U.S. flag   An unofficial archive of your favorite United States government website
This is an archive
(replace .gov by .rip)
A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

security control inheritance

Abbreviation(s) and Synonym(s): Definition(s):

  A situation in which an information system or application receives protection from security controls (or portions of security controls) that are developed, implemented, assessed, authorized, and monitored by entities other than those responsible for the system or application; entities either internal or external to the organization where the system or application resides. See Common Control.
Source(s):
NIST SP 800-137 under Security Control Inheritance CNSSI 4009
NIST SP 800-30 Rev. 1 under Security Control Inheritance CNSSI 4009
NIST SP 800-37 Rev. 1 under Security Control Inheritance
NIST SP 800-39 under Security Control Inheritance CNSSI 4009
NIST SP 800-53 Rev. 4 under Security Control Inheritance CNSSI 4009
NIST SP 800-53A Rev. 4 under Security Control Inheritance
NISTIR 8170 under Security Control Inheritance CNSSI 4009

  A situation in which an information system or application receives protection from security controls (or portions of security controls) that are developed, implemented, and assessed, authorized, and monitored by entities other than those responsible for the system or application; entities either internal or external to the organization where the system or application resides. See common control.
Source(s):
CNSSI 4009-2015 NIST SP 800-53A Rev. 1

  See security control inheritance.
Source(s):
CNSSI 4009-2015 under inheritance