Risk Management Framework: A Lab-Based Approach to Securing Information Systems
โ Scribed by James Broad
- Publisher
- Syngress
- Year
- 2013
- Tongue
- English
- Leaves
- 316
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
The RMF allows an organization to develop an organization-wide risk framework that reduces the resources required to authorize a systems operation. Use of the RMF will help organizations maintain compliance with not only FISMA and OMB requirements but can also be tailored to meet other compliance requirements such as Payment Card Industry (PCI) or Sarbanes Oxley (SOX). With the publishing of NIST SP 800-37 in 2010 and the move of the Intelligence Community and Department of Defense to modified versions of this process, clear implementation guidance is needed to help individuals correctly implement this process. No other publication covers this topic in the detail provided in this book or provides hands-on exercises that will enforce the topics. Examples in the book follow a fictitious organization through the RMF, allowing the reader to follow the development of proper compliance measures. Templates provided in the book allow readers to quickly implement the RMF in their organization. The need for this book continues to expand as government and non-governmental organizations build their security programs around the RMF. The companion website provides access to all of the documents, templates and examples needed to not only understand the RMF but also implement this process in the reader's own organization.
. A comprehensive case study from initiation to decommission and disposal
. Detailed explanations of the complete RMF process and its linkage to the SDLC
. Hands on exercises to reinforce topics
. Complete linkage of the RMF to all applicable laws, regulations and publications as never seen before
๐ SIMILAR VOLUMES
<p>The RMF allows an organization to develop an organization-wide risk framework that reduces the resources required to authorize a systems operation. Use of the RMF will help organizations maintain compliance with not only FISMA and OMB requirements but can also be tailored to meet other compliance
In the Digital Age you need to find new approaches for Information and Cyber Security. This book describes the risk-based approach to transform information security considering the influences of the human factor. It is intended for people who want to protect the information of an organization in a h
This guide shows how organizations can identify and manage their risks for good governance. Since the publication of PD 6668:2000, Managing Risk for Corporate Governance, upon which this book is based, there is a greater appreciation of the importance of risk management in organizations and society
<p>Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and techniques. By providing a strategy-based introduction, the reader is given a clear understanding of how to provid
Information security requires far more than the latest tool or technology. Organizations must understand exactly what they are trying to protect - and why - before selecting specific solutions. Security issues are complex and often are rooted in organizational and business concerns. A careful evalua