Andromeda Security Glossary

This resource lists terms commonly used in Cloud Identity Security, addressing both human and non-human (NHI) identities.

A

ABAC (Attribute-Based Access Control)

A fine-grained authorization model that grants access based on attributes associated with users, resources, and environmental conditions.

Access Request

A process where users can request additional permissions for a specific duration (JIT) or permanently (Standing) through a workflow that involves AI analysis and manual approval.

Account

A logical container of resources managed as a single entity in a cloud or application environment. 

Account Admin

Users authorized to manage and control specific accounts with access restricted to these accounts. 

Agentless Identity Security

A method of protecting user identities and access controls without the need to install dedicated software agents on individual devices, instead relying on existing network infrastructure and APIs to monitor and enforce security policies, providing a broader view of user activity across different systems without the overhead of managing agents on each endpoint. 

Agentic AI

Artificial intelligence (AI) that can make decisions, take actions, and learn independently to achieve goals. It can understand natural language, plan workflows, and adapt to changing circumstances. Agentic AI is designed to be autonomous and proactive without the need for constant human guidance.

API Key

A unique identifier used to authenticate and authorize access to an API (Application Programming Interface).

App Registration

The process of registering an application with an identity provider to enable authentication and authorization services.

Authentication

The process of verifying the identity of a user, device, or system.

Automated Permission Management

Refers to the practice of using technology to automatically assign, modify, and revoke user access rights to systems and data based on predefined rules and policies, essentially eliminating the need for manual intervention in managing who can access what information within a network, minimizing the risk of human error and ensuring consistent security enforcement across all users. Applies to the principles of Least Privilege.

Authorization

The process of granting or denying access rights and permissions to resources based on authenticated identities.

AWS EC2 Instance Profile

A container for an IAM role that you can use to pass role information to an EC2 instance when the instance starts.

AWS IAM Role

A secure way to grant permissions to entities you trust in your AWS account.

Azure AD Application

Represents an Azure Active Directory application used for service-to-service authentication scenarios.

Azure Managed Identity

An identity in Azure Active Directory that applications can use to access Azure resources securely.

B

Behavioral Risk

Measures the probability that an identity has already been compromised, derived from the dynamic behavior exhibited by the identities. 

Blast Radius

The extent of potential damage or impact that could result from a security breach or compromise of a specific identity or system.

Blast Risk

A metric that measures the potential business impact of a compromised identity based on permissions.

C

CASB (Cloud Access Security Broker)

A security policy enforcement point between cloud service consumers and providers to enforce security policies.

CIAM (Customer Identity and Access Management)

A framework for managing customer identities, authentication, and access to digital services and applications.

Cloud Entitlement

A cloud entitlement is like a digital key that grants specific access to cloud resources. It defines what a particular cloud identity (a person, a machine, or a service account) can do within a cloud environment.

Cloud Infrastructure Entitlements Management (CIEM)

A solution offering comprehensive features for managing access to cloud infrastructure resources, including visibility into entitlements, removal of unused entitlements, automated risk remediation, anomaly detection, and compliance automation.

Criticality

The level of importance or business impact associated with an account based on its environment. 

Cross-Account IAM Role

An IAM role that allows trusted entities from other AWS accounts to access resources in your account.

Customer Identity

The digital representation of a customer or end-user within an organization's identity system.

D

Dynamic Least Privilege

A real-time approach to access control where permissions are granted to users, systems, or applications based on their current context and needs.

Digital Identity

A digital identity is a collection of information uniquely identifying a person, device, application, or organization online. It's a one-to-one relationship between a person and their digital presence, which can include multiple accounts, credentials, and entitlements

E

EKS Cluster

A managed Kubernetes service on AWS that provides a scalable, secure, and fully managed platform for running containerized applications.

Eligibility Mapping

A list of IAM policies that a user can request for JIT or standing access in a specific account, configured by admins at the Provider level. 

Enforcement Mode

The mode in which a security vendor controls user permissions, grants necessary access, and provides temporary elevated privileges as needed.

Excessive Privilege Score

A measure of the degree to which an identity’s permissions exceed its expected or required access, potentially increasing the risk of unauthorized access. 

