U.S. flag   An unofficial archive of your favorite United States government website
This is an archive
(replace .gov by .rip)
A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

AC

Abbreviation(s) and Synonym(s):

Access Control (NIST SP 800-53 security control family)

Definition(s):

  The process of granting or denying specific requests to: 1) obtain and use information and related information processing services; and 2) enter specific physical facilities (e.g., federal buildings, military establishments, border crossing entrances).
Source(s):
NIST SP 800-12 Rev. 1 under Access Control from FIPS 201-2
NIST SP 1800-25B under Access Control from FIPS 201-2, CNSSI 4009-2015
NIST SP 1800-26B under Access Control from FIPS 201-2, CNSSI 4009-2015

  The process of permitting or restricting access to applications at a granular level, such as per-user, per-group, and per-resources.
Source(s):
NIST SP 800-113 under Access Control

  Procedures and controls that limit or detect access to critical information resources. This can be accomplished through software, biometrics devices, or physical access to a controlled space.
Source(s):
NIST SP 800-192 under Access Control
NISTIR 7316 under Access Control

  Process of granting access to information system resources only to authorized users, programs, processes, or other systems.
Source(s):
NIST SP 800-32 under Access Control

  The process of granting access to information technology (IT) system resources only to authorized users, programs, processes, or other systems.
Source(s):
NIST SP 800-47 under Access Control

  The process of granting or denying specific requests to: (i) obtain and use information and related information processing services; and (ii) enter specific physical facilities (e.g., Federal buildings, military establishments, and border-crossing entrances).
Source(s):
NIST SP 800-79-2 under Access Control

  The process of limiting access to resources of a system only to authorized programs, processes, or other systems (in a network).
Source(s):
NISTIR 4734 under Access Control

  The process of granting or denying specific requests for obtaining and using information and related information processing services.
Source(s):
NISTIR 7711 under Access Control

  The process of granting or denying specific requests: 1) obtain and use information and related information processing services; and 2) enter specific physical facilities (e.g., Federal buildings, military establishments, border crossing entrances).
Source(s):
FIPS 201 [version unknown] under Access Control