Segmenting the Network
Segmenting the network → security practice that divides a network into smaller, isolated segments to limit lateral movement, reduce attack surface, and contain breaches.
ACL
Access control list (ACL) → rule set that explicitly allows or denies network traffic based on criteria such as Internet Protocol address, port number, or protocol.
Application Allow List/Deny List
Application allow list and deny list → security controls that permit only approved applications to run or explicitly block known malicious or unauthorized software.
Mitigation
Mitigation → actions taken to reduce the severity, impact, or likelihood of a security threat or vulnerability rather than eliminating it entirely.
Patching
Patching → process of applying updates to software or systems to fix vulnerabilities, improve stability, and reduce exposure to known attacks.
Encryption
Encryption → security technique that protects data by converting it into unreadable ciphertext, ensuring confidentiality for data at rest and data in transit.
SIEM
Security information and event management (SIEM) → Centralized security and event logging software. Detects an helps respond to threats
Least Privilege
Least privilege → access control principle that grants users and systems only the minimum permissions necessary to perform their required tasks.
Configuration Enforcement
Configuration enforcement → posture assessment process that ensures systems remain compliant with approved security baselines and configuration standards.
Decommissioning
Decommissioning → secure process of retiring systems or services by removing access, wiping data, and eliminating unused resources to prevent future exploitation.