Trusted Path

March 5, 2018

Trusted Path

You are here:
< Back

A mechanism by which a user (through an input device) can communicate directly with the security functions of the information system with the necessary confidence to support the system security policy. This mechanism can only be activated by the user or the security functions of the information system and cannot be imitated by untrusted software.
SOURCE: SP 800-53; CNSSI-4009

A means by which an operator and a target of evaluation security function can communicate with the necessary confidence to support the target of evaluation security policy.
SOURCE: FIPS 140-2