23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Management Client (MGC) –<br />

Management Controls –<br />

A configuration <strong>of</strong> a client node that enables a KMI external<br />

operational manager to manage KMI products and services by either<br />

1) accessing a PRSN, or 2) exercising locally provided capabilities.<br />

An MGC consists <strong>of</strong> a client platform and an advanced key processor<br />

(AKP).<br />

SOURCE: CNSSI-4009<br />

The security controls (i.e., safeguards or countermeasures) for an<br />

information system that focus on the management <strong>of</strong> risk and the<br />

management <strong>of</strong> information system security.<br />

SOURCE: SP 800-37; SP 800-53; SP 800-53A; FIPS 200<br />

Actions taken to manage the development, maintenance, and use <strong>of</strong><br />

the system, including system-specific policies, procedures and rules<br />

<strong>of</strong> behavior, individual roles and responsibilities, individual<br />

accountability, and personnel security decisions.<br />

SOURCE: CNSSI-4009<br />

Management <strong>Security</strong> Controls – The security controls (i.e., safeguards or countermeasures) for an<br />

information system that focus on the management <strong>of</strong> risk and the<br />

management <strong>of</strong> information systems security.<br />

SOURCE: CNSSI-4009<br />

Mandatory Access Control (MAC) – A means <strong>of</strong> restricting access to system resources based on the<br />

sensitivity (as represented by a label) <strong>of</strong> the information contained in<br />

the system resource and the formal authorization (i.e., clearance) <strong>of</strong><br />

users to access information <strong>of</strong> such sensitivity.<br />

SOURCE: SP 800-44<br />

Mandatory Access Control – Access controls (which) are driven by the results <strong>of</strong> a comparison<br />

between the user’s trust level or clearance and the sensitivity<br />

designation <strong>of</strong> the information.<br />

SOURCE: FIPS 191<br />

A means <strong>of</strong> restricting access to objects based on the sensitivity (as<br />

represented by a security label) <strong>of</strong> the information contained in the<br />

objects and the formal authorization (i.e., clearance, formal access<br />

approvals, and need-to-know) <strong>of</strong> subjects to access information <strong>of</strong><br />

such sensitivity.<br />

SOURCE: CNSSI-4009<br />

Mandatory Modification – Change to a COMSEC end-item that NSA requires to be completed<br />

and reported by a specified date. See optional modification.<br />

SOURCE: CNSSI-4009<br />

Pg 116

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!