has on an asset.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/></entry><entry><title>Access Recertification Campaigns</title><link href="https://sinetris.info/glossary/access-recertification-campaigns/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/access-recertification-campaigns/" type="text/html"/><published>2025-12-01T10:25:02+00:00</published><updated>2025-12-01T10:25:02Z</updated><id>https://sinetris.info/glossary/access-recertification-campaigns/#atom</id><summary type="html">Periodic review of user &lt;a class="glossary-term" href="/glossary/entitlements/"&gt;entitlements&lt;/a&gt;
to enforce the &lt;a class="glossary-term" href="/glossary/principle-of-least-privilege/"&gt;Principle of Least Privilege&lt;/a&gt;,
ensure &lt;a class="glossary-term" href="/glossary/orphaned-account/"&gt;orphaned accounts&lt;/a&gt; are removed,
and reduce internal threats and compliance violations.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/><category term="/contexts/grc" label="context: GRC"/></entry><entry><title>Access Request</title><link href="https://sinetris.info/glossary/access-request/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/access-request/" type="text/html"/><published>2025-12-01T10:22:15+00:00</published><updated>2025-12-01T10:22:15Z</updated><id>https://sinetris.info/glossary/access-request/#atom</id><summary type="html">A user-initiated process to gain permission to access an &lt;a class="glossary-term" href="/glossary/information-technology-asset/"&gt;IT asset&lt;/a&gt; within an organization&amp;rsquo;s infrastructure.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/></entry><entry><title>Birthright Access</title><link href="https://sinetris.info/glossary/birthright-access/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/birthright-access/" type="text/html"/><published>2025-11-29T15:32:02+00:00</published><updated>2025-11-29T15:32:02Z</updated><id>https://sinetris.info/glossary/birthright-access/#atom</id><summary type="html">&lt;a class="glossary-term" href="/glossary/entitlements/"&gt;Entitlements&lt;/a&gt; automatically granted to a user when
they join an organization or change roles within it.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/><category term="/contexts/grc" label="context: GRC"/></entry><entry><title>Orphaned Account</title><link href="https://sinetris.info/glossary/orphaned-account/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/orphaned-account/" type="text/html"/><published>2025-11-29T15:24:33+00:00</published><updated>2025-11-29T15:24:33Z</updated><id>https://sinetris.info/glossary/orphaned-account/#atom</id><summary type="html">Account that retains access to an asset without an active owner.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/></entry><entry><title>Data Breach</title><link href="https://sinetris.info/glossary/data-breach/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/data-breach/" type="text/html"/><published>2025-11-27T22:08:23+00:00</published><updated>2025-11-27T22:08:23Z</updated><id>https://sinetris.info/glossary/data-breach/#atom</id><summary type="html">Incident involving copying, transmitting, viewing, or processing sensitive,
protected, or confidential information by unauthorized individuals or for
unauthorized purposes.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/information-security" label="context: Information Security"/></entry><entry><title>Data Anonymization</title><link href="https://sinetris.info/glossary/data-anonymization/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/data-anonymization/" type="text/html"/><published>2025-11-24T14:47:49+00:00</published><updated>2025-11-24T14:47:49Z</updated><id>https://sinetris.info/glossary/data-anonymization/#atom</id><summary type="html">The process of removing Personally Identifiable Information from a dataset in an irreversible and permanent manner.
