Security design order of precedence: Difference between revisions
Appearance
imported>Unknown user No edit summary |
imported>Unknown user No edit summary |
||
| (2 intermediate revisions by the same user not shown) | |||
(No difference)
| |||
imported>Unknown user No edit summary |
imported>Unknown user No edit summary |
||
| (2 intermediate revisions by the same user not shown) | |||
(No difference)
| |||
A design approach for minimizing the design basis for loss potential and using architectural features to provide structure for implementing engineered security features and devices.
Source: NIST SP 800-160v1r1 | Category: