Security protocols, authentication methods, encryption, compliance standards, and best practices for cloud security.
Scrambling data so only authorized people can read it. Like writing in a secret code that only you and your friend know.
Example: When you shop online, encryption protects your credit card number from hackers....
A secret word or phrase that proves your identity to access accounts or systems. Like a key to your digital house.
Example: Using a strong, unique password for each account helps prevent hackers from accessing your informati...
Security software that blocks unauthorized access to your computer or network. Like a security guard for your digital data.
Example: A firewall prevents malicious software from connecting to your computer from the internet....
AWS service that records all API calls made in your account for security and compliance. Like a detailed security log that tracks who did what and when.
Example: Security teams use CloudTrail to investigate suspicious activity by seeing exactly which actions wer...
Identity and Access Management - AWS service that controls who can access what resources. Like a bouncer at a club who checks IDs and decides who can enter which areas.
Example: IAM policies ensure that developers can only access development resources, not production databases....
Microsoft's identity and access management service. Like a master key system for all your digital doors - one login for everything.
Example: Employees use their Active Directory credentials to access email, file shares, and business applicat...
Azure service for securely storing and managing sensitive information like passwords, certificates, and encryption keys. Like a bank safety deposit box for your digital secrets.
Example: Applications retrieve database passwords from Key Vault instead of storing them in code files....
Secure Sockets Layer - security protocol that encrypts data between web browsers and servers. Like sending mail in a locked box that only the recipient can open.
Example: Online banking websites use SSL certificates to encrypt your login information and transaction detai...
Transport Layer Security - the newer, more secure version of SSL for encrypting internet communications. Like an upgraded lock system that's harder to break.
Example: Modern websites use TLS 1.3 to ensure all data between your browser and the website is encrypted and...
Hypertext Transfer Protocol Secure - the secure version of HTTP that uses SSL/TLS encryption. Like regular mail vs. certified mail - HTTPS ensures your data can't be read by others.
Example: When you see the padlock icon in your browser, it means the website is using HTTPS to protect your i...
Virtual Private Network - creates a secure connection over the internet between your device and a private network. Like having a private tunnel through a public highway.
Example: Remote employees use VPN to securely access company files and systems as if they were in the office....
Secure File Transfer Protocol - encrypted version of FTP for secure file transfers. Like FTP but with all packages sent in locked boxes.
Example: Companies use SFTP to securely transfer sensitive financial data between systems without risk of int...
Open Authorization - standard for secure API access without sharing passwords. Like giving a valet key that only works for parking, not accessing your glove compartment.
Example: When you log into Spotify using your Facebook account, OAuth allows Spotify access without seeing yo...
JSON Web Token - secure way to transmit information between parties as digitally signed tokens. Like having a tamper-proof ID card that proves who you are.
Example: Web applications use JWT tokens to verify user identity without repeatedly asking for passwords....
Single Sign-On - authentication system that allows users to log in once and access multiple applications. Like having a master key for all doors in a building.
Example: Google SSO lets you access Gmail, Drive, and YouTube with one login instead of separate passwords fo...
Security Assertion Markup Language - standard for exchanging authentication data between systems. Like having a standardized passport format recognized by all countries.
Example: Enterprise employees use SAML to access both internal company systems and external partner applicati...
Multi-Factor Authentication - security method requiring two or more verification methods. Like needing both a key and fingerprint to open a safe.
Example: Online banking uses MFA by requiring both your password and a text message code to log in....
Two-Factor Authentication - security process requiring two different authentication methods. Like needing both an ID and a secret handshake to enter a club.
Example: Gmail 2FA requires your password plus a code from your phone to sign in from new devices....
Web Application Firewall - security system that filters HTTP traffic to web applications. Like having a security guard that checks everyone entering a building and blocks suspicious visitors.
Example: E-commerce websites use WAF to block SQL injection attacks and other malicious web traffic automatic...
Distributed Denial of Service - attack that overwhelms a service with traffic from many sources. Like having thousands of people simultaneously calling a restaurant to prevent real customers from getting through.
Example: Online services use DDoS protection to stay available when attackers try to overwhelm their servers ...
General Data Protection Regulation - European law governing data protection and privacy. Like having strict rules about how companies can collect, store, and use personal information.
Example: Websites now ask for cookie consent and provide data deletion options to comply with GDPR requiremen...
