How Can We Help?
Environment providing sufficient assurance that applications and equipment are protected against the introduction of malicious logic during an information system life cycle. Closed security is based upon a system’s developers, operators, and maintenance personnel having sufficient clearances, authorization, and configuration control.
SOURCE: CNSSI-4009