Glossary

Access Control (AC): The process of regulating who can access what resources within a system or application.

API (Application Programming Interface): A set of instructions that allows applications to communicate with each other.

Authentication: The process of verifying a user's identity before granting access to a system or application.

Authorization: The process of determining what actions a user is allowed to perform after their identity has been verified.

Cloud Security: The practices and technologies used to protect data, applications, and infrastructure in the cloud.

Compliance: Adherence to a set of industry standards or regulations.

Data Breach: An incident where unauthorized access to sensitive data occurs.

Encryption: The process of transforming data into a scrambled format that can only be read by authorized users.

Horizontal SaaS (HaaS): Cloud-based applications that address general business needs across various departments or functions, such as CRM, marketing automation, or HR software.

Identity and Access Management (IAM): A framework for managing user identities and access controls.

Least Privilege: The security principle of granting users only the minimum permissions necessary to perform their job duties.

Multi-Factor Authentication (MFA): An authentication method that requires two or more verification factors to access a system or application.

OAuth: An open-standard authorization framework that allows users to grant third-party applications access to their data on another service.

Onboarding: The process of integrating new users or applications into a system or platform. In the context of SaaS, this refers to getting users set up with access and familiar with the application.

Risk Management: The process of identifying, assessing, and mitigating security risks.

SaaS (Software as a Service): A cloud-based software delivery model where applications are hosted by a provider and accessed over the internet.

Security Posture: The overall security state of an organization's IT infrastructure, including its cloud environment.

Security Misconfiguration: An incorrect or insecure configuration of a security setting or system.

Single Sign-On (SSO): An authentication method that allows users to access multiple applications with a single login.

Threat Actor: An individual or group that attempts to gain unauthorized access to a system or network.

Third-Party Application: A software application developed by a company outside of your organization.

User Provisioning: The process of creating and managing user accounts in a system or application.

Vertical SaaS (VaaS): Cloud-based applications designed to meet the specific needs of a particular industry or department, such as healthcare software for hospitals or legal practice management software for law firms.

Vulnerability: A weakness in a system or application that can be exploited by attackers.

Last updated