|
[ABAC] – Attribute-Based Access Control |
[ABAC] – Attribute-Based Access Control |
[AUP] – Acceptable Use Policy |
[BYOD] – Bring Your Own Device |
|
[CMMC] – Cybersecurity Maturity Model Certification |
[CSA] – Cloud Security Alliance |
[COBIT] – Control Objectives for Information and Related Technologies |
[CIS] – Center for Internet Security |
|
[CISM] – Certified Information Security Manager |
[CISSP] – Certified Information Systems Security Professional |
[CISA] – Certified Information Systems Auditor |
[CERT-In] – Indian Computer Emergency Response Team |
|
[CASB] – Cloud Access Security Broker |
[CIEM] – Cloud Infrastructure Entitlement Management |
[CISO] – Chief Information Security Officer |
[CSCFR] - Cybersecurity and Cyber Resilience Framework |
|
[DLP] – Data Loss Prevention |
[DPO] - Data Protection Officer |
[DPIA] - Data Protection Impact Assessments |
[EDR] – Endpoint Detection and Response |
|
[FIM] – File Integrity Monitoring |
[FISMA] – Federal Information Security Management Act |
[GDPR] – General Data Protection Regulation |
[HIDS] – Host-based Intrusion Detection System |
|
[HSM] – Hardware Security Module |
[HRM] – Human Resource Management |
[HIPAA] – Health Insurance Portability and Accountability Act |
[IAM] – Identity and Access Management |
|
[IDS] – Intrusion Detection System |
[IPS] – Intrusion Prevention System |
[ISO] – International Organization for Standardization |
[ITIL] – Information Technology Infrastructure Library |
|
[ISO/IEC 27001] – International Standard for Information Security Management Systems (ISMS) |
[ISA/IEC 62443] – Standards for Industrial Automation and Control Systems Security |
[LDAP] – Lightweight Directory Access Protocol |
[MFA] – Multi-Factor Authentication |
|
[MDR] – Managed Detection and Response |
[MeitY] - The Ministry of Electronics and Information Technology |
[NAC] – Network Access Control |
[NERC-CIP] – North American Electric Reliability Corporation Critical Infrastructure Protection |
|
[NGFW] – Next-Generation Firewall |
[OIDC] – OpenID Connect |
[PKI] – Public Key Infrastructure |
[PIM] – Privileged Identity Management |
|
[PAM] – Privileged Access Management |
[PCI-DSS] – Payment Card Industry Data Security Standard |
[RPA] – Robotic Process Automation |
[RBAC] – Role-Based Access Control |
|
[RADIUS] – Remote Authentication Dial-In User Service |
[RBI] – Remote Browser Isolation |
[RCA] - Root Cause Analysis |
SIEM] – Security Information and Event Management |
|
[SOC] – Security Operations Center |
[SOAR] – Security Orchestration, Automation, and Response |
[SSL] – Secure Sockets Layer |
[SSO] – Single Sign-On |
|
[SAML] – Security Assertion Markup Language |
[SCIM] – System for Cross-domain Identity Management |
[SASE] – Secure Access Service Edge |
[SWG] – Secure Web Gateway |
|
[SD-WAN] – Software-Defined Wide Area Network |
[SOC 2] – System and Organization Controls 2 |
[SOX] – Sarbanes-Oxley Act |
[TLS] – Transport Layer Security |
|
[TACACS+] – Terminal Access Controller Access-Control System Plus |
[UEBA] – User and Entity Behavior Analytics |
[UAC] – User Account Control |
[VPN] – Virtual Private Network |
|
[WAF] – Web Application Firewall |
[XDR] – Extended Detection and Response |
[ZTNA] – Zero Trust Network Access |
|