![]() ![]() ![]() Provides execution environments for code downloaded from remote sources.Supports browser plug-ins and extensions such as password managers for storing credentials for web server resources.Performs multiple access management functions.Software that processes content delivered by web servers over a network, and is often used as the user interface to device and service configuration functions Highly privileged software with direct access and control of underlying hardware resources and that provides the most basic and critical trust and security functions.Hypervisors and container runtime systems that support virtualized execution of operating systems and similar environments.Operating systems for servers, desktops, and mobile devices.Software that establishes or manages access and control of hardware resources (bare metal or virtualized/ containerized) and provides common services such as access control, memory management, and runtime execution environments to software applications and/or interactive users Operating systems, hypervisors, container environments Foundational for ensuring that only authorized users, systems, and devices can obtain access to sensitive information and functions.Identity provider and federation services.Software that centrally identifies, authenticates, manages access rights for, or enforces access decisions for organizational users, systems, and devices Identity, credential, and access management (ICAM) As noted previously, CISA will provide the authoritative list of software categories at a later date. This table is provided to illustrate the application of the definition of EO-critical software to the scope of the recommended initial implementation phase described above. The table below provides a preliminary list of software categories considered to be EO-critical. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |