DoDI 8510.1 Definitions Flashcards
application
Software program that performs a specific function directly for a user and can be executed without access to system control, monitoring, or administrative privileges.
authorization
Access privileges granted to a user, program, or process or the act of granting those privileges
authorization boundary
All components of an information system to be authorized for operation by an authorizing official and excludes separately authorized systems, to which the information system is connected.
Authorizing Official (AO)
Senior (federal) official or executive with the authority to formally assume responsibility for operating an information system at an acceptable level of risk to organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, and the Nation.
AODR
An organizational official acting on behalf of an AO in carrying out and coordinating the required activities associated with security authorization
Authorization (to Operate) (ATO)
The official management decision given by a senior organizational official to authorize operation of an information system and to explicitly accept the risk to organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, and the Nation based on the implementation of an agreed-upon set of security controls.
control correlation identifier (CCI)
Decomposition of an NIST control into single, actionable, measurable statement.
common controls
Controls inherited by organizational information systems
cross domain solution (CDS)
A form of controlled interface that provides the ability to manually and/or automatically access and/or transfer information between different security domains.
cybersecurity
Prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communications services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and nonrepudiation.
DoD IT
DoD-owned IT and DoD-controlled IT. DoD IT includes IS, PIT, IT services, and IT products.
enclave
Collection of information systems connected by one or more internal networks under the control of a single authority and security policy. The systems may be structured by physical proximity or by function, independent of location.
hardware
The physical components of an information system.
Interim Approval To Test (IATT)
Temporary authorization to test an information system in a specified operational information environment within the timeframe and under the conditions or constraints enumerated in the written authorization.
IT product
Individual IT hardware or software items. Products can be commercial or government provided and include, but are not limited to, operating systems, office productivity software, firewalls, and routers.
IT Service
A capability provided to one or more DoD entities by an internal or external provider based on the use of information technology and that supports a DoD mission or business process. An IT Service consists of a combination of people, processes, and technology.