SecuritySecurity PoliciesInformation Security PolicyInformation Security PolicyCompany-wide information security policies and requirements.FavoriteCopy Link📘Confluence1 min readUpdated Jan 13145 viewssecuritypolicyContentAI InsightsCommentsOriginalDiscuss AIInformation Security PolicyGlossaryAI DetectedTechnical terms found in this documentAllTechnicalBusinessAcronymConceptAPIacronymApplication Programming Interface - a set of protocols and tools for building software applications that specify how software components should interact.RESTtechnicalRepresentational State Transfer - an architectural style for designing networked applications using stateless communication protocols, typically HTTP.EndpointtechnicalA specific URL where an API can be accessed. Each endpoint represents a different function or resource in the API.AuthenticationconceptThe process of verifying the identity of a user, device, or system. It answers the question 'Who are you?'AuthorizationconceptThe process of determining what actions an authenticated user is allowed to perform. It answers the question 'What can you do?'JWTacronymJSON Web Token - a compact, URL-safe means of representing claims between two parties, commonly used for authentication.RBACacronymRole-Based Access Control - a method of restricting system access based on the roles of individual users.MicroservicesconceptAn architectural approach where an application is built as a collection of small, independent services that communicate over a network.CI/CDacronymContinuous Integration/Continuous Deployment - practices that enable development teams to deliver code changes more frequently and reliably.LatencytechnicalThe time delay between a request being sent and the response being received. Lower latency means faster response times.ThroughputtechnicalThe amount of data or number of requests that can be processed in a given time period.SLAbusinessService Level Agreement - a commitment between a service provider and client that defines the expected level of service.12 terms found • AI-detected from document contentRelated Documents1 related documentSOC 2 Compliance GuideOverview of our SOC 2 compliance status and requirements.📘ConfluenceJan 12