Passive information system-related entity (e.g., devices, files, records, tables, processes, programs, domains) containing or receiving information. Access to an object (by a subject) implies access to the information it contains. See subject.
Sources:
CNSSI 4009-2015
Passive system-related entity, including devices, files, records, tables, processes, programs, and domains that contain or receive information. Access to an object (by a subject) implies access to the information it contains. See subject.
Sources:
NIST SP 800-53 Rev. 5
An entity to be protected from unauthorized use.
Sources:
NIST SP 800-162
An operating system abstraction that is visible at the application program interface, has a unique name, and capable of being shared. In this document, the following are resources: files, programs, directories, databases, mini-disks, and special files. In this document, the following are not resources: records, blocks, pages, segments, bits, bytes, words, fields, and processors.
Sources:
NISTIR 5153
under Resource
the set of passive entities within the system, protected from unauthorized use.
Sources:
NISTIR 6192
under Object
A passive entity that contains or receives information.
Sources:
NISTIR 7316
under Object
See Object, Assessment.
Sources:
NISTIR 8011 Vol. 1
under Object
Assessment objects identify the specific items being assessed, and as such, can have one or more security defects. Assessment objects include specifications, mechanisms, activities, and individuals which in turn may include, but are not limited to, devices, software products, software executables, credentials, accounts, account-privileges, things to which privileges are granted (including data and physical facilities), etc. See SP 800-53A.
Sources:
NISTIR 8011 Vol. 1
under Object, Assessment