Investigation Playbook
Read-only Credentials
IAM Principal
Common Vulnerabilities and Exposures (CVE)
Inventory Report
Security Tooling Account
Gap Analysis
Single Sign-On (SSO)
Security Assertion Markup Language (SAML)
Confused Deputy Problem
Security Posture
Break Glass User
Local Individual User
Prompt Incident Response
Policy as Code
Virtual Security Appliance
Forensic Logging
Message Replay
Forward Secrecy
DDoS Attack Layers: An Overview with Examples