Security concepts refer to the strategies, controls, and frameworks used to protect data, systems, and networks from unauthorized access or damage. Core ideas include confidentiality, integrity, availability, and non-repudiation.
Conditional Access enables extra layers of security by allowing access to be granted based on specific conditions such as time of day, location, device type, or security posture. For example, access might be restricted based on the security posture of a device or workload, such as whether it meets certain criteria defined by an integration with security tools like CrowdStrike.
TLS (Transport Layer Security)
Security concepts
A cryptographic protocol that provides secure communication over a computer network. TLS is commonly used to encrypt API traffic and protect sensitive information from eavesdropping and tampering.
Trust Relationship
Security concepts
A mutual agreement or configuration between identity providers and service providers that establishes trust and enables federated identity management. Trust relationships define the rules and protocols for exchanging identity tokens, assertions, and attributes securely.
Two-Factor Authentication (2FA)
Security concepts
An authentication method that requires users to provide two forms of verification to access an account or system. Password managers and vaults often support 2FA to enhance security by requiring an additional factor, such as a code from a mobile app or a hardware token.
Zero Trust
Security concepts
A security framework that assumes no entity, either inside or outside the network, should be automatically trusted. It mandates continuous verification of the security status of identities, devices, and network traffic before granting access to resources.
Access Control
Security concepts
The practice of regulating access to resources or systems based on permissions and
authorization policies. Secrets managers implement access control mechanisms to restrict who
can view, modify, or retrieve stored secrets, ensuring that only authorized users or applications
have access