eBook Risk Management Framework, 1st Edition

  • Published By:
  • ISBN-10: 0124047238
  • ISBN-13: 9780124047235
  • DDC: 005.8
  • Grade Level Range: College Freshman - College Senior
  • 316 Pages | eBook
  • Original Copyright 2013 | Published/Released May 2014
  • This publication's content originally published in print form: 2013
  • Price:  Sign in for price

About

Overview

The RMF allows an organization to develop an organization-wide risk framework that reduces the resources required to authorize a systems operation. Use of the RMF will help organizations maintain compliance with not only FISMA and OMB requirements but can also be tailored to meet other compliance requirements such as Payment Card Industry (PCI) or Sarbanes Oxley (SOX). With the publishing of NIST SP 800-37 in 2010 and the move of the Intelligence Community and Department of Defense to modified versions of this process, clear implementation guidance is needed to help individuals correctly implement this process. No other publication covers this topic in the detail provided in this book or provides hands-on exercises that will enforce the topics. Examples in the book follow a fictitious organization through the RMF, allowing the reader to follow the development of proper compliance measures. Templates provided in the book allow readers to quickly implement the RMF in their organization. The need for this book continues to expand as government and non-governmental organizations build their security programs around the RMF. The companion website provides access to all of the documents, templates and examples needed to not only understand the RMF but also implement this process in the reader’s own organization.

Table of Contents

Front Cover.
Half Title Page.
Title Page.
Copyright Page.
Dedication Page.
Acknowledgments.
About the Author.
Technical Editor.
Contents.
Companion Website.
1: Introduction.
2: Part 1.
3: Laws, Regulations, and Guidance.
4: Integrated Organization-Wide Risk Management.
5: The Joint Task Force Transformation Initiative.
6: System Development Life Cycle (SDLC).
7: Transitioning from the C&A Process to RMF.
8: Key Positions and Roles.
9: Part 2.
10: Lab Organization.
11: RMF Phase 1: Categorize the Information System.
12: RMF Phase 2: Selecting Security Controls.
13: RMF Phase 3: Implementing Security Controls.
14: RMF Phase 4: Assess Security Controls.
15: RMF Phase 5: Authorizing the Information System.
16: RMF Phase 6: Monitoring Security Controls.
17: The Expansion of the RMF.
18: Answers to Exercises in Chapters 9 Through 14.
19: Control Families and Classes.
20: Security Control Assessment Requirements.
21: Assessment Method Definitions, Applicable Objects, and Attributes.
Glossary.
Common Acronyms in this Book.
References.
Index.