Suite B compatible: Difference between revisions
Appearance
imported>Unknown user No edit summary |
imported>Unknown user No edit summary |
||
| (2 intermediate revisions by the same user not shown) | |||
| Line 1: | Line 1: | ||
{{LanguageHeader|en}} | {{LanguageHeader|en}} | ||
{{CyberTerm|definition=An information assurance (IA) or IA-enabled information technology (IT) product that: a. Uses National Security Agency (NSA)-approved public standards-based security protocols. If none are available with the necessary functionality, then uses a NSA-approved security protocol; b. Includes (as selectable capabilities) all of the Suite B cryptographic algorithms that are functionally supported by the NSA-approved security protocol(s); and c. Has been evaluated or validated in accordance with NSTISSP 11.|source=CNSSI 4009-2015}} | {{CyberTerm|definition=An information assurance (IA) or IA-enabled information technology (IT) product that: | ||
a. Uses National Security Agency (NSA)-approved public standards-based security protocols. If none are available with the necessary functionality, then uses a NSA-approved security protocol; | |||
b. Includes (as selectable capabilities) all of the Suite B cryptographic algorithms that are functionally supported by the NSA-approved security protocol(s); and | |||
c. Has been evaluated or validated in accordance with NSTISSP 11.|source=CNSSI 4009-2015}} | |||
Latest revision as of 00:24, 20 January 2026
Suite B compatible
An information assurance (IA) or IA-enabled information technology (IT) product that: a. Uses National Security Agency (NSA)-approved public standards-based security protocols. If none are available with the necessary functionality, then uses a NSA-approved security protocol; b. Includes (as selectable capabilities) all of the Suite B cryptographic algorithms that are functionally supported by the NSA-approved security protocol(s); and c. Has been evaluated or validated in accordance with NSTISSP 11.
Source: CNSSI 4009-2015 | Category: