<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">

Infrastructure Access | Glossary of Terms

StrongDM manages and audits access to infrastructure.
  • Role-based, attribute-based, & just-in-time access to infrastructure
  • Connect any person or service to any infrastructure, anywhere
  • Logging like you've never seen

The way companies look at infrastructure access is changing. With so many data sources and types of information, ever-changing regulatory requirements, and the need to scale up or down quickly, even the terms we use to describe infrastructure have changed.

To help you keep up with it all, this glossary contains definitions for infrastructure access terms you’ll hear as you work to manage access for your organization.

Access as code: The practice of managing and provisioning all aspects of infrastructure access via automated processes and centralized management, across any technology type.

Attribute-Based Access Control (ABAC): A runtime decision-making strategy for what features and/or data a user can access based on policies and user attributes.

Auditing: Official inspection of IT infrastructure, policies, and programs to identify areas of improvement.

Audit Log: A document that records what is happening within an IT system.

Audit Trail: A formal record of transactions within an IT system.

Authorization (Authz): A system or application process that makes a runtime decision as to whether a user can perform a certain function or access data.

Authentication (Authn): The process of verifying a user’s identity, such as through a username/password combination.

Bastion Host: A computer that is purposely exposed on a public network. It’s placed outside the firewall and filters incoming traffic to prevent attacks.

Cloud Access Security Broker (CASB): Software or hardware that is either hosted in the cloud or on-premises. It adds a layer of security between users and cloud service providers and often overlaps with secure web gateway (SWG) functionality.

Compliance: The state of adhering to specific guidelines, such as those from a government agency.

Data Governance: How organizations manage enterprise system availability, integrity, usability, and security, based on internal standards and any external requirements.

DevSecOps: A management approach that combines application development, security, and operations teams, along with infrastructure as a code, to create an automated, continuous delivery cycle for enterprise applications.

Firewall-as-a-Service (FWaaS): A centralized firewall service provided by a vendor that consolidates traffic headed to all enterprise locations, including mobile users and cloud services, and implements a security policy.

Identity-as-a-Service (IDaaS): An identity and access management (IAM) solution delivered in a cloud-based service that is hosted by a trusted third party.

Identity and Access Management (IAM): Business processes, policies, and technology that help companies manage digital identities. These include single sign-on systems, multi-factor authentication, and privilege management.

Identity Aware Proxy (IAP): A Google Cloud Platform service that can authenticate users and provide secure access to specific applications.

Identity Governance and Administration (IGA): Policies for identity management and access control that go beyond traditional IAM tools. It enables and secures digital identities for all users, applications, and databases.

Identity provider (IdP): Part of a system that gives an end user or connected device a set of login credentials for platforms, applications, and networks.

Infrastructure Access: The ability to connect to a system in your infrastructure, such as a database or connecting to a server.

Infrastructure Access Platform: A single solution that combines authentication, authorization, networking, and observability. This lets organizations centrally manage and automate infrastructure access securely.

Infrastructure as Code (IaC): An IT practice that treats underlying IT infrastructure as software.

Just-in-Time (JIT) Access: A methodology that provides real-time, granular access to applications or systems so that users can perform necessary actions.

Logging: The act of creating a log file that time-stamps each action or event in a particular system.

Observability: The ability to measure the internal state of a system by tracking the system’s external outputs.

Points of Presence (POPs): Access points to systems.

Principle of Least Privilege (PoLP): A computer security concept that limits access rights for users, accounts, and computing processes to give them the bare minimum they need to complete a task or job.

Privileged Access Management (PAM): Tools and technology used to secure, control, and monitor how an organization’s critical infrastructure and resources are accessed.

Privileged Account Management (also PAM): A term used to refer to privileged access management that focuses on granting access to existing accounts.

Privileged Identity Management (PIM): A term used to refer to privileged access management that implies only the identities of privileged accounts are being managed. (Recommended reading: PIM vs. PAM)

Privileged Session Management (PSM): A term that refers to privileged access management but only focuses on launching and recording login sessions.

Proxy: An intermediary between users, applications, systems, and other resources.

Role-Based Access Control (RBAC): A method of managing entitlements by granting privileges to users by creating roles and attaching users to those roles, instead of directly.

Secure Access Service Edge (SASE): A cloud architecture that delivers network and security as a single cloud service.

Secure Shell (SSH): A network protocol that lets users access computers securely over an unsecured network.

Secure Web Gateway (SWG): A security device that protects internal networks from unsecured internet traffic.

Single Sign-On (SSO): A service that lets users authenticate with a single login for multiple systems.

SOC 2 Compliance: The state of adhering to the System and Organization Control 2 (SOC 2) standard set by the American Institute of CPAs (AICPA).

Software-defined network (SDN): An architecture that abstracts network layers into distinguishable components (application layer, control layer, infrastructure layer, and APIs) so that enterprises can better control their networks.

Software-defined networking in a wide area network (SD-WAN): A technology that uses SDN concepts to distribute network traffic across a wide-area network (WAN).

Virtual Private Network (VPN): A service that creates a “tunnel” for safe, secure network connections.

Zero Trust: A security model that assumes all users are already compromised. Every user or device must re-authenticate every time they log in.

Zero Trust Network Access (ZTNA): Part of the zero trust model that hides the IP address while requiring identity-based authentication to provide network access.

Zero Standing Privileges (ZSP): A term coined by analyst firm Gartner to describe the state of having the least amount of privileges necessary to access systems and networks, using just-in-time access.

Zombie Credentials: Active accounts that are no longer used and can open the door to malicious actors.

Want to learn more terms? Check out our Cybersecurity Glossary

About the Author

, People-First Access platform, StrongDM, gives technical staff access to the infrastructure they need to be productive.

💙 this post?
Then get all that strongDM goodness, right in your inbox.

You May Also Like

Centralized and Decentralized Identity Management Explained
Centralized and Decentralized Identity Management Explained
In this article, we’ll define centralized identity management and explain the difference between centralized and decentralized identity management models. We’ll explore what centralized access control is, how it works, and how centralized access management handles provisioning, authentication, and authorization. By the end of the article, you’ll know how to choose between centralized account management and decentralized models to prevent cybercrime and streamline provisioning workflows.
StrongDM + Cloud Secrets Management = Your New PAM
StrongDM + Cloud Secrets Management = Your New PAM
StrongDM integrates with your favorite cloud secrets manager to provide an end-to-end version of remote access for more than just privileged accounts.
Competitors & Alternatives to Saviynt
Competitors & Alternatives to Saviynt
Saviynt is a popular identity and access management solution (IAM), but it may not be the best choice for every organization. In this article, we’ll explore powerful alternatives to Saviynt for companies with cloud-first IT infrastructure. By the end of this article, you’ll know whether Saviynt or one of these Saviynt competitors is the right fit for you.
3 Types of Access Control: IT Security Models Explained
3 Types of Access Control: IT Security Models Explained
In this article, we will look at three important types of access control in security. You’ll learn about the different types of access control, how they work, and their pros and cons. By the end of this article, you’ll understand what type of access control will work best for your organization and meet your security needs.
PIM vs. PAM Security: Understanding the Difference
PIM vs. PAM Security: Understanding the Difference
Understanding the nuances of privileged access management vs privileged identity management can be challenging. Although PIM and PAM are often used interchangeably, there is an important difference between PIM and PAM that companies should know. In this article, we’ll explain PIM vs PAM and explore how they work to demonstrate the differences between them. By the end of this article, you’ll know what role PIM and PAM should play in your security strategy.