This can serve as a mechanism of privacy protection. In the context of data governance,
anonymized data is no longer considered Personally Identifiable Information
according to the current regulatory interpretation.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/></entry><entry><title>Proactive Controls</title><link href="https://sinetris.info/glossary/proactive-controls/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/proactive-controls/" type="text/html"/><published>2025-11-24T12:56:03+00:00</published><updated>2025-11-24T12:56:03Z</updated><id>https://sinetris.info/glossary/proactive-controls/#atom</id><summary type="html">&lt;p&gt;Proactive Controls are a strategy designed to prevent attacks and identify vulnerabilities
before they are exploited, focusing on prediction and prevention rather than simply
reacting, anticipating potential problems or targets and taking action to prepare
in advance, rather than waiting for them to occur.&lt;/p&gt;</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/></entry><entry><title>Preventative Controls</title><link href="https://sinetris.info/glossary/preventative-controls/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/preventative-controls/" type="text/html"/><published>2025-11-24T11:42:20+00:00</published><updated>2025-11-24T11:42:20Z</updated><id>https://sinetris.info/glossary/preventative-controls/#atom</id><summary type="html">Designed to prevent an event or an unauthorized action from occurring.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/></entry><entry><title>Security Controls</title><link href="https://sinetris.info/glossary/security-controls/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/security-controls/" type="text/html"/><published>2025-11-24T11:36:55+00:00</published><updated>2025-11-24T11:36:55Z</updated><id>https://sinetris.info/glossary/security-controls/#atom</id><summary type="html">Safeguards and countermeasures that help protect an organization&amp;rsquo;s assets, systems,
and data from potential risks and threats.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/></entry><entry><title>Subject Matter Expert</title><link href="https://sinetris.info/glossary/subject-matter-expert/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/subject-matter-expert/" type="text/html"/><published>2025-11-24T07:28:53+00:00</published><updated>2025-11-24T07:28:53Z</updated><id>https://sinetris.info/glossary/subject-matter-expert/#atom</id><summary type="html">A professional with in-depth, specialized knowledge in a particular field, process,
or technology who acts as a trusted advisor, guiding teams, validating information,
and solving complex problems to ensure accuracy, efficiency, and successful project
outcomes.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/><category term="/contexts/grc" label="context: GRC"/><category term="/contexts/tech" label="context: Tech"/></entry><entry><title>Asset Administrator</title><link href="https://sinetris.info/glossary/asset-administrator/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/asset-administrator/" type="text/html"/><published>2025-11-24T01:27:13+00:00</published><updated>2025-11-24T01:27:13Z</updated><id>https://sinetris.info/glossary/asset-administrator/#atom</id><summary type="html">Manages user roles, account assignments, and performs access reviews and audits
for an &lt;a class="glossary-term" href="/glossary/information-technology-asset/"&gt;IT asset&lt;/a&gt;.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/><category term="/contexts/grc" label="context: GRC"/></entry><entry><title>Brute-Force Attack</title><link href="https://sinetris.info/glossary/brute-force-attack/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/brute-force-attack/" type="text/html"/><published>2025-11-22T09:03:19+00:00</published><updated>2025-11-22T09:03:19Z</updated><id>https://sinetris.info/glossary/brute-force-attack/#atom</id><summary type="html">Often used to guess authentication credentials or discover hidden content/pages
within a web application using a trial-and-error method.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/></entry><entry><title>Zero Trust</title><link href="https://sinetris.info/glossary/zero-trust/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/zero-trust/" type="text/html"/><published>2025-11-22T08:11:15+00:00</published><updated>2025-11-22T08:11:15Z</updated><id>https://sinetris.info/glossary/zero-trust/#atom</id><summary type="html">Security framework that requires all users, devices, and systems, whether inside
or outside the organization&amp;rsquo;s network, to be continuously authenticated, authorized,
and validated before gaining access to applications and data.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/networking" label="context: Networking"/></entry><entry><title>Authentication Assurance Level</title><link href="https://sinetris.info/glossary/authentication-assurance-level/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/authentication-assurance-level/" type="text/html"/><published>2025-11-22T08:02:00+00:00</published><updated>2025-11-22T08:02:00Z</updated><id>https://sinetris.info/glossary/authentication-assurance-level/#atom</id><summary type="html">NIST standard to assess the degree of confidence and reliability of an authentication
