Automation Support for Security Control Assessments, Volume 2: Hardware Asset Management

Published: June 06, 2017

Author(s)

Kelley L. Dempsey, Paul Eavy, George Moore

Abstract

The NISTIR 8011 volumes focus on each individual information security capability, adding tangible detail to the more general overview given in NISTIR 8011 Volume 1, and providing a template for transition to a detailed, NIST standards-compliant automated assessment. This document, Volume 2 of NISTIR 8011, addresses the Hardware Asset Management (HWAM) information security capability. The focus of the HWAM capability is to manage risk created by unmanaged devices on a network. Unmanaged devices are targets that attackers can use to gain and more easily maintain a persistent platform from which to attack the rest of the network.
Citation: NIST Interagency/Internal Report (NISTIR) - 8011, Volume 2
Report Number:
8011, Volume 2
Pub Type: NIST Pubs

Download Paper

Keywords

actual state, assessment, assessment boundary, assessment method, authorization boundary, automated assessment, automation, capability, continuous diagnostics and mitigation, dashboard, defect, defect check, desired state specification, hardware asset management, information security continuous monitoring, inventory management, mitigation, ongoing assessment, root cause analysis, security automation, security capability, security control, security control assessment, security control item
Created June 06, 2017, Updated June 06, 2017