Actions, devices, procedures, techniques, or other measures that reduce the vulnerability of an information system.
Sources:
FIPS 200
under COUNTERMEASURES
from
CNSSI 4009
Protective measures prescribed to meet the security requirements (i.e., confidentiality, integrity, and availability) specified for an information system. Safeguards may include security features, management constraints, personnel security, and security of physical structures, areas, and devices.
Sources:
FIPS 200
under SAFEGUARDS
from
CNSSI 4009 - Adapted
The management, operational, and technical controls (i.e., safeguards or countermeasures) prescribed for an information system to protect the confidentiality, integrity, and availability of the system and its information.
Sources:
FIPS 200
under SECURITY CONTROLS
from
FIPS 199
CNSSI 4009-2015
from
FIPS 199
NIST SP 800-128
under Security Controls
from
FIPS 199
NIST SP 800-137
under Security Controls
from
FIPS 199
NIST SP 800-18 Rev. 1
under Security Controls
from
FIPS 199
NIST SP 800-30 Rev. 1
under Security Controls
from
FIPS 199, CNSSI 4009
NIST SP 800-34 Rev. 1
under Security Controls
from
FIPS 199
NIST SP 800-39
under Security Controls
from
FIPS 199, CNSSI 4009
NIST SP 800-60 Vol. 1 Rev. 1
under Security Controls
from
FIPS 199
NIST SP 800-60 Vol. 2 Rev. 1
under Security Controls
from
FIPS 199
NIST SP 800-82r3
from
FIPS 199
NISTIR 8170
under Security Controls
from
FIPS 199, CNSSI 4009
The management, operational, and technical controls (i.e., safeguards or countermeasures) prescribed for a system to protect the confidentiality, integrity, and availability of the system and its information.
Sources:
NIST SP 800-12 Rev. 1
under Security Controls
from
FIPS 199
A safeguard or countermeasure prescribed for an information system or an organization designed to protect the confidentiality, integrity, and availability of its information and to meet a set of defined security requirements.
Sources:
NIST SP 800-137A
The safeguards or countermeasures prescribed for an information system or an organization to protect the confidentiality, integrity, and availability of the system and its information.
Sources:
NIST SP 800-160 Vol. 2 Rev. 1
from
OMB Circular A-130 (2016)