O'Reilly logo

FISMA and the Risk Management Framework by Daniel R. Philpott, Stephen D. Gantz

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 12

Plan of Action and Milestones

Information in this chapter:

• Regulatory Background

• Structure and Content of the Plan of Action and Milestones

• Weaknesses and Deficiencies

• Producing the Plan of Action and Milestones

• Maintaining and Monitoring the Plan of Action and Milestones

• Relevant Source Material

No system is perfectly secure, and a system deemed to have adequate protective measures in place still presents some risk that the system will be compromised in a way that results in loss or damage to the organization. Information security also is not static, as the set of threats and vulnerabilities that might affect a system can and do change over time. For both of these reasons, system owners and organizational information security ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required