Security-Architecture
Authentication vs Authorization — Verifying Identity vs Granting Access
Authentication and Authorization are distinct security concepts: authentication verifies identity, while authorization determines access rights. This SECMONS glossary entry explains the difference, common implementation flaws, and how misconfigurations lead to security incidents.
Zero Trust — Security Model Based on Continuous Verification and Least Privilege
Zero Trust is a security model that assumes no user, device, or system is inherently trusted, even inside the network perimeter. This SECMONS glossary entry explains Zero Trust principles, architectural components, and how it reduces attack surface and lateral movement risk.