process.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/><category term="/contexts/grc" label="context: GRC"/></entry><entry><title>Asset Owner</title><link href="https://sinetris.info/glossary/asset-owner/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/asset-owner/" type="text/html"/><published>2025-11-22T08:01:09+00:00</published><updated>2025-11-22T08:01:09Z</updated><id>https://sinetris.info/glossary/asset-owner/#atom</id><summary type="html">Person or group responsible for an &lt;a class="glossary-term" href="/glossary/information-technology-asset/"&gt;IT asset&lt;/a&gt;.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/><category term="/contexts/grc" label="context: GRC"/></entry><entry><title>Account Lockout</title><link href="https://sinetris.info/glossary/account-lockout/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/account-lockout/" type="text/html"/><published>2025-11-22T08:00:36+00:00</published><updated>2025-11-22T08:00:36Z</updated><id>https://sinetris.info/glossary/account-lockout/#atom</id><summary type="html">A security feature typically used to prevent a &lt;a class="glossary-term" href="/glossary/brute-force-attack/"&gt;Brute-Force Attack&lt;/a&gt;
by temporarily disabling a user account after a set number of failed login attempts.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/></entry><entry><title>Single Source of Truth</title><link href="https://sinetris.info/glossary/single-source-of-truth/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/single-source-of-truth/" type="text/html"/><published>2025-11-20T09:01:34+00:00</published><updated>2025-11-20T09:01:34Z</updated><id>https://sinetris.info/glossary/single-source-of-truth/#atom</id><summary type="html">Practice of centralizing all of an organization&amp;rsquo;s data related to a given subject
in a single, reliable location, ensuring that every person and every system operates
with the same up-to-date information.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/gitops" label="context: GitOps"/><category term="/contexts/tech" label="context: Tech"/></entry><entry><title>Web Authentication</title><link href="https://sinetris.info/glossary/web-authentication/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/web-authentication/" type="text/html"/><published>2025-11-10T15:34:37+00:00</published><updated>2025-11-10T15:34:37Z</updated><id>https://sinetris.info/glossary/web-authentication/#atom</id><summary type="html">Specification that defines an API enabling the creation and use of strong, attested,
scoped, public key-based credentials by web applications, for the purpose of strongly
authenticating users.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/></entry><entry><title>Client-to-Authenticator Protocols</title><link href="https://sinetris.info/glossary/client-to-authenticator-protocols/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/client-to-authenticator-protocols/" type="text/html"/><published>2025-11-10T15:29:40+00:00</published><updated>2025-11-10T15:29:40Z</updated><id>https://sinetris.info/glossary/client-to-authenticator-protocols/#atom</id><summary type="html">Protocol developed by the FIDO Alliance and complementary to the &lt;a class="glossary-term" href="/glossary/web-authentication/"&gt;W3C&amp;#39;s WebAuthn specification&lt;/a&gt; that allows
a client (for example, an operating system, browser, or application) to communicate
with a device designed to authenticate the user.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/></entry><entry><title>FIDO Specifications</title><link href="https://sinetris.info/glossary/fido-specifications/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/fido-specifications/" type="text/html"/><published>2025-11-10T15:10:26+00:00</published><updated>2025-11-10T15:10:26Z</updated><id>https://sinetris.info/glossary/fido-specifications/#atom</id><summary type="html">A set of open standards published by the 
&lt;a href="https://fidoalliance.org/" rel="external"&gt;FIDO Alliance&lt;/a&gt;
for stronger, simpler, and phishing-resistant user authentication.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/></entry><entry><title>Information Technology Asset Management</title><link href="https://sinetris.info/glossary/information-technology-asset-management/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/information-technology-asset-management/" type="text/html"/><published>2025-11-10T14:55:30+00:00</published><updated>2025-11-10T14:55:30Z</updated><id>https://sinetris.info/glossary/information-technology-asset-management/#atom</id><summary type="html">Systems to manage the lifecycle of &lt;a class="glossary-term" href="/glossary/information-technology-asset/"&gt;IT assets&lt;/a&gt;, including tracking, maintaining and disposing of hardware
and software.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/><category term="/contexts/grc" label="context: GRC"/></entry><entry><title>Anomaly Detection</title><link href="https://sinetris.info/glossary/anomaly-detection/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/anomaly-detection/" type="text/html"/><published>2025-11-10T14:26:54+00:00</published><updated>2025-11-10T14:26:54Z</updated><id>https://sinetris.info/glossary/anomaly-detection/#atom</id><summary type="html">A fundamental process in cybersecurity, used to identify events or patterns that
deviate from expected behavior within systems, networks, or datasets and that could
indicate a security threat, such as a network intrusion, malware, or unauthorized access.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/></entry><entry><title>Drift</title><link href="https://sinetris.info/glossary/drift/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/drift/" type="text/html"/><published>2025-11-10T13:50:07+00:00</published><updated>2025-11-10T13:50:07Z</updated><id>https://sinetris.info/glossary/drift/#atom</id><summary type="html">&lt;p&gt;Drift is the difference between the &lt;a class="glossary-term" href="/glossary/desired-state/"&gt;Desired State&lt;/a&gt; of
