This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

NIST Template

This essay is written by:

Louis PHD Verified writer

Finished papers: 5822

4.75

Proficient in:

Psychology, English, Economics, Sociology, Management, and Nursing

You can get writing help to write an essay on these topics
100% plagiarism-free

Hire This Writer

NIST Template

The NIST SP 800-53 and FIPS 200 are policies whose intent is to ensure that all information systems apply suitable security controls and requirements. Through evaluation of risk, the policies allow agencies to authenticate their first security control choices and ascertain if extra controls are required to safeguard corporate processes, as well as corporate reputation, mission, image, and functions as well as organizational assets, other agencies, the nation, or individuals (Howard, 2016). The resultant security controls set up a level of security suitable for a particular agency. These policies have been implemented well through collaboration between themselves and other policies. For instance, for an organization to conform to the federal standards, it has to ascertain the type of security aligning to its information system in reference to FIPS Publication 199 (Howard, 2016). Next, it should use the security category outlined in FIPS 200 to obtain the information system impact level, and then appropriately apply customized security controls as delineated in SP 800-53.

NIST template

Document

Number

Document NameDateNIST Guidance
NIST Special Publication 800-53 Revision 4Security and Privacy Controls for Federal Information Systems and Organizations4/30/2013It provides guidelines concerning state-of-the-practice security controls and control enhancements addressing areas such as application security, supply chain security, cloud and mobile computing, trustworthiness, insider threat, assurance, application security, advanced persistent threat, and insider threat.
NIST Special Publication 800-53A Revision 4Assessing Security and Privacy Controls in Federal Information Systems and Organizations Building: Effective Assessment Plans12/4/2014It offers guidelines for building efficient security evaluation procedures and plans for evaluating the efficacy of security controls applied in federal information systems and organizations.
FIPS PUB 200FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION (Minimum Security Requirements for Federal Information and Information Systems)3/9/2006It constitutes a set of minimum security requirements for all information systems and federal information.

 

References

Howard, P. D. (2016). FISMA principles and best practices: Beyond compliance. CRC press.

U.S. Department of Commerce. (2014). Assessing Security and Privacy Controls in Federal Information Systems and Organizations Building Effective Assessment Plans. Retrieved from https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53Ar4.pdf

U.S. DEPARTMENT OF COMMERCE. (2006). Minimum Security Requirements for Federal Information and Information Systems. Retrieved from https://csrc.nist.gov/csrc/media/publications/fips/200/final/documents/fips-200-final-march.pdf

U.S. Department of Commerce. (2013). Security and Privacy Controls for Federal Information Systems and Organizations. Retrieved from https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf

 

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask