A comprehensive assessment of the management, operational, and technical security controls in an information system, made in support of security accreditation, to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system.
Sources:
FIPS 200
under CERTIFICATION
NIST SP 800-18 Rev. 1
under Certification
NIST SP 800-60 Vol. 1 Rev. 1
under Certification
from
FIPS 200
NIST SP 800-60 Vol. 2 Rev. 1
under Certification
from
FIPS 200
The process of verifying the correctness of a statement or claim and issuing a certificate as to its correctness.
Sources:
FIPS 201-3
under Certification
Comprehensive evaluation of an information system component that establishes the extent to which a particular design and implementation meets a set of specified security requirements.
Sources:
CNSSI 4009-2015
A designation earned to ensure qualifications to perform a job or task. Often issued by a professional organization, industry vendor, or employer to signify an achievement following a course of study.
Sources:
NIST SP 800-50r1
Third-party attestation related to an object of conformity assessment, with the exception of accreditation.
Sources:
Cybersecurity Labeling for Consumer IoT Products
under Certification