a system and its &lt;a class="glossary-term" href="/glossary/actual-state/"&gt;Actual State&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Detecting and resolving this drift is essential to prevent security vulnerabilities,
compliance violations, and operational failures.&lt;/p&gt;</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/gitops" label="context: GitOps"/><category term="/contexts/tech" label="context: Tech"/></entry><entry><title>Actual State</title><link href="https://sinetris.info/glossary/actual-state/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/actual-state/" type="text/html"/><published>2025-11-10T13:47:54+00:00</published><updated>2025-11-10T13:47:54Z</updated><id>https://sinetris.info/glossary/actual-state/#atom</id><summary type="html">Current and factual condition of a system or its data as opposed to the
&lt;a class="glossary-term" href="/glossary/desired-state/"&gt;Desired State&lt;/a&gt;.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/gitops" label="context: GitOps"/><category term="/contexts/tech" label="context: Tech"/></entry><entry><title>Desired State</title><link href="https://sinetris.info/glossary/desired-state/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/desired-state/" type="text/html"/><published>2025-11-10T13:47:45+00:00</published><updated>2025-11-10T13:47:45Z</updated><id>https://sinetris.info/glossary/desired-state/#atom</id><summary type="html">The planned state of a system, usually defined as data or code in a
&lt;a class="glossary-term" href="/glossary/single-source-of-truth/"&gt;&lt;abbr title="Single Source of Truth"&gt;SSOT&lt;/abbr&gt;&lt;/a&gt;.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/><category term="/contexts/gitops" label="context: GitOps"/><category term="/contexts/tech" label="context: Tech"/></entry><entry><title>Segregation of Duties</title><link href="https://sinetris.info/glossary/segregation-of-duties/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/segregation-of-duties/" type="text/html"/><published>2025-09-04T12:33:22+00:00</published><updated>2025-09-04T12:33:22Z</updated><id>https://sinetris.info/glossary/segregation-of-duties/#atom</id><summary type="html">&lt;h2 id="description"&gt;Description&lt;/h2&gt;
&lt;p&gt;Segregation of Duties (SoD) is a mechanism designed to prevent the risks of errors and fraudulent behavior by dividing the actions required to complete a task among different employees.&lt;/p&gt;
&lt;h3 id="examples"&gt;Examples&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;To prevent financial fraud: the person approving an invoice cannot be the same person who issued it.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Reason:&lt;/strong&gt; they could potentially approve and pay fraudulent invoices to themselves or a fictitious supplier.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;To prevent both fraud and errors: the software engineer that approve code changes to critical assets cannot be the same person who submitted the changes.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Reason:&lt;/strong&gt; they could miss mistakes made by them (prevent errors) or abuse the system to their own advantage (prevent fraud).&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/li&gt;
&lt;/ul&gt;</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/grc" label="context: GRC"/></entry><entry><title>Non-Human Identity</title><link href="https://sinetris.info/glossary/non-human-identity/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/non-human-identity/" type="text/html"/><published>2025-07-26T10:27:48+00:00</published><updated>2025-07-26T10:27:48Z</updated><id>https://sinetris.info/glossary/non-human-identity/#atom</id><summary type="html">Identity belonging to a machine, service account, containerized workload, or autonomous agent.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/tech" label="context: Tech"/></entry><entry><title>Identity and Access Management</title><link href="https://sinetris.info/glossary/identity-and-access-management/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/identity-and-access-management/" type="text/html"/><published>2025-07-16T15:07:33+00:00</published><updated>2025-07-16T15:07:33Z</updated><id>https://sinetris.info/glossary/identity-and-access-management/#atom</id><summary type="html">Identity and access management is a framework of policies, technologies, and
business processes aimed at facilitating the management of digital identities
and their access.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/tech" label="context: Tech"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/></entry><entry><title>Identity Threat Detection &amp; Response</title><link href="https://sinetris.info/glossary/identity-threat-detection-and-response/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/identity-threat-detection-and-response/" type="text/html"/><published>2025-07-16T11:30:52+00:00</published><updated>2025-07-16T11:30:52Z</updated><id>https://sinetris.info/glossary/identity-threat-detection-and-response/#atom</id><summary type="html">Cybersecurity discipline that includes tools and best practices for protecting
user identities and identity systems from cyber threats.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/></entry><entry><title>SSL-Bridging</title><link href="https://sinetris.info/glossary/ssl-bridging/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/ssl-bridging/" type="text/html"/><published>2025-07-02T07:50:28+00:00</published><updated>2025-07-02T07:50:28Z</updated><id>https://sinetris.info/glossary/ssl-bridging/#atom</id><summary type="html">The load balancer decrypts the incoming encrypted traffic (same as in
SSL-Termination) and re-encrypts it when sending to the destination (e.g.
