Secrets Security Glossary


Continuous threat exposure management - CTEM

Cloud Infrastructure Entitlements Management (CIEM)

Dynamic secrets: Enhancing security and access management

Effective secrets management in CI/CD pipelines

False positives in Attack Surface Scanning & management


Identity and access management

Identity, Threat, Detection & Response (ITDR)

Principle of Least Privilege (PoLP)


Risk remediation and mitigation

Secrets Attack Surface Management

Secret key cryptography

Secret Sprawl

Secrets Management

Secrets and secrets management

SLSA levels for enhanced security

SSDF (Secure Software Development Framework)

SSDLC - Secure Software Development Lifecycle

Static Secrets

Threat vulnerability management

Zero Standing Privileges

Zero Trust Model

Want full security oversight?

See the Entro platform in action