U.S. flag   An unofficial archive of your favorite United States government website
This is an archive
(replace .gov by .rip)
A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

security requirement

Abbreviation(s) and Synonym(s):

None

Definition(s):

  Requirements levied on an information system that are derived from applicable laws, Executive Orders, directives, policies, standards, instructions, regulations, or procedures, or organizational mission/business case needs to ensure the confidentiality, integrity, and availability of the information being processed, stored, or transmitted.
Source(s):
FIPS 200 under SECURITY REQUIREMENTS
CNSSI 4009-2015 under security requirements FIPS 200

  Requirements levied on an information system that are derived from applicable laws, Executive Orders, directives, policies, standards, instructions, regulations, procedures, or organizational mission/business case needs to ensure the confidentiality, integrity, and availability of the information being processed, stored, or transmitted.
Source(s):
NIST SP 800-137 under Security Requirements FIPS 200
NIST SP 800-30 Rev. 1 under Security Requirements FIPS 200
NIST SP 800-37 Rev. 1 under Security Requirements FIPS 200
NIST SP 800-39 under Security Requirements FIPS 200
NIST SP 800-53A Rev. 4 under Security Requirements FIPS 200

  A requirement levied on an information system or an organization that is derived from applicable laws, Executive Orders, directives, policies, standards, instructions, regulations, procedures, and/or mission/business needs to ensure the confidentiality, integrity, and availability of information that is being processed, stored, or transmitted. Note: Security requirements can be used in a variety of contexts from high-level policy-related activities to low-level implementation-related activities in system development and engineering disciplines.
Source(s):
NIST SP 800-53 Rev. 4 under Security Requirement FIPS 200 - Adapted

  A requirement levied on an information system or an organization that is derived from applicable laws, executive orders, directives, policies, standards, instructions, regulations, procedures, and/or mission/business needs to ensure the confidentiality, integrity, and availability of information that is being processed, stored, or transmitted. Note: Security requirements can be used in a variety of contects from high-level policy activies to low-level implementation activities in system development and engineering disciplines.
Source(s):
NIST SP 800-37 Rev. 2

  A requirement levied on an information system or an organization that is derived from applicable laws, Executive Orders, directives, policies, standards, instructions, regulations, procedures, and/or mission/business needs to ensure the confidentiality, integrity, and availability of information that is being processed, stored, or transmitted. Note: Security requirements can be used in a variety of contexts from high-level policy-related activities to low-level implementation-related activities in system development and engineering disciplines.
Source(s):
NIST SP 800-53 Rev. 4 under Security Requirement FIPS 200 - Adapted

  Requirements levied on an information system that are derived from laws, executive orders, directives, policies, instructions, regulations, or organizational (mission) needs to ensure the confidentiality, integrity, and availability of the information being processed, stored, or transmitted.
Source(s):
NIST SP 800-18 Rev. 1 under Security Requirements

  A requirement that specifies the functional, assurance, and strength characteristics for a mechanism, system, or system element.
Source(s):
NIST SP 800-160 Vol.2
NIST SP 800-160 [Superseded]