Skip to Main Content
Information Security Policy Development for Compliance
book

Information Security Policy Development for Compliance

by Barry L. Williams
April 2016
Intermediate to advanced content levelIntermediate to advanced
152 pages
4h 9m
English
Auerbach Publications
Content preview from Information Security Policy Development for Compliance
97
InformatIon SecurIty PolIcy DeveloPment for comPlIance
SC-12 CRYPTOGRAPHIC KEY ESTABLISHMENT AND
MANAGEMENT
Control: e organization establishes and manages cryptographic keys
for required cryptography employed within the information system.
SC-13 USE OF CRYPTOGRAPHY
Control: e information system implements required cryptographic
protections using cryptographic modules that comply with applicable
federal laws, Executive Orders, directives, policies, regulations, stan-
dards, and guidance.
SC-14 PUBLIC ACCESS PROTECTIONS
Control: e information system protects the integrity and availability
of publicly available information and applications.
SC-15 COLLABORATIVE COMPUTING DEVICES
Control: e information system:
a. Prohibits remote activatio
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Writing Information Security Policies

Writing Information Security Policies

Scott Barman

Publisher Resources

ISBN: 9781466580589