Glossary
Product-related terms
| Term | Description |
|---|---|
| Security365 | SOFTCAMP's integrated security service platform. It offers various security services such as SHIELDrive, SHIELD Gate, and Document Security. |
| Security365 Management Center | A dedicated platform for administrators to centrally manage Security365 services. Control users, groups, licenses, and policies from a single console. |
| SHIELDrive | Security365's cloud document security storage service. Provides file encryption storage and access control features. |
| SHIELD Gate | Security365's Remote Browser Isolation (RBI) based web security service. Protecting users from web threats. |
| Document Security | Security365's document encryption and access control service. Provides DRM-based document security. |
Account and Authentication Terms
| Term | Description |
|---|---|
| SSO (Single Sign-On) | Single sign-on. An authentication method that allows access to multiple Security365 services with a single login. |
| SAML (Security Assertion Markup Language) | Standard protocols for implementing SSO. Integrate authentication with the organization's IdP. |
| IdP (Identity Provider) | ID provider. A system responsible for user authentication in an SSO environment. When configuring SAML SSO, it is necessary to register the organization's IdP information. |
| SP (Service Provider) | Service Provider. A system that provides services in an SSO environment. Security365 acts as the SP. |
| OTP (One-Time Password) | One-time password. Used as an additional authentication method, verified with a time-based code generated by the authentication app. |
| MFA (Multi-Factor Authentication) | Multi-factor authentication. Strengthening security by requiring additional authentication methods such as OTP and email verification in addition to ID/password. |
| CSP Certification | Cloud service provider authentication. Login method using external accounts such as Microsoft, Google, etc. |
User Management Terms
| Term | Description |
|---|---|
| User | Members of the organization using the Security365 service. Registration and management in the management center. |
| Administrator | Users who have permission to access the Security365 management center and manage settings. |
| Super Administrator | An administrator with full permissions across the system. Can grant/revoke permissions for other administrators. At least 1 is required. |
| Editor Manager | Administrator who can view and edit all service menus. Administrator menu access not allowed. |
| Query Manager | An administrator who can only view all service menus. No modification rights. |
| Log Viewer Admin | Granted to administrators, such as audit personnel, who can only view the log menu. |
| Activate/Deactivate | Availability status of the user account. If deactivated, service access is not possible, and the license is automatically revoked. |
Group Management Terms
| Term | Description |
|---|---|
| Basic Group | A group created to reflect the organizational structure (departments, teams, etc.). Created through manual registration, CSV bulk registration, and synchronization. |
| Policy Group | A virtual group created separately for policy application. Members can be designated regardless of the organizational structure. |
| Condition-based group | A policy group where members are automatically set based on specific conditions (e.g., IDs starting with 'dev'). |
Policy-related terms
| Term | Description |
|---|---|
| Conditional Policy | A policy that dynamically controls service access based on conditions such as the user's IP, time, country, device, etc. |
| Condition items | Components of access conditions used in conditional policies. Location (IP), country, and time conditions can be registered. |
| Access Policy | Policies applied when conditions are met. Choose between Allow access, Block access, or Allow access + Additional authentication. |
| Priority | A value that determines the order of policy application. If a user is included in multiple policies, the policy with the highest priority is applied. |
| Zero Trust | "Do not trust blindly, always verify" is a security principle. Validate all access attempts and grant the minimum necessary permissions. |
Synchronization-related terms
| Term | Description |
|---|---|
| Inbound Provisioning | Process of importing user/group information from external systems (Microsoft 365, SCI Server) to Security365. |
| Full synchronization | The method for synchronizing all AD groups and user information in a Microsoft 365 tenant. |
| Designated Group Synchronization | A method to synchronize only specific AD groups and members selected by the administrator in Microsoft 365. |
| Automatic synchronization | Automatic synchronization that runs daily at the set time. Real-time reflection of personnel changes. |
| Manual synchronization | Synchronization performed by the administrator by clicking the execute button immediately. |
| AD (Active Directory) | Microsoft's directory service. It is used for managing user accounts and groups and can be integrated with Security365. |
| Azure AD | Microsoft's cloud-based ID management service. Currently renamed to Microsoft Entra ID. |
| SCI Server | Personnel Information Management Server used in SOFTCAMP's Document Security |
| Tenant | A unit that distinguishes organizations in cloud services. When synchronizing Microsoft 365, it is linked based on the tenant. |
License-related terms
| Term | Description |
|---|---|
| License | Permission for the user to use a specific Security365 service. Must be assigned to the user for service availability. |
| Plan | Security365 service subscription unit. The features and number of licenses available are determined by the plan. |
| Automatic License Assignment | A feature that automatically grants licenses when a user is activated. |
| Remaining licenses | The remaining quantity after excluding the allocated licenses from the total number of licenses. |
Security classification terminology
| Term | Description |
|---|---|
| Security Classification Label | A feature for systematically classifying the security level of data. A two-tier structure of grades and labels. |
| Grade | Top-level classification that distinguishes the security level of data. For example: Confidential, Sensitive, Public. Color coding by grade is possible. |
| Label | Subcategories of the grade. Detailed classification based on the nature or purpose of the data. Example: personnel information, customer information. |
Logging and Monitoring Terms
| Term | Description |
|---|---|
| log | Records of service usage activities by users and administrators. Connection date and time, IP, performed actions, etc. are recorded. |
| Log Backup | A feature to regularly save log data as archive files. Backup cycle and collection period can be set. |
| Archive file | A compressed file created during log backup. Contains log data for the configured collection period. |
| Master Log | Original log data before backup. It will be deleted after backup if the automatic deletion setting is enabled. |
| Log external transmission | Function to automatically transfer log backup files to an external server using SSH/SFTP method. |
Account Security Terms
| Term | Description |
|---|---|
| Password Policy | Security rules applied when creating and changing passwords. Settings for minimum length, character combinations, change frequency, etc. |
| Password reuse restriction | A feature that restricts the reuse of the last N passwords. |
| Account Lockout | A security feature that temporarily locks the account after multiple incorrect password entries. |
| Automatic Logout | A feature that automatically logs out if the service is not used for a set period of time. |
| Account Deactivation Period | Setting to automatically deactivate user accounts after a certain period of inactivity. |
Other Terms
| Term | Description |
|---|---|
| CSV (Comma-Separated Values) | Comma-separated values format file. Used for bulk registration of users and groups. |
| GNB (Global Navigation Bar) | Global navigation bar. The menu area displayed at the top of the service. |
| Favicon | A small icon image displayed on the browser tab. |
| Approval Service | A feature for centrally managing approval requests generated by the integration service. |
| On-Premise | A method of directly installing and operating on an internal server of the organization. It is contrasted with the cloud method. |