Access Control
Application Access Governance (AAG)
Attack Surface
AuthN
AuthZ
California Consumer Privacy Act (CCPA)
Cloud Governance
Cloud Infrastructure Entitlement Management (CIEM)
Continuous Compliance
Converged Identity Platform (CIP)
Cybersecurity Maturity Model Certification (CMMC)
Data Access Governance (DAG)
Deprovisioning
DevOps
DevSecOps
Electronic Health Records (EHR)
Federal Information Security Modernization Act (FISMA)
General Data Protection Regulation (GDPR)
Governance, Risk, & Compliance (GRC)
Health Insurance Portability and Accountability Act (HIPAA)
Identity Access Management (IAM)
Identity as a Service (IDaaS)
Identity Governance and Administration (IGA)
Identity Management
Infrastructure as a Service (IaaS)
Internet of Things (IoT) | Saviynt Identity & Security Glossary
Just-in-Time Access (JIT)
Level of Assurance (LOA)
Lift and Shift
Machine Identity
Machine Learning (ML)
Multi-Factor Authentication (MFA)
National Institute of Standards & Technology (NIST)
Payment Card Industry Data Security Standard (PCI/DSS)
Phishing
Platform as a Service (PaaS)
Privileged Access Management (PAM)
Protected Health Information (PHI)
Role-based Access Control (RBAC)
Separation of Duties (SoD)
Vendor Access Management (VAM)
Zero Standing Privilege (ZSP)
Zero Trust Network Access (ZTNA)
Zero Trust Security
Zero-Day Attack
Access Control
Application Access Governance (AAG)
Attack Surface
AuthN
AuthZ
Zero-Day Attack
Access Control
Application Access Governance (AAG)
Attack Surface
AuthN
AuthZ
California Consumer Privacy Act (CCPA)
Cloud Governance
Cloud Infrastructure Entitlement Management (CIEM)
Continuous Compliance
Converged Identity Platform (CIP)
Cybersecurity Maturity Model Certification (CMMC)
Data Access Governance (DAG)
Deprovisioning
DevOps
DevSecOps
Electronic Health Records (EHR)
Federal Information Security Modernization Act (FISMA)
General Data Protection Regulation (GDPR)
Governance, Risk, & Compliance (GRC)
Health Insurance Portability and Accountability Act (HIPAA)
Identity Access Management (IAM)
Identity as a Service (IDaaS)
Identity Governance and Administration (IGA)
Identity Management
Infrastructure as a Service (IaaS)
Internet of Things (IoT) | Saviynt Identity & Security Glossary
Just-in-Time Access (JIT)
Level of Assurance (LOA)
Lift and Shift
Machine Identity
Machine Learning (ML)
Multi-Factor Authentication (MFA)
National Institute of Standards & Technology (NIST)
Payment Card Industry Data Security Standard (PCI/DSS)
Phishing
Platform as a Service (PaaS)
Privileged Access Management (PAM)
Protected Health Information (PHI)
Role-based Access Control (RBAC)
Separation of Duties (SoD)
Vendor Access Management (VAM)
Zero Standing Privilege (ZSP)
Zero Trust Network Access (ZTNA)
Zero Trust Security
Zero-Day Attack
Access Control
Application Access Governance (AAG)
Attack Surface
AuthN
Zero-Day Attack
Access Control
Application Access Governance (AAG)
Attack Surface
AuthN
AuthZ
California Consumer Privacy Act (CCPA)
Cloud Governance
Cloud Infrastructure Entitlement Management (CIEM)
Continuous Compliance
Converged Identity Platform (CIP)
Cybersecurity Maturity Model Certification (CMMC)
Data Access Governance (DAG)
Deprovisioning
DevOps
DevSecOps
Electronic Health Records (EHR)
Federal Information Security Modernization Act (FISMA)
General Data Protection Regulation (GDPR)
Governance, Risk, & Compliance (GRC)
Health Insurance Portability and Accountability Act (HIPAA)
Identity Access Management (IAM)
Identity as a Service (IDaaS)
Identity Governance and Administration (IGA)
Identity Management
Infrastructure as a Service (IaaS)
Internet of Things (IoT) | Saviynt Identity & Security Glossary
Just-in-Time Access (JIT)
Level of Assurance (LOA)
Lift and Shift
Machine Identity
Machine Learning (ML)
Multi-Factor Authentication (MFA)
