TAILIEUCHUNG - Twenty Most Important Controls and Metrics for Effective 

Twenty Most Important Controls and Metrics for Effective Cyber Defense and Continuous FISMA Compliance Draft : February 23, 2009 NOTICE to readers of this draft document: Criticisms and suggestions are strongly encouraged. If you are actively engaged in cyber forensics, red teams, blue teams, technical incident response, vulnerability research, or cyber attack research or operations, please help make sure this document is as good as it can be. We also request support in identifying users who have implemented scalable methods for measuring compliance with these controls and producing sharable benchmarks and other types of baseline guidance that can be used to drive tool‐based assessment of as many of these controls as possible | Twenty Most Important Controls and Metrics for Effective Cyber Defense and Continuous FISMA Compliance Draft February 23 2009 NOTICE to readers of this draft document Criticisms and suggestions are strongly encouraged. If you are actively engaged in cyber forensics red teams blue teams technical incident response vulnerability research or cyber attack research or operations please help make sure this document is as good as it can be. We also request support in identifying users who have implemented scalable methods for measuring compliance with these controls and producing sharable benchmarks and other types of baseline guidance that can be used to drive tool-based assessment of as many of these controls as possible. Send criticism comments suggestions to John Gilligan jgilligan@ as well as to cag@ by March 25 2009. INTRODUCTION Securing our Nation against cyber attacks has become one of the Nation s highest priorities. To achieve this objective networks systems and the operations teams that support them must vigorously defend against external attacks. Furthermore for those external attacks that are successful defenses must be capable of thwarting detecting and responding to follow-on attacks on internal networks as attackers spread inside a compromised network. A central tenet of the US Comprehensive National Cybersecurity Initiative CNCI is that offense must inform defense . In other words knowledge of actual attacks that have compromised systems provides the essential foundation on which to construct effective defenses. The US Senate Homeland Security and Government Affairs Committee moved to make this same tenet central to the Federal Information Security Management Act in drafting FISMA 2008. That new proposed legislation calls upon Federal agencies to Establish security control testing protocols that ensure that the information infrastructure of the agency including contractor information systems operating on behalf of the .

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.