Cloud 101CircleEventsBlog
Register for CSA’s free Virtual Cloud Trust Summit to tackle enterprise challenges in cloud assurance.

Cloud Security Terms You Need to Know

Cloud Security Terms You Need to Know

Blog Article Published: 06/04/2022

Written by Nicole Krenz, Web Marketing Specialist, CSA.


As more companies are migrating to the cloud, security must remain at the forefront of everyone’s minds. Regardless of your job title, industry, or technical knowledge, the topic of cloud security is necessary. Explore the following terms to stay up-to-date with and gain a baseline knowledge of the growing business of cloud security.

Cloud Computing

Cloud computing separates application and information resources from the underlying infrastructure used to deliver them. It describes the on-demand collection of services, applications, and information from network and storage resources. With cloud, organizations can move faster, reduce downtime, and save money.

Digital Transformation

Digital transformation is the process of adopting new digital technologies and business models, such as cloud computing, with the goal of improving revenue, efficiency, or other business objectives.

Cloud Migration

Cloud migration describes the movement of applications and infrastructure from a physical data center to that of public and private clouds.

Zero Trust

In a Zero Trust network, users aren’t allowed access to anything until they authenticate who they are. This security architecture withholds access until a user or device has been thoroughly inspected and authenticated. The least amount of access is granted and there is continuous monitoring of suspicious activity.

Serverless

An execution model for the cloud that gives users/developers the ability to build and run applications and services without thinking about servers. Serverless applications are built faster, launched only as needed, and the management of the infrastructure is no longer required.

DevSecOps

Short for development, security, and operations, a DevSecOps model automates the integration of security at every phase of the software development lifecycle, from initial design through integration, testing, deployment, and software delivery.

Ransomware

Ransomware is a form of malware used by an attacker to encrypt a victim’s data and demand a ransom for the encryption key, which allows the victim access to their data. It is typically delivered through exploits, associated with website advertisements containing malware, or through phishing campaigns

Phishing

A type of attack in which a message is sent from a malicious party disguised as a trusted source. Phishing has the intention of fooling the recipient into giving up credentials, money, or confidential data.

Quantum Computing

An area of quantum mechanics focused on developing computer technology based on quantum theory to deliver a huge leap forward in computation to solve complex problems.

Threat Modeling

To identify threats and preventative measures for a system or application. Clout threat modeling expands on standard threat modeling practices to account for unique cloud services and an application’s qualities and consideration.

Data Loss Prevention (DLP)

A type of security that prevents sensitive data from being shared outside the organization or to unauthorized individuals within the organization. DLP is usually done through policies that encrypt data or control sharing settings.

Share this content on your favorite social network today!