Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

Sandbox

Abbreviation(s) and Synonym(s):

None

Definition(s):

  A restricted, controlled execution environment that prevents potentially malicious software, such as mobile code, from accessing any system resources except those for which the software is authorized.
Source(s):
CNSSI 4009-2015 under sandboxing
NIST SP 800-179 under Sandboxing (NISTIR 7298 Rev. 2)

  A system that allows an untrusted application to run in a highly controlled environment where the application’s permissions are restricted to an essential set of computer permissions. In particular, an application in a sandbox is usually restricted from accessing the file system or the network. A widely used example of applications running inside a sandbox is a Java applet.
Source(s):
NIST SP 800-95 (NIST ITL Bulletin, Security Implications of Active Content)

  Isolating each guest OS from the others and restricting what resources they can access and what privileges they have.
Source(s):
NIST SP 800-125 under Sandboxing