[ABAC] – Attribute-Based Access Control
| [ABAC] – Attribute-Based Access Control
| [AUP] – Acceptable Use Policy | [BYOD] – Bring Your Own Device |
[CMMC] – Cybersecurity Maturity Model Certification
| [CSA] – Cloud Security Alliance
| [COBIT] – Control Objectives for Information and Related Technologies
| [CIS] – Center for Internet Security
|
[CISM] – Certified Information Security Manager
| [CISSP] – Certified Information Systems Security Professional | [CISA] – Certified Information Systems Auditor
| [CERT-In] – Indian Computer Emergency Response Team
|
[CASB] – Cloud Access Security Broker
| [CIEM] – Cloud Infrastructure Entitlement Management
| [CISO] – Chief Information Security Officer | [DLP] – Data Loss Prevention |
[EDR] – Endpoint Detection and Response | [FIM] – File Integrity Monitoring | [FISMA] – Federal Information Security Management Act
| [GDPR] – General Data Protection Regulation |
[HIDS] – Host-based Intrusion Detection System | [HSM] – Hardware Security Module | [HRM] – Human Resource Management | [HIPAA] – Health Insurance Portability and Accountability Act |
[IAM] – Identity and Access Management | [IDS] – Intrusion Detection System | [IPS] – Intrusion Prevention System | [ISO] – International Organization for Standardization |
[ITIL] – Information Technology Infrastructure Library | [ISO/IEC 27001] – International Standard for Information Security Management Systems (ISMS)
| [ISA/IEC 62443] – Standards for Industrial Automation and Control Systems Security
| [LDAP] – Lightweight Directory Access Protocol |
[MFA] – Multi-Factor Authentication | [MDR] – Managed Detection and Response | [NAC] – Network Access Control | [NERC-CIP] – North American Electric Reliability Corporation Critical Infrastructure Protection
|
[NERC-CIP] – North American Electric Reliability Corporation Critical Infrastructure Protection | [NGFW] – Next-Generation Firewall | [OIDC] – OpenID Connect | [PKI] – Public Key Infrastructure |
[PIM] – Privileged Identity Management
| [PAM] – Privileged Access Management
| [PCI-DSS] – Payment Card Industry Data Security Standard
| [RPA] – Robotic Process Automation |
[RBAC] – Role-Based Access Control | [RADIUS] – Remote Authentication Dial-In User Service | [RBI] – Remote Browser Isolation | [SIEM] – Security Information and Event Management |
[SOC] – Security Operations Center | [SOAR] – Security Orchestration, Automation, and Response | [SSL] – Secure Sockets Layer | [SSO] – Single Sign-On
|
[SAML] – Security Assertion Markup Language | [SCIM] – System for Cross-domain Identity Management
| [SASE] – Secure Access Service Edge | [SWG] – Secure Web Gateway |
[SD-WAN] – Software-Defined Wide Area Network | [SIEM] – Security Information and Event Management | [SOC 2] – System and Organization Controls 2 | [SOX] – Sarbanes-Oxley Act |
[TLS] – Transport Layer Security | [TACACS+] – Terminal Access Controller Access-Control System Plus | [UEBA] – User and Entity Behavior Analytics | [UAC] – User Account Control
|
[VPN] – Virtual Private Network | [WAF] – Web Application Firewall | [XDR] – Extended Detection and Response
| [ZTNA] – Zero Trust Network Access
|