U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

This is an archive
(replace .gov by .rip)
A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

adequate security

Definition(s):

  Security commensurate with the risk and the magnitude of harm resulting from the loss, misuse, or unauthorized access to or modification of information.
Source(s):
FIPS 200 under ADEQUATE SECURITY from OMB Circular A-130, Appendix III
CNSSI 4009-2015 from OMB Circular A-130
NIST SP 800-128 under Adequate Security from OMB Circular A-130, Appendix III
NIST SP 800-18 Rev. 1 under Adequate Security from OMB Circular A-130, Appendix III
NIST SP 800-53A Rev. 4 under Adequate Security from OMB Circular A-130, Appendix III

  Security commensurate with the risk and magnitude of harm resulting from the loss, misuse, or unauthorized access to or modification of information.
Source(s):
NIST SP 800-30 Rev. 1 under Adequate Security from OMB Circular A-130, Appendix III
NIST SP 800-39 under Adequate Security from OMB Circular A-130, Appendix III

  Security commensurate with the risk resulting from the loss, misuse, or unauthorized access to or modification of information.
Source(s):
NIST SP 800-53 Rev. 4 under Adequate Security from OMB Circular A-130, Appendix III - Adapted

  security commensurate with the risk and magnitude of the harmresulting from the loss, misuse, or unauthorized access to or modification of information. This includes assuring that systems and applications operate effectively and provide appropriate confidentiality, integrity, and availability, through the use of cost-effective management, acquisition, development, installation, operational, and technical controls.
Source(s):
NIST SP 800-16 under Adequate Security

  Security protections commensurate with the risk resulting from the unauthorized access, use, disclosure, disruption, modification, or destruction of information. This includes ensuring that information hosted on behalf of an agency and information systems and applications used by the agency operate effectively and provide appropriate confidentiality, integrity, and availability protections through the application of cost-effective security controls.
Source(s):
NIST SP 800-128 from OMB Circular A-130
NIST SP 800-37 Rev. 2
NIST SP 800-53 Rev. 5 from OMB Circular A-130 (2016)

  Security commensurate with the risk and the magnitude of harm resulting from the loss, misuse, or unauthorized access to or modification of information. This includes assuring that systems and applications used by the agency operate effectively and provide appropriate confidentiality, integrity, and availability, through the use of cost-effective management, personnel, operational, and technical controls.
Source(s):
NIST SP 800-137 under Adequate Security from OMB Circular A-130, Appendix III
NIST SP 800-37 Rev. 1 under Adequate Security from OMB Circular A-130, Appendix III