This is a potential security issue, you are being redirected to https://csrc.nist.gov.
Systematic and proven process by which potential adversaries can be denied information about capabilities and intentions by identifying, controlling, and protecting generally unclassified evidence of the planning and execution of sensitive activities. The process involves five steps: identification of critical information, analysis of threats, analysis of vulnerabilities, assessment of risks, and application of appropriate countermeasures.
NIST SP 800-53 Rev. 4 under Operations Security from CNSSI 4009