backend instances).</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/tech" label="context: Tech"/><category term="/contexts/networking" label="context: Networking"/></entry><entry><title>SSL-Passthrough</title><link href="https://sinetris.info/glossary/ssl-passthrough/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/ssl-passthrough/" type="text/html"/><published>2025-07-02T07:50:28+00:00</published><updated>2025-07-02T07:50:28Z</updated><id>https://sinetris.info/glossary/ssl-passthrough/#atom</id><summary type="html">&lt;p&gt;The load balancer passes the encrypted traffic to the destination (e.g. backend
instances) without decrypting it.&lt;/p&gt;
&lt;p&gt;Because the load balancer only sees encrypted traffic, it is not possible to
perform layer 7 (OSI model) actions.&lt;/p&gt;</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/tech" label="context: Tech"/><category term="/contexts/networking" label="context: Networking"/></entry><entry><title>SSL-Termination</title><link href="https://sinetris.info/glossary/ssl-termination/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/ssl-termination/" type="text/html"/><published>2025-07-02T07:50:28+00:00</published><updated>2025-07-02T07:50:28Z</updated><id>https://sinetris.info/glossary/ssl-termination/#atom</id><summary type="html">The load balancer decrypts the incoming encrypted traffic and sends it to the
destination (e.g. backend instances) unencrypted.</summary><category term="/types/glossary" label="type: glossary"/><category term="/categories/tech" label="category: Tech"/><category term="/categories/networking" label="category: Networking"/><category term="/contexts/tech" label="context: Tech"/><category term="/contexts/networking" label="context: Networking"/></entry><entry><title>Account Takeover</title><link href="https://sinetris.info/glossary/account-take-overs/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/account-take-overs/" type="text/html"/><published>2025-06-25T11:55:55+00:00</published><updated>2025-06-25T11:55:55Z</updated><id>https://sinetris.info/glossary/account-take-overs/#atom</id><summary type="html">Gaining unauthorized access to a user account.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/></entry><entry><title>Color Wheel</title><link href="https://sinetris.info/glossary/color-wheel/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/color-wheel/" type="text/html"/><published>2025-05-30T06:55:18+00:00</published><updated>2025-05-30T06:55:18Z</updated><id>https://sinetris.info/glossary/color-wheel/#atom</id><summary type="html">A circular diagram used to show the relationships between colors.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/graphic-design" label="context: Graphic Design"/></entry><entry><title>Color Theory</title><link href="https://sinetris.info/glossary/color-theory/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/color-theory/" type="text/html"/><published>2025-05-27T15:46:33+00:00</published><updated>2025-05-27T15:46:33Z</updated><id>https://sinetris.info/glossary/color-theory/#atom</id><summary type="html">The study of how colors interact with each other and how they can influence people&amp;rsquo;s emotions and perceptions.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/graphic-design" label="context: Graphic Design"/></entry><entry><title>Color Harmonies</title><link href="https://sinetris.info/glossary/color-harmonies/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/color-harmonies/" type="text/html"/><published>2025-05-27T14:18:00+00:00</published><updated>2025-05-27T14:18:00Z</updated><id>https://sinetris.info/glossary/color-harmonies/#atom</id><summary type="html">&lt;h2 id="definition"&gt;Definition&lt;/h2&gt;
&lt;p&gt;The term &amp;ldquo;color harmonies&amp;rdquo; refers to the creation of balanced and aesthetically
pleasing color combinations based on the principles and concepts outlined in
&lt;a class="glossary-term" href="/glossary/color-theory/"&gt;Color Theory&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id="color-combinations"&gt;Color combinations&lt;/h2&gt;
&lt;h3 id="analogous"&gt;Analogous&lt;/h3&gt;
&lt;h3 id="complementary"&gt;Complementary&lt;/h3&gt;
&lt;h3 id="split-complementary"&gt;Split-Complementary&lt;/h3&gt;
&lt;h3 id="triadic"&gt;Triadic&lt;/h3&gt;
&lt;p&gt;The triadic color harmony uses three colors equally spaced on the color wheel,
forming a triangle, to create vibrant, balanced, and visually appealing color
palette.&lt;/p&gt;</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/graphic-design" label="context: Graphic Design"/></entry><entry><title>Information Assurance</title><link href="https://sinetris.info/glossary/information-assurance/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/information-assurance/" type="text/html"/><published>2025-03-17T10:43:09+00:00</published><updated>2025-03-17T10:43:09Z</updated><id>https://sinetris.info/glossary/information-assurance/#atom</id><summary type="html">&lt;p&gt;Information Assurance (IA) is the practice of assuring information quality and managing risks related to the use, processing, storage, and transmission of information.&lt;/p&gt;
&lt;p&gt;The 5 pillars of information assurance includes protection of the &lt;strong&gt;Confidentiality&lt;/strong&gt;, &lt;strong&gt;Integrity&lt;/strong&gt;, &lt;strong&gt;Availability&lt;/strong&gt;, &lt;strong&gt;Authenticity&lt;/strong&gt;, and &lt;strong&gt;Non-repudiation&lt;/strong&gt; of information.&lt;/p&gt;
&lt;p&gt;In IT systems, when possible, assets should be tagged/labeled with proper Information Assurance level.&lt;/p&gt;
&lt;h2 id="confidentiality"&gt;Confidentiality&lt;/h2&gt;
