Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center


A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z  |  Symbols





  The process of verifying the correctness of a statement or claim and issuing a certificate as to its correctness.
Source(s): FIPS 201-2

  A comprehensive assessment of the management, operational, and technical security controls in an information system, made in support of security accreditation, to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system.
Source(s): FIPS 200
NIST SP 800-18 Rev. 1 (NIST SP 800-37)
NIST SP 800-60 Vol 1 Rev. 1 (FIPS 200, NIST SP 800-37)
NIST SP 800-82 Rev. 2 (NIST SP 800-37)

  Comprehensive evaluation of an information system component that establishes the extent to which a particular design and implementation meets a set of specified security requirements.
Source(s): CNSSI 4009-2015

  A formal process for testing components or systems against a specified set of security requirements. Certification is normally performed by an independent reviewer rather than one involved in building the system. Certification can be part of the review of security controls identified in OMB Circular A-130, Appendix III, which calls for security reviews to assure that management, operational, and technical controls are appropriate and functioning effectively.
Source(s): NIST SP 800-16



See Also: