Glossary
| Field | Value |
|---|---|
| Document ID | ASCEND-REF-002 |
| Version | 1.0.0 |
| Last Updated | December 19, 2025 |
| Author | Ascend Engineering Team |
| Publisher | OW-KAI Technologies Inc. |
| Classification | Enterprise Client Documentation |
| Compliance | SOC 2 CC6.1/CC6.2, PCI-DSS 7.1/8.3, HIPAA 164.312, NIST 800-53 AC-2/SI-4 |
Reading Time: 5 minutes | Skill Level: All Levels
A
Action
An operation that an AI agent wants to perform. Actions are the fundamental unit of governance in ASCEND. Each action is evaluated, risk-assessed, and either approved or denied.
Agent
An autonomous AI system that performs actions. Agents must be registered with ASCEND before submitting actions.
API Key
A secret credential used to authenticate SDK and API requests. Keys are scoped to specific roles and permissions.
Approval Level
A numeric value (1-5) indicating what role is required to approve an action. Higher levels require more senior approvers.
Audit Trail
An immutable record of all actions, decisions, and events. Used for compliance and forensic analysis.
C
CCPA
California Consumer Privacy Act. ASCEND supports CCPA data rights including access, deletion, and opt-out.
Compliance Framework
A set of regulatory requirements (SOC 2, HIPAA, PCI-DSS) that ASCEND helps organizations meet.
Consent
Explicit permission from a data subject for specific data processing activities. Managed through the Data Rights API.
D
Data Lineage
A record of how data flows through systems, including source, destination, and processing purpose.
Data Subject Request (DSR)
A formal request from an individual to access, correct, or delete their personal data under GDPR/CCPA.
Dead Letter Queue (DLQ)
A queue for webhook deliveries that failed after all retry attempts.
E
Evidence Pack
A collection of audit records, logs, and documentation assembled for compliance audits.
G
GDPR
General Data Protection Regulation. EU privacy law that ASCEND supports through data rights APIs.
Governance
The process of controlling and overseeing AI agent behavior to ensure safety, compliance, and alignment with organizational policies.
H
Hash-Chaining
A technique for ensuring audit log integrity by linking each record to the previous one via cryptographic hash.
HIPAA
Health Insurance Portability and Accountability Act. US healthcare privacy law that ASCEND supports.
I
IDOR
Insecure Direct Object Reference. A security vulnerability that ASCEND prevents through multi-tenant isolation.
Immutable Logging
Audit records that cannot be modified or deleted, ensuring compliance with regulatory requirements.
J
JWT (JSON Web Token)
A token format used for dashboard authentication. Contains user identity and permissions.
K
Kill Switch
An emergency control to immediately terminate an agent's ability to execute actions.
KMS (Key Management Service)
AWS service used for encryption key management. ASCEND uses KMS for data encryption.
M
MCP (Model Context Protocol)
A standard protocol for AI models to interact with external tools. ASCEND provides governance for MCP servers.
Multi-Tenancy
Architecture where multiple organizations share infrastructure but have completely isolated data.
O
Organization
A tenant in ASCEND. Each organization has its own users, agents, policies, and data.
P
PCI-DSS
Payment Card Industry Data Security Standard. Compliance framework that ASCEND supports.
PII (Personally Identifiable Information)
Data that can identify an individual. ASCEND provides PII detection and protection.
Policy
A rule that defines how certain types of actions should be handled (auto-approve, require approval, deny).
Pending Approval
Action status indicating human review is required before execution.
R
RBAC (Role-Based Access Control)
Security model where permissions are assigned to roles, and roles are assigned to users.
Risk Assessment
The process of calculating a risk score for an action based on multiple factors.
Risk Score
A numeric value (0-100) indicating the potential risk of an action. Higher scores require more oversight.
RLS (Row-Level Security)
PostgreSQL feature that restricts data access at the row level based on user context.
S
SIEM
Security Information and Event Management. ASCEND exports events to Splunk, Datadog, and other SIEMs.
Smart Rule
A conditional policy that triggers based on specific criteria (action type, risk level, parameters).
SOC 2
Service Organization Control 2. Compliance framework that ASCEND supports through audit logging and controls.
SSO (Single Sign-On)
Authentication method allowing users to access ASCEND using their corporate identity provider.
T
Tenant
See Organization. Each tenant has isolated data and configurations.
Trust Level
A classification for MCP servers (trusted, restricted, sandbox) that affects default approval requirements.
W
Webhook
An HTTP callback that ASCEND sends when events occur. Used for real-time integrations.
WORM (Write Once Read Many)
Storage model where data can only be written once, never modified. Used for audit logs.
Common Abbreviations
| Abbreviation | Full Form |
|---|---|
| API | Application Programming Interface |
| BAA | Business Associate Agreement |
| CAB | Change Advisory Board |
| CI | Configuration Item (ServiceNow) |
| CIM | Common Information Model (Splunk) |
| CMDB | Configuration Management Database |
| DLQ | Dead Letter Queue |
| DSR | Data Subject Request |
| HEC | HTTP Event Collector (Splunk) |
| HMAC | Hash-based Message Authentication Code |
| ITSM | IT Service Management |
| MFA | Multi-Factor Authentication |
| OIDC | OpenID Connect |
| PII | Personally Identifiable Information |
| RLS | Row-Level Security |
| SAML | Security Assertion Markup Language |
| SDK | Software Development Kit |
| SLA | Service Level Agreement |
| TLS | Transport Layer Security |
Document Version: 1.0.0 | Last Updated: December 2025