Cybersecurity & Cloud Glossary

Clear, practitioner-friendly definitions for the terms security and cloud teams rely on every day.

Cloud Infrastructure

8 definitions focused on day-to-day security work.

API Gateway

Cloud Infrastructure

A service that acts as a single entry point for API requests, handling routing, authentication, rate limiting, and other cross-cutting concerns.

Read definition →

AWS (Amazon Web Services)

Cloud Infrastructure

Amazon's comprehensive cloud computing platform offering over 200 services for compute, storage, databases, networking, security, and application development.

Read definition →

Azure (Microsoft Azure)

Cloud Infrastructure

Microsoft's cloud computing platform providing integrated services for compute, analytics, storage, networking, AI, and enterprise applications.

Read definition →

CDN (Content Delivery Network)

Cloud Infrastructure

A geographically distributed network of servers that cache and deliver web content from locations closest to end users, improving performance and reliability.

Read definition →

Docker

Cloud Infrastructure

A platform for developing, shipping, and running applications in lightweight, portable containers that package code with all its dependencies.

Read definition →

Kubernetes

Cloud Infrastructure

An open-source container orchestration platform that automates deployment, scaling, and management of containerized applications across clusters of hosts.

Read definition →

Load Balancer

Cloud Infrastructure

A system that distributes incoming network traffic across multiple servers to ensure high availability, reliability, and optimal resource utilization.

Read definition →

Service Mesh

Cloud Infrastructure

A dedicated infrastructure layer that handles service-to-service communication, providing observability, traffic management, and security without changing application code.

Read definition →

Cloud Security

9 definitions focused on day-to-day security work.

AWS Security Hub

Cloud Security

AWS service that aggregates security findings from multiple AWS services and third-party tools, providing a unified view of security posture.

Read definition →

CASB (Cloud Access Security Broker)

Cloud Security

A security solution that sits between cloud service users and cloud applications to enforce security policies, provide visibility, and protect data.

Read definition →

Cloud Security Posture Management (CSPM)

Cloud Security

Continuous monitoring and remediation of cloud misconfigurations across accounts, services, and regions.

Read definition →

Cloud Workload Protection Platform (CWPP)

Cloud Security

Security tooling that safeguards cloud-native workloads—containers, serverless functions, and VMs—across build and runtime.

Read definition →

Cloud-Native Application Protection Platform (CNAPP)

Cloud Security

A unified security platform that combines CSPM, CWPP, and other cloud security capabilities into a single solution.

Read definition →

Microsegmentation

Cloud Security

A network security technique that divides the network into isolated segments, applying granular access controls between workloads.

Read definition →

Shared Responsibility Model

Cloud Security

A framework that outlines which security tasks the cloud provider handles versus what the customer must secure.

Read definition →

Virtual Private Cloud (VPC)

Cloud Security

An isolated virtual network within a cloud provider where you can launch resources with control over IP addressing, subnets, and routing.

Read definition →

Web Application Firewall (WAF)

Cloud Security

A security control that filters, monitors, and blocks HTTP/HTTPS traffic to and from web applications based on predefined rules.

Read definition →

DevSecOps

10 definitions focused on day-to-day security work.

Container Image

DevSecOps

A lightweight, standalone, executable package containing everything needed to run an application: code, runtime, libraries, and settings.

Read definition →

Container Registry

DevSecOps

A repository for storing, managing, and distributing container images, providing version control and access management.

Read definition →

Dynamic Application Security Testing (DAST)

DevSecOps

Testing a running application from the outside to discover security vulnerabilities by simulating attacks.

Read definition →

Immutable Infrastructure

DevSecOps

An infrastructure paradigm where servers are never modified after deployment; changes require replacing instances with new ones built from updated images.

Read definition →

Infrastructure as Code (IaC)

DevSecOps

Managing and provisioning infrastructure through machine-readable configuration files rather than manual processes.

Read definition →

Policy as Code

DevSecOps

Defining and enforcing security, compliance, and operational policies through code that can be versioned, tested, and automated.

