A mechanism by which a user (through an input device) can communicate directly with the security functions of the information system with the necessary confidence to support the system security policy. This mechanism can only be activated by the user or the security functions of the information system and cannot be imitated by untrusted software.
(NIST SP 800-53 Rev. 4)
NIST SP 800-18 Rev. 1 under Trusted Path
NIST SP 800-53 Rev. 4 under Trusted Path