User

An individual (person), organization, device, or process. Used interchangeably with “party”. 

Get Certified Get Ahead

See the following under Entity for more information: 
NIST SP 800-56A Rev. 2.  
NIST SP 800-56B Rev. 1
NIST SP 800-102.  
NIST SP 800-133.  
NIST SP 800-89.  
NIST SP 800-57 Part 1 Rev. 4.  


Individual or (system) process authorized to access an information system. 

See the following for more information: 
FIPS 200 under USER .
NIST SP 800-18 Rev. 1 under User.

Individual, or (system) process acting on behalf of an individual, authorized to access an information system.
 
See NIST SP 800-53 Rev. 4 under User  for more information. 
 
An FCKMS role that utilizes the key-management services offered by an FCKMS service provider. 
 
See NIST SP 800-152 under User for more information. 
 
  1. Individual, or (system) process acting on behalf of an individual, authorized to access an information system. 
 
See NIST SP 800-53 Rev. 4 for more information. 
 
  2. An individual who is required to use COMSEC material in the performance of his/her official duties and who is responsible for safeguarding that COMSEC material.
 
See  NSA/CSS Manual Number 3-16 (COMSEC) for more information. 
 
 An individual (person), organization, device or a combination thereof. “Party” is a synonym. In this Recommendation, an entity may be a functional unit that executes certain processes. 
 
See NIST SP 800-108 under Entity for more information. 
 
Individual, or (system) process acting on behalf of an individual, authorized to access an information system. [Note: With respect to SecCM, an information system user is an individual who uses the information system functions, initiates change requests, and assists with functional testing.] 
 
See NIST SP 800-128 under Information System User  for more information. 
 
The term user refers to an individual, group, host, domain, trusted communication channel, network address/port, another netwoik, a remote system (e.g., operations system), or a process (e.g., service or program) that accesses the network, or is accessed by it, including any entity that accesses a network support entity to perform OAM&Prelated tasks. Regardless of their role, users must be required to successfully pass an identification and authentication (I&A) mechanism. For example, I&A would be required for a security or system administrator. For customers, I&A could be required for billing purposes. For some services (e.g.. Emergency Services) a customer may not need to be authenticated by the system. 
 
See NIST SP 800-13 under User for more information. 
 
The entity, human or machine, that is identified by the userID, authenticated prior to system access, the subject of all access control decisions, and held accountable via the audit reporting system. 
 
See NISTIR 5153 under User for more information. 
 
Person who interacts with the product. 
 
See NISTIR 8040 under User (ISO 9241-11:1998) for more information. 
 
 A consumer of the services offered by an RP. 
 
See NISTIR 8149 under User for more information. 

Share this Post