Security Controls Evaluation, Testing, and Assessment Handbook (2nd Ed.)
Auteur : Johnson Leighton
Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine, and test installed security controls in the world of threats and potential breach actions surrounding all industries and systems. If a system is subject to external or internal threats and vulnerabilities - which most are - then this book will provide a useful handbook for how to evaluate the effectiveness of the security controls that are in place.
Security Controls Evaluation, Testing, and Assessment Handbook shows you what your security controls are doing and how they are standing up to various inside and outside threats. This handbook provides guidance and techniques for evaluating and testing various computer security controls in IT systems.
Author Leighton Johnson shows you how to take FISMA, NIST Guidance, and DOD actions and provide a detailed, hands-on guide to performing assessment events for information security professionals who work with US federal agencies. As of March 2014, all agencies are following the same guidelines under the NIST-based Risk Management Framework. This handbook uses the DOD Knowledge Service and the NIST Families assessment guides as the basis for needs assessment, requirements, and evaluation efforts for all security controls. Each of the controls can and should be evaluated in its own unique way, through testing, examination, and key personnel interviews.
- Provides direction on how to use SP800-53A, SP800-115, DOD Knowledge Service, and the NIST Families assessment guides to implement thorough evaluation efforts for the security controls in your organization
- Shows reader how to implement proper evaluation, testing, and assessment procedures and methodologies with step-by-step walkthroughs of all key concepts
- Presents assessment techniques for each type of control, provides evidence of assessment, and proper reporting techniques
1. Introduction to Assessments 2. Risk and Security 3. Statutory & Regulatory GRC 4. Federal RMF Requirements 5. Risk Management Framework - SP 800-37, rev.1 6. Roles and Responsibilities 7. Assessment Process 8. Assessment Methods 9. Assessment Techniques for each kind of control 10. System and Network Assessments 11. Security Components Fundamentals 12. Cybersecurity Controls 13. CUI Controls 14. Evidence of Assessment 15. Reporting 16. Conclusion
Appendix A. Templates for RMF documents and artifacts commonly required or requested B. Templates for RMF Policies and Procedures by Control Family C. Assessment and Testing Tools
Date de parution : 10-2019
Ouvrage de 650 p.
À paraître, réservez-le dès maintenant
97,13 €Ajouter au panier