Critical software: Difference between revisions
Appearance
imported>Unknown user No edit summary |
imported>Unknown user No edit summary |
||
| Line 1: | Line 1: | ||
{{LanguageHeader|en}} | {{LanguageHeader|en}} | ||
{{CyberTerm|definition=Any software that has, or has direct software dependencies upon, one or more components with at least one of these attributes: · is designed to run with elevated privilege or manage privileges; · has direct or privileged access to networking or computing resources; · is designed to control access to data or operational technology; · performs a function critical to trust; or, · operates outside of normal trust boundaries with privileged access.|source=Critical Software Definition (for EO 14028)}} | {{CyberTerm|definition=Any software that has, or has direct software dependencies upon, one or more components with at least one of these attributes: | ||
· is designed to run with elevated privilege or manage privileges; | |||
· has direct or privileged access to networking or computing resources; | |||
· is designed to control access to data or operational technology; | |||
· performs a function critical to trust; or, | |||
· operates outside of normal trust boundaries with privileged access.|source=Critical Software Definition (for EO 14028)}} | |||
Revision as of 01:42, 15 January 2026
Critical software
Any software that has, or has direct software dependencies upon, one or more components with at least one of these attributes: · is designed to run with elevated privilege or manage privileges; · has direct or privileged access to networking or computing resources; · is designed to control access to data or operational technology; · performs a function critical to trust; or, · operates outside of normal trust boundaries with privileged access.
Source: Critical Software Definition (for EO 14028) | Category: