O'Reilly logo

Risk Management Framework by James Broad

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Appendix D: Assessment Method Definitions, Applicable Objects, and Attributes

The following paragraphs are reproduced from NIST SP 800-53A Revision 1. This appendix can assist the security control assessor with defining the depth and coverage required for the assessment of each security control. It is recommended that the reader verify that this information is accurate and up to date by validating it on the NIST website.

Examine Assessment Method

ASSESSMENT METHOD: Examine

ASSESSMENT OBJECTS: Specifications (e.g., policies, plans, procedures, system requirements, designs)

Mechanisms (e.g., functionality implemented in hardware, software, firmware)

Activities (e.g., system operations, administration, management, exercises)

DEFINITION: The process ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required