CHAPTER 7: VERIFY, VALIDATE & AUTHORIZE – CONDUCTING THE AUTHORIZATION
One must verify or expel his doubts, and convert them into the certainty of Yes or No.72
Thomas Carlyle, Scottish Essayist, Satirist, and Historian
In this chapter:
Assessing the security controls Developing the plan of action and milestones Authorizing the information system operation
The previous phase ended with the implementation of a set of security controls as defined in the system security plan. This phase begins with a review of the initial SSP and the independent assessment of the security controls and ends with a risk-based decision to either authorize or deny the operation of an information system.
Get The Definitive Guide to the C Transformation Process now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.