Glossary (Acronyms)21 items

Glossary (Acronyms)21 items
API

Application Programming Interface — a contract for software-to-software interaction.

  • See also: REST, GraphQL, gRPC.
SSO

Single Sign-On — one identity session to access many apps.

  • Often implemented with SAML or OpenID Connect (OIDC).
OAuth 2.0

Authorization framework for delegated access; not an identity protocol.

OIDC

OpenID Connect — identity layer on top of OAuth2 that provides user authentication.

JWT

JSON Web Token — a compact, signed token format for conveying claims.

mTLS

Mutual TLS — both client and server present certificates.

  • Used for service-to-service identity in zero trust architectures.
BYOK

Bring Your Own Key — vendor uses your key in their KMS.

HYOK

Hold Your Own Key — your keys never leave your HSM boundary.

KMS

Key Management Service — managed cryptographic key lifecycle and usage.

HSM

Hardware Security Module — tamper-resistant cryptographic hardware.

ZTNA

Zero Trust Network Access — per-app access with strong identity and device posture.

PAM

Privileged Access Management — broker and monitor privileged sessions.

PIM

Privileged Identity Management — JIT elevation for roles.

SSPM

SaaS Security Posture Management — continuous config monitoring of SaaS apps.

CASB

Cloud Access Security Broker — visibility and control for SaaS usage.

SIEM

Security Information & Event Management — log aggregation, detection, and response.

SOAR

Security Orchestration, Automation, and Response — automated enrichment and actions.

WAF

Web Application Firewall — blocks common web attacks at the edge or app.

DLP

Data Loss Prevention — monitor/block data exfiltration.

SBOM

Software Bill of Materials — inventory of software components.

VEX

Vulnerability Exploitability eXchange — signals exploitability for vulnerabilities.