Read definition →

Runtime Security

DevSecOps

Monitoring and protecting applications during execution to detect and prevent attacks in real-time.

Read definition →

Shift Left Security

DevSecOps

Moving security testing and controls earlier in the software development lifecycle to find and fix vulnerabilities sooner.

Read definition →

Software Composition Analysis (SCA)

DevSecOps

Identifying open-source components and third-party libraries in applications and detecting known vulnerabilities.

Read definition →

Static Application Security Testing (SAST)

DevSecOps

Analyzing source code, bytecode, or binaries for security vulnerabilities without executing the application.

Read definition →

Development

14 definitions focused on day-to-day security work.

API (Application Programming Interface)

Development

A set of rules and protocols that allows different software applications to communicate and exchange data.

Read definition →

Cron Expression

Development

A time-based job scheduling syntax using five or six fields to specify when tasks should run.

Read definition →

DevOps

Development

A set of practices combining software development (Dev) and IT operations (Ops) to shorten development cycles and deliver high-quality software continuously.

Read definition →

Diff Algorithm

Development

A computational method for comparing two sets of data and identifying differences between them.

Read definition →

GitOps

Development

An operational framework that uses Git repositories as the single source of truth for declarative infrastructure and application configurations.

Read definition →

JSON (JavaScript Object Notation)

Development

A lightweight data interchange format using human-readable text to represent structured data.

Read definition →

Markdown

Development

A lightweight markup language that uses plain text formatting to create structured documents.

Read definition →

Regular Expressions (Regex)

Development

Pattern-matching syntax used to search, validate, and manipulate text based on rules.

Read definition →

Semantic Versioning (Semver)

Development

A versioning scheme using MAJOR.MINOR.PATCH format that communicates the scope and impact of changes, enabling predictable dependency management.

Read definition →

Text Diff (Difference)

Development

A comparison showing line-by-line or character-by-character changes between two versions of text.

Read definition →

Universally Unique Identifier (UUID)

Development

A 128-bit identifier guaranteed to be unique across space and time without central coordination.

Read definition →

Unix Timestamp

Development

The number of seconds elapsed since January 1, 1970 00:00:00 UTC (the Unix epoch).

Read definition →

Version Control

Development

A system that tracks changes to files over time, enabling collaboration, history tracking, and the ability to revert to previous states.

Read definition →

Webhook

Development

An HTTP callback that delivers real-time data from one application to another when a specific event occurs.

Read definition →

Identity & Access Management

10 definitions focused on day-to-day security work.

Authentication vs Authorization

Identity & Access Management

Authentication verifies who you are, while authorization determines what you can do.

Read definition →

FIDO2

Identity & Access Management

An open authentication standard that enables passwordless and phishing-resistant login using hardware security keys or platform authenticators.

Read definition →

Identity and Access Management (IAM)

Identity & Access Management

The policies and technologies used to verify identities, govern permissions, and log access across systems.

Read definition →

Kerberos

Identity & Access Management

A network authentication protocol that uses secret-key cryptography and trusted third parties to verify user and service identities without transmitting passwords.

Read definition →

LDAP (Lightweight Directory Access Protocol)

Identity & Access Management

An open, vendor-neutral protocol for accessing and maintaining distributed directory services over a network.

Read definition →

Multi-Factor Authentication (MFA)

Identity & Access Management

An authentication method that requires users to provide two or more verification factors to gain access.

Read definition →

OAuth (Open Authorization)

Identity & Access Management

An open standard for delegated access authorization that allows applications to access user resources without exposing credentials.

Read definition →

OIDC (OpenID Connect)

Identity & Access Management

An identity layer built on OAuth 2.0 that enables applications to verify user identity and obtain basic profile information through a standardized protocol.

Read definition →

Privileged Access Management (PAM)

Identity & Access Management

A framework for securing and auditing accounts with elevated permissions, such as admins, service accounts, and break-glass users.

Read definition →

Session Management

Identity & Access Management

The process of securely maintaining user state and authentication across multiple HTTP requests.

Read definition →

Networking

14 definitions focused on day-to-day security work.

