Set of potential entry points an attacker may try to exploit.
The attack surface includes domains, applications, ports, identities, devices, APIs, cloud services, suppliers and exposed configurations. Reducing it is a core preventive security measure.
Standard for exchanging authentication and authorization information.
SAML is widely used in federation and single sign-on between applications and identity providers. Correct configuration is essential for both security and access experience.
Aliases security assertion markup language
Isolated environment used to execute, analyze or test suspicious items or controlled changes.
A sandbox allows organizations to observe the behavior of files, code or processes without exposing production systems directly, making it useful for investigation, testing and validation.
SBOM (Software Bill of Materials)
# Structured inventory of the components and dependencies in an application.
An SBOM improves visibility over libraries, versions, dependencies and exposure to known vulnerabilities across the software supply chain.
Aliases software bill of materials
SCA (Software Composition Analysis)
# Analysis of software dependencies and components to identify risk and vulnerabilities.
SCA helps identify vulnerable libraries, outdated dependencies, license issues and risk exposure in modern applications.
Aliases software composition analysis
Supervisory control system used in industrial and infrastructure environments.
SCADA enables the monitoring and control of distributed industrial processes. Its security requires a dedicated approach because of operational impact, availability requirements and IT/OT convergence.
Aliases supervisory control and data acquisition
Discipline used to protect technical passwords, tokens, certificates and service keys.
Secrets management helps prevent sensitive credentials from being exposed in code, scripts, pipelines or configuration files, while also supporting rotation, control and auditability.
Technical and organizational review of the real state of security.
A security audit evaluates controls, configurations, exposure and processes in order to identify gaps and prioritize improvements. It may focus on infrastructure, cloud, Microsoft 365, networks, compliance or overall security posture.
Incident that compromises the confidentiality, integrity or availability of information or services.
A breach may involve unauthorized access, data leakage, manipulation of information or service disruption. Its impact depends on the affected assets, the speed of detection and the response capability in place.
Set of decisions, responsibilities and oversight mechanisms used to direct security.
Security governance defines who decides, who approves, what is measured, how it is reported and how security is integrated with business, IT, risk, continuity and compliance.
Real state of an organization’s maturity, exposure and control environment.
Security posture includes configurations, processes, detection capability, governance, continuity, identity and exposure. It is broader than a simple inventory of tools.
Principle that critical tasks should be distributed across different people or roles.
Segregation of duties reduces fraud, mistakes and privilege abuse by ensuring that a single identity cannot control sensitive processes end to end.
Use of technology, apps or services not formally approved by the organization.
Shadow IT increases exposure, complicates compliance and reduces visibility over data, access, third parties and real operational configurations.
SIEM (Security Information and Event Management)
# Platform that centralizes, correlates and analyzes security events.
A SIEM collects logs from systems, identity platforms, networks, endpoints, cloud services and applications to generate visibility, rules and alerts. It is an important building block inside a SOC, but it is not a response capability by itself.
Aliases security information and event management
Mechanism that allows users to authenticate once and access multiple services.
SSO improves user experience and centralized access control, but it also makes the identity system a critical point of security and availability.
Phishing attack delivered through SMS or mobile messaging.
Smishing attempts to induce clicks, credential theft, MFA code disclosure or malware installation through messages that appear legitimate.
Capability used to orchestrate, automate and coordinate security response workflows.
SOAR connects tools, playbooks and workflows to accelerate repetitive tasks, enrich alerts and reduce operating time in security operations and incident response.
Aliases security orchestration automation and response
SOC (Security Operations Center)
# Function or service dedicated to monitoring, detecting and investigating threats.
A SOC combines people, processes, technology and reporting to operate defense continuously. It may be internal or managed and often relies on SIEM, EDR/XDR and intelligence capabilities.
Aliases security operations center
Manipulation techniques used to obtain information, access or unauthorized actions.
Social engineering exploits trust, urgency, authority or lack of knowledge to obtain credentials, payments, access or sensitive information. It includes phishing, vishing, smishing and impersonation.
Technical or visual impersonation of a source, system or sender.
Spoofing can affect email, DNS, IP addresses, domains or interfaces in order to deceive users or systems and enable fraud, phishing or unauthorized access.
Malicious software designed to spy on activity or capture information.
Spyware may record keystrokes, capture screens, monitor browsing or extract data without the user’s knowledge.
SSPR (Self-Service Password Reset)
# Mechanism that allows users to reset credentials without manual helpdesk intervention.
SSPR improves efficiency, but it must be configured with strong verification controls so that it does not become an account takeover path.
Aliases self service password reset