National Institute of Standards & Technology (NIST)
Payment Card Industry Data Security Standard (PCI/DSS)
Phishing
Platform as a Service (PaaS)
Privileged Access Management (PAM)
Protected Health Information (PHI)
Role-based Access Control (RBAC)
Separation of Duties (SoD)
Vendor Access Management (VAM)
Zero Standing Privilege (ZSP)
Zero Trust Network Access (ZTNA)
Zero Trust Security
Zero-Day Attack
Access Control
Application Access Governance (AAG)
Attack Surface
AuthN
Access Control
Application Access Governance (AAG)
Attack Surface
AuthN
AuthZ
California Consumer Privacy Act (CCPA)
Cloud Governance
Cloud Infrastructure Entitlement Management (CIEM)
Continuous Compliance
Converged Identity Platform (CIP)
Cybersecurity Maturity Model Certification (CMMC)
Data Access Governance (DAG)
Deprovisioning
DevOps
DevSecOps
Electronic Health Records (EHR)
Federal Information Security Modernization Act (FISMA)
General Data Protection Regulation (GDPR)
Governance, Risk, & Compliance (GRC)
Health Insurance Portability and Accountability Act (HIPAA)
Identity Access Management (IAM)
Identity as a Service (IDaaS)
Identity Governance and Administration (IGA)
Identity Management
Infrastructure as a Service (IaaS)
Internet of Things (IoT) | Saviynt Identity & Security Glossary
Just-in-Time Access (JIT)
Level of Assurance (LOA)
Lift and Shift
Machine Identity
Machine Learning (ML)
Multi-Factor Authentication (MFA)
National Institute of Standards & Technology (NIST)
Payment Card Industry Data Security Standard (PCI/DSS)
Phishing
Platform as a Service (PaaS)
Privileged Access Management (PAM)
Protected Health Information (PHI)
Role-based Access Control (RBAC)
Separation of Duties (SoD)
Vendor Access Management (VAM)
Zero Standing Privilege (ZSP)
Zero Trust Network Access (ZTNA)
Zero Trust Security
Zero-Day Attack
Access Control
Application Access Governance (AAG)
Attack Surface
AuthN
AuthZ
Access Control
Application Access Governance (AAG)
Attack Surface
AuthN
AuthZ
California Consumer Privacy Act (CCPA)
Cloud Governance
Cloud Infrastructure Entitlement Management (CIEM)
Continuous Compliance
Converged Identity Platform (CIP)
Cybersecurity Maturity Model Certification (CMMC)
Data Access Governance (DAG)
Deprovisioning
DevOps
DevSecOps
Electronic Health Records (EHR)
Federal Information Security Modernization Act (FISMA)
General Data Protection Regulation (GDPR)
Governance, Risk, & Compliance (GRC)
Health Insurance Portability and Accountability Act (HIPAA)
Identity Access Management (IAM)
Identity as a Service (IDaaS)
Identity Governance and Administration (IGA)
Identity Management
Infrastructure as a Service (IaaS)
Internet of Things (IoT) | Saviynt Identity & Security Glossary
Just-in-Time Access (JIT)
Level of Assurance (LOA)
Lift and Shift
Machine Identity
Machine Learning (ML)
Multi-Factor Authentication (MFA)
National Institute of Standards & Technology (NIST)
Payment Card Industry Data Security Standard (PCI/DSS)
Phishing
Platform as a Service (PaaS)
Privileged Access Management (PAM)
Protected Health Information (PHI)
Role-based Access Control (RBAC)
Separation of Duties (SoD)
Vendor Access Management (VAM)
Zero Standing Privilege (ZSP)
Zero Trust Network Access (ZTNA)
Zero Trust Security
Zero-Day Attack
Access Control
Application Access Governance (AAG)
Attack Surface
AuthN
AuthZ
Zero-Day Attack
Access Control
Application Access Governance (AAG)
Attack Surface
AuthN
AuthZ
California Consumer Privacy Act (CCPA)
Cloud Governance
Cloud Infrastructure Entitlement Management (CIEM)
Continuous Compliance
Converged Identity Platform (CIP)
Cybersecurity Maturity Model Certification (CMMC)
Data Access Governance (DAG)
Deprovisioning
DevOps
DevSecOps
Electronic Health Records (EHR)
Federal Information Security Modernization Act (FISMA)
General Data Protection Regulation (GDPR)
