Glossary Computer Security / Term
An environment in which both of the following conditions hold true:
1) Application developers (including maintainers) have sufficient clearances and authorizations to provide an acceptable presumption that they have not introduced malicious logic.
2) Configuration control provides sufficient assurance that applications and the equipment are protected against the introduction of malicious logic prior to and during the operation of system applications.
Permanent link closed security environment - Creation date 2020-06-27