23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

<strong>Security</strong> Control Assessment – The testing and/or evaluation <strong>of</strong> the management, operational, and<br />

technical security controls in an information system to determine the<br />

extent to which the controls are implemented correctly, operating as<br />

intended, and producing the desired outcome with respect to meeting<br />

the security requirements for the system.<br />

SOURCE: SP 800-37; SP 800-53; SP 800-53A<br />

The testing and/or evaluation <strong>of</strong> the management, operational, and<br />

technical security controls to determine the extent to which the<br />

controls are implemented correctly, operating as intended, and<br />

producing the desired outcome with respect to meeting the security<br />

requirements for the system and/or enterprise.<br />

SOURCE: CNSSI-4009<br />

<strong>Security</strong> Control Assessor – The individual, group, or organization responsible for conducting<br />

a security control assessment.<br />

SOURCE: SP 800-37; SP 800-53A<br />

<strong>Security</strong> Control Baseline – The set <strong>of</strong> minimum security controls defined for a low-impact,<br />

moderate-impact, or high-impact information system.<br />

SOURCE: SP 800-53; FIPS 200<br />

One <strong>of</strong> the sets <strong>of</strong> minimum security controls defined for federal<br />

information systems in NIST Special Publication 800-53 and CNSS<br />

Instruction 1253.<br />

SOURCE: SP 800-53A<br />

<strong>Security</strong> Control Enhancements – Statements <strong>of</strong> security capability to 1) build in additional, but related,<br />

functionality to a basic control; and/or 2) increase the strength <strong>of</strong> a<br />

basic control.<br />

SOURCE: CNSSI-4009; SP 800-53A<br />

Statements <strong>of</strong> security capability to: (i) build in additional, but<br />

related, functionality to a security control; and/or (ii) increase the<br />

strength <strong>of</strong> the control.<br />

SOURCE: SP 800-53; SP 800-18<br />

<strong>Security</strong> Control Inheritance – A situation in which an information system or application<br />

receives protection from security controls (or portions <strong>of</strong> security<br />

controls) that are developed, implemented, assessed, authorized,<br />

and monitored by entities other than those responsible for the<br />

system or application; entities either internal or external to the<br />

organization where the system or application resides.<br />

See Common Control.<br />

SOURCE: SP 800-37; SP 800-53; SP 800-53A; CNSSI-4009<br />

Pg 170

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!