Determination of the extent to which the security policy model and subsequent lower-level program descriptions may allow unauthorized access to information. Source(s): NIST SP 800-53 Rev. 5
CNSSI 4009-2015 CNSSI 4009-2015 [Superseded] NIST SP 800-53 Rev. 4 [Superseded] under Covert Channel Analysis
Comments about specific definitions should be sent to the authors of the linked Source publication. For NIST publications, an email is usually found within the document.
Comments about the glossary's presentation and functionality should be sent to firstname.lastname@example.org.