Term:Privileged User

From FISMApedia
Revision as of 01:03, 27 October 2009 by DanPhilpott (talk) (1 revision)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

CNSSI 4009

Privileged User - Individual who has access to system control, monitoring, or administration functions (e.g., system administrator, system ISSO, maintainers, system programmers, etc.)

DoD 8580.02-R

Privileged User - An authorized user who has access to system control, monitoring, or administration functions. DL1.42.

DoDD 8570.01

Privileged User - An authorized user who has access to system control, monitoring, administration, criminal investigation, or compliance functions. E2.1.8.

DoDI 8500.02

Privileged User - An authorized user who has access to system control, monitoring, or administration functions. E2.1.44.

DSS Glossary

Privileged User - User of an Information System with more authority and access than a general user (for example, root access, help desk support, system administrator, Information Assurance Manager/Information Assurance Officer).

GAO-09-232G

Privileged User - Individual who has access to system control, monitoring, or administration functions (e.g., system administrator, system security officer, maintainers, system programmers, etc.)

NIST SP 800-53A

Privileged User - Individual who has access to system control, monitoring, or administration functions (e.g., system administrator, information system security officer, maintainer, system programmer). [CNSS Inst. 4009]

NIST SP 800-53r1

Privileged User - Individual who has access to system control, monitoring, or administration functions (e.g., system administrator, information system security officer, maintainer, system programmer).

NIST SP 800-53r2

Privileged User - Individual who has access to system control, monitoring, or administration functions (e.g., system administrator, information system security officer, maintainer, system programmer). [CNSS Inst. 4009]

NIST SP 800-53r3

Privileged User - A user that is authorized (and therefore, trusted) to perform security-relevant functions that ordinary users are not authorized to perform. [CNSSI 4009]