The process of granting or denying specific requests to: 1) obtain and use information and related information processing services; and 2) enter specific physical facilities (e.g., federal buildings, military establishments, border crossing entrances).
Source(s):
NIST SP 800-12 Rev. 1
under Access Control
from
FIPS 201-2
NIST SP 1800-25B
under Access Control
from
FIPS 201-2, CNSSI 4009-2015
NIST SP 1800-26B
under Access Control
from
FIPS 201-2, CNSSI 4009-2015
The process of granting or denying specific requests: 1) for obtaining and using information and related information processing services; and 2) to enter specific physical facilities (e.g., Federal buildings, military establishments, and border crossing entrances).
Source(s):
NIST SP 1800-27B
under Access Control
from
CNSSI 4009-2015
NIST SP 1800-27C
under Access Control
from
CNSSI 4009-2015
The process of permitting or restricting access to applications at a granular level, such as per-user, per-group, and per-resources.
Source(s):
NIST SP 800-113
under Access Control
Procedures and controls that limit or detect access to critical information resources. This can be accomplished through software, biometrics devices, or physical access to a controlled space.
Source(s):
NIST SP 800-192
under Access Control
NISTIR 7316
under Access Control
The process of granting or denying specific requests to: (i) obtain and use information and related information processing services; and (ii) enter specific physical facilities (e.g., Federal buildings, military establishments, and border-crossing entrances).
Source(s):
NIST SP 800-79-2
under Access Control
The process of limiting access to resources of a system only to authorized programs, processes, or other systems (in a network).
Source(s):
NISTIR 4734
under Access Control
The process of granting or denying specific requests for obtaining and using information and related information processing services.
Source(s):
NISTIR 7711
under Access Control
The process of granting or denying specific requests: 1) obtain and use information and related information processing services; and 2) enter specific physical facilities (e.g., Federal buildings, military establishments, border crossing entrances).
Source(s):
FIPS 201
[version unknown]
under Access Control
Process of granting access to information system resources only to authorized users, programs, processes, or other systems.
Source(s):
NIST SP 800-32
[Withdrawn]
under Access Control
The process of granting access to information technology (IT) system resources only to authorized users, programs, processes, or other systems.
Source(s):
NIST SP 800-47
[Superseded]
under Access Control