Cloud 101CircleEventsBlog
Join us for Cybersecurity Awareness Month! Strengthen your cyber resilience with essential security tips and resources for everyone.

Download Publication

CSA Data Security Glossary
CSA Data Security Glossary
Who it's for:
All cybersecurity professionals

CSA Data Security Glossary

Release Date: 01/22/2024

This CSA Data Security Glossary identifies and defines 127 terms relevant to data security. Based on the CSA Cloud Security Glossary, NIST Glossary, and other public sources, this compilation of data security terms serves as a foundational reference for both cybersecurity professionals and future CSA Data Security Working Group publications.

Key terms defined include: application monitoring, authentication, authorization, big data, BCDR, CASB, data, data architecture, data breach, data discovery, data governance, data integrity, data life cycle management, data loss prevention, data provenance, data retention, data sovereignty, decryption, encryption, GDPR, metadata, password management, PII.


Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
Zero Trust Guiding Principles v1.1
Zero Trust Guiding Principles v1.1
Strengthening Research Integrity with High-Performance Computing (HPC) Security
Strengthening Research Integrity with High-Perf...
Top Threats to Cloud Computing 2024
Top Threats to Cloud Computing 2024
Cybersecurity Risk Mitigation Recommendations for 2024-2025
Cybersecurity Risk Mitigation Recommendations for 2024-2025
Published: 10/08/2024
Why You Should Have a Whistleblower Policy for AI
Why You Should Have a Whistleblower Policy for AI
Published: 10/07/2024
Reflections on NIST Symposium in September 2024, Part 1
Reflections on NIST Symposium in September 2024, Part 1
Published: 10/04/2024
How to Maximize Alignment Between Security and Compliance Teams
How to Maximize Alignment Between Security and Compliance Teams
Published: 10/04/2024
Cyber Attacks: It's not if, It's when! Why aren't we prepared?
Cyber Attacks: It's not if, It's when! Why aren't we prepared?
October 10 | Online

Acknowledgements

Oliver Forbes Headshot Missing
Oliver Forbes

Oliver Forbes

Parth Jamodkar Headshot Missing
Parth Jamodkar

Parth Jamodkar

Alex Kaluza
Alex Kaluza
Research Analyst, CSA

Alex Kaluza

Research Analyst, CSA

Michael Roza
Michael Roza
Risk, Audit, Control and Compliance Professional

Michael Roza

Risk, Audit, Control and Compliance Professional

Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...

Read more

Rocco Alfonzetti Headshot Missing
Rocco Alfonzetti

Rocco Alfonzetti

Paola Cardenas Headshot Missing
Paola Cardenas

Paola Cardenas

Sanjeewa Fernando Headshot Missing
Sanjeewa Fernando

Sanjeewa Fernando

Onyeka Illoh Headshot Missing
Onyeka Illoh

Onyeka Illoh

Pan Maszyna Headshot Missing
Pan Maszyna

Pan Maszyna

Are you a research volunteer? Request to have your profile displayed on the website here.

Related Certificates & Training