This glossary covers essential cybersecurity and password management terminology from password policies and zero-knowledge encryption to RBAC, API authentication, and compliance frameworks like GDPR and SOC 2.
Access token — a temporary credential that grants authenticated users or applications permission to access protected resources without repeatedly entering credentials. Access tokens are issued by authentication servers following successful login, typically using protocols like OAuth 2.0 or JWT (JSON Web Tokens). They contain encoded information about permissions, expiration time, and user identity.
API key — a unique alphanumeric identifier used to authenticate and authorize applications or users accessing an API. API keys serve as simple authentication tokens that identify the calling program, control access permissions, track usage quotas, and monitor API consumption. While convenient for development, API keys require proper secrets management since they grant direct access to services and data.
Application secrets — confidential credentials and sensitive data that applications require to function: database passwords, API keys, OAuth tokens, encryption keys, and third-party service credentials. Application secrets must be protected from exposure in source code, configuration files, container images, and logs. Modern DevSecOps practices mandate storing application secrets in dedicated secrets management systems rather than hardcoding them.
Certificate management — the certificate management encompasses the complete lifecycle of digital certificates used for SSL/TLS encryption, code signing, and authentication: provisioning, installation, renewal, monitoring, and revocation. Poor certificate management leads to expired certificates causing outages, security vulnerabilities, and compliance violations. Modern certificate management solutions automate discovery of certificates across infrastructure, alert before expiration, handle automated renewal through protocols like ACME, and maintain certificate inventories.
CI/CD Integration — the process of connecting secrets management systems with continuous integration and continuous deployment pipelines to enable secure credential delivery without hardcoding secrets in build configurations or scripts. Modern CI/CD platforms (Jenkins, GitLab CI, GitHub Actions, CircleCI) integrate with secrets managers to fetch credentials at build time. Secure CI/CD secrets management includes storing secrets in dedicated vaults, using short-lived credentials, restricting access by pipeline and environment, masking secrets in logs, and rotating credentials regularly.
Configuration management — a systematic approach to defining, deploying, and maintaining consistent system and application settings across environments. Configuration management encompasses infrastructure configurations, application parameters, feature flags, and secrets. Tools like Ansible, Puppet, Chef, and Terraform enable infrastructure as code (IaC) and configuration automation. Effective configuration management separates secrets from non-sensitive configurations, uses version control for tracking changes, implements environment-specific configurations, and integrates with secrets management platforms.
Database credentials — authentication information required to connect to database systems: usernames, passwords, connection strings, and certificates. Database credentials represent high-value targets since they provide direct access to sensitive data. Compromised database credentials enable data breaches, ransomware attacks, and compliance violations. Secure database credential management includes storing credentials in secrets vaults, implementing automated rotation, using dynamic database credentials when possible, enforcing strong authentication, restricting network access, and monitoring credential usage.
Dynamic secrets — credentials generated on-demand with limited lifespans, automatically created when requested and revoked after use or expiration. Unlike static secrets that exist indefinitely, dynamic secrets provide enhanced security by minimizing exposure windows and eliminating long-lived credentials. Secrets management platforms like HashiCorp Vault generate dynamic database credentials, cloud IAM credentials, and SSH certificates programmatically.
Hardcoded secrets — credentials embedded directly in application source code, configuration files, or scripts — a critical security vulnerability. Hardcoded secrets in repositories become exposed when code is shared, committed to public GitHub repositories, or accessed by unauthorized personnel. Attackers actively scan public repositories for hardcoded API keys, passwords, and tokens.
Infrastructure as Code (IaC) — the practice of managing and provisioning infrastructure through machine-readable definition files rather than manual configuration. IaC tools like Terraform, CloudFormation, and Pulumi enable version-controlled, repeatable infrastructure deployment. IaC presents secrets management challenges since infrastructure code often requires credentials for cloud providers, databases, and services.
Key management system (KMS) — a centralized platform for creating, storing, distributing, rotating, and retiring cryptographic keys throughout their lifecycle. KMS solutions provide secure key generation using hardware random number generators, encrypted storage often using HSMs, access controls, audit logging, and automated rotation.
Management key — the root cryptographic key used to encrypt and decrypt other keys and secrets within a secrets management system. Management keys represent the highest security tier since compromise exposes all protected secrets. Organizations protect management keys through hardware security modules (HSMs), key splitting across multiple custodians, strict access controls, and air-gapped storage.