Governance, Risk, & Compliance (GRC)
Health Insurance Portability and Accountability Act (HIPAA)
Identity Access Management (IAM)
Identity as a Service (IDaaS)
Identity Governance and Administration (IGA)
Identity Management
Infrastructure as a Service (IaaS)
Internet of Things (IoT) | Saviynt Identity & Security Glossary
Just-in-Time Access (JIT)
Level of Assurance (LOA)
Lift and Shift
Machine Identity
Machine Learning (ML)
Multi-Factor Authentication (MFA)
National Institute of Standards & Technology (NIST)
Payment Card Industry Data Security Standard (PCI/DSS)
Phishing
Platform as a Service (PaaS)
Privileged Access Management (PAM)
Protected Health Information (PHI)
Role-based Access Control (RBAC)
Separation of Duties (SoD)
Vendor Access Management (VAM)
Zero Standing Privilege (ZSP)
Zero Trust Network Access (ZTNA)
Zero Trust Security
Zero-Day Attack
Access Control
Application Access Governance (AAG)
Attack Surface
AuthN
Zero-Day Attack
Access Control
Application Access Governance (AAG)
Attack Surface
AuthN
AuthZ
California Consumer Privacy Act (CCPA)
Cloud Governance
Cloud Infrastructure Entitlement Management (CIEM)
Continuous Compliance
Converged Identity Platform (CIP)
Cybersecurity Maturity Model Certification (CMMC)
Data Access Governance (DAG)
Deprovisioning
DevOps
DevSecOps
Electronic Health Records (EHR)
Federal Information Security Modernization Act (FISMA)
General Data Protection Regulation (GDPR)
Governance, Risk, & Compliance (GRC)
Health Insurance Portability and Accountability Act (HIPAA)
Identity Access Management (IAM)
Identity as a Service (IDaaS)
Identity Governance and Administration (IGA)
Identity Management
Infrastructure as a Service (IaaS)
Internet of Things (IoT) | Saviynt Identity & Security Glossary
Just-in-Time Access (JIT)
Level of Assurance (LOA)
Lift and Shift
Machine Identity
Machine Learning (ML)
Multi-Factor Authentication (MFA)
National Institute of Standards & Technology (NIST)
Payment Card Industry Data Security Standard (PCI/DSS)
Phishing
Platform as a Service (PaaS)
Privileged Access Management (PAM)
Protected Health Information (PHI)
Role-based Access Control (RBAC)
Separation of Duties (SoD)
Vendor Access Management (VAM)
Zero Standing Privilege (ZSP)
Zero Trust Network Access (ZTNA)
Zero Trust Security
Zero-Day Attack
Access Control
Application Access Governance (AAG)
Attack Surface
AuthN
Access Control
Application Access Governance (AAG)
Attack Surface
AuthN
AuthZ
California Consumer Privacy Act (CCPA)
Cloud Governance
Cloud Infrastructure Entitlement Management (CIEM)
Continuous Compliance
Converged Identity Platform (CIP)
Cybersecurity Maturity Model Certification (CMMC)
Data Access Governance (DAG)
Deprovisioning
DevOps
DevSecOps
Electronic Health Records (EHR)
Federal Information Security Modernization Act (FISMA)
General Data Protection Regulation (GDPR)
Governance, Risk, & Compliance (GRC)
Health Insurance Portability and Accountability Act (HIPAA)
Identity Access Management (IAM)
Identity as a Service (IDaaS)
Identity Governance and Administration (IGA)
Identity Management
Infrastructure as a Service (IaaS)
Internet of Things (IoT) | Saviynt Identity & Security Glossary
Just-in-Time Access (JIT)
Level of Assurance (LOA)
Lift and Shift
Machine Identity
Machine Learning (ML)
Multi-Factor Authentication (MFA)
National Institute of Standards & Technology (NIST)
Payment Card Industry Data Security Standard (PCI/DSS)
Phishing
Platform as a Service (PaaS)
Privileged Access Management (PAM)
Protected Health Information (PHI)
Role-based Access Control (RBAC)
Separation of Duties (SoD)
Vendor Access Management (VAM)
Zero Standing Privilege (ZSP)
Zero Trust Network Access (ZTNA)
Zero Trust Security
Zero-Day Attack
Access Control
Application Access Governance (AAG)
Attack Surface
AuthN
AuthZ