&lt;p&gt;The property that information is not made available or disclosed to unauthorized individuals, entities, or processes.&lt;/p&gt;</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/><category term="/contexts/grc" label="context: GRC"/><category term="/tags/compliance" label="tag: Compliance"/><category term="/tags/confidentiality" label="tag: Confidentiality"/><category term="/tags/integrity" label="tag: Integrity"/><category term="/tags/availability" label="tag: Availability"/><category term="/tags/authenticity" label="tag: Authenticity"/><category term="/tags/non-repudiation" label="tag: Non-Repudiation"/></entry><entry><title>Access Management</title><link href="https://sinetris.info/topics/iam/iga/access-management/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/topics/iam/iga/access-management/" type="text/html"/><published>2024-07-15T16:27:00+00:00</published><updated>2024-07-15T16:27:00Z</updated><id>https://sinetris.info/topics/iam/iga/access-management/#atom</id><summary type="html">&lt;h2 id="why-you-need-access-management"&gt;Why you need access management&lt;/h2&gt;
&lt;p&gt;Some important points are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;It allows to properly document granted access history for auditing and security purposes&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Who had access to a specific system, what kind of access, why, at any point in time&lt;/li&gt;
&lt;li&gt;What did they access, when, and why (via integration with SIEM systems)&lt;/li&gt;
&lt;li&gt;When they are doing operations on a system, this allow to check if they are allowed&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Monitor drifting between desired state and actual state and what caused it&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Keeping track of users accesses allow to better refine them&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Did they had granted more access than needed for their work?&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Grant them access based on principle of least privilege&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;</summary><category term="/types/topic" label="type: topic"/><category term="/categories/iga" label="category: IGA"/><category term="/categories/security" label="category: Security"/><category term="/tags/access-requests" label="tag: Access Requests"/><category term="/tags/access-revocation" label="tag: Access Revocation"/><category term="/tags/provisioning" label="tag: Provisioning"/><category term="/tags/deprovisioning" label="tag: Deprovisioning"/></entry><entry><title>Information and Communication Technology</title><link href="https://sinetris.info/glossary/information-and-communication-technology/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/information-and-communication-technology/" type="text/html"/><published>2023-08-06T10:15:25+00:00</published><updated>2023-08-06T10:15:25Z</updated><id>https://sinetris.info/glossary/information-and-communication-technology/#atom</id><summary type="html">&lt;p&gt;An umbrella term that encompasses all technical means used to handle information
and facilitate communication through the use of computing devices (e.g., desktops,
laptops, servers, mainframes, smartphones, tablet, or any other CPU-equipped device),
network equipment (e.g., routers, switches, modems, cables), other peripherals (e.g.,
printers, scanners, external hard drives), and any related software.&lt;/p&gt;</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/tech" label="context: Tech"/></entry><entry><title>Out of the box</title><link href="https://sinetris.info/glossary/out-of-the-box/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/out-of-the-box/" type="text/html"/><published>2023-08-06T10:15:25+00:00</published><updated>2023-08-06T10:15:25Z</updated><id>https://sinetris.info/glossary/out-of-the-box/#atom</id><summary type="html">Native or built-in feature or functionality of a product, included by default
and that works immediately after first setup.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/tech" label="context: Tech"/></entry><entry><title>Best Effort</title><link href="https://sinetris.info/glossary/best-effort/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/best-effort/" type="text/html"/><published>2023-08-06T10:10:15+00:00</published><updated>2023-08-06T10:10:15Z</updated><id>https://sinetris.info/glossary/best-effort/#atom</id><summary type="html">Reasonable effort to satisfy a request but without guaranteeing success.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/tech" label="context: Tech"/><category term="/contexts/networking" label="context: Networking"/></entry><entry><title>Information Technology</title><link href="https://sinetris.info/glossary/information-technology/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/information-technology/" type="text/html"/><published>2023-08-06T10:10:15+00:00</published><updated>2023-08-06T10:10:15Z</updated><id>https://sinetris.info/glossary/information-technology/#atom</id><summary type="html">&lt;p&gt;The study or use of hardware and software to manage, store, retrieve, and deliver
data.&lt;/p&gt;
&lt;p&gt;A subset of &lt;a class="glossary-term" href="/glossary/information-and-communication-technology/"&gt;&lt;abbr title="Single Source of Truth"&gt;ICT&lt;/abbr&gt;&lt;/a&gt;.&lt;/p&gt;</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/tech" label="context: Tech"/></entry><entry><title>Principle of Least Privilege</title><link href="https://sinetris.info/glossary/principle-of-least-privilege/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/principle-of-least-privilege/" type="text/html"/><published>2023-08-06T10:10:15+00:00</published><updated>2023-08-06T10:10:15Z</updated><id>https://sinetris.info/glossary/principle-of-least-privilege/#atom</id><summary type="html">Security concept whereby a user or service is granted the minimum levels of access
