Index

A

abuse/misuse case, 965, 976

access acknowledgement, 965

access control policy, 965

access controls. See also Access Management (AM), 965

establishing identity community, 452–453

for information assets, 525–526

modification management and, 527–528

overview of, 150–151

for technology assets, 882–883

for trusted access. See Identity Management (IM)

Access Management (AM)

achieve specific goals, 161

assign responsibility for, 165–166

collect improvement information, 173–174

correct inconsistencies, 159–160

defined, 965

enable access, 152–155

establish defined process for, 173

establish process governance, 161–162

FISMA compliance, 957

identify and involve relevant stakeholders, 168–169

insider threats and, 964

introductory notes, 149–151 ...

Get CERT® Resilience Management Model: A Maturity Model for Managing Operational Resilience now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.