Health Insurance Portability and Accountability Act - US law protecting medical information privacy. Like having special locks on medical records to ensure patient privacy.
Example: Healthcare applications must implement HIPAA-compliant security measures to protect patient data in ...
Service Organization Control 2 - auditing standard for security, availability, and confidentiality of customer data. Like having a security inspection certificate for cloud services.
Example: Cloud providers obtain SOC 2 compliance to prove they meet industry security standards for handling ...
Authorized simulated attack on a system to find security vulnerabilities. Like hiring friendly burglars to test your security system and find weaknesses.
Example: Companies hire ethical hackers to perform penetration testing on their web applications before going...
Cross-Origin Resource Sharing - mechanism that allows web pages to access resources from other domains. Like having permission slips that allow websites to share resources safely.
Example: Web applications configure CORS to allow their frontend to communicate with APIs hosted on different...
Cross-Site Request Forgery - attack that tricks users into performing unwanted actions on websites. Like someone forging your signature on documents without your knowledge.
Example: Banking websites implement CSRF protection to prevent malicious sites from making unauthorized trans...
Cross-Site Scripting - vulnerability where malicious scripts are injected into trusted websites. Like someone putting fake signs in a store to mislead customers.
Example: Web developers sanitize user inputs to prevent XSS attacks that could steal user credentials or pers...
AWS service for securely storing and managing configuration data and secrets. Like a secure vault specifically designed for application settings and passwords.
Example: Applications retrieve database connection strings from Parameter Store instead of hardcoding them in...
AWS service for managing, retrieving, and rotating database credentials, API keys, and other secrets. Like having an automated security system that changes locks regularly.
Example: Production applications use Secrets Manager to automatically rotate database passwords without downt...
Google Cloud security service that provides DDoS protection and web application firewall. Like having a digital security guard that protects your applications from attacks.
Example: E-commerce websites use Cloud Armor to protect against DDoS attacks during high-traffic sales events...
Protecting stored data by encrypting it while it sits on storage devices. Like keeping sensitive documents in a locked safe when they're not being used.
Example: Healthcare organizations use encryption at rest to protect patient data stored in databases and back...
Protecting data while it's being transmitted between systems or locations. Like sending sensitive mail in armored vehicles instead of regular postal trucks.
Example: Online banking uses encryption in transit to protect financial data as it travels between customer b...
AWS intelligent threat detection service that continuously monitors for malicious activity. Like having a 24/7 security guard that never sleeps and recognizes suspicious behavior.
Example: Companies use GuardDuty to automatically detect cryptocurrency mining attacks and unauthorized acces...
AWS unified security dashboard that aggregates security alerts from multiple services. Like having a central command center that shows all security issues in one place.
Example: Security teams use Security Hub to get a complete view of their security posture across all AWS serv...
Security service that protects web applications from common attacks like SQL injection, cross-site scripting, and other web-based threats.
Example: Web Application Firewall automatically blocks malicious requests trying to hack your e-commerce webs...
Secure service for creating, storing, and managing cryptographic keys used to encrypt and decrypt data in cloud applications.
Example: Key Management Service handles all the encryption keys for your application so you don't have to wor...
Secure storage and automatic rotation of sensitive information like passwords, API keys, certificates, and tokens used by applications.
Example: Secrets Management automatically rotates your database passwords every 30 days and updates all appli...
Protection measures and technologies used to keep data and applications safe when stored or processed in the cloud. Like having professional security guards for your digital belongings.
Example: Cloud security includes encryption to protect your files and authentication to ensure only you can a...
Secure Sockets Layer/Transport Layer Security - encryption protocols that secure data transmitted over the internet. Like putting your messages in a locked box before sending them through the mail.
Example: When you see 'https://' and a padlock in your browser, SSL/TLS is encrypting your connection to prot...
Role-Based Access Control - security approach that assigns permissions based on job roles rather than individual users. Like giving all managers the same key instead of customizing access for each person.
Example: Instead of setting permissions for each developer individually, RBAC assigns all developers to a 'De...
Meeting regulatory and industry standards for data security, privacy, and business practices. Like following building codes and safety regulations when constructing a building.
Example: Healthcare companies must maintain HIPAA compliance when storing patient data, ensuring proper encry...
Security model that requires verification for every access request, regardless of location. Like requiring ID checks every time someone enters a building, even if they work there.
Example: With Zero Trust, even employees inside the company network must authenticate and prove authorization...