2020
DOI: 10.6028/nist.sp.800-137a-draft
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Assessing Information Security Continuous Monitoring (ISCM) Programs:

Abstract: Authority 58 This publication has been developed by NIST in accordance with its statutory responsibilities under the 59 Federal Information Security Modernization Act (FISMA) of 2014, 44 U.S.C. § 3551 et seq., Public Law 60 (P.L.) 113-283. NIST is responsible for developing information security standards and guidelines, including 61 minimum requirements for federal information systems, but such standards and guidelines shall not apply 62 to national security systems without the express approval of appropriate … Show more

Help me understand this report
View published versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 0 publications
0
0
0
Order By: Relevance
“…An effective ISCM program maintains a picture of an organization's security posture, presents security-related data, and incorporates results to portray greater situational awareness (Mell et al, 2012;Dempsey et al, 2020). Through constant observation and analysis, ISCM provides visibility into assets, awareness of vulnerabilities and threats, and improves overall cyber situational awareness.…”
Section: Introductionmentioning
confidence: 99%
“…An effective ISCM program maintains a picture of an organization's security posture, presents security-related data, and incorporates results to portray greater situational awareness (Mell et al, 2012;Dempsey et al, 2020). Through constant observation and analysis, ISCM provides visibility into assets, awareness of vulnerabilities and threats, and improves overall cyber situational awareness.…”
Section: Introductionmentioning
confidence: 99%