<p>This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. <i>FISMA Compliance Handbook Second Edition </i>explains what the requirements are for FISMA compliance and why FISMA compliance is mandated by federal law. The evolution of Certification and Ac
FISMA Compliance Handbook: Second Edition
β Scribed by Laura P. Taylor
- Publisher
- Syngress
- Year
- 2013
- Tongue
- English
- Leaves
- 350
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. FISMA Compliance Handbook Second Edition explains what the requirements are for FISMA compliance and why FISMA compliance is mandated by federal law. The evolution of Certification and Accreditation is discussed.
This book walks the reader through the entire FISMA compliance process and includes guidance on how to manage a FISMA compliance project from start to finish. The book has chapters for all FISMA compliance deliverables and includes information on how to conduct a FISMA compliant security assessment.
Various topics discussed in this book include the NIST Risk Management Framework, how to characterize the sensitivity level of your system, contingency plan, system security plan development, security awareness training, privacy impact assessments, security assessments and more. Readers will learn how to obtain an Authority to Operate for an information system and what actions to take in regards to vulnerabilities and audit findings.
FISMA Compliance Handbook Second Edition, also includes all-new coverage of federal cloud computing compliance from author Laura Taylor, the federal government's technical lead for FedRAMP, the government program used to assess and authorize cloud products and services.
- Includes new information on cloud computing compliance from Laura Taylor, the federal government's technical lead for FedRAMP
- Includes coverage for both corporate and government IT managers
- Learn how to prepare for, perform, and document FISMA compliance projects
- This book is used by various colleges and universities in information security and MBA curriculums.
π SIMILAR VOLUMES
<p>While many agencies struggle to comply with Federal Information Security Management Act (FISMA) regulations, those that have embraced its requirements have found that their comprehensive and flexible nature provides a sound security risk management framework for the implementation of essential sy
<P>While many agenciesΒ struggle to comply with Federal Information Security Management Act (FISMA) regulations, those that have embraced its requirements have found that their comprehensive and flexible nature provides a sound security risk management framework for the implementation of essential sy
Large-scale data loss and data privacy compliance breaches continue to make headline news, highlighting the need for stringent data protection policies, especially when personal or commercially sensitive information is at stake. While regulations and legislation exist to address these issues, how or
<p><i>Job Hazard Analysis: A Guide for Voluntary Compliance and Beyond, Second Edition, </i>provides a complete reference for performing JHA and setting up a JHA program. The book identifies the basic job steps and tasks, their associated hazards and risks, and safe operating procedures and hazard c