Ensuring timely and reliable access to and use of information.
Sources:
FIPS 200
under AVAILABILITY
from
44 U.S.C., Sec. 3542
NIST SP 800-137
under Availability
from
44 U.S.C., Sec. 3542
NIST SP 800-171r3
from
44 U.S.C., Sec. 3552
NIST SP 800-172
from
44 U.S.C., Sec. 3552
NIST SP 800-172A
from
44 U.S.C., Sec. 3552
NIST SP 800-18 Rev. 1
under Availability
from
44 U.S.C., Sec. 3542
NIST SP 800-30 Rev. 1
under Availability
from
44 U.S.C., Sec. 3542
NIST SP 800-37 Rev. 2
from
44 U.S.C., Sec. 3552
NIST SP 800-39
under Availability
from
44 U.S.C., Sec. 3542
NIST SP 800-53 Rev. 5
from
PL 113-283 (FISMA)
NIST SP 800-53A Rev. 5
under Availability
from
PL 113-283 (FISMA)
NIST SP 800-53B
from
PL 113-283 (FISMA)
NIST SP 800-60 Vol. 1 Rev. 1
under Availability
from
44 U.S.C., Sec. 3542
NIST SP 800-60 Vol. 2 Rev. 1
under Availability
from
44 U.S.C., Sec. 3542
NIST Privacy Framework Version 1.0
under Availability
from
44 U.S.C., Sec. 3542
NISTIR 7497
under Availability
from
44 U.S.C., Sec. 3542
NISTIR 7621 Rev. 1
under Availability
from
44 U.S.C., Sec. 3542
1. Ensuring timely and reliable access to and use of information.
Sources:
CNSSI 4009-2015
from
44 U.S.C., Sec. 3542
As defined in FISMA, the term 'availability' means ensuring timely and reliable access to and use of information.
Sources:
NIST SP 800-59
under Availability
from
44 U.S.C., Sec. 3542 (b)(1)(C)
2. Timely, reliable access to data and information services for authorized users.
Sources:
CNSSI 4009-2015
from
NSA/CSS Manual Number 3-16 (COMSEC)
The ability for authorized users to access systems as needed.
Sources:
NIST SP 800-113
under Availability
Timely, reliable access to information or a service.
Sources:
NIST SP 800-152
under Availability
the timely, reliable access to data and information services for authorized users.
Sources:
NIST SP 800-16
under Availability
Timely, reliable access to information by authorized entities.
Sources:
NIST SP 800-57 Part 1 Rev. 5
under Availability
NIST SP 800-57 Part 2 Rev.1
under Availability
Property of being accessible and usable on demand by an authorized entity.
Sources:
NIST SP 800-160v1r1
from
ISO/IEC 7498-2:1989
The property that data or information is accessible and usable upon demand by an authorized person.
Sources:
NIST SP 800-66r2
from
HIPAA Security Rule - §164.304
The state that exists when data can be accessed or a requested service provided within an acceptable period of time.
Sources:
NISTIR 4734
under Availability
measures an attacker’s ability to disrupt or prevent access to services or data. Vulnerabilities that impact availability can affect hardware, software, and network resources, such as flooding network bandwidth, consuming large amounts of memory, CPU cycles, or unnecessary power consumption.
Sources:
NISTIR 7946
under Availability