Official (ISC)2® Guide to the CAP® CBK®
eBook - ePub

Official (ISC)2® Guide to the CAP® CBK®

Patrick D. Howard

Buch teilen
  1. 462 Seiten
  2. English
  3. ePUB (handyfreundlich)
  4. Über iOS und Android verfügbar
eBook - ePub

Official (ISC)2® Guide to the CAP® CBK®

Patrick D. Howard

Angaben zum Buch
Buchvorschau
Inhaltsverzeichnis
Quellenangaben

Über dieses Buch

Significant developments since the publication of its bestselling predecessor, Building and Implementing a Security Certification and Accreditation Program, warrant an updated text as well as an updated title. Reflecting recent updates to the Certified Authorization Professional (CAP) Common Body of Knowledge (CBK) and NIST SP 800-37, the Official

Häufig gestellte Fragen

Wie kann ich mein Abo kündigen?
Gehe einfach zum Kontobereich in den Einstellungen und klicke auf „Abo kündigen“ – ganz einfach. Nachdem du gekündigt hast, bleibt deine Mitgliedschaft für den verbleibenden Abozeitraum, den du bereits bezahlt hast, aktiv. Mehr Informationen hier.
(Wie) Kann ich Bücher herunterladen?
Derzeit stehen all unsere auf Mobilgeräte reagierenden ePub-Bücher zum Download über die App zur Verfügung. Die meisten unserer PDFs stehen ebenfalls zum Download bereit; wir arbeiten daran, auch die übrigen PDFs zum Download anzubieten, bei denen dies aktuell noch nicht möglich ist. Weitere Informationen hier.
Welcher Unterschied besteht bei den Preisen zwischen den Aboplänen?
Mit beiden Aboplänen erhältst du vollen Zugang zur Bibliothek und allen Funktionen von Perlego. Die einzigen Unterschiede bestehen im Preis und dem Abozeitraum: Mit dem Jahresabo sparst du auf 12 Monate gerechnet im Vergleich zum Monatsabo rund 30 %.
Was ist Perlego?
Wir sind ein Online-Abodienst für Lehrbücher, bei dem du für weniger als den Preis eines einzelnen Buches pro Monat Zugang zu einer ganzen Online-Bibliothek erhältst. Mit über 1 Million Büchern zu über 1.000 verschiedenen Themen haben wir bestimmt alles, was du brauchst! Weitere Informationen hier.
Unterstützt Perlego Text-zu-Sprache?
Achte auf das Symbol zum Vorlesen in deinem nächsten Buch, um zu sehen, ob du es dir auch anhören kannst. Bei diesem Tool wird dir Text laut vorgelesen, wobei der Text beim Vorlesen auch grafisch hervorgehoben wird. Du kannst das Vorlesen jederzeit anhalten, beschleunigen und verlangsamen. Weitere Informationen hier.
Ist Official (ISC)2® Guide to the CAP® CBK® als Online-PDF/ePub verfügbar?
Ja, du hast Zugang zu Official (ISC)2® Guide to the CAP® CBK® von Patrick D. Howard im PDF- und/oder ePub-Format sowie zu anderen beliebten Büchern aus Computer Science & Cyber Security. Aus unserem Katalog stehen dir über 1 Million Bücher zur Verfügung.

Information

Jahr
2016
ISBN
9781466576032
Chapter 1

Security Authorization of Information Systems

Security authorization includes a tiered risk management approach to evaluate both strategic and tactical risk across the enterprise. The authorization process incorporates the application of a Risk Management Framework (RMF), a review of the organizational structure, and the business process/mission as the foundation for the implementation and assessment of specified security controls. This authorization management process identifies vulnerabilities and countermeasures and determines residual risks. The residual risks are evaluated and deemed either acceptable or unacceptable. More controls must be implemented to reduce unacceptable risk. The system may be deployed only when the residual risks are acceptable to the enterprise.
Certified Authorization Professional (CAP®) Candidate Information Bulletin, November 2010

Introduction

I once made the acquaintance of an information system security officer (ISSO) in a federal department who had what he defined as airtight security for his major application. During my assessment, I found that he had implemented government security authorization guidance for his application as well as could possibly be imagined and had fully documented all the controls protecting the system. Three years later when I returned to recertify the system for reauthorization, the system could not be recertified. When I was told that the ISSO had been transferred, the problem became quite clear to me. The process that the ISSO had used to protect his system was limited only to his single, well-protected application and had not been institutionalized elsewhere in the organization.
To be effective, a system authorization program must be greater than the efforts of isolated, well-intentioned individuals like this ISSO and must be implemented on an enterprise-wide level. A program implemented at this highest organizational level first and foremost permits consistency across the entire organization. Further, the implementation of a successful enterprise system authorization program can greatly promote the implementation of a likewise effective information security program for an organization.
An enterprise security authorization program can be considered successful if it provides an effective means of identifying and meeting requirements, permits efficient oversight of its activities, and provides assurance that necessary controls are implemented at the system level. For the purposes of this discussion, an enterprise program is one that supports the entire organization and that either is independent of any other program or has a significant degree of independence to implement guidance of a higher-level program. This equates to a corporate- or department-level government organization. An enterprise program is distinct from its business unit-level components, which relate to elements of the overall enterprise program. Security authorization for a line of business will normally focus on an interrelated grouping of information technology systems that support a tightly focused business function.
The information contained in this chapter applies to efforts to build an enterprise security authorization program from the ground up, as well as efforts to expand an existing program with additional capabilities or with a revised orientation. This chapter discusses the ingredients necessary to construct a successful enterprise system authorization program. This includes information sections on key elements of such a program; a detailed discussion of system authorization roles and responsibilities; incorporation of system authorization into the system development life cycle (SDLC); causes of the failure of many system security authorization programs; system authorization project planning; elements of an organization-level system inventory process; and the work of dealing with interconnected systems. Also, this chapter provides an overview of the application of the Risk Management Framework (RMF) of the National Institute of Standards and Technology (NIST) to information systems as well as fundamentals of information system risk management according to NIST Special Publication (SP) 800-37, Revision 1.
System authorization is a comprehensive methodology that consists of a number of individual processes, most of which the reader will probably recognize. It is the combining of these related processes into a unified risk management approach that gives...

Inhaltsverzeichnis