<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">
Curious about how StrongDM works? 🤔 Learn more here!
Search
Close icon
Search bar icon

Infrastructure Access | Glossary of Terms

StrongDM manages and audits access to infrastructure.
  • Role-based, attribute-based, & just-in-time access to infrastructure
  • Connect any person or service to any infrastructure, anywhere
  • Logging like you've never seen

The way companies look at infrastructure access is changing. With so many data sources and types of information, ever-changing regulatory requirements, and the need to scale up or down quickly, even the terms we use to describe infrastructure have changed.

To help you keep up with it all, this glossary contains definitions for infrastructure access terms you’ll hear as you work to manage access for your organization.

Access as code: The practice of managing and provisioning all aspects of infrastructure access via automated processes and centralized management, across any technology type.

Attribute-Based Access Control (ABAC): A runtime decision-making strategy for what features and/or data a user can access based on policies and user attributes.

Auditing: Official inspection of IT infrastructure, policies, and programs to identify areas of improvement.

Audit Log: A document that records what is happening within an IT system.

Audit Trail: A formal record of transactions within an IT system.

Authorization (Authz): A system or application process that makes a runtime decision as to whether a user can perform a certain function or access data.

Authentication (Authn): The process of verifying a user’s identity, such as through a username/password combination.

Bastion Host: A computer that is purposely exposed on a public network. It’s placed outside the firewall and filters incoming traffic to prevent attacks.

Cloud Access Security Broker (CASB): Software or hardware that is either hosted in the cloud or on-premises. It adds a layer of security between users and cloud service providers and often overlaps with secure web gateway (SWG) functionality.

Compliance: The state of adhering to specific guidelines, such as those from a government agency.

Data Governance: How organizations manage enterprise system availability, integrity, usability, and security, based on internal standards and any external requirements.

DevSecOps: A management approach that combines application development, security, and operations teams, along with infrastructure as a code, to create an automated, continuous delivery cycle for enterprise applications.

Firewall-as-a-Service (FWaaS): A centralized firewall service provided by a vendor that consolidates traffic headed to all enterprise locations, including mobile users and cloud services, and implements a security policy.

Identity-as-a-Service (IDaaS): An identity and access management (IAM) solution delivered in a cloud-based service that is hosted by a trusted third party.

Identity and Access Management (IAM): Business processes, policies, and technology that help companies manage digital identities. These include single sign-on systems, multi-factor authentication, and privilege management.

Identity Aware Proxy (IAP): A Google Cloud Platform service that can authenticate users and provide secure access to specific applications.

Identity Governance and Administration (IGA): Policies for identity management and access control that go beyond traditional IAM tools. It enables and secures digital identities for all users, applications, and databases.

Identity provider (IdP): Part of a system that gives an end user or connected device a set of login credentials for platforms, applications, and networks.

Infrastructure Access: The ability to connect to a system in your infrastructure, such as a database or connecting to a server.

Infrastructure Access Platform: A single solution that combines authentication, authorization, networking, and observability. This lets organizations centrally manage and automate infrastructure access securely.

Infrastructure as Code (IaC): An IT practice that treats underlying IT infrastructure as software.

Just-in-Time (JIT) Access: A methodology that provides real-time, granular access to applications or systems so that users can perform necessary actions.

Logging: The act of creating a log file that time-stamps each action or event in a particular system.

Observability: The ability to measure the internal state of a system by tracking the system’s external outputs.

Points of Presence (POPs): Access points to systems.

Principle of Least Privilege (PoLP): A computer security concept that limits access rights for users, accounts, and computing processes to give them the bare minimum they need to complete a task or job.

Privileged Access Management (PAM): Tools and technology used to secure, control, and monitor how an organization’s critical infrastructure and resources are accessed.

Privileged Account Management (also PAM): A term used to refer to privileged access management that focuses on granting access to existing accounts.

Privileged Identity Management (PIM): A term used to refer to privileged access management that implies only the identities of privileged accounts are being managed. (Recommended reading: PIM vs. PAM)

Privileged Session Management (PSM): A term that refers to privileged access management but only focuses on launching and recording login sessions.

