23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

KMI-Aware Device – A user device that has a user identity for which the registration has<br />

significance across the entire KMI (i.e., the identity’s registration<br />

data is maintained in a database at the PRSN level <strong>of</strong> the system,<br />

rather than only at an MGC) and for which a product can be<br />

generated and wrapped by a PSN for distribution to the specific<br />

device.<br />

SOURCE: CNSSI-4009<br />

KOA Agent – A user identity that is designated by a KOA manager to access PRSN<br />

product delivery enclaves for the purpose <strong>of</strong> retrieving wrapped<br />

products that have been ordered for user devices that are assigned to<br />

that KOA.<br />

SOURCE: CNSSI-4009<br />

KOA Manager – The Management Role that is responsible for the operation <strong>of</strong> one or<br />

KOA’s (i.e., manages distribution <strong>of</strong> KMI products to the end<br />

cryptographic units, fill devices, and ADPs that are assigned to the<br />

manager’s KOA).<br />

SOURCE: CNSSI-4009<br />

KOA Registration Manager – The individual responsible for performing activities related to<br />

registering KOAs.<br />

SOURCE: CNSSI-4009<br />

Label – See <strong>Security</strong> Label.<br />

Labeled <strong>Security</strong> Protections –<br />

Access control protection features <strong>of</strong> a system that use security labels<br />

to make access control decisions.<br />

SOURCE: CNSSI-4009<br />

Laboratory Attack – Use <strong>of</strong> sophisticated signal recovery equipment in a laboratory<br />

environment to recover information from data storage media.<br />

SOURCE: SP 800-88; CNSSI-4009<br />

Least Privilege – The security objective <strong>of</strong> granting users only those accesses they<br />

need to perform their <strong>of</strong>ficial duties.<br />

SOURCE: SP 800-12<br />

The principle that a security architecture should be designed so that<br />

each entity is granted the minimum system resources and<br />

authorizations that the entity needs to perform its function.<br />

SOURCE: CNSSI-4009<br />

Pg 110

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!