home/glossary/Compromise

Compromise

nounid 1910·updated May 12, 2026
candidate

Disclosure of information to unauthorized persons, or a violation of the security policy of a system in which unauthorized intentional or unintentional disclosure, modification, destruction, or loss of an object may have occurred.

polysemous

Classifications

Entity Type

Event0%rule-basedmulti_axis_classifier_low_confidence.v1

Sensitivity

Regulated88%llm-generatedllm:claude-haiku-4-5

Information Class

60%llm-generatedllm:claude-haiku-4-5

Variants

plural
Compromises
possessive
Compromise's
pluralpossessive
Compromises'

Framework definitions

FFIEC IT Examination Handbook - Audit, April 20121 senseview framework →
§1
To bring into danger, suspicion, or disrepute.
SEC IM Guidance Update: Cybersecurity Guidance, No. 2015-021 senseview framework →
§1
To bring into danger, suspicion, or disrepute.
NISTIR 7298: Glossary of Key Information Security Terms, Revision 22 sensesview framework →
§1
Disclosure of information to unauthorized persons, or a violation of the security policy of a system in which unauthorized intentional or unintentional disclosure, modification, destruction, or loss of an object may have occurred.
§2 · sense_2_pending_review
The unauthorized disclosure, modification, substitution, or use of sensitive data (including plaintext cryptographic keys and other CSPs).
CNSSI-4009 (Glossary of Information Assurance Terms)1 senseview framework →
§1
Disclosure of information to unauthorized persons, or a violation of the security policy of a system in which unauthorized intentional or unintentional disclosure, modification, destruction, or loss of an object may have occurred.
NIST SP 800-321 senseview framework →
§1
Disclosure of information to unauthorized persons, or a violation of the security policy of a system in which unauthorized intentional or unintentional disclosure, modification, destruction, or loss of an object may have occurred.
FIPS PUB 140-21 senseview framework →
§1
The unauthorized disclosure, modification, substitution, or use of sensitive data (including plaintext cryptographic keys and other CSPs).

Outgoing relationships

No outgoing triples
This term is not the subject of any RDF-style relationship yet.

Incoming relationships

No incoming triples
No other term currently asserts a relationship to this one.