These technologies or methodologies plays a role in securing applications, data, and systems, helping to prevent unauthorized access, data breaches, and attacks.

- Access Control
Access Control refers to the policies and mechanisms used to manage and restrict access to systems, resources, or data. It ensures that only authorized users or systems can access sensitive information. Common models include Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC).
- WAF (Web Application Firewall)
A WAF is a security system that filters and monitors HTTP/HTTPS traffic between a web application and the internet. It protects against common web application attacks, such as SQL injection, cross-site scripting (XSS), and cross-site request forgery (CSRF), by analyzing and blocking malicious requests before they reach the web server.
- Data Access Control
Data Access Control involves mechanisms to restrict access to data based on policies. It ensures that only authorized users or systems can access, modify, or delete sensitive data, and helps prevent data breaches and unauthorized access.
- Runtime Application Self-Protection (RASP)
RASP is a security technology that is integrated into an application to monitor and protect it during runtime. It can detect and block attacks in real time by analyzing both the application’s behavior and the environment. RASP helps secure applications by mitigating threats as they occur.
- API Security
API Security refers to the practices and technologies used to protect APIs (Application Programming Interfaces) from threats like unauthorized access, data breaches, and denial of service attacks. It involves securing communication channels, ensuring proper authentication and authorization, and protecting data integrity.
- SAST (Static Application Security Testing)
SAST is a security testing method that analyzes an application’s source code, bytecode, or binary code to identify vulnerabilities before the software is run. It is usually done during the development phase and helps developers find security flaws early in the lifecycle.
- DAST (Dynamic Application Security Testing)
DAST involves testing a running application to identify vulnerabilities that might be exploited while the application is in operation. It simulates external attacks to evaluate how well the application behaves under various threat scenarios. DAST is usually performed during the testing phase after the app is deployed.
- User Behavior Analytics (UBA)
UBA uses machine learning and data analysis to monitor and detect abnormal user behavior that may indicate a security threat, such as an insider attack or compromised account. By analyzing patterns, UBA helps identify potential risks and enforce security measures proactively.
- Security Analytics
Security Analytics involves the use of advanced analytics to collect, process, and analyze security-related data to identify threats and vulnerabilities. By integrating data from various sources, such as firewalls, intrusion detection systems, and logs, security analytics helps organizations detect and respond to potential security incidents in real time..
- API Key Management
API Key Management refers to the practice of generating, distributing, and controlling API keys used for authentication and authorization between systems. Proper management ensures that keys are securely stored, rotated, and revoked to prevent unauthorized access to APIs and associated services.
- Public API
A Public API is an application programming interface that is openly available for developers to use and integrate with external systems or services. Public APIs are typically designed to be used by third-party developers and are made publicly accessible, with security measures in place to control and monitor access.
- Internal API Communication
Internal API Communication refers to APIs used within an organization or system to enable different components or services to interact with each other. These APIs are typically not exposed to the outside world and focus on internal processes, but they still require strong security measures to protect sensitive data and ensure proper access control.