Trust Segura® to provide accurate and up-to-date cybersecurity definitions, helping you make sense of the complex world of access and identity management.
OpenID Connect (OIDC) is a protocol built on OAuth 2.0 that securely verifies a user's identity and provides applications with basic profile information using tokens issued by a trusted identity provider.
On-Premises refers to IT infrastructure, software, or hardware that is hosted, managed, and maintained within an organization’s physical facilities rather than in the cloud or through a third-party provider.
OAuth (Open Authorization) is a secure protocol that allows users to grant third-party applications limited access to their data on another platform without sharing their credentials.
Multi-Factor Authentication (MFA) is a security process that requires users to verify their identity using two or more factors, such as a password and a biometric scan, to protect sensitive systems and accounts.
Platform-as-a-Service (PaaS) is a cloud computing model offering tools and infrastructure for developers to build, test, and deploy applications without managing hardware or software.
Password strength is a measure of how difficult a password is to guess or crack, determined by its length, complexity, and predictability.
Password reset is the process of securely updating or restoring a password to regain access to an account or system when the original password is forgotten, expired, or compromised.
Password management is the practice of securely creating, storing, and managing passwords to protect accounts and systems while reducing the risks associated with weak or compromised credentials.
Passwordless authentication is a method of verifying a user's identity using secure alternatives to passwords, such as biometrics, hardware tokens, or device-based verification.
Password complexity refers to rules or requirements for creating passwords that meet specific security standards, such as including a mix of letters, numbers, symbols, and a minimum length to protect against unauthorized access.
Load balancing is the process of distributing network or application traffic across multiple servers to optimize resource use, improve performance, and enhance the availability and reliability of applications.
Just in Time (JIT) Access is a security strategy that grants users temporary access to systems, applications, or data only when needed, for a specific duration.
Infrastructure-as-a-Service (IaaS) is a cloud computing model that offers virtualized computing resources, such as servers, storage, and networking, over the internet on a pay-as-you-go basis.
Identity Provisioning is the process of creating, managing, and assigning user identities and access rights across IT systems and applications based on predefined policies and roles.
An Identity Provider (IdP) is a service that authenticates and manages user identities, enabling secure access to applications and systems by verifying credentials.
Identity Lifecycle Management (ILM) is the process of managing a user’s digital identity from creation to deactivation, ensuring proper access rights throughout their time with an organization.
Identity-First Security is a security approach that centers on user identities to control and monitor access to systems and data, rather than relying on traditional network boundaries.
Identity Fabric is a unified architecture that integrates various identity management tools and services to manage user identities, authentication, and access across an organization’s digital ecosystem.
Identity De-provisioning is the process of securely removing or disabling a user’s access to an organization’s systems and data when they no longer need it, preventing unauthorized access.
Identity as a Service (IDaaS) is a cloud-based system for managing and authenticating user identities across applications and systems.
The SAMA Cybersecurity Framework is a comprehensive set of guidelines and controls established by the Saudi Arabian Monetary Authority to enhance the cyber resilience of financial institutions in Saudi Arabia.
Remote Desktop Protocol (RDP) is a secure network communication protocol developed by Microsoft, allowing users to remotely control and operate computers.
Operational Technology (OT) cybersecurity is the practice of protecting industrial systems and critical infrastructure from cyber threats to ensure safe and reliable operations.
IT Governance (ITG) encompasses the processes and structures that ensure the effective and efficient use of information technology (IT) to help an organization achieve its goals.
Identity Security is a comprehensive set of tools, processes, and principles designed to safeguard all digital identities within an organization from unauthorized access.
Identity Analytics refers to the use of data analytics techniques to manage and mitigate risks associated with user identities and access within an organization.
Identity and Access Management (IAM) is a framework of processes and technologies used to manage digital identities, control user access to resources, and ensure secure and compliant access within an organization.
High Availability (HA) refers to a system design approach aimed at ensuring that services, applications, or systems remain operational and accessible with minimal downtime.
Governance Framework is a comprehensive system of rules, procedures, and responsibilities that guides how an organization operates and interacts with its stakeholders.
Federated Identity Management (FIM) is a system that allows users to access multiple applications and services using a single set of credentials managed by one organization.
Disaster recovery (DR) is a set of strategies, processes, and tools designed to restore and maintain critical IT systems, data, and operations following a disruptive event.
Directory Services are a crucial component of network management that store, organize, and provide access to information about network resources and users.
A digital certificate, also known as a public key certificate or identity certificate, is a digital document used to prove the ownership of a public key.
DevSecOps, short for Development, Security, and Operations, extends the DevOps framework by integrating security practices into every phase of the software development lifecycle.
DevOps is a set of practices and cultural philosophies that brings together software development and IT operations to speed up and improve the delivery and quality of software.
A data leak occurs when sensitive, confidential, or protected information is released unintentionally into an untrusted environment.
A data breach is a security incident in which sensitive, protected, or confidential data is accessed, disclosed, or stolen without authorization.
Cybersecurity Mesh is a modern architectural approach to scalable, flexible, and reliable cybersecurity control.
A credential is any piece of information that serves as a form of identification to authenticate an entity, usually for the purpose of gaining access to resources within an information system.
Contextual Authentication, also known as adaptive authentication or risk-based authentication, is a dynamic approach to verifying user identities that considers the context of a login attempt or transaction.
Break the Glass is an emergency access protocol used in PAM to provide immediate and time-limited access to critical systems in exceptional circumstances.
Authorization is the process of granting or denying specific rights and privileges to a system or network resource.
Authentication is a fundamental process in both security and identity management, serving as the gatekeeper for accessing systems, networks, and applications.