Continuous monitoring through security automation
Abstract
This chapter focuses on security automation standards, reference architectures, and tools and techniques to assist with addressing the FedRAMP operational visibility and other Continuous Monitoring requirements.
Keywords
FedRAMP; CM requirements; security automation; CM reference architecture; CM solutions; continuous monitoring; security
Information in this chapter:
• Introduction
• CM Reference Architectures
• Security Automation Standards and Specifications
• Operational Visibility and Continuous Monitoring
Introduction
Security automation is an essential part of an information security program, enabling organizations to achieve more efficiency in monitoring activities. Not all continuous ...
Get Federal Cloud Computing, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.