The attribute of a person or enterprise that provides confidence to others of the qualifications, capabilities, and reliability of that entity to perform specific tasks and fulfill assigned responsibilities.
Sources:
CNSSI 4009-2015
NIST SP 800-37 Rev. 2
from
CNSSI 4009-2015
NIST SP 800-39
under Trustworthiness
from
CNSSI 4009
NIST SP 800-53 Rev. 5
from
CNSSI 4009-2015
NIST SP 800-53A Rev. 5
from
CNSSI 4009-2015
Computer hardware, software and procedures that—
1) are reasonably secure from intrusion and misuse;
2) provide a reasonable level of availability, reliability, and correct operation;
3) are reasonably suited to performing their intended functions; and
4) adhere to generally accepted security procedures.
Sources:
NIST SP 800-12 Rev. 1
under Trustworthy System
Worthy of being trusted to fulfill whatever critical requirements may be needed for a particular component, subsystem, system, network, application, mission, business function, enterprise, or other entity.
Sources:
NIST SP 800-160 Vol. 2 Rev. 1
The interdependent combination of attributes of a person, system, or enterprise that provides confidence to others of the qualifications, capabilities, and reliability of that entity to perform specific tasks and fulfill assigned responsibilities. The degree to which a system (including the technology components that are used to build the system) can be expected to preserve the confidentiality, integrity, and availability of the information being processed, stored, or transmitted by the system across the full range of threats.
Sources:
NIST SP 800-161r1
from
NIST SP 800-53 Rev. 5 - adapted
Worthy of being trusted to fulfill whatever critical requirements may be needed for a particular component, subsystem, system, network, application, mission, enterprise, or other entity.
Sources:
NIST SP 800-160v1r1
from
Neumann04
The degree to which the behavior of a component is demonstrably compliant with its stated requirements.
Sources:
NIST SP 800-160v1r1
under trustworthy
Worthy of being trusted to fulfill whatever critical requirements may be needed for a particular component, subsystem, system, network, application, mission, enterprise, or other entity. Note: From a privacy perspective, a trustworthy system is a system that meets specific privacy requirements in addition to meeting other critical requirements.
Sources:
NISTIR 8062
under Trustworthiness
from
Neumann04 - adapted
Worthy of being trusted to fulfill whatever critical requirements may be needed for a particular component, subsystem, system, network, application, mission, enterprise, or other entity.
Note From a privacy perspective, a trustworthy system is a system that meets specific privacy requirements in addition to meeting other critical requirements.
Sources:
NISTIR 8062
under Trustworthiness
from
Neumann04 - Derived
Worthy of being trusted to fulfill whatever critical requirements may be needed.
Sources:
NISTIR 8320A
under Trustworthy
NISTIR 8320B
under Trustworthy
from
NIST SP 800-160 Vol. 2 Rev. 1 - adapted