- Information Security Handbook
- Darren Death
- 130字
- 2021-07-02 21:55:57
Security assessment policy
The security assessment policy establishes rules for how the organization will conduct information security testing on a new information system or information system components. This policy also establishes the rules for how information security continuous monitoring and reporting will be established for the organization.
What the security assessment policy should address:
- The periodic assessment of security controls in organizational information systems to determine if the controls are effective in their application
- The development and implementation of plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational information systems
- The authorization to operational and organizational information systems and any associated information system connections by management
- The monitoring of information system security controls on an ongoing basis to ensure the continued effectiveness of the controls
推薦閱讀
- 課課通計(jì)算機(jī)原理
- 后稀缺:自動(dòng)化與未來工作
- 大學(xué)計(jì)算機(jī)基礎(chǔ):基礎(chǔ)理論篇
- Canvas LMS Course Design
- Natural Language Processing Fundamentals
- 最后一個(gè)人類
- 控制系統(tǒng)計(jì)算機(jī)仿真
- 工業(yè)控制系統(tǒng)測試與評價(jià)技術(shù)
- DevOps Bootcamp
- 在實(shí)戰(zhàn)中成長:Windows Forms開發(fā)之路
- 統(tǒng)計(jì)挖掘與機(jī)器學(xué)習(xí):大數(shù)據(jù)預(yù)測建模和分析技術(shù)(原書第3版)
- 網(wǎng)絡(luò)脆弱性掃描產(chǎn)品原理及應(yīng)用
- 一步步寫嵌入式操作系統(tǒng)
- Natural Language Processing and Computational Linguistics
- Linux常用命令簡明手冊