How to implement Security Controls
How to Implement Security Controls
Step 3 of the Risk Managment Framework requires an organization to implement security controls and describe how the controls are employed within the information system and its environment of operation. Policies and configuration settings should be tailored to each device to align with the required security documentation.
References: FIPS Publication 200; NIST Special Publications 800-34, 800-61, 800-128; CNSS Instruction 1253; Web: SCAP.NIST.GOV.