Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

confidentiality

Abbreviation(s) and Synonym(s):

None

Definition(s):

  Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information.
Source(s):
CNSSI 4009-2015 (44 U.S.C., Sec. 3542)
FIPS 200 under CONFIDENTIALITY (44 U.S.C., Sec. 3542)
NIST SP 800-137 under Confidentiality (44 U.S.C., Sec. 3542)
NIST SP 800-160 [Superseded] (PL 107-347)
NIST SP 800-171 Rev. 1 (44 U.S.C., Sec. 3542)
NIST SP 800-18 Rev. 1 under Confidentiality (44 U.S.C., Sec. 3542)
NIST SP 800-30 Rev. 1 under Confidentiality (44 U.S.C., Sec. 3542)
NIST SP 800-37 Rev. 1 under Confidentiality (44 U.S.C., Sec. 3542)
NIST SP 800-39 under Confidentiality (44 U.S.C., Sec. 3542)
NIST SP 800-53 Rev. 4 under Confidentiality (44 U.S.C., Sec. 3542)
NIST SP 800-53A Rev. 4 under Confidentiality (44 U.S.C., Sec. 3542)
NIST SP 800-60 Vol. 1 Rev. 1 under Confidentiality (44 U.S.C., Sec. 3542)
NIST SP 800-60 Vol. 2 Rev. 1 under Confidentiality (44 U.S.C., Sec. 3542)
NIST SP 800-82 Rev. 2 under Confidentiality (NIST SP 800-53)
NISTIR 7497 under Confidentiality (44 U.S.C., Sec. 3542)
NISTIR 7621 Rev. 1 under Confidentiality (44 U.S.C., Sec. 3542)

  “Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information.”
Source(s):
NIST SP 800-122 under Confidentiality (44 U.S.C., Sec. 3542)

  The property that sensitive information is not disclosed to unauthorized entities.
Source(s):
NIST SP 800-152 under Confidentiality
NIST SP 800-57 Part 1 Rev. 3 under Confidentiality [Superseded]
NIST SP 800-57 Part 1 Rev. 4 under Confidentiality

  The security objective that generates the requirement for protection from intentional or accidental attempts to perform unauthorized data reads. Confidentiality covers data in storage, during processing, and while in transit.
Source(s):
NIST SP 800-33

  The security goal that generates the requirement for protection from intentional or accidental attempts to perform unauthorized data reads. Confidentiality covers data in storage, during processing, and while in transit.
Source(s):
NIST SP 800-27 Rev. A [Withdrawn]

  The ability to protect data so that unauthorized parties cannot view the data.
Source(s):
NIST SP 800-113 under Confidentiality

  For the purposes of this guide, prevention of the disclosure of information by ensuring that only authorized devices can view the contents of WiMAX communications.
Source(s):
NIST SP 800-127 under Confidentiality

  the assurance that information is not disclosed to unauthorized individualsor processes.
Source(s):
NIST SP 800-16 under Confidentiality

  The property that sensitive information is not disclosed to unauthorized entities. In a general information security context: preserving authorized restrictions on information access and disclosure, including means for preserving personal privacy and proprietary information [SP 800-53].
Source(s):
NIST SP 800-57 Part 2 under Confidentiality

  The term 'confidentiality' means preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information.
Source(s):
NIST SP 800-59 under Confidentiality (44 U.S.C., Sec. 3542 (b)(1)(B))

  The property that data or information is not made available or disclosed to unauthorized persons or processes.
Source(s):
NIST SP 800-66 Rev. 1 under Confidentiality (45 C.F.R., Sec. 164.304)

  Assurance that information is not disclosed to unauthorized individuals, processes, or devices.
Source(s):
NIST SP 800-70 Rev. 2 under Confidentiality [Superseded]

  Assurance that information is not disclosed to unauthorized entities or processes.
Source(s):
NIST SP 800-32 under Confidentiality (CNSSI 4009)

  The state that exists when information is held in confidence and protected from unauthorized disclosure.
Source(s):
NISTIR 4734 under Confidentiality

  Assurance that information is not disclosed to unauthorized persons, processes, or devices. Confidentiality covers data in storage, during processing, and in transit.
Source(s):
NISTIR 7316 under Confidentiality

  measures the attacker’s ability to obtain unauthorized access to information from an application or system.
Source(s):
NISTIR 7946 under Confidentiality