Immutable Infrastructure

Immutable Infrastructure: The concept of replacing existing infrastructure components or systems instead of updating them. With an immutable infrastructure, once a system or component is deployed, it is not modified – any changes lead to a new deployment of a system or component. This philosophy is intended to increase the reliability, consistency, and repeatability of […]

HOTP (HMAC-based One-time Password)

HOTP (HMAC-based One-time Password): An algorithm that computes a one-time password from a shared secret key and an incrementing counter. In a security context, this provides a robust method of two-factor authentication, enhancing user verification processes by generating unique, counter-based credentials that are difficult for attackers to replicate or predict, thereby protecting sensitive data and […]

Identity deprovisioning

Identity deprovisioning: The process of revoking access to an individual’s identity and associated resources. It is commonly used in IAM systems to ensure that individuals who are no longer authorized to access certain resources are unable to do so. Examples of identity deprovisioning include disabling a user’s account or deleting a user’s access permissions.

Hub

Hub: A network device that connects multiple computers or other network segments. In a hub-based network, the hub receives data packets and broadcasts them to all connected devices, regardless of the intended recipient. Hubs operate on the Physical Layer of the OSI model and have been largely replaced by smarter, more secure switches.

Identity Lifecycle – Job or duties review

Identity Lifecycle – Job or duties review: As part of the identity lifecycle, job or duties review involves regularly reviewing and updating the roles and responsibilities of users within an organization. This is typically done to ensure that users have the appropriate access and permissions for their job duties and to reduce the risk of […]

Hybrid cloud

Hybrid cloud: A computing environment that combines a mix of on-premises, private cloud, and third-party, public cloud services with orchestration among these platforms. This allows organizations to benefit from the scalability and cost-effectiveness of public cloud computing while maintaining control over critical applications and sensitive data, providing a balanced approach to managing security and operational […]