Access Control
Application Access Governance (AAG)
Attack Surface
AuthN
AuthZ
California Consumer Privacy Act (CCPA)
Cloud Governance
Cloud Infrastructure Entitlement Management (CIEM)
Continuous Compliance
Continuous Integration & Continuous Delivery (CI/CD) Pipeline
Converged Identity Platform (CIP)
Cyber Kill Chain
Cybersecurity Maturity Model Certification (CMMC)
Data Access Governance (DAG)
Deprovisioning
DevOps
DevSecOps
Electronic Health Records (EHR)
Enterprise Resource Planning (ERP)
Federal Information Security Modernization Act (FISMA)
FedRAMP
General Data Protection Regulation (GDPR)
Governance, Risk, & Compliance (GRC)
Health Insurance Portability and Accountability Act (HIPAA)
Identity and Access Management (IAM)
Identity as a Service (IDaaS)
Identity Governance and Administration (IGA)
Identity Management
Identity, Credential, and Access Management (ICAM)
Infrastructure as a Service (IaaS)
Internet of Things (IoT) | Saviynt Identity & Security Glossary
Just-in-Time Access (JIT)
Level of Assurance (LOA)
Lift and Shift
Machine Identity
Machine Learning (ML)
Multi-Factor Authentication (MFA)
National Institute of Standards & Technology (NIST)
Payment Card Industry Data Security Standard (PCI/DSS)
Phishing
Platform as a Service (PaaS)
Privileged Access Management (PAM)
Protected Health Information (PHI)
Role-based Access Control (RBAC)
Sarbanes-Oxley Act (SOX)
Separation of Duties (SoD)
Vendor Access Management (VAM)
Zero Standing Privilege (ZSP)
Zero Trust Network Access (ZTNA)
Zero Trust Security
Zero-Day Attack
Zero-Day Attack
Zero-Day Attack
Access Control
Application Access Governance (AAG)
Attack Surface
AuthN
AuthZ
California Consumer Privacy Act (CCPA)
Cloud Governance
Cloud Infrastructure Entitlement Management (CIEM)
Continuous Compliance
Continuous Integration & Continuous Delivery (CI/CD) Pipeline
Converged Identity Platform (CIP)
Cyber Kill Chain
Cybersecurity Maturity Model Certification (CMMC)
Data Access Governance (DAG)
Deprovisioning
DevOps
DevSecOps
Electronic Health Records (EHR)
Enterprise Resource Planning (ERP)
Federal Information Security Modernization Act (FISMA)
FedRAMP
General Data Protection Regulation (GDPR)
Governance, Risk, & Compliance (GRC)
Health Insurance Portability and Accountability Act (HIPAA)
Identity and Access Management (IAM)
Identity as a Service (IDaaS)
Identity Governance and Administration (IGA)
Identity Management
Identity, Credential, and Access Management (ICAM)
Infrastructure as a Service (IaaS)
Internet of Things (IoT) | Saviynt Identity & Security Glossary
Just-in-Time Access (JIT)
Level of Assurance (LOA)
Lift and Shift
Machine Identity
Machine Learning (ML)
Multi-Factor Authentication (MFA)
National Institute of Standards & Technology (NIST)
Payment Card Industry Data Security Standard (PCI/DSS)
Phishing
Platform as a Service (PaaS)
Privileged Access Management (PAM)
Protected Health Information (PHI)
Role-based Access Control (RBAC)
Sarbanes-Oxley Act (SOX)
Separation of Duties (SoD)
Vendor Access Management (VAM)
Zero Standing Privilege (ZSP)
Zero Trust Network Access (ZTNA)
Zero Trust Security
Zero-Day Attack
Access Control
Application Access Governance (AAG)
Attack Surface
AuthN
AuthZ
California Consumer Privacy Act (CCPA)
Cloud Governance
Cloud Infrastructure Entitlement Management (CIEM)
Continuous Compliance
Continuous Integration & Continuous Delivery (CI/CD) Pipeline
Converged Identity Platform (CIP)
Cyber Kill Chain
Cybersecurity Maturity Model Certification (CMMC)
Data Access Governance (DAG)
Deprovisioning
DevOps
DevSecOps
Electronic Health Records (EHR)
Enterprise Resource Planning (ERP)
Federal Information Security Modernization Act (FISMA)
FedRAMP
General Data Protection Regulation (GDPR)
Governance, Risk, & Compliance (GRC)
Health Insurance Portability and Accountability Act (HIPAA)
Identity and Access Management (IAM)
Identity as a Service (IDaaS)
Identity Governance and Administration (IGA)
Identity Management
Identity, Credential, and Access Management (ICAM)
Infrastructure as a Service (IaaS)
Internet of Things (IoT) | Saviynt Identity & Security Glossary
Just-in-Time Access (JIT)
Level of Assurance (LOA)
Lift and Shift
Machine Identity
Machine Learning (ML)
Multi-Factor Authentication (MFA)
National Institute of Standards & Technology (NIST)
Payment Card Industry Data Security Standard (PCI/DSS)
Phishing
Platform as a Service (PaaS)
Privileged Access Management (PAM)
Protected Health Information (PHI)
Role-based Access Control (RBAC)
Sarbanes-Oxley Act (SOX)
Separation of Duties (SoD)
Vendor Access Management (VAM)
Zero Standing Privilege (ZSP)
Zero Trust Network Access (ZTNA)
Zero Trust Security
Zero-Day Attack
Zero-Day Attack
Zero-Day Attack
Access Control
Application Access Governance (AAG)
Attack Surface
AuthN
AuthZ
California Consumer Privacy Act (CCPA)
Cloud Governance
Cloud Infrastructure Entitlement Management (CIEM)
Continuous Compliance
Continuous Integration & Continuous Delivery (CI/CD) Pipeline
Converged Identity Platform (CIP)
Cyber Kill Chain
Cybersecurity Maturity Model Certification (CMMC)
Data Access Governance (DAG)
Deprovisioning
DevOps
DevSecOps
Electronic Health Records (EHR)
Enterprise Resource Planning (ERP)
Federal Information Security Modernization Act (FISMA)
FedRAMP
General Data Protection Regulation (GDPR)
Governance, Risk, & Compliance (GRC)
Health Insurance Portability and Accountability Act (HIPAA)
Identity and Access Management (IAM)
Identity as a Service (IDaaS)
Identity Governance and Administration (IGA)
Identity Management
Identity, Credential, and Access Management (ICAM)
Infrastructure as a Service (IaaS)
Internet of Things (IoT) | Saviynt Identity & Security Glossary
Just-in-Time Access (JIT)
Level of Assurance (LOA)
Lift and Shift
Machine Identity
Machine Learning (ML)
Multi-Factor Authentication (MFA)
National Institute of Standards & Technology (NIST)
Payment Card Industry Data Security Standard (PCI/DSS)
Phishing
Platform as a Service (PaaS)
Privileged Access Management (PAM)
Protected Health Information (PHI)
Role-based Access Control (RBAC)
Sarbanes-Oxley Act (SOX)
Separation of Duties (SoD)
Vendor Access Management (VAM)
Zero Standing Privilege (ZSP)
Zero Trust Network Access (ZTNA)
Zero Trust Security
Zero-Day Attack