FISMA Compliance Handbook

Second Edition

Paperback Engels 2013 9780124058712
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. FISMA Compliance Handbook Second Edition explains what the requirements are for FISMA compliance and why FISMA compliance is mandated by federal law. The evolution of Certification and Accreditation is discussed.

This book walks the reader through the entire FISMA compliance process and includes guidance on how to manage a FISMA compliance project from start to finish. The book has chapters for all FISMA compliance deliverables and includes information on how to conduct a FISMA compliant security assessment.

Various topics discussed in this book include the NIST Risk Management Framework, how to characterize the sensitivity level of your system, contingency plan, system security plan development, security awareness training, privacy impact assessments, security assessments and more. Readers will learn how to obtain an Authority to Operate for an information system and what actions to take in regards to vulnerabilities and audit findings.

FISMA Compliance Handbook Second Edition, also includes all-new coverage of federal cloud computing compliance from author Laura Taylor, the federal government’s technical lead for FedRAMP, the government program used to assess and authorize cloud products and services.

Specificaties

ISBN13:9780124058712
Taal:Engels
Bindwijze:Paperback

Lezersrecensies

Wees de eerste die een lezersrecensie schrijft!

Inhoudsopgave

<p>1: What Is Certification and Accreditation? <br>2 FISMA Trickles into the Private Sector <br>3: FISMA Compliance Methodologies <br>4: Understanding the FISMA Compliance Process <br>5: Establishing a FISMA Compliance Program <br>6: FISMA Compliance Project Management <br>7: Preparing the Hardware and Software Inventory <br>8: Determining the Information Sensitivity Level <br>9: Addressing Security Awareness and Training Requirements <br>10: Addressing End-User Rules of Behavior <br>11: Addressing Incident Response <br>12: Performing Security Testing <br>13: Conducting a Privacy Impact Assessment <br>14: Performing the Business Impact Analysis <br>15: Developing the Contingency Plan <br>16: Preparing the Security Assessment Report <br>17: Developing a Configuration Management Plan <br>18: Preparing the System Security Plan <br>19: Before Submitting Your Documents <br>20: Evaluating the Security Assessment Package for Authorization <br>21: Addressing Compliance Findings <br>22: FedRAMP and Cloud Computing </p>

Managementboek Top 100

Rubrieken

    Personen

      Trefwoorden

        FISMA Compliance Handbook