External Identities

Identities from outside an organization's primary identity system, often used for collaboration with partners or customers.

F

FIDO  (FIDO2)

Fast Identity Online is an open authentication standard that leverages hardware-based security keys to verify user identity, eliminating the need for traditional passwords and enhancing security against phishing and credential theft.  

Fine-grained permissions

An identity management that allows administrators to control access to resources with high granularity, granting specific permissions for specific actions on specific resources, ensuring precise control over who can do what within a system.

G

GCP Service Account

A special type of account used by an application or a virtual machine (VM) instance, not a person, to authenticate and access Google Cloud resources.

GCP Workload Identity

Allows Kubernetes applications to access Google Cloud services using a Kubernetes service account.

Group Membership

A Group Membership in Okta refers to the association of users with specific groups, granting them access to resources and applications based on their group affiliations. 

Group Profile

A Group Profile in Okta is a template that defines the common attributes and settings for multiple groups within an organization.

H

Human Resource Information Systems (HRIS)

A software application for managing employee data and personal information. 

Human Identity

The digital representation of an individual user within an organization's identity system, typically associated with a unique username or email address.

I

IAM Roles for Service Accounts (IRSA)

A feature in Kubernetes that allows pods to access AWS services securely by associating an IAM role with a Kubernetes service account. This enables fine-grained access control and eliminates the need to store AWS credentials as secrets.

Identity and Access Management (IAM)

A framework of policies and technologies to ensure that the right users have the appropriate access to resources.

Identity Federation

A system that allows individuals to use the same personal identification to obtain access to the networks of more than one enterprise.

Identity Provider (IdP)

A system entity that creates, maintains, and manages identity information for principals and provides authentication services to relying applications within a federation or distributed network.

IGA (Identity Governance and Administration)

A set of processes and technologies for managing digital identities, access rights, and ensuring compliance with policies and regulations.

Inactive Identity

Users with no activity for a specified period, often former employees, pose a security risk due to potential exploitation by attackers.

Inactive Keys

Access keys that have not been used for at least 30 days. 

ISPM (Identity Security Posture Management)

A comprehensive approach to managing and optimizing an organization's identity security posture across various systems and environments.

ITDR (Identity Threat Detection and Response)

A security approach that focuses on detecting and responding to threats related to identity and access management.

J

Just-in-Time (JIT) Access

A security approach where elevated privileges are granted only when needed and for a limited time, reducing the risk of standing privileges.

JIT Eligibility List

A curated list of permissions a user can request during future JIT sessions tailored to their role and previous IAM policies.

K

Key Hygiene

The practice of maintaining secure access keys by regularly rotating them, ensuring they are active, and avoiding unused keys. 

Kubernetes Service Account

An identity used by processes running in a Kubernetes pod to authenticate with the Kubernetes API server and access cluster resources.

L

Least Standing Privilege

A security principle granting only the minimum necessary permissions to users, systems, and applications to perform their functions.

Local Identities

User accounts created and managed within a specific system or application, not centrally managed by an organization-wide identity provider.

M

Machine Identity

The digital identity of a device or system used for authentication and secure communication between machines.

Microsoft Entra ID

A cloud-based identity and access management service that provides single sign-on, multi-factor authentication, and user management for Microsoft and non-Microsoft applications.

Multi-Factor Authentication (MFA)

A security system requiring multiple authentication methods to verify a user's identity.

N

Non-Human Identities

Digital identities associated with systems, applications, or services rather than individual users, used for machine-to-machine communication and automation.

O

OAuth

An open standard for access delegation, commonly used for secure authorization in web and mobile applications.

Observation Mode

The mode in which a security solution monitors identity privileges and usage to offer insights on permission policy usage and recommendations. 

OpenID Connect (OIDC)

An identity layer on top of the OAuth 2.0 protocol, allowing clients to verify end-users identity based on the authentication performed by an authorization server.

P

PIM (Privileged Identity Management)

A solution for managing, controlling, and monitoring privileged access to critical resources within an organization.

Ping Identity

An identity and access management (IAM) platform that provides secure authentication, authorization, and single sign-on (SSO) solutions. 

Policy

A set of rules that define permissions and restrictions for identities or accounts within a system or organization.

