Appendix A

Glossary

access control:
the sum of all the technologies, processes, and personnel that are responsible for controlling access to resources
account deprovisioning:
the process of removing access and disabling an account when a user no longer requires access to cloud resources
account hijacking:
an occurrence when an unauthorized party gains access to and takes over a privileged account
account provisioning:
the process of creating user accounts and enabling access to cloud resources
address allocation:
the process of assigning one or multiple IP addresses to a cloud resource; this can be done either statically or dynamically
adverse event:
an event that comes with negative consequences
aggregate risk:
the combined risk of multiple individual security flaws or vulnerabilities
agile:
an SDLC methodology in which development and testing activities occur simultaneously, cyclically, and iteratively
anonymization:
the process of removing information that can be used to identify a specific individual from a dataset
application programming interface (API):
a software-to-software communication link that allows two applications, such as a client and a server, to interact with one another over the Internet
application virtualization:
the process of encapsulating (or bundling) an application into a self-contained package that is isolated from the underlying operating system on which it is executed
applistructure:
includes the applications that are deployed in the cloud and the underlying ...

Get CCSP For Dummies, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.