<p>The RMF allows an organization to develop an organization-wide risk framework that reduces the resources required to authorize a systems operation. Use of the RMF will help organizations maintain compliance with not only FISMA and OMB requirements but can also be tailored to meet other compliance
Risk Management Framework. A Lab-Based Approach to Securing Information Systems
โ Scribed by James Broad (Auth.)
- Publisher
- Syngress
- Year
- 2013
- Tongue
- English
- Leaves
- 292
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Table of Contents
Content:
Front Matter, Pages i-ii
Copyright, Page iv
Dedication, Page v
Acknowledgments, Page vii
About the Author, Page viii
Technical Editor, Page ix
Companion Website, Page xv
Chapter 1 - Introduction, Pages 1-7
Introduction, Page 9
Chapter 2 - Laws, Regulations, and Guidance, Pages 11-22
Chapter 3 - Integrated Organization-Wide Risk Management, Pages 23-32
Chapter 4 - The Joint Task Force Transformation Initiative, Pages 33-38
Chapter 5 - System Development Life Cycle (SDLC), Pages 39-45
Chapter 6 - Transitioning from the C&A Process to RMF, Pages 47-57
Chapter 7 - Key Positions and Roles, Pages 59-68
Introduction, Page 69
Chapter 8 - Lab Organization, Pages 71-73
Chapter 9 - RMF Phase 1: Categorize the Information System, Pages 75-102
Chapter 10 - RMF Phase 2: Selecting Security Controls, Pages 103-122
Chapter 11 - RMF Phase 3: Implementing Security Controls, Pages 123-132
Chapter 12 - RMF Phase 4: Assess Security Controls, Pages 133-145
Chapter 13 - RMF Phase 5: Authorizing the Information System, Pages 147-155
Chapter 14 - RMF Phase 6: Monitoring Security Controls, Pages 157-167
Chapter 15 - The Expansion of the RMF, Pages 169-174
Appendix A: Answers to Exercises in Chapters 9 through 14, Pages 175-185
Appendix B: Control Families and Classes, Page 187
Appendix C: Security Control Assessment Requirements, Pages 189-272
Appendix D: Assessment Method Definitions, Applicable Objects, and Attributes, Pages 273-277
Glossary, Pages 279-286
Common Acronyms in this Book, Page 287
References, Page 289
Index, Pages 291-298
๐ SIMILAR VOLUMES
<p>The RMF allows an organization to develop an organization-wide risk framework that reduces the resources required to authorize a systems operation. Use of the RMF will help organizations maintain compliance with not only FISMA and OMB requirements but can also be tailored to meet other compliance
In the Digital Age you need to find new approaches for Information and Cyber Security. This book describes the risk-based approach to transform information security considering the influences of the human factor. It is intended for people who want to protect the information of an organization in a h
This guide shows how organizations can identify and manage their risks for good governance. Since the publication of PD 6668:2000, Managing Risk for Corporate Governance, upon which this book is based, there is a greater appreciation of the importance of risk management in organizations and society
<p>Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and techniques. By providing a strategy-based introduction, the reader is given a clear understanding of how to provid
Information security requires far more than the latest tool or technology. Organizations must understand exactly what they are trying to protect - and why - before selecting specific solutions. Security issues are complex and often are rooted in organizational and business concerns. A careful evalua