expand for answer

Standard

Mandatory statement of minimum requirements that support some part of a policy. A set of rules or specifications that, when taken together, define a software or hardware device. A standard is also an acknowledged basis for comparing or measuring something. Standards are important because new technology will only take root once a group of specifications is agreed upon.


Similar items:
The certifier’s statement provides an overview of the security status of the system and brings together all of the information necessary for the DAA to make an informed, riskbased decision. The statement documents that the security controls are correctly implemented and effective in their application. The report also documents the security controls not implemented and provides corrective actions.
[view]
A hierarchical classification and a set of nonhierarchical components that are used by mandatory access controls to define a process’s resource access rights. Information representing elements of the security label(s) of a subject and an object. Sensitivity labels are used by the trusted computing base (TCB) as the basis for mandatory access control decisions.
[view]
The combination of hardware, software, and controls that form a trusted base that enforces your security policy. The totality of protection mechanisms within a computer system, including hardware, software, and communications equipment, the combination of which is responsible for enforcing a security policy. A TCB consists of one or more components that together enforce a unified security policy over a product or system. The ability of a trusted computing base to correctly enforce a security policy depends solely on the mechanisms within the TCB and on the correct input by system administrative personnel of parameters (such as a user’s clearance) related to the security policy. Totality of protection mechanisms within a computer system, including hardware, firmware, and software, the combination responsible for enforcing a security policy.
[view]
Documents that define compulsory requirements for the homogenous use of hardware, software, technology, and security controls. They provide a course of action by which technology and procedures are uniformly implemented throughout an organization. Standards are tactical documents that define steps or methods to accomplish the goals and overall direction defined by security policies.
[view]
A statement of the certification authority’s practices with respect to a wide range of technical, business, and legal issues that can be used as a basis for the certification authorities contract with the entity to whom the certificate was issued.
[view]


There are no comments yet.

Authentication required

You must log in to post a comment.

Log in