Cloud Security and Compliance
Expert-defined terms from the Certificate in Cloud Transformation Management course at Greenwich School of Business and Finance. Free to read, free to share, paired with a globally recognised certification pathway.
Access Control is a security process that regulates who can view or use a specif… #
Related terms include Identity and Access Management, Authentication, and Authorization. Access Control is essential in Cloud Security to prevent unauthorized access to sensitive data and applications. It involves setting up policies, procedures, and technologies to control access to resources based on user roles, responsibilities, and permissions.
Accountability is the ability to track and monitor user activity in a clo… #
Related terms include Auditing, Compliance, and Governance. Accountability is critical in Cloud Security to ensure that users are held responsible for their actions, and any security breaches can be investigated and addressed.
Advanced Threat Protection is a security solution that detects and prevents soph… #
Related terms include Threat Intelligence, Incident Response, and Security Information and Event Management. Advanced Threat Protection is essential in Cloud Security to protect against complex and targeted attacks.
Alarm Fatigue is a phenomenon where users become desensitized to security ale… #
Related terms include Security Information and Event Management, Incident Response, and Compliance. Alarm Fatigue is a challenge in Cloud Security as it can lead to delayed or inadequate responses to security incidents.
Application Programming Interface is a set of defined rules that enables differe… #
Related terms include API Security, Integration, and Microservices. API is essential in Cloud Security as it enables secure integration and communication between different applications and services.
Asset Management is the process of identifying, classifying, and tracking … #
Related terms include Inventory Management, Configuration Management, and Change Management. Asset Management is critical in Cloud Security to ensure that all assets are accounted for, and any security vulnerabilities are identified and addressed.
Audit is a systematic process of evaluating an organization's compliance … #
Related terms include Compliance, Governance, and Risk Management. Audit is essential in Cloud Security to ensure that an organization is compliant with relevant laws and regulations, and any security risks are identified and mitigated.
Authentication is the process of verifying the identity of users, devices… #
Related terms include Authorization, Identity and Access Management, and Single Sign-On. Authentication is critical in Cloud Security to prevent unauthorized access to sensitive data and applications.
Authorization is the process of granting or denying access to resources b… #
Related terms include Authentication, Identity and Access Management, and Role-Based Access Control. Authorization is essential in Cloud Security to ensure that users only have access to the resources they need to perform their jobs.
Availability is the ability of a system or application to be accessible a… #
Related terms include Uptime, Downtime, and Disaster Recovery. Availability is critical in Cloud Security to ensure that systems and applications are always available and usable, even in the event of a disaster or outage.
Backup is the process of creating copies of data to prevent loss o… #
Related terms include Recovery, Disaster Recovery, and Business Continuity. Backup is essential in Cloud Security to ensure that data is protected and can be recovered in the event of a disaster or outage.
Bring Your Own Device is a policy that allows employees to use their personal… #
Related terms include BYOD, Mobile Device Management, and Security. BYOD is a challenge in Cloud Security as it can introduce security risks and vulnerabilities into the organization.
Cloud Access Security Broker is a security solution that acts as an intermedi… #
Related terms include CASB, Cloud Security Gateway, and Cloud Security. CASB is essential in Cloud Security to provide an additional layer of security and protection for cloud services.
Cloud Compliance is the process of ensuring that an organization is compliant… #
Related terms include Cloud Security, Governance, and Risk Management. Cloud Compliance is critical in Cloud Security to ensure that an organization is compliant with relevant laws and regulations, and any security risks are identified and mitigated.
Cloud Data Loss Prevention is a security solution that detects and prevents #
sensitive data from being leaked or stolen in a cloud environment. Related terms include CDLP, Data Loss Prevention, and Cloud Security. CDLP is essential in Cloud Security to protect sensitive data and prevent data breaches.
Cloud Security is the practice of protecting cloud computing environments… #
Related terms include Cloud Computing, Cloud Compliance, and Cloud Governance. Cloud Security is critical in Cloud Security to protect cloud computing environments from cyber threats and attacks, and ensure the confidentiality, integrity, and availability of cloud resources.
Cloud Security Alliance is a non #
profit organization that promotes best practices for cloud security and compliance. Related terms include CSA, Cloud Security, and Cloud Compliance. CSA is essential in Cloud Security to provide guidance and resources for cloud security and compliance.
Cloud Security Gateway is a security solution that acts as an intermediary</i… #
Related terms include CSG, Cloud Access Security Broker, and Cloud Security. CSG is essential in Cloud Security to provide an additional layer of security and protection for cloud services.
Cloud Security Posture Management is the process of identifying , remed… #
Related terms include CSPM, Cloud Security, and Cloud Compliance. CSPM is essential in Cloud Security to identify and remediate security vulnerabilities, and ensure the security and compliance of cloud resources.
