Trusted process: A procedure that has been vetted and authorized to access resources and information beyond the restrictions imposed on most processes. It has the necessary permissions to perform sensitive operations, making it crucial that its integrity and security are maintained.
Categories: CC D5: Security Operations | CCSP D3: Cloud Platform and Infrastructure Security | CISM D3: Information Security Program | CISSP D3: Security Architecture and Engineering | Security+ D5: Security Program Management and Oversight | SSCP D1: Security Concepts and Practices
« Back to Glossary Index


