Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).
NIST Authors in Bold
|Author(s):||Kelley L. Dempsey; L A. Johnson; Matthew A. Scholl; Kevin M. Stine; Alicia Clay Jones; Angela Orebaugh; Nirali S. Chawla; Ronald Johnston;|
|Title:||Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations|
|Published:||September 30, 2011|
|Abstract:||The purpose of this guideline is to assist organizations in the development of a continuous monitoring strategy and the implementation of a continuous monitoring program providing visibility into organizational assets, awareness of threats and vulnerabilities, and visibility into the effectiveness of deployed security controls. It provides ongoing assurance that planned and implemented security controls are aligned with organizational risk tolerance as well as the information needed to respond to risk in a timely manner should observations indicate that the security controls are inadequate.|
|Citation:||Special Publication (NIST SP) - 800-137|
|Keywords:||continuous monitoring, ISCM, information security, security, risk management|
|Research Areas:||Computer Security, Cybersecurity|