Server Security Glossary

Server security encompasses a specialized vocabulary drawn from networking standards, cryptographic frameworks, regulatory guidance, and operational practice. This glossary defines the core terms used across server hardening, access control, encryption, compliance, and incident response — providing precise definitions grounded in published standards from bodies including NIST, CIS, and IETF. Professionals navigating server security auditing and compliance or evaluating vendor capabilities benefit from a shared, standards-aligned terminology base.


Definition and scope

A server security glossary covers the technical and regulatory vocabulary specific to protecting server infrastructure — physical, virtual, and cloud-hosted — from unauthorized access, exploitation, and data loss. The scope spans operating-system-level controls, network perimeter mechanisms, cryptographic protocols, identity management, and compliance frameworks.

The NIST Computer Security Resource Center maintains the authoritative Computer Security Resource Center (CSRC) Glossary, which defines over 4,000 terms drawn from Federal Information Processing Standards (FIPS) publications, NIST Special Publications (SP), and Committee on National Security Systems (CNSS) Instruction 4009. Definitions below align with NIST CSRC, IETF RFCs, and CIS Benchmark terminology where those sources provide published definitions.

Scope boundaries: This glossary covers server-specific terminology. Network-layer terms (BGP, OSPF, MPLS) and endpoint-device terms appear only where they intersect directly with server security architecture — for example, where a term governs server network segmentation or DMZ architecture and server placement.


How it works

Glossary terms in server security are structured around 6 functional domains, each corresponding to a distinct protection layer:

  1. Identity and access — authentication, authorization, privilege, and credential management
  2. Cryptography and transport — encryption algorithms, key management, certificate infrastructure, and protocol configurations
  3. Threat detection and response — vulnerability classes, attack vectors, detection mechanisms, and incident handling
  4. Hardening and configuration — baseline standards, benchmarks, patch states, and configuration controls
  5. Compliance and audit — regulatory frameworks, control families, audit trails, and evidence requirements
  6. Architecture and segmentation — network zones, trust boundaries, virtualization layers, and container isolation

Terms within each domain are defined using the most specific authoritative source available — NIST SP 800-53 Rev 5 for control-related terms (NIST SP 800-53 Rev 5), FIPS 140-3 for cryptographic module terms (FIPS 140-3), and CIS Benchmarks for hardening-specific terminology (CIS Benchmarks).


Common scenarios

Authentication and access terms

Cryptography and transport terms

Threat and vulnerability terms

Hardening and compliance terms


Decision boundaries

Selecting the correct term — and the correct definition — depends on the regulatory and operational context in which the term is applied.

NIST vs. ISO 27001 terminology: NIST SP 800-53 uses "security controls" organized into 20 control families; ISO/IEC 27001:2022 uses "controls" within Annex A structured around 4 organizational themes. A "control" under NIST AC-6 (Least Privilege) maps conceptually but not textually to ISO 27001 Annex A control 8.2 (Privileged Access Rights). Practitioners working across both frameworks must resolve these terminological differences explicitly.

Authentication factors — NIST SP 800-63B classification: NIST SP 800-63B defines 3 authenticator types: something you know (memorized secret), something you have (physical or software token), and something you are (biometric). This 3-factor taxonomy differs from older 2-factor framings that collapse token and biometric categories.

Vulnerability vs. threat vs. risk: NIST defines these as distinct concepts. A vulnerability is a weakness in a system (NIST SP 800-30 Rev 1). A threat is any circumstance or event with the potential to exploit a vulnerability. Risk is the combination of likelihood and adverse impact. Conflating these 3 terms produces imprecise control mapping in risk assessments. See server security risk assessment.

Encryption at rest vs. in transit: Encryption at rest protects stored data using mechanisms such as AES-256 full-disk or volume encryption; encryption in transit protects data moving across network connections using protocols such as TLS 1.3. Compliance frameworks including HIPAA (45 CFR §164.312) and PCI DSS v4.0 (PCI Security Standards Council) treat these as distinct technical safeguard categories requiring separate implementation evidence.

Hardening benchmarks — CIS Level 1 vs. Level 2: CIS Benchmarks assign configurations to Level 1 (basic, broadly applicable, minimal operational impact) or Level 2 (defense-in-depth, higher security, potentially higher operational overhead). Applying Level 2 controls to production environments without operational review is a documented source of service disruption. See server hardening fundamentals and [CIS Benchmarks for servers](/cis-bench

Explore This Site