

- #Description of application software categories verification
- #Description of application software categories code
Operating systems for servers, desktops, and mobile devices.Software that establishes or manages access and control of hardware resources (bare metal or virtualized/ containerized) and provides common services such as access control, memory management, and runtime execution environments to software applications and/or interactive users

Operating systems, hypervisors, container environments

#Description of application software categories code
software development tools such as code repository systems, development tools, testing software, integration software, packaging software, and deployment software.Subsequent phases may address other categories of software such as: NIST recommends that the initial EO implementation phase focus on standalone, on-premises software that has security-critical functions or poses similar significant potential for harm if compromised. Other use cases, such as software solely used for research or testing that is not deployed in production systems, are outside of the scope of this definition. The definition applies to software of all forms (e.g., standalone software, software integral to specific devices or hardware components, cloud-based software) purchased for, or deployed in, production systems and used for operational purposes. operates outside of normal trust boundaries with privileged access.performs a function critical to trust or,.is designed to control access to data or operational technology.has direct or privileged access to networking or computing resources.is designed to run with elevated privilege or manage privileges.A pointer to that information will be provided here when available.įinally, there is a set of FAQs at the bottom of the page that provides answers to questions that may arise about the interpretation of the definition, the phased approach, and other related topics.ĮO-critical software is defined as any software that has, or has direct software dependencies upon, one or more components with at least one of these attributes: At a later date, CISA will provide the authoritative list of software categories that are within the scope of the definition and to be included in the initial phase of implementation. Following that is a table with a preliminary list of software categories recommended for the initial phase along with some explanatory material. This section provides the definition of EO-critical software. Workshops on Cybersecurity Labeling of Consumer Products.Consumer Cybersecurity Labeling Pilots: The Approach and Contributions.Cybersecurity Labeling for Consumers Expand or Collapse.
#Description of application software categories verification
