Glossary A Flashcards
Expanding on functional testing to include operations outside of the intended use of an application in order to test for security flaws or application stability problems
Abuse case testing
Modern approach to development that uses an iterative process of “sprints” to segment coding and features into manageable chunks
Agile
Value derived by multiplying the single loss expectancy (SLE) by the annualized rate of occurrence (ARO). ALE = SLE x ARO
ALE (annualized loss expectancy)
A tool that sits between client systems and the back-end services they call via API requests in order to serve as a reverse proxy for security and performance capabilities
API Gateway
A set of functions, routines, tools or protocols for building applications. Allows for interaction between systems and applications that can be leveraged by developers as building blocks for their applications and data access through a common method, without custom coding for each integration
Application Programming Interface (API)
Estimated number of the times a threat will successfully exploit a given vulnerability over the course of a single year
ARO (Annualized rate of occurrence)
A threat-modeling approach composed of Architecture, Threats, Attack Surfaces, and Mitigations
ATASM
The ability to properly capture, analyze, and report on any and all events that happen within a system or application, such as data access and modification, user actions and processes, controls and compliance, and regulatory and contractual compliance
Auditability
The process of evaluating credentials presented by a user, application, or service to prove its identity as compared to values already known and verified by the authentication system
Authentication
The process of granting or denying access to a system, network, or application after successful authentication has been performed, based on approved criteria set by policy or regulation
Authorization
Means or method of accessing a system or application while bypassing the typical and required authentication and authorization methods. Can be unauthenticated methods discovered by malicious actors to get into a system, or they can be methods purposefully employed by developers or support staff to access systems for maintenance or other support activities. Created by developers or hackers.
Backdoor
Part of the change management process, which establishes an agreed-upon standard configuration and the attributes that comprise it and forms the basis for managing change from that point forward
Baseline
Heavily fortified system that serves as a jump box or proxy between an untrusted network and trusted networks
bastion host
Refers to collection, processing, and analysis of data sets that are so large that traditional data processing and analysis tools are inadequate to properly handle them. Often applied in regard to predictive analysis and user analytics of data sets rather than referring to a specific size of the data involved.
Big Data
The practice of allowing employees of an organization to use their own computers, phones, tablets or other electronic resources to access official computing resources, rather than using devices provided and supported by the organization.
Bring your own device (BYOD)
The capability of an organization to continue the operation of systems or applications at a predetermined level after an incident or a disruption of service
Business Continuity
A process designed to identify risks, threats, and vulnerabilities that could disrupt or impact services, with the intent of determining mitigation strategies and response processes should they occur
Business continuity management
A developed and tested document, containing information from stakeholders and staff, for the continuation of operations and services in the event of a disruption or incident
Business continuity plan
A structured methodology to identify and evaluate the possible risks and threats that operations or services could be impacted by, as well as the possible or likely extent of impact and disruption
Business Impact Analysis (BIA)
Formal documentation showing the chronological control and disposition of data or evidence, either physical or electronic. Includes creation, all changes of possession, and final disposition. It is absolutely essential to maintain the integrity of evidence and its admissibility in legal proceedings.
Chain of custody
Group that assists the change team and change management process by evaluating, prioritizing, and approving change requests
Change Advisory Board (CAB)
Individual with a role in the change management process who ensures the overall change process is properly executed. This person also directly handles low-level tasks related to the change process.
Change Manager
A software tool or service that sits between cloud resources and the clients or systems accessing them. It serves as a gateway that can perform a variety of security and policy enforcement functions. Can consolidate and perform the functions of firewalls and web application firewalls as well as provide authentication and data loss prevention capabilities.
Cloud Access Security Broker (CASB)
Application that is never installed on a local server or desktop but is instead accessed via network or the Internet. Merges the functionality of a local application with the accessibility of a web-based application
Cloud Application
Within a PaaS implementation, this serves as the framework and specification for managing platform services, encompassing a RESTful protocol for managing services, the model for describing and documenting the components that comprise the platform, and the language describing the overall platform, its components and services, and the metadata about it
Cloud Application Management for Platforms (CAMP)
An auditor that is specifically responsible for conducting audits of cloud systems and cloud applications. Responsible for assessing the effectiveness of the cloud service and identifying control deficiencies between the cloud customer and the cloud provider, as well as the cloud broker if one is used
Cloud Auditor
The process of using a cloud-based backup system, with files and data being sent over the network to a public or private cloud provider for backup, rather than running traditional backup systems within a data center
Cloud Backup
A public or private cloud services organization that offers backup services to either the public or organizational clients, either on a free basis or using various costing models based on either the amount of data or number of systems
Cloud backup service provider
services that run within a public or private cloud offering backup solutions, either through client-based software that does automatic or scheduled backups or through manual backups initiated by a user or system
cloud backup solutions
a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computer resources that can be rapidly provisioned and released with minimal management effort or service provider interaction. Cloud model is composed of five essential characteristics, three service models, and four deployment models
Cloud Computing
An organization that sells and offers cloud services, and possibly cloud support services, to various organizations and works as a middleman between the cloud customer and cloud provider
Cloud Computing reseller
A formally published guide by the Cloud Security Alliance that enables cloud customers to evaluate a prospective cloud provider in regard to its security posture. Allows a cloud provider to structure its security approach.
Cloud Controls Matrix (CCM)
An organization or individual that utilizes and consumes resources and services from a cloud provider. This can be in the form of free public services and systems or private and fee-based applications or solutions.
Cloud Customer
The ability to move data between cloud providers
Cloud data portability
A database that is installed in a cloud environment and accessed via the network or the Internet by a user or application. Elasticity, scalability, and high availability can be achieved and maximized.