Secrets discovery — an automated process of scanning codebases, repositories, configuration files, containers, and infrastructure to identify exposed credentials, API keys, and sensitive data. Secrets discovery tools detect hardcoded passwords, committed API keys, embedded certificates, and other credential leaks that create security vulnerabilities. Organizations use secrets discovery during security assessments, before migrating to secrets management platforms, and continuously in CI/CD pipelines to prevent credential commits.
Secrets expiration — a policy that enforces automatic invalidation of credentials after a predetermined time period, requiring renewal or rotation Expiration reduces security risks by limiting the useful lifetime of compromised credentials and forcing regular updates. Secrets management systems set expiration policies based on sensitivity—highly privileged credentials may expire within hours while less critical secrets last months.
Secrets governance — the framework that establishes policies, procedures, and controls for managing organizational credentials to ensure security, compliance, and operational consistency. Governance frameworks define who can create, access, modify, and delete secrets; rotation requirements; approval workflows; audit procedures; and compliance mappings. Effective secrets governance includes role-based access controls, separation of duties, regular access reviews, compliance reporting, and incident response procedures.
Secrets injection — the secure delivery of credentials and sensitive data to applications at runtime without storing them in code, configuration files, or container images. Modern secrets injection methods include environment variables populated from secrets managers, mounted volumes containing credentials, init containers that fetch secrets, and sidecar patterns. Secrets injection prevents hardcoded credentials, reduces secrets sprawl, and enables centralized management.
Secrets lifecycle — the process that encompasses all stages of credential existence: creation/generation, secure storage, distribution to authorized systems, active usage, rotation/renewal, revocation when compromised, and final deletion. Each lifecycle stage presents security considerations—creation requires strong randomness, storage demands encryption, distribution needs secure channels, and deletion must be complete.
Secrets management — the practice of securely storing, distributing, controlling, and auditing sensitive authentication data like passwords, API keys, certificates, and encryption keys. Modern secrets management solutions provide centralized vaults, automated rotation, access controls, and audit trails to prevent data breaches. Organizations use secrets management tools to eliminate hardcoded credentials, reduce secrets sprawl, and ensure compliance with security standards like SOC 2, GDPR, and PCI DSS.
Secrets rotation — an automated process of regularly changing passwords, API keys, certificates, and other credentials to minimize security risks from compromised secrets. Regular rotation limits the window of opportunity for attackers using stolen credentials and ensures compliance with security policies and regulations. Modern secrets management platforms automate rotation by generating new credentials, updating dependent systems, and retiring old secrets without service disruption.
Secrets sprawl — a secrets sprawl occurs when credentials, API keys, and sensitive data proliferate uncontrollably across repositories, configuration files, containers, CI/CD systems, and cloud environments. Secrets sprawl creates significant security risks: hardcoded credentials in source code, duplicate secrets across systems, unknown or forgotten credentials, and difficulty tracking access.
Secrets vault — a centralized, encrypted repository designed specifically for storing and managing sensitive credentials, API keys, certificates, and other confidential data. Secrets vaults provide enterprise-grade security through encryption at rest and in transit, role-based access controls (RBAC), detailed audit logging, and secrets versioning.
Secrets versioning — the practice of maintaining a complete history of changes to credentials, enabling rollback to previous versions, audit trails, and change tracking. When secrets rotate or get updated, versioning preserves old values temporarily to support graceful transitions and troubleshooting. Secrets versioning helps organizations meet compliance requirements by documenting who changed secrets, when modifications occurred, and why updates happened.
Service account — a service account is a non-human identity used by applications, services, and automated processes to authenticate and access resources programmatically. Unlike user accounts, service accounts enable machine-to-machine authentication for CI/CD pipelines, microservices, scheduled jobs, and infrastructure automation. Service accounts require careful secrets management since their credentials provide programmatic access to sensitive systems and data.
SSH key — a cryptographic key pair (public and private) used for secure authentication when connecting to remote servers via Secure Shell (SSH) protocol. SSH keys provide stronger security than password-based authentication by using asymmetric encryption. The private key remains on the user's machine while the public key is stored on target servers. SSH keys enable passwordless authentication for system administrators, developers, and automated processes accessing Linux servers, cloud infrastructure, and Git repositories.