A security assurance, in the context of nuclear warfare, is an expression of a political position by a nuclear-armed nation intended to placate other non-nuclear-armed nations. There are two types of security assurance: positive and negative.[1] A positive assurance states that the nation giving it will aid any or a particular non-nuclear-armed nation in retaliation if it is a victim of nuclear attack. A negative assurance is not the opposite but instead means that a nuclear-armed nation has promised not to use nuclear weapons except in retaliation for a nuclear attack against itself (a policy known as No first use).
Security assurances are a key part of nuclear diplomacy, and since they are statements of intent, not guarantees, they are based entirely on trust and the threat of retaliation should they be broken. Thus, Security Assurances have been issued and changed over time, and are vital tools in the Nuclear Non-Proliferation Treaty (NPT). U.S. President Barack Obama modified the specific conditions of the US Negative Security Assurance on 6 April 2010 citing "the importance of nations meeting their NPT and nuclear non-proliferation obligations."[2]
China is so far the only nation to issue a positive security assurance in April 1995, and at the same time, it issued a negative security assurance. China stated that despite its willingness to use nuclear weapons, it "[should] not in any way be construed as endorsing the use of nuclear weapons."[3] The dichotomy of such a position has led for calls to make more use of protocols attached to NWFZ (nuclear-weapon-free zone) treaties, instead of generalized security assurances.[4]
^"Negative Security Assurances (NSAs) and Positive Security Assurances (PSAs)". Nuclear Threat Initiative. Archived from the original on 2003-09-02.
^"U.S. "Negative Security Assurances" At a Glance". Arms Control Association. Retrieved 7 June 2011.
^China (1995-04-06), Letter dated 6 April 1995 from the Permanent Representative of China to the United Nations addressed to the Secretary-General., United Nations, S/1995/265, retrieved 2023-08-13
^Spector and Ohlde, Leonard S. and Aubrie. "Negative Security Assurances: Revisiting the Nuclear-Weapon-Free Zone Option". Arms Control Today. Arms Control Association. Retrieved 7 June 2011.
and 30 Related for: Security assurance information
A securityassurance, in the context of nuclear warfare, is an expression of a political position by a nuclear-armed nation intended to placate other non-nuclear-armed...
The Budapest Memorandum on SecurityAssurances comprises three substantially identical political agreements signed at the OSCE conference in Budapest...
Software securityassurance is a process that helps design and implement software that protects the data and resources contained in and controlled by that...
system users can specify their security functional and assurance requirements (SFRs and SARs, respectively) in a Security Target (ST), and may be taken...
Software assurance (SwA) is a critical process in software development that ensures the reliability, safety, and security of software products. It involves...
Assurance Level (EAL1 through EAL7) of an IT product or system is a numerical grade assigned following the completion of a Common Criteria security evaluation...
security problem in terms of TOE description, threats, assumptions, security objectives, security functional requirements (SFRs), securityassurance requirements...
superset of information security (i.e. umbrella term), and as the business outcome of information risk management. Information assurance (IA) is the process...
and the United States signed a memorandum to provide Ukraine with securityassurances in connection with its accession to the NPT as a non-nuclear weapon...
the only NPT nuclear-weapon state to give an unqualified negative securityassurance with its "no first use" policy. China acceded to the Nuclear Non-Proliferation...
incorporates security measures through collaborations with various SecurityAssurance Providers (SAP). These providers conduct testing and quality assurance for...
specification of information assurancesecurity requirements. A PP is a combination of threats, security objectives, assumptions, security functional requirements...
before they are checked for being acceptable See software securityassurance. Computer security Hacking: The Art of Exploitation IT risk Threat (computer)...
include a government incapable of tax collection, law enforcement, securityassurance, territorial control, political or civil office staffing, and infrastructure...
Cloud Security Alliance (CSA) is a not-for-profit organization with the mission to “promote the use of best practices for providing securityassurance within...
Financial SecurityAssurance (FSA) was an American financial guaranty (or monoline) insurance company. FSA was bought in 2000 for EUR€2.7 billion by the...
well-informed sense of assurance that information risks and controls are in balance." (Anderson, J., 2003) "Information security is the protection of information...
An Information AssuranceSecurity Officer (IASO) in the United States Army is primarily responsible for the security and integrity of the information...
ability to specify security requirements via Protection Profiles (PPs) for security functional requirements (SFRs) and securityassurance requirements (SARs)...
Security engineering is the process of incorporating security controls into an information system so that the controls become an integral part of the...
SABRE (SecurityAssurance by the Building Research Establishment) was launched in 2017 by the Building Research Establishment (BRE). Organisations such...
security testing (SAST) and Dynamic application security testing products, as well as products and services that support Software SecurityAssurance....
obscurity Software Security Assurance Santos, Joanna C. S.; Tarrit, Katy; Mirakhorli, Mehdi (2017). "A Catalog of Security Architecture Weaknesses". 2017...
Committee on National Security Systems Instruction No. 4009, National Information Assurance Glossary, published by the United States federal government...
Supplier relationships security Legal and compliance Information security event management; and Information_security_assurance The previous version of...
historic catalogue of hit music from the dawn of the Jazz Age. To provide assurance and interoperability through the supply chain, Guildhawk was the first...
is a British security expert and The Director of Information SecurityAssurance for Apple. Anne Saita, writing for Information Security magazine, called...