BGP (Border Gateway Protocol)

Networking

The routing protocol that exchanges network reachability information between autonomous systems, forming the backbone of Internet routing.

Read definition →

DNS

Networking

The Domain Name System translates human-readable domain names into IP addresses that computers use to connect to websites and services.

Read definition →

DNSSEC (DNS Security Extensions)

Networking

A suite of specifications that add cryptographic authentication to DNS responses, preventing DNS spoofing and cache poisoning attacks.

Read definition →

Domain Name System (DNS)

Networking

The hierarchical naming system that translates human-readable domain names into IP addresses.

Read definition →

IP Address Geolocation

Networking

The process of determining the geographic location of an internet-connected device using its IP address.

Read definition →

MAC Address

Networking

A unique hardware identifier assigned to network interfaces for local network communication.

Read definition →

MX Record

Networking

A DNS record type that specifies which mail servers are responsible for receiving email for a domain.

Read definition →

Network Interface Card (NIC)

Networking

A hardware component that connects a computer or device to a network, enabling communication through its unique MAC address.

Read definition →

Network Protocol

Networking

A set of rules defining how data is transmitted and received over a network.

Read definition →

OUI (Organizationally Unique Identifier)

Networking

The first three bytes of a MAC address, assigned by IEEE to identify the manufacturer of a network device.

Read definition →

Port Numbers

Networking

Numerical identifiers (0-65535) used to route network traffic to specific services on a device.

Read definition →

Subnet Mask

Networking

A 32-bit number that divides an IP address into network and host portions for routing.

Read definition →

TTL (Time to Live)

Networking

A value that specifies how long a DNS record or network packet should be cached or forwarded before being discarded or refreshed.

Read definition →

WHOIS Database

Networking

A public directory that stores registration information for domain names and IP address blocks.

Read definition →

Risk & Resilience

10 definitions focused on day-to-day security work.

Business Impact Analysis (BIA)

Risk & Resilience

An assessment that identifies critical business processes and quantifies the impact of their disruption.

Read definition →

Cyber Insurance

Risk & Resilience

Insurance coverage that protects organizations against financial losses from cyberattacks and data breaches.

Read definition →

Data Breach Cost

Risk & Resilience

The total financial impact of a security incident, including detection, response, notification, and long-term damages.

Read definition →

Incident Response Plan (IRP)

Risk & Resilience

A documented, tested approach for detecting, containing, and recovering from cybersecurity incidents.

Read definition →

MITRE ATT&CK Framework

Risk & Resilience

A globally accessible knowledge base of adversary tactics, techniques, and procedures mapped to the attack lifecycle.

Read definition →

Ransomware

Risk & Resilience

Malware that encrypts systems or exfiltrates data, demanding payment to restore access or prevent disclosure.

Read definition →

Recovery Point Objective (RPO)

Risk & Resilience

The maximum acceptable amount of data loss measured in time, defining how far back systems must be restored after an incident.

Read definition →

Recovery Time Objective (RTO)

Risk & Resilience

The maximum acceptable downtime for a system or service before business impact becomes unacceptable.

Read definition →

Return on Security Investment (ROSI)

Risk & Resilience

A metric that quantifies the financial benefit of security investments relative to their cost.

Read definition →

Risk Assessment

Risk & Resilience

A systematic process of identifying, analyzing, and evaluating cybersecurity risks to inform treatment decisions.

Read definition →

Security Operations

10 definitions focused on day-to-day security work.

Chronicle Security Operations

Security Operations

Google Cloud security analytics platform that provides threat detection, investigation, and response using Google infrastructure and intelligence.

Read definition →

Endpoint Detection and Response (EDR)

Security Operations

Security software that monitors endpoints for malicious activity, enabling rapid detection and containment.

Read definition →

Managed Detection and Response (MDR)

Security Operations

A security service that combines technology and human expertise to detect, investigate, and respond to threats 24/7.

Read definition →

Microsoft Sentinel

Security Operations

Microsoft cloud-native SIEM and SOAR solution that provides intelligent security analytics and threat detection across the enterprise.

