Search results

Jump to: navigation, search
  • [[Category:FIPS 200 Terms]] == NIST SP 800-18r1 ==
    2 KB (329 words) - 18:36, 22 March 2008
  • ===1=== ...(iii) an independent establishment as defined in [[5 U.S.C., Section 104]](1); and (iv) a wholly owned government corporation fully subject to the provi
    14 KB (1,760 words) - 04:15, 21 March 2008
  • ...800-37 Footnotes#2|<sup>'''2'''</sup>]] that support the operations[[NIST SP 800-37 Footnotes#3|<sup>'''3'''</sup>]] and assets of the agency, including ...on security]] policies, procedures, practices, and security controls[[NIST SP 800-37 Footnotes#4|<sup>'''4'''</sup>]] to be performed with a frequency de
    14 KB (1,915 words) - 03:44, 13 March 2008
  • ...em]] undergoing security [[certification]] and [[accreditation]]. Figure 3.1 provides a high-level view of the security [[certification]] and [[accredit FIGURE 3.1 SECURITY [[CERTIFICATION]] AND [[ACCREDITATION]] PROCESS
    80 KB (10,519 words) - 03:44, 13 March 2008
  • == NIST SP 800-66 == :(1) [[Health plan]] includes the following, singly or in combination:
    3 KB (453 words) - 18:37, 22 March 2008
  • NIST Special Publication 800-137 ...gy Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leader
    207 KB (28,594 words) - 11:04, 18 September 2012
  • == NIST SP 800-88r1 == ...me of 5220 [[block]] [[erasure]]. It was added to the ATA specification in part at CMRR request. For ATA drives manufactured after 2001 (Over 15 GB) have t
    851 bytes (133 words) - 18:39, 22 March 2008
  • Separation of data or information into two or more parts, each part constantly kept under control of separate authorized individuals or teams s [[Category:CNSS]] [[Category:CNSSI 4009 Terms]] [[Category:NIACAP]] [[Category:DIACAP]]
    1,004 bytes (153 words) - 18:39, 22 March 2008
  • ===1=== ...for federal information systems. When assessing agency compliance with [[NIST]] guidance, auditors, evaluators, and/or assessors [[should]] consider the
    28 KB (3,658 words) - 14:20, 20 July 2009
  • ==2.1 SECURITY CONTROL ORGANIZATION AND STRUCTURE== ...[identifier]] is assigned to uniquely identify each control family. Table 1 summarizes the classes and families in the security control catalog and the
    30 KB (4,138 words) - 14:20, 20 July 2009
  • ...izational assessment of [[risk]]; and (v) [[updating]] the [[controls]] as part of a comprehensive continuous monitoring [[process]]. ==3.1 MANAGING RISK==
    30 KB (4,019 words) - 16:16, 14 September 2009
  • ...ance section, when appropriate, for the particular security control.[[NIST SP 800-53r2 Footnotes#50|<sup>'''50'''</sup>]] ===AC-1 ACCESS CONTROL POLICY AND PROCEDURES===
    249 KB (31,794 words) - 14:19, 20 July 2009
  • ===2.1 System Boundaries=== ...under the same direct management control. Direct management control[[NIST SP 800-18r1 Footnotes#10|<sup>'''10'''</sup>]] does not necessarily imply that
    25 KB (3,415 words) - 22:19, 23 March 2008
  • ...any differences between this description and the most recent version of [[NIST Special Publication 800-53]], [[Special Publication 800-53]] remains the de ...particular time (e.g., during an assessment of a subset of the controls as part of continuous monitoring activities).
    859 KB (105,394 words) - 04:34, 22 July 2009
  • ...y in security plans and automated tools supporting the implementation of [[NIST Special Publication 800-53]], [[security controls]] and control enhancement ...systems in accordance with the [[risk management]] guidance provided in [[NIST Special Publication 800-39]] as summarized in Chapter Three of this publica
    440 KB (53,406 words) - 18:12, 2 December 2010
  • COMMON TERMS AND DEFINITIONS ...al Publication 800-53]]. Unless specifically defined in this glossary, all terms used in this publication are consistent with the definitions contained in [
    72 KB (8,841 words) - 20:15, 27 August 2010
  • ===1=== ...ral information systems. When assessing [[federal agency]] compliance with NIST Special Publications, Inspectors General, evaluators, auditors, and assesso
    27 KB (3,605 words) - 02:26, 15 September 2009
  • ...tional assessment of risk; and (iv) assessing the [[security controls]] as part of a comprehensive continuous monitoring [[process]]. ==3.1 MANAGING RISK==
    51 KB (6,969 words) - 02:26, 15 September 2009
  • ==2.1 SECURITY CONTROL ORGANIZATION AND STRUCTURE== ...the dominant characteristics of the controls in that family.</ref> Table 1-1 summarizes the classes and families in the security control catalog and the
    41 KB (5,624 words) - 02:12, 10 May 2010
  • == F.1 AUTHORIZATION PACKAGE == ...anizational [[Term:Risk Management|risk management]] strategy developed as part of the [[Term:Risk Executive (Function)|risk executive (function)]] and is
    35 KB (4,662 words) - 01:38, 24 November 2009

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)