Glossary Terms: C

A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z

Cross-Origin Resource Sharing

Security concepts
CORS controls whether JavaScript running in your browser can read responses from a different origin, gating access to your API data.

Continuous Access Evaluation Profile (CAEP)

Security concepts
CAEP enables real-time access decisions based on dynamic signals, revoking or adjusting permissions the moment risk conditions change.

Cloud Infrastructure Entitlement Management (CIEM)

IAM concepts
CIEM provides centralized visibility and control over your cloud permissions to reduce access risk across multi-cloud environments.

Credential Harvesting

NHI security threats
Credential harvesting is an attack technique where adversaries systematically collect authentication credentials, including passwords, API keys, access tokens and service account secrets, from compromised systems, code repositories, or network traffic.

Customer Identity and Access Management (CIAM)

IAM concepts
Customer Identity and Access Management (CIAM) is a specialized identity system that helps your business securely register, sign in and manage all external users, including customers, partners or citizens accessing your digital services.

Cyber Resilience

Security concepts
Cyber resilience is your organization’s ability to anticipate, withstand, recover from and adapt to adverse conditions, stresses, attacks or compromises that involve cyber resources, while keeping the business running continuously.

Cybersecurity Compliance

Security concepts
Beyond avoiding fines, a strong cybersecurity compliance framework is a forcing function for security excellence. It pushes teams to eliminate credential sprawl, implement zero-trust principles, and maintain visibility into access patterns across increasingly complex architectures.

Credential Provider

AI/MCP Concepts
A credential provider is a system that securely issues, manages, and delivers credentials, such as API keys, access tokens or certificates, to software workloads that need to access protected data. Unlike traditional secrets storage, credential providers generate or deliver these credentials dynamically based on a workload identity that has already been verified by a trust provider and evaluated against policy. They often issue short-lived credentials that expire automatically, reducing exposure if they are compromised.

Cloud-Native Application Protection Platform (CNAPP)

AI/MCP Concepts
A Cloud-Native Application Protection Platform (CNAPP) is a unified framework that combines many security tools into one single platform.It combines vulnerability management, misconfiguration detection, runtime threat protection, and workload security into a single platform that understands the dynamic, distributed nature of modern cloud infrastructure.

Cloud Identity

AI/MCP Concepts
Cloud identity systems handle authentication for workloads, services, and users running in cloud platforms like AWS, Azure, and GCP using API-first approaches with standardized protocols like OAuth 2.0, OpenID Connect, and SAML 2.0. They issue short-lived, cryptographically verifiable tokens that replace the long-lived credentials found in older authentication systems.