Compliance is the process of ensuring that an organization is compliant w… #
Related terms include Compliance, Governance, and Risk Management. Compliance is critical in Cloud Security to ensure that an organization is compliant with relevant laws and regulations, and any security risks are identified and mitigated.
Configuration Management is the process of tracking and controlling</b… #
Related terms include CM, Change Management, and Asset Management. Configuration Management is essential in Cloud Security to ensure that cloud resources and configurations are accurate and up-to-date, and any security vulnerabilities are identified and remediated.
Data Encryption is the process of converting plaintext data into ciphe… #
Related terms include Data Encryption, Encryption, and Cloud Security. Data Encryption is essential in Cloud Security to protect sensitive data from unauthorized access and data breaches.
Data Loss Prevention is a security solution that detects and prevents sensiti… #
Related terms include DLP, Cloud Data Loss Prevention, and Cloud Security. DLP is essential in Cloud Security to protect sensitive data and prevent data breaches.
Data Masking is a security technique that conceals sensitive data to prev… #
Related terms include Data Masking, Data Encryption, and Cloud Security. Data Masking is essential in Cloud Security to protect sensitive data from unauthorized access and data breaches.
Disaster Recovery is the process of recovering cloud resources and… #
Related terms include DR, Business Continuity, and Cloud Security. Disaster Recovery is essential in Cloud Security to ensure that cloud resources and data are available and usable after a disaster or outage.
Encryption is the process of converting plaintext data into ciphertext… #
Related terms include Encryption, Data Encryption, and Cloud Security. Encryption is essential in Cloud Security to protect sensitive data from unauthorized access and data breaches.
Identity and Access Management is the process of managing user identities… #
Related terms include IAM, Authentication, and Authorization. IAM is essential in Cloud Security to ensure that users have secure and controlled access to cloud resources and applications.
Incident Response is the process of responding to and managing sec… #
Related terms include IR, Security Information and Event Management, and Cloud Security. Incident Response is essential in Cloud Security to ensure that security incidents are identified, contained, and eradicated quickly and effectively.
Key Management is the process of managing encryption keys and c… #
Related terms include KM, Encryption, and Cloud Security. Key Management is essential in Cloud Security to ensure that encryption keys and certificates are secure and managed properly.
Managed Security Service Provider is a third #
party provider that offers security services and expertise to organizations in a cloud environment. Related terms include MSSP, Cloud Security, and Cloud Compliance. MSSP is essential in Cloud Security to provide security services and expertise to organizations that lack the resources and expertise to manage their own cloud security.
Network Segmentation is the process of dividing a cloud network into s… #
Related terms include NS, Network Security, and Cloud Security. Network Segmentation is essential in Cloud Security to improve security and compliance by isolating sensitive data and applications from the rest of the network.
Penetration Testing is a security testing method that simulates cyber … #
Related terms include PT, Vulnerability Assessment, and Cloud Security. Penetration Testing is essential in Cloud Security to identify vulnerabilities and weaknesses in cloud resources and applications.
Privacy is the ability of an organization to protect personal and sens… #
Related terms include Privacy, Data Protection, and Cloud Security. Privacy is essential in Cloud Security to protect personal and sensitive data from unauthorized access and data breaches.
Risk Management is the process of identifying , assessing , and m… #
Related terms include RM, Compliance, and Cloud Security. Risk Management is essential in Cloud Security to identify and mitigate security risks that could impact the confidentiality, integrity, and availability of cloud resources and data.
Security Information and Event Management is a security solution that monitor… #
Related terms include SIEM, Incident Response, and Cloud Security. SIEM is essential in Cloud Security to identify and respond to security incidents quickly and effectively.
Security Orchestration, Automation, and Response is a security solution that … #
Related terms include SOAR, Incident Response, and Cloud Security. SOAR is essential in Cloud Security to automate and streamline security incident response, and improve the efficiency and effectiveness of security teams.
Single Sign #
On is a security solution that allows users to access multiple applications with a single set of credentials in a cloud environment. Related terms include SSO, Identity and Access Management, and Cloud Security. SSO is essential in Cloud Security to improve user experience and convenience, while reducing the risk of password fatigue and related security risks.
Threat Intelligence is the process of collecting , analyzing , and <… #
Related terms include TI, Incident Response, and Cloud Security. Threat Intelligence is essential in Cloud Security to identify and mitigate potential security threats that could impact the confidentiality, integrity, and availability of cloud resources and data.
Vulnerability Assessment is a security testing method that identifies and… #
Related terms include VA, Penetration Testing, and Cloud Security. Vulnerability Assessment is essential in Cloud Security to identify and remediate vulnerabilities in cloud resources and applications, and improve the overall security and compliance posture of an organization.