Platform
Plerion Platform
Medium Risk
Top risks
Hacking
Attack paths
Edit Property
Kubernetes misconfigurations
Bullet List
Asset inventory
Search in Browser
Misconfigurations
Brake Warning
Vulnerabilities
Find iPhone
Breach detection
Name Tag
Permissions
Data Protection
Data security
Code
Code security
Conference
Compliance
Index
Software composition
Explore the platform →
Integrations →Supported clouds →Use cases →
Pleri AI
Happy Cloud
Meet Pleri
Neuroscience Experiment
Pleri skills & capabilities
Storytelling
Pleri docs
Customers
Resources
Microscope
Blog
Bookmark
Cloud knowledge base
Platform Documentation
Platform Documentation
Api Reference
API Reference
Company
Business Building
About
Briefcase
Careers
Chat
Contact
People
Partnerships
Secure
Trust Center
Pricing
  • Home
  • Pleri AI Icon Rounded Chevron Dark - BRIX Templates
    Pleri skills & capabilitiesPleri docs
  • Customers
  • Platform
    Icon Rounded Chevron Dark - BRIX Templates
    Top risksKuberenets misconfigurationsAsset InventoryMisconfigurationsVulnerabilitiesPermissionsBreach DetectionData SecurityCode securityComplianceSoftware Composition
    Explore The Platform
  • Use Cases
    Icon Rounded Chevron Dark - BRIX Templates
    Find & prioritize vulnerabilitiesIdentify the 1% of risk that mattersUnderstand what's in your cloudKnow who has access to whatWork where you already work
  • Resources
    Icon Rounded Chevron Dark - BRIX Templates
    BlogCloud knowledge basePlatform DocumentationAPI Reference
  • Company
    Icon Rounded Chevron Dark - BRIX Templates
    About usCareersContact usTrust center
  • Pricing
Circled Menu
Circled Menu
Get a demoSign up
Icon Rounded Padlock Accent - BRIX Templates
Sign in
Cloud knowledge base
Glossary

Glossary

Essential cloud security terms and definitions
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Glossary

What is defense in depth?

Layered security approach with multiple protective measures
Glossary

What is least privelage

Security principle of granting minimum necessary permissions
Glossary

What is RBAC?

Role-Based Access Control for permission management
Glossary

What is IAM?

Identity and Access Management for controlling resources access
Glossary

What is zero trust?

Security model that assumes no implicit trust in any network
Glossary

What is SOAR?

Security Orchestration, Automation and Response for incident handling
Glossary

What is SIEM?

Security information and Event Management for threat detection
Glossary

What is CNAPP?

Cloud-Native Application Protection Platform for comprehensive security
Glossary

What is CWPP?

Cloud Workload Protection Platform for runtime security
Glossary

What is CSPM?

Cloud Security Posture Management for continuous compliance monitoring
1
of
2
Page
Back to Cloud knowledge base

What is defense in depth?

Layered security approach with multiple protective measures

What is least privelage

Security principle of granting minimum necessary permissions

What is RBAC?

Role-Based Access Control for permission management

What is IAM?

Identity and Access Management for controlling resources access

What is zero trust?

Security model that assumes no implicit trust in any network

What is SOAR?

Security Orchestration, Automation and Response for incident handling

What is SIEM?

Security information and Event Management for threat detection

What is CNAPP?

Cloud-Native Application Protection Platform for comprehensive security

What is CWPP?

Cloud Workload Protection Platform for runtime security

What is CSPM?

Cloud Security Posture Management for continuous compliance monitoring