Identity typesAWS Document DB User
An AWS Document DB user is an identity granted access to resources and services within an Amazon Web Services (AWS) DocumentDB...
Read more
Identity typesAWS RDS User
An AWS RDS user is an identity granted access to resources and services within an Amazon Web Services (AWS) Relational Database Service...
Read more
Identity typesApplication
An application is a software program or set of software components designed to perform specific tasks or functions to meet...
Read more
IAM ConceptsAttestation
Access attestation, also known as access recertification or entitle review, enables you to review and validate the access privileges...
Read more
Identity typesBreak Glass Account
A break glass account is a special user account or emergency access mechanism used to gain privileged access to critical systems...
Read more
IAM ConceptsConditional Access
Conditional access is a security feature that controls access to resources based on specific conditions or criteria, such as...
Read more
Identity typesExternal Account
An external account refers to a user account or identity managed by an external identity provider (IdP) or authentication...
Read more
VendorGCP Secret Vault
The Google Cloud Secrets Engine automates the generation of service account keys and OAuth tokens, aligning with...
Read more
VendorHashiCorp Vault
HashiCorp Vault is a popular open-source tool for managing secrets, encryption keys, and...
Read more
Identity typesHuman Identity
Human identity refers to the unique characteristics, attributes, or identifiers associated with individual users or persons within...
Read more
IAM ConceptsIAM
Identity and Access Management (IAM) is a framework or system used to manage digital identities, authentication, and access controls...
Read more
Identity typesIAM User
An IAM (Identity and Access Management) user is an individual or entity granted access to resources and services within an IAM system or...
Read more
IAM ConceptsIDP
IDP stands for Identity Provider, a service or system responsible for authenticating and verifying the identities of users or entities...
Read more
Identity typesKMS Key
A Key Management Service (KMS) key is a cryptographic key used for encryption, decryption, and access management of data, usually for...
Read more
IAM ConceptsMFA
Multi-Factor Authentication (MFA) is a security mechanism that requires users to provide two or more forms of...
Read more
Identity typesMSA Key
MSA is the consumer side of Microsoft that powers authentication for all consumer based platforms...
Read more
Identity typesNHI
NHI stands for Non Human Identity. A Non-Human Identity (NHI) is a digital construct used for machine-to-machine access and authentication.
Read more
IAM ConceptsOffboarded Employee
An offboarded employee is a former employee or staff member who has left the organization or terminated their employment. Offboarding...
Read more
VendorOkta Application
Okta is a platform for identity and access management that offers secure identity verification, single sign-on (SSO), and...
Read more
RegulationPCI 4.0
PCI 4.0 refers to the Payment Card Industry Data Security Standard (PCI DSS) version 4.0, a set of...
Read more
VendorParameter Store
AWS Systems Manager Parameter Store offers a secure way to store and manage configuration data and...
Read more
IAM ConceptsRBAC Role-Based Access Control
Role-Based Access Control (RBAC) is a method of managing access to resources in a system based on the roles assigned to individual users...
Read more
Identity typesRole
A role defines a set of permissions and access rights granted to users, groups, or service principals within a system or...
Read more
Identity typesSAS Token
A Shared Access Signature (SAS) token is a security token that provides limited access rights to specific...
Read more
IAM ConceptsSSO
Single Sign-On (SSO) is an authentication mechanism that allows users to access multiple applications or services with...
Read more
Identity typesSecret Manager Secret
A secret manager secret is a confidential piece of information, such as a password, API token, or database connection string, stored...
Read more
IAM ConceptsSecret Sprawl
Secret sprawl refers to the uncontrolled proliferation or accumulation of secrets, credentials, or sensitive information across an...
Read more
Identity typesSecure Parameter
A secure parameter is a configurable value or setting used in an application, service, or system that has been designed and implemented...
Read more
Identity typesService Account
A service account is a type of account used by services, applications, or automated processes to access resources or perform specific...
Read more
Identity typesService Principal
A service principal is an identity used by a service or application to authenticate and access resources in a secure and controlled...
Read more
IAM ConceptsVault
A vault is a secure repository used to store sensitive information, such as passwords, cryptographic keys, certificates...
Read more
Identity typesVault Certificate
A vault certificate is a digital certificate stored securely within a vault or cryptographic system. Vault certificates are used for...
Read more
Identity typesVault Key
A vault key is a cryptographic key stored securely within a vault for encryption, decryption, or authentication purposes. Vault keys are...
Read more