23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Identity – The set <strong>of</strong> physical and behavioral characteristics by which an<br />

individual is uniquely recognizable.<br />

SOURCE: FIPS 201<br />

The set <strong>of</strong> attribute values (i.e., characteristics) by which an entity is<br />

recognizable and that, within the scope <strong>of</strong> an identity manager’s<br />

responsibility, is sufficient to distinguish that entity from any other<br />

entity.<br />

SOURCE: CNSSI-4009<br />

Identity-Based Access Control – Access control based on the identity <strong>of</strong> the user (typically relayed as<br />

a characteristic <strong>of</strong> the process acting on behalf <strong>of</strong> that user) where<br />

access authorizations to specific objects are assigned based on user<br />

identity.<br />

SOURCE: SP 800-53; CNSSI-4009<br />

Identity-Based <strong>Security</strong> Policy – A security policy based on the identities and/or attributes <strong>of</strong> the<br />

object (system resource) being accessed and <strong>of</strong> the subject (user,<br />

group <strong>of</strong> users, process, or device) requesting access.<br />

SOURCE: SP 800-33<br />

Identity Binding – Binding <strong>of</strong> the vetted claimed identity to the individual (through<br />

biometrics) according to the issuing authority.<br />

SOURCE: FIPS 201<br />

Identity Pro<strong>of</strong>ing – The process by which a Credentials Service Provider (CSP) and a<br />

Registration Authority (RA) validate sufficient information to<br />

uniquely identify a person.<br />

SOURCE: SP 800-63<br />

Identity Pro<strong>of</strong>ing – The process <strong>of</strong> providing sufficient information (e.g., identity history,<br />

credentials, documents) to a Personal Identity Verification Registrar<br />

when attempting to establish an identity.<br />

SOURCE: FIPS 201<br />

Identity Registration – The process <strong>of</strong> making a person’s identity known to the Personal<br />

Identity Verification (PIV) system, associating a unique identifier<br />

with that identity, and collecting and recording the person’s relevant<br />

attributes into the system.<br />

SOURCE: FIPS 201; CNSSI-4009<br />

Identity Token – Smart card, metal key, or other physical object used to authenticate<br />

identity.<br />

SOURCE: CNSSI-4009<br />

Pg 87

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!