U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

Security Protections

Abbreviation(s) and Synonym(s):

Security Controls

Definition(s):

  The management, operational, and technical controls (i.e., safeguards or countermeasures) prescribed for an information system to protect the confidentiality, integrity, and availability of the system and its information.
Source(s):
NIST SP 800-128 under Security Controls from FIPS 199
NIST SP 800-137 under Security Controls from FIPS 199
NIST SP 800-18 Rev. 1 under Security Controls from FIPS 199
NIST SP 800-30 Rev. 1 under Security Controls from FIPS 199, CNSSI 4009
NIST SP 800-34 Rev. 1 under Security Controls from FIPS 199
NIST SP 800-39 under Security Controls from FIPS 199, CNSSI 4009
NIST SP 800-60 Vol. 1 Rev. 1 under Security Controls from FIPS 199
NIST SP 800-60 Vol. 2 Rev. 1 under Security Controls from FIPS 199
NIST SP 800-82 Rev. 2 under Security Controls from FIPS 199
NISTIR 8170 under Security Controls from FIPS 199, CNSSI 4009
NIST SP 800-37 Rev. 1 [Superseded] under Security Controls from FIPS 199

  The management, operational, and technical controls (i.e., safeguards or countermeasures) prescribed for a system to protect the confidentiality, integrity, and availability of the system and its information.
Source(s):
NIST SP 800-12 Rev. 1 under Security Controls from FIPS 199

  A safeguard or countermeasure prescribed for an information system or an organization designed to protect the confidentiality, integrity, and availability of its information and to meet a set of defined security requirements.
Source(s):
NIST SP 800-53A Rev. 4 under Security Controls from NIST SP 800-53

  See “Security Protections.”
Source(s):
NIST SP 800-114 [Superseded] under Security Controls

  Measures against threats that are intended to compensate for a computer’s security weaknesses.
Source(s):
NIST SP 800-114 [Superseded]

  Protective measures used to meet the security requirements specified for IT resources.
Source(s):
NIST SP 800-47 [Superseded] under Security Controls