ABAC
Attribute-Based Access Control
ACL
Access Control List
ACME
Automated Certificate Management Environment
AEAD
Authenticated Encryption with Associated Data
AI
Artificial Intelligence
API
Application Programming Interface
APT
Advanced Persistent Threat
AQL
Ariel Query Language
ATT&CK
MITRE Adversarial Tactics Techniques and Common Knowledge framework
Ansible
Open source automation tool used to automate IT tasks
BCP
Business Continuity Plan
BEAST
Browser Exploit Against SSL TLS
BIA
Business Impact Analysis
BIOS
Basic Input Output System
BYOD
Bring Your Own Device
C2
Command and Control infrastructure used by attackers
CA
Certificate Authority
CAPEC
Common Attack Pattern Enumeration and Classification
CASB
Cloud Access Security Broker
CBC
Cipher Block Chaining
CC
Common Criteria
CCPA
California Consumer Privacy Act
CDN
Content Delivery Network
CI/CD
Continuous Integration Continuous Deployment