Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

security control inheritance

Abbreviation(s) and Synonym(s): Definition(s):

  A situation in which an information system or application receives protection from security controls (or portions of security controls) that are developed, implemented, assessed, authorized, and monitored by entities other than those responsible for the system or application; entities either internal or external to the organization where the system or application resides. See Common Control.
Source(s):
NIST SP 800-37 Rev. 1 under Security Control Inheritance
NIST SP 800-137 under Security Control Inheritance (CNSSI 4009)
NIST SP 800-30 Rev. 1 under Security Control Inheritance (CNSSI 4009)
NIST SP 800-39 under Security Control Inheritance (CNSSI 4009)
NIST SP 800-53 Rev. 4 under Security Control Inheritance (CNSSI 4009)
NIST SP 800-53A Rev. 4 under Security Control Inheritance

  See security control inheritance.
Source(s):
CNSSI 4009-2015 under inheritance

  A situation in which an information system or application receives protection from security controls (or portions of security controls) that are developed, implemented, and assessed, authorized, and monitored by entities other than those responsible for the system or application; entities either internal or external to the organization where the system or application resides. See common control.
Source(s):
CNSSI 4009-2015 (NIST SP 800-53A Rev. 1)