SPNT

Glossary

Key terms and concepts used throughout Serpentine documentation.

A

Asset Graph
A continuously updated representation of all security-relevant entities (devices, users, applications, data stores) and their relationships within an organization's environment.
Attack Path
A sequence of vulnerabilities, misconfigurations, or excessive permissions that an attacker could chain together to reach a target asset. Serpentine's Offense module identifies and validates these paths.

B

Blast Radius
The potential scope of damage if a specific vulnerability is exploited or control fails. Calculated by analyzing the asset graph to determine what an attacker could access from a compromised starting point.

C

Compliance Drift
The gradual degradation of security controls between audit periods. Traditional compliance is point-in-time; Serpentine provides continuous validation to prevent drift.
Continuous Validation
The practice of regularly testing security controls through automated offensive techniques, rather than relying on periodic assessments or assumed configurations.
Control
A security measure implemented to protect assets, enforce policies, or meet compliance requirements. Examples include firewall rules, access controls, encryption, and monitoring.
Control State Contradiction
A situation where a security control is documented or configured but doesn't function as intended. Example: a firewall rule that should block traffic but has an exception that permits it.

D

Decision Intelligence
Serpentine's capability to provide context-aware recommendations by analyzing the security graph, historical data, and organizational priorities to guide response actions.
Detection
The identification of security events, anomalies, or threats through monitoring, log analysis, and behavioral analysis. One of Serpentine's four core modules.
DORA
Digital Operational Resilience Act. EU regulation establishing requirements for ICT risk management, incident reporting, resilience testing, and third-party risk management for financial entities.

E

Evidence
Artifacts that demonstrate a security control's existence and effectiveness. In Serpentine, evidence is collected automatically and linked to compliance requirements in the security graph.

G

Governance
The framework of policies, procedures, and controls that guide security decisions and ensure compliance. One of Serpentine's four core modules.
Graph-Based Security
An architectural approach where security data is stored as interconnected nodes and relationships rather than isolated records, enabling complex queries about how entities relate to each other.

H

Hardening
The process of reducing attack surface by applying security configurations, removing unnecessary services, and implementing defensive measures. One of Serpentine's four core modules.

N

NIS2
Network and Information Security Directive 2. EU directive expanding cybersecurity requirements to more sectors and introducing stricter supervisory measures and enforcement.

O

Offense
The practice of testing security controls through controlled attack simulations. One of Serpentine's four core modules, providing continuous validation of defensive measures.
OSINT
Open Source Intelligence. Information gathered from publicly available sources to assess external attack surface, leaked credentials, or threat actor activity.

P

Policy-as-Code
Security policies defined in machine-readable formats that can be automatically enforced, tested, and version-controlled alongside infrastructure code.
Posture
The overall security state of an organization, including the effectiveness of controls, presence of vulnerabilities, and compliance status.

S

Security Graph
Serpentine's unified data model that connects assets, vulnerabilities, controls, compliance requirements, and validation results into a queryable knowledge graph.
Security Substrate
The foundational layer of Serpentine's architecture that ingests, normalizes, and correlates data from all sources into the unified security graph.
Sovereignty
Control over where data is stored and processed, typically to meet regulatory requirements like GDPR. Serpentine offers EU-sovereign deployment options.

T

Telemetry
Data collected from security tools, infrastructure, and applications that provides visibility into the environment's state and activity.

V

Validation
The process of confirming that a security control actually works as intended, typically through testing rather than configuration review alone.
Validation Loop
Serpentine's core workflow: detect issues → harden defenses → validate with offense → govern continuously. Each step informs the others through the security graph.