Security glossary

Plain-English definitions of every security term you will hit. Each entry links to the guides, CVEs, and tools that are most relevant.

authz

Broken Object-Level Authorization (BOLA)

A vulnerability where an API exposes an object by its identifier without verifying that the requesting user is authorized to access that specific object.

Insecure Direct Object Reference (IDOR)

A classic authorization bug where internal object identifiers are exposed client-side and used without ownership verification.

Row-Level Security (RLS)

A PostgreSQL feature (used heavily by Supabase) that restricts which rows a database user can read or write via policies attached to tables.

Cross-Site Request Forgery (CSRF)

An attack where a malicious site triggers a state-changing request against your app while your user is logged in, using the user's cookies.

JSON Web Token (JWT)

A compact, URL-safe token format for transmitting claims between parties, cryptographically signed by the issuer.

OAuth

An open standard for delegated authorization — letting an app access a resource on behalf of a user without sharing the user's password.

Multi-Factor Authentication (MFA)

An authentication method that requires two or more verification factors — something you know, something you have, or something you are.

Proof Key for Code Exchange (PKCE)

An extension to OAuth 2.0 Authorization Code flow that protects against code interception for public clients (SPAs, mobile apps).

Principle of Least Privilege (PoLP)

A principle stating that every user, process, or system should have only the minimum permissions required to perform its function.

Web Authentication (WebAuthn)

A W3C standard for strong, phishing-resistant authentication using public-key cryptography tied to the user's device or security key.

Passkey

A passwordless credential built on WebAuthn that syncs across the user's devices via iCloud Keychain, Google Password Manager, or a password manager.

Role-Based Access Control (RBAC)

An authorization model where users are assigned roles, and roles are granted permissions.

input

network

crypto

secrets

supply-chain

ai

infra

Common Vulnerabilities and Exposures (CVE)

A globally-unique identifier for a specific disclosed software vulnerability.

Static Application Security Testing (SAST)

Security testing that analyzes source code or build artifacts without executing the code.

Dynamic Application Security Testing (DAST)

Security testing that runs against a deployed application, sending requests and observing responses.

Interactive Application Security Testing (IAST)

A hybrid testing approach that instruments a running application to observe security-relevant behavior during test execution.

SOC 2

A compliance framework developed by the AICPA for service organizations, focused on security, availability, processing integrity, confidentiality, and privacy.

Zero Trust

A security model where no request is trusted by default — every identity, device, and network path must be verified regardless of its origin.

Defense in Depth

A security strategy layering multiple independent controls so no single failure exposes the system.

Common Vulnerability Scoring System (CVSS)

A standard for rating the severity of software vulnerabilities on a 0.0 – 10.0 numeric scale.

Open Worldwide Application Security Project (OWASP)

A nonprofit that publishes open security resources, most famously the OWASP Top 10 and OWASP API Top 10 lists of most-common vulnerabilities.

National Institute of Standards and Technology (NIST)

US government agency that publishes many security standards: NIST 800-53 (controls), NIST CSF (framework), NVD (vulnerability database), PQC (post-quantum) standards.

Threat Modeling

A structured process to identify, enumerate, and prioritize the ways an attacker could compromise a system.

Penetration Testing (pentest)

An authorized simulated attack on a system to identify exploitable vulnerabilities — conducted by humans or autonomous tools.

Bug Bounty Program

A policy inviting security researchers to report vulnerabilities in exchange for recognition or monetary reward.

DevSecOps

The practice of integrating security into every stage of the DevOps lifecycle — from design to deployment to runtime.

Shift-Left Security

Moving security activities earlier in the development lifecycle — from post-deployment audits to pre-merge code review.