2011
DOI: 10.6028/nist.sp.800-137
|View full text |Cite
|
Sign up to set email alerts
|

Information Security Continuous Monitoring (ISCM) for federal information systems and organizations

Abstract: The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the nation's measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analyses to advance the development and productive use of information technology. ITL's responsibilities include the development of management, administrative, technical, and… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
83
0
1

Year Published

2013
2013
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 68 publications
(84 citation statements)
references
References 0 publications
0
83
0
1
Order By: Relevance
“…Federal Information Processing Standards (FIPS) requirements demands implementation of a categorization [7], but does not require using any particular scale, thus risk comparison of users' systems is difficult.…”
Section: ) Security Requirements (Cr Ir Ar)mentioning
confidence: 99%
See 2 more Smart Citations
“…Federal Information Processing Standards (FIPS) requirements demands implementation of a categorization [7], but does not require using any particular scale, thus risk comparison of users' systems is difficult.…”
Section: ) Security Requirements (Cr Ir Ar)mentioning
confidence: 99%
“…Examples of vulnerability specifications used by NVD are: vulnerability category, vendor name, product name, published vulnerability start and end dates, vulnerability update dates, vulnerability severity, access vector, and access complexity [7].…”
Section:  Vulnerabilities Database (Nvd)mentioning
confidence: 99%
See 1 more Smart Citation
“…Examples of vulnerability specifications used by NVD are: vulnerability category, vendor name, product name, published vulnerability start and end dates, vulnerability update dates, vulnerability severity, access vector, and access complexity [13].…”
Section:  Continuous Monitoring System (Cms)mentioning
confidence: 99%
“…According to Federal Information Processing Standards (FIPS) 1995 [13], organizations assign their IT resources security importance measures based on component location in the environment, business function using it, and potential losses in case the component is damaged. U.S. government assigns every IT asset to a group of assets called a system.…”
Section: Existing Solutionsmentioning
confidence: 99%