Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

architecture

Abbreviations / Acronyms / Synonyms:

Definitions:

  A highly structured specification of an acceptable approach within a framework for solving a specific problem. An architecture contains descriptions of all the components of a selected, acceptable solution while allowing certain details of specific components to be variable to satisfy related constraints (e.g., costs, local environment, user acceptability).
Sources:
FIPS 201-3 under Architecture

  Fundamental concepts or properties of a system in its environment embodied in its elements, relationships, and in the principles of its design and evolution.
Sources:
NIST SP 800-160v1r1 under architecture (system)

  A set of physical and logical security-relevant representations (i.e., views) of system architecture that conveys information about how the system is partitioned into security domains and makes use of security-relevant elements to enforce security policies within and between security domains based on how data and information must be protected. Note: The security architecture reflects security domains, the placement of security-relevant elements within the security domains, the interconnections and trust relationships between the security-relevant elements, and the behavior and interaction between the security-relevant elements. The security architecture, similar to the system architecture, may be expressed at different levels of abstraction and with different scopes.
Sources:
NIST SP 800-37 Rev. 2 under security architecture

  An embedded, integral part of the enterprise architecture that describes the structure and behavior for an enterprise’s security processes, information security systems, personnel and organizational sub-units, showing their alignment with the enterprise’s mission and strategic plans. See information security architecture.
Sources:
NIST SP 800-37 Rev. 2 under security architecture from NIST SP 800-39

  A highly structured specification of an acceptable approach within a framework for solving a specific problem. An architecture contains descriptions of all the components of a selected, acceptable solution while allowing certain details of specific components to be variable to satisfy related constraints (e.g., costs, local environment, user acceptability).
Sources:
NIST SP 1800-10B under Architecture
NIST SP 1800-25B under Architecture

  A highly structured specification of an acceptable approach within a framework for solving a specific problem. An architecture contains descriptions of all the components of a selected, acceptable solution, while allowing certain details of specific components to be variable to satisfy related constraints (e.g., costs, local environment, user acceptability).
Sources:
NIST SP 1800-26B under Architecture

  The design of the network of the hotel environment and the components that are used to construct it.
Sources:
NIST SP 1800-27B under Architecture

  the design of the network of the hotel environment and the components that are used to construct it
Sources:
NIST SP 1800-27C under Architecture

  Fundamental concepts or properties related to a system in its environment embodied in its elements, relationships, and in the principles of its design and evolution.
Sources:
NIST SP 800-160v1r1

  A set of physical and logical security-relevant representations (i.e., views) of system architecture that conveys information about how the system is partitioned into security domains and makes use of security-relevant elements to enforce security policies within and between security domains based on how data and information must be protected.
Sources:
NIST SP 800-160v1r1 under security architecture