and authorization necessary to perform the requested task.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/iam" label="context: IAM"/><category term="/contexts/information-security" label="context: Information Security"/></entry><entry><title>Real Time</title><link href="https://sinetris.info/glossary/real-time/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/real-time/" type="text/html"/><published>2023-08-06T10:10:15+00:00</published><updated>2023-08-06T10:10:15Z</updated><id>https://sinetris.info/glossary/real-time/#atom</id><summary type="html">&lt;p&gt;Reported at the same time something takes place or delivered in a short time.&lt;/p&gt;
&lt;p&gt;What we consider real-time is a matter of expectations, for example a postal package
delivered in few minutes would still be considered as delivered in real-time.&lt;/p&gt;</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/generic" label="context: Generic"/></entry><entry><title>Real-Time Computing</title><link href="https://sinetris.info/glossary/real-time-computing/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/real-time-computing/" type="text/html"/><published>2023-08-06T10:10:15+00:00</published><updated>2023-08-06T10:10:15Z</updated><id>https://sinetris.info/glossary/real-time-computing/#atom</id><summary type="html">&lt;h2 id="description"&gt;Description&lt;/h2&gt;
&lt;p&gt;Real-time computing, also known as reactive computing, is used to describe a computer system that guarantees the processing of inputs and the execution of tasks within specified time limits, often referred to as “deadlines”.&lt;/p&gt;
&lt;p&gt;We can divide real-time systems into three categories based on expectations:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;a href="/glossary/real-time-computing/"&gt;soft real-time&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="/glossary/real-time-computing/"&gt;firm real-time&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="/glossary/real-time-computing/"&gt;hard real-time&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="soft-real-time"&gt;soft real-time&lt;/h2&gt;
&lt;p&gt;The system continues to operate even if it’s unable to perform operations within the allotted time.&lt;/p&gt;
&lt;h2 id="firm-real-time"&gt;firm real-time&lt;/h2&gt;
&lt;p&gt;Deadlines are crucial, but occasional non-compliance is tolerable.&lt;/p&gt;</summary><category term="/types/glossary" label="type: glossary"/><category term="/categories/tech" label="category: Tech"/><category term="/contexts/tech" label="context: Tech"/></entry><entry><title>Real-Time Operating System</title><link href="https://sinetris.info/glossary/real-time-os/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/real-time-os/" type="text/html"/><published>2023-08-06T10:10:15+00:00</published><updated>2023-08-06T10:10:15Z</updated><id>https://sinetris.info/glossary/real-time-os/#atom</id><category term="/types/glossary" label="type: glossary"/><category term="/categories/tech" label="category: Tech"/><category term="/contexts/tech" label="context: Tech"/></entry><entry><title>Recovery Point Objective</title><link href="https://sinetris.info/glossary/recovery-point-objective/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/recovery-point-objective/" type="text/html"/><published>2023-08-06T10:10:15+00:00</published><updated>2023-08-06T10:10:15Z</updated><id>https://sinetris.info/glossary/recovery-point-objective/#atom</id><summary type="html">Targeted duration of time between the event of failure and the point where operations resume.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/tech" label="context: Tech"/><category term="/contexts/grc" label="context: GRC"/></entry><entry><title>Recovery Time Objective</title><link href="https://sinetris.info/glossary/recovery-time-objective/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/recovery-time-objective/" type="text/html"/><published>2023-08-06T10:10:15+00:00</published><updated>2023-08-06T10:10:15Z</updated><id>https://sinetris.info/glossary/recovery-time-objective/#atom</id><summary type="html">Agreed maximum time, based on risk analysis, between the failure event and the restoration of operations.</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/tech" label="context: Tech"/><category term="/contexts/grc" label="context: GRC"/></entry><entry><title>Software Bill of Materials</title><link href="https://sinetris.info/glossary/software-bill-of-materials/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/glossary/software-bill-of-materials/" type="text/html"/><published>2023-08-06T10:10:15+00:00</published><updated>2023-08-06T10:10:15Z</updated><id>https://sinetris.info/glossary/software-bill-of-materials/#atom</id><summary type="html">&lt;p&gt;A Software Bill of Materials (SBOM) is a comprehensive inventory of all the components,
including dependencies and related installed tools, used in a software.&lt;/p&gt;</summary><category term="/types/glossary" label="type: glossary"/><category term="/contexts/tech" label="context: Tech"/><category term="/contexts/cyber-security" label="context: Cyber Security"/><category term="/contexts/grc" label="context: GRC"/></entry><entry><title>Advices</title><link href="https://sinetris.info/topics/iam/iga/considerations/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/topics/iam/iga/considerations/" type="text/html"/><published>2023-07-16T18:20:00+00:00</published><updated>2023-07-16T18:20:00Z</updated><id>https://sinetris.info/topics/iam/iga/considerations/#atom</id><summary type="html">&lt;h2 id="assets-and-people"&gt;Assets and people&lt;/h2&gt;
&lt;p&gt;Ensure to have proper Orphan Account Monitoring (for example, people leaving the
company) and delegation (for example, people in sick or parental leave) for people
assigned to managing assets (Asset Owners, Application Administrators, Infrastructure
Administrators, etc).
