A list of discrete entities, such as hosts or applications that are known to be benign and are approved for use within an organization and/or information system.
Source(s):
NIST SP 800-128
under Whitelist
from
NIST SP 800-94 - Adapted
NIST SP 800-82 Rev. 2
under Whitelist
from
NIST SP 800-128
A list of discrete entities, such as hosts or applications, that are known to be benign and are approved for use within an organization and/or information system.
Source(s):
NIST SP 800-179
under Whitelist
from
NISTIR 7298 Rev. 2
A process used to identify software programs that are authorized to execute on a system or authorized Universal Resource Locators (URL)/websites.
Source(s):
NIST SP 800-171 Rev. 2
NIST SP 800-171 Rev. 1
[Superseded]
An approved list or register of entities that are provided a particular privilege, service, mobility, access or recognition.
Source(s):
NISTIR 7621 Rev. 1
under Whitelist
from
CNSSI 4009-2015 - “whitelisting”
2). An implementation of a default deny all or allow by exception policy across an enterprise environment, and a clear, concise, timely process for adding exceptions when required for mission accomplishments.
Source(s):
CNSSI 4009-2015
[Superseded]
from
CNSSI 1011
A list of discrete entities, such as hosts or applications that are known to be benign and are approved for use within an organization and/or information system.
Also known as “clean word list”.
Source(s):
CNSSI 4009-2015
[Superseded]
under white list
from
NIST SP 800-128
1). An approved list or register of entities that are provided a particular privilege, service, mobility, access or recognition.
Source(s):
CNSSI 4009-2015
[Superseded]
A list of email senders known to be benign, such as a user’s coworkers, friends, and family.
Source(s):
NIST SP 800-114
[Superseded]
under Whitelist
The process used to identify: (i) software programs that are authorized to execute on an information system; or (ii) authorized Universal Resource Locators (URL)/websites.
Source(s):
NIST SP 800-53 Rev. 4
[Superseded]
under Whitelisting