Proxy: An intermediary between users, applications, systems, and other resources.

Role-Based Access Control (RBAC): A method of managing entitlements by granting privileges to users by creating roles and attaching users to those roles, instead of directly.

Secure Access Service Edge (SASE): A cloud architecture that delivers network and security as a single cloud service.

Secure Shell (SSH): A network protocol that lets users access computers securely over an unsecured network.

Secure Web Gateway (SWG): A security device that protects internal networks from unsecured internet traffic.

Single Sign-On (SSO): A service that lets users authenticate with a single login for multiple systems.

SOC 2 Compliance: The state of adhering to the System and Organization Control 2 (SOC 2) standard set by the American Institute of CPAs (AICPA).

Software-defined network (SDN): An architecture that abstracts network layers into distinguishable components (application layer, control layer, infrastructure layer, and APIs) so that enterprises can better control their networks.

Software-defined networking in a wide area network (SD-WAN): A technology that uses SDN concepts to distribute network traffic across a wide-area network (WAN).

Virtual Private Network (VPN): A service that creates a “tunnel” for safe, secure network connections.

Zero Trust: A security model that assumes all users are already compromised. Every user or device must re-authenticate every time they log in.

Zero Trust Network Access (ZTNA): Part of the zero trust model that hides the IP address while requiring identity-based authentication to provide network access.

Zero Standing Privileges (ZSP): A term coined by analyst firm Gartner to describe the state of having the least amount of privileges necessary to access systems and networks, using just-in-time access.

Zombie Credentials: Active accounts that are no longer used and can open the door to malicious actors.

Want to learn more terms? Check out our Cybersecurity Glossary


About the Author

, Zero Trust Privileged Access Management (PAM), the StrongDM team is building and delivering a Zero Trust Privileged Access Management (PAM), which delivers unparalleled precision in dynamic privileged action control for any type of infrastructure. The frustration-free access stops unsanctioned actions while ensuring continuous compliance.

StrongDM logo
💙 this post?
Then get all that StrongDM goodness, right in your inbox.

You May Also Like

What Is Network Level Authentication (NLA)? (How It Works)
What Is Network Level Authentication (NLA)? (How It Works)
Network Level Authentication (NLA) is a security feature of Microsoft’s Remote Desktop Protocol (RDP) that requires users to authenticate before establishing a remote session. By enforcing this pre-authentication step, NLA reduces the risk of unauthorized access, conserves server resources, and protects against attacks like credential interception and denial of service. While effective in securing RDP sessions, NLA is limited to a single protocol, lacks flexibility, and can add complexity in diverse, modern IT environments that rely on multiple systems and protocols.
How to Automate Continuous Compliance in AWS with StrongDM
How to Automate Continuous Compliance in AWS with StrongDM
Enterprises seek ways to effectively address the needs of dynamic, always-evolving cloud infrastructures, and StrongDM has developed a platform that is designed with built-in capabilities to support continuous compliance in AWS environments.
IP Whitelisting: Meaning, Alternatives & More
IP Whitelisting: Meaning, Alternatives & More [2024 Guide]
IP whitelisting is a security strategy that restricts access to a network/system to a specified list of trusted IP addresses. This approach ensures that only individuals using the approved addresses can access certain resources.
Mitigating Shadow Access Risks with Zero Trust PAM
Mitigating Shadow Access Risks with Zero Trust PAM
Discover how StrongDM's Zero Trust PAM and fine-grained authorization secure cloud data plane access and mitigate shadow access risks without hindering productivity.
Why Just-in-Time Access Is Key for Zero Trust Security in AWS
Why Just-in-Time Access Is Key for Zero Trust Security in AWS
Learn why Just-in-Time (JIT) access is essential for Zero Trust security in AWS environments. Discover how StrongDM's JIT access enhances security, optimizes workflows, and ensures compliance with Zero Trust principles.