O'Reilly logo

FISMA and the Risk Management Framework by Daniel R. Philpott, Stephen D. Gantz

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 14

Continuous Monitoring

Information in this chapter:

• The Role of Continuous Monitoring in Security Management

• Continuous Monitoring and the Risk Management Framework

• Developing a Continuous Monitoring Strategy

• Agency and System Level Perspectives on Continuous Monitoring

• Approaches, Tools, and Techniques for Continuous Monitoring

Information system security focuses on two fundamental activities: implementing and correctly configuring security controls to reduce risk to an acceptable level, and—recognizing that this first activity is difficult or impossible to do perfectly—testing and monitoring the system and its environment to understand whether the controls are providing the intended level of protection [1]. Once systems are ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required