Trusted Path
nounid
4504·updated May 9, 2026candidate
A mechanism by which a user (through an input device) can communicate directly with the security functions of the information system with the necessary confidence to support the system security policy. This mechanism can only be activated by the user or the security functions of the information system and cannot be imitated by untrusted software.
polysemousMWE
Classifications
Entity Type
Control92%llm-generatedllm:claude-haiku-4-5
Sensitivity
Regulated85%llm-generatedllm:claude-haiku-4-5
Information Class
unclassified
Variants
- plural
- Trusted Paths
- possessive
- Trusted Path's
- pluralpossessive
- Trusted Paths'
Framework definitions
- §1
- A mechanism by which a user (through an input device) can communicate directly with the security functions of the information system with the necessary confidence to support the system security policy. This mechanism can only be activated by the user or the security functions of the information system and cannot be imitated by untrusted software.
- §2 · sense_2_pending_review
- A means by which an operator and a target of evaluation security function can communicate with the necessary confidence to support the target of evaluation security policy.
- §1
- A mechanism by which a user (through an input device) can communicate directly with the security functions of the information system with the necessary confidence to support the system security policy. This mechanism can only be activated by the user or the security functions of the information system and cannot be imitated by untrusted software.
- §1
- A mechanism by which a user (through an input device) can communicate directly with the security functions of the information system with the necessary confidence to support the system security policy. This mechanism can only be activated by the user or the security functions of the information system and cannot be imitated by untrusted software.
- §1
- A means by which an operator and a target of evaluation security function can communicate with the necessary confidence to support the target of evaluation security policy.
Outgoing relationships
No outgoing triples
This term is not the subject of any RDF-style relationship yet.
Incoming relationships
No incoming triples
No other term currently asserts a relationship to this one.