Data in Transit
Data in Transit → Also called data in motion; information actively moving across a network. Protected using Transport Layer Security (TLS) or Internet Protocol Security (IPsec).
Data at Rest
Data at Rest → Stored information protected through encryption such as full disk, database, or file-level encryption.
PKI
Public Key Infrastructure (PKI) → A framework of hardware, software, and policies that manage digital certificates and encryption keys.
Digital Certificates
Digital Certificates → Electronic credentials issued by a Certificate Authority (CA) to verify the identity of entities and enable encrypted communications.
CA
Certificate Authorities (CA) → Trusted organizations that issue and manage digital certificates in a Public Key Infrastructure (PKI).
Self-Signed Certificates
Self-Signed Certificates → Certificates signed by the entity that created them instead of a trusted Certificate Authority (CA); often used internally.
IAM
Identity and Access Management (IAM) → A framework that defines and manages user access rights and authentication to systems and data.
Least Privilege
Least Privilege → A security principle where users and systems are granted only the minimum access needed to perform their tasks.
RBAC
Role-Based Access Control (RBAC) → An access control model where permissions are assigned to roles, and users inherit permissions through their role.
Geographic Restrictions
Geographic Restrictions → Security controls that allow or deny access based on physical or IP-based location.
CCTV
Closed-Circuit Television (CCTV) → A security system that uses cameras for continuous video monitoring of physical spaces.
Door Locks
Door Locks → Physical security controls such as conventional, deadbolt, electronic, token-based, biometric, or multi-factor locks that protect restricted areas.