Cloud Security Terms
45 terms
Continuous tracking of cloud service usage to detect and respond to anomalous access patterns.
New solutions that act as intermediaries between cloud users and services to enforce security policies.
Identifying resources in cloud environments.
Guidelines (ISO/NIST/FedRAMP) ensuring regulatory alignment for cloud infrastructure security.
Processes for managing encryption keys and ensuring data remains encrypted across cloud storage.
Monitoring cloud instances in real time to detect deviations from normal operational behavior.
Security approaches that address the unique challenges posed by applications built specifically for cloud platforms.
Industry group providing cloud security best practices and CAIQ assessments.
Reusable cloud security design.
Evaluating cloud security design.
Structure for evaluating cloud security.
Standard for cloud security comparison.
Measuring adherence to security standards.
Standard cloud security settings.
Managing cloud security events.
Plan for cloud security observation.
Measuring cloud security effectiveness.
Visual monitoring of cloud security status.
Tools that assess cloud risk through monitoring, detecting, reporting, and automation.
Tracking cloud security issues.
Mapping of security controls in cloud environments.
Documenting cloud security boundaries.
Defining security boundaries in cloud environments.
Security solutions designed to protect workloads in modern hybrid and multi-cloud environments.
Security solutions focused on safeguarding applications and data workloads in cloud environments.
Isolating cloud resources for security.
Attacks targeting containerized environments and serverless architectures through misconfigured APIs.
Strategies to ensure that malicious processes remain contained within their containerized environments.
Automated tools that inspect container images for known vulnerabilities before deployment.
The practice of protecting containerized applications and infrastructure throughout the application lifecycle.
Best practices and tools used to secure containerized environments against potential exploits.
Standard for distributed data storage.
Protection of distributed data storage.
Scalable cybersecurity systems that adapt to fluctuating workloads and evolving threat landscapes.
Strategies to maintain a secure environment across a mix of public and private cloud infrastructures.
Strengthening the security of the hypervisor layer to protect virtualized environments from compromise.
Security practices that rely on deploying unchangeable system configurations to prevent unauthorized modifications.
Securing automated, code-driven infrastructure configurations against misconfigurations and attacks.
Designing security frameworks tailored to the unique challenges of distributed microservices systems.
Security architecture for containerized services.
Guidelines for securing the automated coordination of containerized and distributed applications.
Protective measures tailored for stateless computing functions executed in a serverless environment.
Strategies to protect serverless computing environments where traditional security models may not apply.
Analyzing the internal state of a virtual machine from outside the guest OS to detect anomalies.
A cloud security model that enforces strict identity verification and least-privilege access at all layers.