Read definition →

SBOM (Software Bill of Materials)

Security Operations

A comprehensive inventory of all components, libraries, and dependencies that make up a software application, enabling transparency in the software supply chain.

Read definition →

Secrets Management

Security Operations

The practice and tooling for securely storing, accessing, rotating, and auditing sensitive credentials like API keys, passwords, certificates, and encryption keys.

Read definition →

Security Information and Event Management (SIEM)

Security Operations

A platform that ingests security telemetry, correlates events, and surfaces alerts for investigation.

Read definition →

Security Operations Center (SOC)

Security Operations

A dedicated function responsible for monitoring, detecting, and responding to cybersecurity threats in real time.

Read definition →

Virtual Chief Information Security Officer (vCISO)

Security Operations

An outsourced executive who provides strategic cybersecurity leadership and governance without the cost of a full-time hire.

Read definition →

Vulnerability Management

Security Operations

The continuous process of identifying, prioritizing, and remediating security weaknesses in systems and applications.

Read definition →

Threat Intelligence

9 definitions focused on day-to-day security work.

Advanced Persistent Threat (APT)

Threat Intelligence

A sophisticated, long-term cyberattack where an intruder gains unauthorized access and remains undetected for an extended period to steal data or cause damage.

Read definition →

Credential Stuffing

Threat Intelligence

An automated attack that uses stolen username/password pairs from data breaches to gain unauthorized access to user accounts on other services.

Read definition →

IP Reputation

Threat Intelligence

A trustworthiness score (0-100) assigned to IP addresses based on observed malicious behavior, spam activity, and threat intelligence data.

Read definition →

Keylogger

Threat Intelligence

Malicious software or hardware that secretly records keystrokes to capture passwords, credit card numbers, and other sensitive information typed by users.

Read definition →

Malware

Threat Intelligence

Malicious software designed to damage, disrupt, or gain unauthorized access to computer systems and data.

Read definition →

Phishing

Threat Intelligence

A social engineering attack that uses fraudulent communications to trick recipients into revealing sensitive information or installing malware.

Read definition →

Supply Chain Attack

Threat Intelligence

A cyberattack that targets less-secure elements in an organization's supply chain—vendors, software dependencies, or service providers—to compromise the ultimate target.

Read definition →

Threat Intelligence

Threat Intelligence

Evidence-based knowledge about existing or emerging threats used to inform security decisions and response.

Read definition →

URL/Domain Defanging

Threat Intelligence

A technique to render URLs and IPs non-clickable by replacing characters, preventing accidental access to malicious sites.

Read definition →

Web Security

11 definitions focused on day-to-day security work.

CORS (Cross-Origin Resource Sharing)

Web Security

A browser security mechanism that controls how web pages can request resources from different domains, preventing unauthorized cross-site data access.

Read definition →

Cross-Site Request Forgery (CSRF)

Web Security

An attack that tricks a victim into submitting unauthorized requests using their authenticated session.

Read definition →

Cross-Site Scripting (XSS)

Web Security

A web security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.

Read definition →

HTML Entity Encoding

Web Security

A method of representing special characters in HTML using named or numeric references to prevent interpretation as code.

Read definition →

HTTP Cookie

Web Security

Small pieces of data stored by web browsers, used for session management, personalization, and tracking.

Read definition →

HTTP Security Headers

Web Security

Response headers that enable browser security protections against common web attacks.

Read definition →

JSON Web Token (JWT)

Web Security

A compact, URL-safe token format used to securely transmit claims between parties in web applications.

Read definition →

Reverse Proxy

Web Security

A server that sits in front of backend servers, forwarding client requests and returning responses while hiding the origin server's identity.

Read definition →

Subresource Integrity (SRI)

Web Security

A security feature that allows browsers to verify that files from CDNs have not been tampered with.

Read definition →

Typosquatting

Web Security

Registering domain names similar to popular sites by exploiting common typing errors to deceive users.

Read definition →

URL Redirection

Web Security

A technique that forwards users from one URL to another, often used for site migrations or link shortening.

Read definition →