Tools, technologies and technical solutions for information protection and security.
π‘οΈ Perimeter Security
Firewall
Perimeter security devices
WAF (Web Application Firewall)
Web application firewall
VPN
Virtual private network
π Monitoring and Detection
SIEM (Security Information and Event Management)
Security information and event management
SOAR (Security Orchestration, Automation and Response)
Security orchestration, automation and response
EDR (Endpoint Detection and Response)
Endpoint detection and response
XDR (Extended Detection and Response)
Extended detection and response
π Identity Management
Active Directory
Microsoft directory service
UBA (User Behavior Analytics)
User behavior analytics
DAC (Discretionary Access Control)
Discretionary access control
π³ Containers and Cloud
Container Management
Container management
Cloud Security
Cloud security
CSPM (Cloud Security Posture Management)
Cloud security posture management
π§ Development Tools
DevOps
Development and operations
SecOps
Security and operations
SDLC (Software Development Life Cycle)
Software development life cycle
IAC (Infrastructure as Code)
Infrastructure as code
π Vulnerability Assessment
Nessus
Vulnerability scanner
Metasploit
Exploitation framework
Vulnerability Assessment
Vulnerability assessment
Nmap
Network scanner
π Monitoring and Observability
Dashboards
Control panels and visualization
Logs
Log and record management
Google Analytics
Web analytics
π Related Concepts
- Zero Trust - Model implemented by these technologies
- Defense in Depth - Strategy that uses these tools
- Security by Design - Principle applied in development
- Monitoring and Review - Process supported by these technologies
- Metrics and KPIs - Measurement through these tools
- TLS/SSL - Security protocol
- PKI - Key infrastructure
- Docker - Containerization
- AWS S3 - Cloud storage
- CISO - Role that oversees these technologies