Take into consideration that people might be out of office because in vacation,
out sick, at a conference, etc.&lt;/p&gt;</summary><category term="/types/topic" label="type: topic"/><category term="/categories/iam" label="category: IAM"/><category term="/categories/iga" label="category: IGA"/><category term="/tags/orphan-account" label="tag: Orphan Account"/></entry><entry><title>Identity Lifecicle Management</title><link href="https://sinetris.info/topics/iam/iga/identity-lifecicle-management/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/topics/iam/iga/identity-lifecicle-management/" type="text/html"/><published>2023-07-16T18:20:00+00:00</published><updated>2023-07-16T18:20:00Z</updated><id>https://sinetris.info/topics/iam/iga/identity-lifecicle-management/#atom</id><summary type="html">&lt;h2 id="hr-driven-identity-lifecycle"&gt;HR-Driven Identity Lifecycle&lt;/h2&gt;
&lt;p&gt;The HR department is the one that knows who is joining, who is leaving, who is moving to another job within the company, who is on vacation, sick leave, parental leave, etc. Their system should expose for each employee at least the name that should be used for them within the company (might be diﬀerent from their legal name, which is only required by HR to sign contracts), the start and end dates (if applicable) of the contract, department, role, line manager, and absences.&lt;/p&gt;</summary><category term="/types/topic" label="type: topic"/><category term="/categories/iam" label="category: IAM"/><category term="/categories/iga" label="category: IGA"/></entry><entry><title>Identity Security</title><link href="https://sinetris.info/topics/iam/iga/identity-security/" rel="alternate" type="text/html" hreflang="en" title="Sinetris's viewpoints"/><content src="https://sinetris.info/topics/iam/iga/identity-security/" type="text/html"/><published>2023-07-16T18:20:00+00:00</published><updated>2023-07-16T18:20:00Z</updated><id>https://sinetris.info/topics/iam/iga/identity-security/#atom</id><summary type="html">&lt;h2 id="orphan-account-monitoring"&gt;Orphan Account Monitoring&lt;/h2&gt;
&lt;p&gt;It’s important to find missing identity associations or assets assigned to wrong identities (for example off-boarded employees).&lt;/p&gt;
&lt;p&gt;Examples:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;An account is associated to an asset but is not assigned to any identity&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;All accounts should be associated with one (and only one ) identity.&lt;/li&gt;
&lt;li&gt;If the system allow only one account (for example only one admin), access to that account should happen trough a system that keep track of all actions (see PAM and Just-in-time credentials).&lt;/li&gt;
&lt;li&gt;If credentials to the account are shared it will be hard to know who performed an action.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Asset role (for example Owner or Admistrator) assigned to an Identity that left the company&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Employee assigned to a line manager that transferred to a different department&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="adaptive-authentication"&gt;Adaptive Authentication&lt;/h2&gt;
&lt;p&gt;Varying authentication methods based on runtime evaluation of risk factors.&lt;/p&gt;</summary><category term="/types/topic" label="type: topic"/><category term="/categories/iam" label="category: IAM"/><category term="/categories/iga" label="category: IGA"/><category term="/tags/orphan-account" label="tag: Orphan Account"/></entry></feed>