A process that uses two or more separate entities (usually persons) operating in concert to protect sensitive functions or information. No single entity is able to access or use the materials, e.g., cryptographic keys.
Source(s):
NIST SP 800-57 Part 2
[Superseded]