Download Publication
![CSA Data Security Glossary](https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MjYyNTYsInB1ciI6ImJsb2JfaWQifX0=--a34b4608cb746bfb59b875f0de7fb17d1ee3d76c/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJwbmciLCJyZXNpemVfdG9fbGltaXQiOlsyMjUsMzAwXX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--ed3d8b3503f8660626bf50138e90f4b6f3228621/Glossary%20of%20Data%20Security%20Terms%20Thumbnail.png)
Who it's for:
All cybersecurity professionals
CSA Data Security Glossary
Release Date: 01/22/2024
This CSA Data Security Glossary identifies and defines 127 terms relevant to data security. Based on the CSA Cloud Security Glossary, NIST Glossary, and other public sources, this compilation of data security terms serves as a foundational reference for both cybersecurity professionals and future CSA Data Security Working Group publications.
Key terms defined include: application monitoring, authentication, authorization, big data, BCDR, CASB, data, data architecture, data breach, data discovery, data governance, data integrity, data life cycle management, data loss prevention, data provenance, data retention, data sovereignty, decryption, encryption, GDPR, metadata, password management, PII.
Download this Resource
Prefer to access this resource without an account? Download it now.
Related Resources
Acknowledgements
![Oliver Forbes Headshot Missing](/assets/fallback/csa-headshot-7b449f5deff0b8be963d29536d108a63e2ef86ec765da989bb085a7d8c14217c.png)
Oliver Forbes
Oliver Forbes
![Parth Jamodkar Headshot Missing](/assets/fallback/csa-headshot-7b449f5deff0b8be963d29536d108a63e2ef86ec765da989bb085a7d8c14217c.png)
Parth Jamodkar
Parth Jamodkar
![Alex Kaluza](/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTAzNzgsInB1ciI6ImJsb2JfaWQifX0=--29d0715c70ce16ed673ec323908db39ae230f8f9/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMTgweDI0MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--ce1f0b273c14895214513c640abe6c284218f1db/alex_kaluza.jpg)
Alex Kaluza
Research Analyst, CSA
Alex Kaluza
Research Analyst, CSA
![Michael Roza](/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6Mzc3NCwicHVyIjoiYmxvYl9pZCJ9fQ==--2ee3c93fe3c1fbe44c00209688a02592cb8f251c/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMTgweDI0MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--ce1f0b273c14895214513c640abe6c284218f1db/roza.jpg)
Michael Roza
Risk, Control and Compliance Professional at EVC
Michael Roza
Risk, Control and Compliance Professional at EVC
Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...
![Rocco Alfonzetti Headshot Missing](/assets/fallback/csa-headshot-7b449f5deff0b8be963d29536d108a63e2ef86ec765da989bb085a7d8c14217c.png)
Rocco Alfonzetti
Rocco Alfonzetti
![Paola Cardenas Headshot Missing](/assets/fallback/csa-headshot-7b449f5deff0b8be963d29536d108a63e2ef86ec765da989bb085a7d8c14217c.png)
Paola Cardenas
Paola Cardenas
![Sanjeewa Fernando Headshot Missing](/assets/fallback/csa-headshot-7b449f5deff0b8be963d29536d108a63e2ef86ec765da989bb085a7d8c14217c.png)
Sanjeewa Fernando
Sanjeewa Fernando
![Onyeka Illoh Headshot Missing](/assets/fallback/csa-headshot-7b449f5deff0b8be963d29536d108a63e2ef86ec765da989bb085a7d8c14217c.png)
Onyeka Illoh
Onyeka Illoh
![Pan Maszyna Headshot Missing](/assets/fallback/csa-headshot-7b449f5deff0b8be963d29536d108a63e2ef86ec765da989bb085a7d8c14217c.png)
Pan Maszyna
Pan Maszyna
Are you a research volunteer? Request to have your profile displayed on the website here.