23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Interface –<br />

Common boundary between independent systems or modules where<br />

interactions take place.<br />

SOURCE: CNSSI-4009<br />

Interface Control Document – Technical document describing interface controls and identifying the<br />

authorities and responsibilities for ensuring the operation <strong>of</strong> such<br />

controls. This document is baselined during the preliminary design<br />

review and is maintained throughout the information system life<br />

cycle.<br />

SOURCE: CNSSI-4009<br />

Interim Approval to Operate –<br />

(IATO)<br />

Interim Approval to Test (IATT) –<br />

Intermediate Certification<br />

Authority (CA) –<br />

Temporary authorization granted by a DAA for an information<br />

system to process information based on preliminary results <strong>of</strong> a<br />

security evaluation <strong>of</strong> the system. (To be replaced by ATO and<br />

POA&M)<br />

SOURCE: CNSSI-4009<br />

Temporary authorization to test an information system in a specified<br />

operational information environment within the time frame and under<br />

the conditions or constraints enumerated in the written authorization.<br />

SOURCE: CNSSI-4009<br />

A Certification Authority that is subordinate to another CA, and has a<br />

CA subordinate to itself.<br />

SOURCE: SP 800-32<br />

Internal Network – A network where: (i) the establishment, maintenance, and<br />

provisioning <strong>of</strong> security controls are under the direct control <strong>of</strong><br />

organizational employees or contractors; or (ii) cryptographic<br />

encapsulation or similar security technology provides the same effect.<br />

An internal network is typically organization-owned, yet may be<br />

organization-controlled while not being organization-owned.<br />

SOURCE: SP 800-53<br />

A network where 1) the establishment, maintenance, and<br />

provisioning <strong>of</strong> security controls are under the direct control <strong>of</strong><br />

organizational employees or contractors; or 2) cryptographic<br />

encapsulation or similar security technology implemented between<br />

organization-controlled endpoints provides the same effect (at least<br />

with regard to confidentiality and integrity). An internal network is<br />

typically organization-owned, yet may be organization-controlled<br />

while not being organization-owned.<br />

SOURCE: CNSSI-4009<br />

Pg 100

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!