Cloud database
How cloud computing is delivered through a set of particular configurations and features of virtual resources. The cloud deployment models are public, private, hybrid, and community.
Cloud Deployment Model
The creation of a public cloud environment through the offering of services or infrastructure
Cloud enablement
The oversight and operations management of a cloud environment by the cloud service provider, whether it is a public or private cloud environment
Cloud Management
The process of moving services, systems, applications, or data from a traditional data center hosting model into a cloud environment
Cloud migration
Used to denote an operating system in a Platform as a Service (PaaS) implementation and signify the implementation within a cloud environment
Cloud Operating System
A service provider that makes storage or software applications available via the Internet or private networks to customers. Since applications are offered as a service, the platform and underlying software, as well as operations and security systems, are maintained by the provider and abstracted from the customers
Cloud Provider
The process of allocating cloud resources from the cloud provider to the cloud customers based on specific requests and requirements of the customers as far as the number of virtual machines and their specific computing resources
Cloud Provisioning
The most prominent and well-known organization to raise awareness of best practices for security within a cloud environment
Cloud Security Alliance (CSA)
The hosting and location of servers within a virtualized cloud environment, rather than the virtual or physical hosting that’s done in a traditional data center
Cloud Server Hosting
Capabilities offered via a cloud provider and accessible via a client
Cloud service
A partner that servers as an intermediary between a cloud service customer and cloud service provider
Cloud Service Broker
A group of cloud services with a common set of features of qualities
Cloud Service Category
One that holds a relationship with either a cloud service provider or a cloud service customer to assist with cloud services and their delivery
Cloud Service Partner
One that interacts with and consumes services offered by a cloud service provider
Cloud Service user
The testing of systems, services, or applications by leveraging cloud platforms and resources to simulate the size and scale of real-world traffic and users
Cloud testing
Set of international guidelines and specifications for evaluation of IT security resources to ensure they meet an agreed-upon set of security standards, focused on government computing and security needs and requirements.The Common Criteria for Information Technology Security Evaluation is formalized as an international standard in ISO/IEC 15408
Common Criteria
Cloud infrastructure provisioned for exclusive use by a specific community of consumers from organizations that have shared concerns. Owned, managed, and operated by one or more of the organizations in the community, a third party, or some combination of these, and it may exist on or off premises.
Community Cloud
Allows for the execution of compute-intensive workloads to be performed in the cloud. Code can be executed in a serverless environment where the customer only pays for the computing time and cycles they consume, without the need for setting up server instances or environments
Compute as a Service (CaaS)
A paradigm that isolates the processing of data within protected CPU segments that are completely isolated from other users and systems
Confidential Computing
Establishing a controlled means of consistency throughout a systems lifecycle, based on its requirements and technical specifications, to properly ensure configuration controls, performance standards, and design requirements
Configuration management
A software package that contains all of the code, configurations, and libraries needed for an application to operate, packaged inside a single unit
Container
The process of taking logs from many different systems and putting them together based on a commonality in order to fully track a session or transaction
Correlation
Very common type of security vulnerability found with web applications, where an attacker can inject client-side scripts into web pages that are then viewed and executed by other users. The goal of this attack from an attacker’s perspective is to bypass the security controls of an application, such as an access control with a same-origin policy
Cross-site scripting (XSS)
Data that resides on a system in persistent storage, such as disks, tapes, databases, or any other type of storage device
data at rest (DAR)
Feature of cloud storage where data is spread across data centers or wide geographic areas for redundancy and speed. The degree of dispersion is typically based on the needs of the application and the level of service procured by the cloud customer
data dispersion
serverless, managed data processing service offered by a cloud provider for the execution of data pipelines
data flow
data that flows over a networked connection, either through public unsecured networks or internal protected corporate networks
data in transit (DIT)
data within a system or application that is currently being processed or is in use, either through the computing resources or residing in memory
data in use (DIU)
An overall strategy and process for ensuring that users cannot send sensitive or protected information outside of networks or systems that are secured and protected. This can be related to the intentional attempt by users to transfer such information, but it also applies to preventing the accidental sending or leakage of data.
Data loss prevention (DLP)
the ability to easily move data from one system to another without having to re-enter it
data portability
a suite of tools used to monitor database operations and functions in real time in order to detect security concerns or anomalies
database activity monitoring (DAM)
A subscription service where the database is installed, configured, secured, and maintained by the cloud provider, with the cloud customer only responsible for loading their schema and data
Database as a Service (DBaaS)
An attempt to make computing resources or a network unavailable to its intended users by denying legitimate traffic access totally or by degrading performance to unacceptable levels
denial-of-service (DoS) attack
A cloud-based equivalent of a traditional virtual desktop interface (VDI) that is hosted and managed by a cloud provider rather than on hardware owned by the customer
Desktop as a Service (DaaS)
Combines software development with IT operations, with a goal of shortening the software development time and providing optimal uptime and quality of service
DevOps
Process of integrating security at all levels and stages of development and operations to fully ensure best practices and a focus on security
DevSecOps
Information that specifically applies to a unique individual, such as name, address, phone number, e-mail address, or unique identifying numbers or codes.
Direct identifier
A utility from VMWare that balances computing demands and available resources within the virtualized environment
Distributed Resource Scheduler (DRS)
The testing of an application, while is, is in an operational state with currently running systems, applications, and networks
Dynamic Application Security Testing (DAST)
The process of moving and reallocating virtual machines and resources within a cluster environment to maintain optimal performance with balanced and distributed resource utilization
Dynamic optimization (DO)
A computing paradigm that is based on putting the processing of data and computing resources as close to the source of that data as possible
Edge computing