Secrets Security Glossary

A-G

Continuous threat exposure management - CTEM

Cloud Infrastructure Entitlements Management (CIEM)

Dynamic secrets: Enhancing security and access management

Effective secrets management in CI/CD pipelines

False positives in Attack Surface Scanning & management

H-P

Identity and access management

Identity, Threat, Detection & Response (ITDR)

Principle of Least Privilege (PoLP)

Q-Z

Risk remediation and mitigation

Secrets Attack Surface Management

Secret key cryptography

Secret Sprawl

Secrets Management

Secrets and secrets management

SLSA levels for enhanced security

SSDF (Secure Software Development Framework)

SSDLC - Secure Software Development Lifecycle

Static Secrets

Threat vulnerability management

Zero Standing Privileges

Zero Trust Model

Want full security oversight?

See the Entro platform in action