Posture Risk

Measures the probability of an identity being compromised, derived from its authentication configuration and organizational status. 

Privileged Access Management (PAM)

A set of cybersecurity strategies and technologies for controlling elevated access and permissions for users, accounts, processes, and systems. It includes password management, session recording, and access request workflows.

Privilege Escalation

The process of gaining higher levels of access or permissions than were granted initially, either through legitimate means or due to a security vulnerability.

Privilege Risk

Measures the business impact (Blask Risk) to the organization if an identity is compromised. It is determined by considering the types of permissions granted and the criticality of the accessed resources. 

Provider

An entity that offers services related to infrastructure, applications, or identity management.

R

Recommendation

Actionable suggestions aimed at reducing identity posture risk across an organization. 

Remediation

Identifying and actively addressing security vulnerabilities or threats, taking necessary steps to eliminate them, and minimizing potential damage by patching systems, updating software, or implementing security controls once a threat is detected. Vendors providing context-based scripts or automation for each recommendation will more quickly address security risks or issues within an organization’s identity or policy. 

Risk

The potential for unauthorized access, data breaches, or other security threats associated with identities, accounts, policies, or systems. This includes:

  • Policy Risk: Potential security vulnerabilities arising from poorly configured or overly permissive policies.
  • Account Risk: The likelihood of an account being compromised or misused.
  • Provider Risk: Security concerns related to the identity or service provider.
  • Identity Risk: Potential threats associated with a specific identity, such as dormant or over-privileged accounts.

Role-Based Access Control (RBAC)

A method of regulating access to computer or network resources based on the roles of individual users within an organization.

S

SAML Provider

An entity that provides Single Sign-On (SSO) and authentication services to other applications or services using Security Assertion Markup Language (SAML) protocol. 

SCIM (System for Cross-domain Identity Management)

A standard for automating the exchange of user identity information between identity domains or IT systems.

Security Assertion Markup Language (SAML)

An open standard for exchanging authentication and authorization data between parties, particularly between an identity provider and a service provider.

Sensitivity

Refers to whether an account contains sensitive data determined by predefined rules that can be customized. 

Service Account

A special type of account application or service used to interact with systems rather than being associated with a human user.

Service Identities

Roles assigned to cloud workloads (virtual machines, serverless functions, K8s service accounts, or applications) to manage their access and permissions within the cloud environment. 

Service-Linked Role

A unique type of IAM role linked directly to an AWS service. It is pre-defined by the service and includes all the permissions required to call other AWS services on your behalf.

Significant Identity

Critical users within an organization’s cloud and application environment. 

Single Sign-On (SSO)

An authentication scheme allowing users to log in with a single ID to access multiple related but independent software systems.

Stale Identities

Outdated or unused identities that may pose security risks if not adequately managed or deprovisioned.

Standing Privilege

Permanent access rights granted to an identity or account which remain in effect until explicitly revoked.

Super Admin

A user with unrestricted access to all accounts within a provider, capable of making system-wide changes, posing a significant security risk if compromised. 

System-Managed Identity

An identity automatically created and managed by a system or platform, often used for secure access to resources without explicit credentials.

U

User Profile Data

In Okta, User Profile Data refers to the personal and professional information associated with a user account, including name, email, department, and any other attributes specified by the administrator.

W

Workday

A cloud-based HRIS platform that streamlines various HR functions such as payroll, benefits administration, talent management, and time tracking.

Workforce Identity

The digital representation of an employee or internal user within an organization's identity system. It typically includes attributes such as job role, department, and access permissions, and is used to manage access to internal resources and applications.

Z

Zero Standing Privileges (ZSP)

A security approach where users are not granted permanent access rights to systems or resources. Instead, privileges are granted on-demand and for a limited time, reducing the risk of unauthorized access and improving overall security posture. This concept aligns closely with the principles of Just-in-Time (JIT) access and Zero Trust security models.

Zero Trust

Assumes no user or device can be implicitly trusted, requiring strict verification and authorization for every access request, regardless of location or network connection.

Zero Trust Identity Security

A security model that requires strict identity verification for every person and device trying to access resources, regardless of whether inside or outside the network perimeter.