U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

This is an archive
(replace .gov by .rip)
A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

Security Protections

Abbreviation(s) and Synonym(s):

Security Controls

Definition(s):

  The management, operational, and technical controls (i.e., safeguards or countermeasures) prescribed for an information system to protect the confidentiality, integrity, and availability of the system and its information.
Source(s):
NIST SP 800-128 under Security Controls from FIPS 199
NIST SP 800-137 under Security Controls from FIPS 199
NIST SP 800-18 Rev. 1 under Security Controls from FIPS 199
NIST SP 800-30 Rev. 1 under Security Controls from FIPS 199, CNSSI 4009
NIST SP 800-34 Rev. 1 under Security Controls from FIPS 199
NIST SP 800-39 under Security Controls from FIPS 199, CNSSI 4009
NIST SP 800-60 Vol. 1 Rev. 1 under Security Controls from FIPS 199
NIST SP 800-60 Vol. 2 Rev. 1 under Security Controls from FIPS 199
NIST SP 800-82 Rev. 2 under Security Controls from FIPS 199
NISTIR 8170 under Security Controls from FIPS 199, CNSSI 4009
NIST SP 800-37 Rev. 1 [Superseded] under Security Controls from FIPS 199

  The management, operational, and technical controls (i.e., safeguards or countermeasures) prescribed for a system to protect the confidentiality, integrity, and availability of the system and its information.
Source(s):
NIST SP 800-12 Rev. 1 under Security Controls from FIPS 199

  A safeguard or countermeasure prescribed for an information system or an organization designed to protect the confidentiality, integrity, and availability of its information and to meet a set of defined security requirements.
Source(s):
NIST SP 800-53A Rev. 4 under Security Controls from NIST SP 800-53

  See “Security Protections.”
Source(s):
NIST SP 800-114 [Superseded] under Security Controls

  Measures against threats that are intended to compensate for a computer’s security weaknesses.
Source(s):
NIST SP 800-114 [Superseded]

  Protective measures used to meet the security requirements specified for IT resources.
Source(s):
NIST SP 800-47 [Superseded] under Security Controls