Cybersecurity Acronyms

[ABAC] – Attribute-Based Access Control
[ABAC] – Attribute-Based Access Control
[AUP] – Acceptable Use Policy[BYOD] – Bring Your Own Device
[CMMC] – Cybersecurity Maturity Model Certification
[CSA] – Cloud Security Alliance
[COBIT] – Control Objectives for Information and Related Technologies
[CIS] – Center for Internet Security
[CISM] – Certified Information Security Manager
[CISSP] – Certified Information Systems Security Professional[CISA] – Certified Information Systems Auditor
[CERT-In] – Indian Computer Emergency Response Team
[CASB] – Cloud Access Security Broker
[CIEM] – Cloud Infrastructure Entitlement Management
[CISO] – Chief Information Security Officer[DLP] – Data Loss Prevention
[EDR] – Endpoint Detection and Response[FIM] – File Integrity Monitoring[FISMA] – Federal Information Security Management Act
[GDPR] – General Data Protection Regulation
[HIDS] – Host-based Intrusion Detection System[HSM] – Hardware Security Module[HRM] – Human Resource Management[HIPAA] – Health Insurance Portability and Accountability Act
[IAM] – Identity and Access Management[IDS] – Intrusion Detection System[IPS] – Intrusion Prevention System[ISO] – International Organization for Standardization
[ITIL] – Information Technology Infrastructure Library[ISO/IEC 27001] – International Standard for Information Security Management Systems (ISMS)
[ISA/IEC 62443] – Standards for Industrial Automation and Control Systems Security
[LDAP] – Lightweight Directory Access Protocol
[MFA] – Multi-Factor Authentication[MDR] – Managed Detection and Response[NAC] – Network Access Control[NERC-CIP] – North American Electric Reliability Corporation Critical Infrastructure Protection
[NERC-CIP] – North American Electric Reliability Corporation Critical Infrastructure Protection[NGFW] – Next-Generation Firewall[OIDC] – OpenID Connect[PKI] – Public Key Infrastructure
[PIM] – Privileged Identity Management
[PAM] – Privileged Access Management
[PCI-DSS] – Payment Card Industry Data Security Standard
[RPA] – Robotic Process Automation
[RBAC] – Role-Based Access Control[RADIUS] – Remote Authentication Dial-In User Service[RBI] – Remote Browser Isolation[SIEM] – Security Information and Event Management
[SOC] – Security Operations Center[SOAR] – Security Orchestration, Automation, and Response[SSL] – Secure Sockets Layer[SSO] – Single Sign-On
[SAML] – Security Assertion Markup Language[SCIM] – System for Cross-domain Identity Management
[SASE] – Secure Access Service Edge[SWG] – Secure Web Gateway
[SD-WAN] – Software-Defined Wide Area Network[SIEM] – Security Information and Event Management[SOC 2] – System and Organization Controls 2[SOX] – Sarbanes-Oxley Act
[TLS] – Transport Layer Security[TACACS+] – Terminal Access Controller Access-Control System Plus[UEBA] – User and Entity Behavior Analytics[UAC] – User Account Control
[VPN] – Virtual Private Network[WAF] – Web Application Firewall[XDR] – Extended Detection and Response
[ZTNA] – Zero Trust Network Access
[ABAC] – Attribute-Based Access Control [ABAC] – Attribute-Based Access Control [AUP] – Acceptable Use Policy [BYOD] – Bring Your Own Device
[CMMC] – Cybersecurity Maturity Model Certification [CSA] – Cloud Security Alliance [COBIT] – Control Objectives for Information and Related Technologies [CIS] – Center for Internet Security
[CISM] – Certified Information Security Manager [CISSP] – Certified Information Systems Security Professional [CISA] – Certified Information Systems Auditor [CERT-In] – Indian Computer Emergency Response Team
[CASB] – Cloud Access Security Broker [CIEM] – Cloud Infrastructure Entitlement Management [CISO] – Chief Information Security Officer [CSCFR] - Cybersecurity and Cyber Resilience Framework
[DLP] – Data Loss Prevention [DPO] - Data Protection Officer [DPIA] - Data Protection Impact Assessments [EDR] – Endpoint Detection and Response
[FIM] – File Integrity Monitoring [FISMA] – Federal Information Security Management Act [GDPR] – General Data Protection Regulation [HIDS] – Host-based Intrusion Detection System
[HSM] – Hardware Security Module [HRM] – Human Resource Management [HIPAA] – Health Insurance Portability and Accountability Act [IAM] – Identity and Access Management
[IDS] – Intrusion Detection System [IPS] – Intrusion Prevention System [ISO] – International Organization for Standardization [ITIL] – Information Technology Infrastructure Library
[ISO/IEC 27001] – International Standard for Information Security Management Systems (ISMS) [ISA/IEC 62443] – Standards for Industrial Automation and Control Systems Security [LDAP] – Lightweight Directory Access Protocol [MFA] – Multi-Factor Authentication
[MDR] – Managed Detection and Response [MeitY] - The Ministry of Electronics and Information Technology [NAC] – Network Access Control [NERC-CIP] – North American Electric Reliability Corporation Critical Infrastructure Protection
[NGFW] – Next-Generation Firewall [OIDC] – OpenID Connect [PKI] – Public Key Infrastructure [PIM] – Privileged Identity Management
[PAM] – Privileged Access Management [PCI-DSS] – Payment Card Industry Data Security Standard [RPA] – Robotic Process Automation [RBAC] – Role-Based Access Control
[RADIUS] – Remote Authentication Dial-In User Service [RBI] – Remote Browser Isolation [RCA] - Root Cause Analysis SIEM] – Security Information and Event Management
[SOC] – Security Operations Center [SOAR] – Security Orchestration, Automation, and Response [SSL] – Secure Sockets Layer [SSO] – Single Sign-On
[SAML] – Security Assertion Markup Language [SCIM] – System for Cross-domain Identity Management [SASE] – Secure Access Service Edge [SWG] – Secure Web Gateway
[SD-WAN] – Software-Defined Wide Area Network [SOC 2] – System and Organization Controls 2 [SOX] – Sarbanes-Oxley Act [TLS] – Transport Layer Security
[TACACS+] – Terminal Access Controller Access-Control System Plus [UEBA] – User and Entity Behavior Analytics [UAC] – User Account Control [VPN] – Virtual Private Network
[WAF] – Web Application Firewall [XDR] – Extended Detection and Response [ZTNA] – Zero Trust Network Access