How to implement Security Controls

How to Implement Security Controls

Step 3 of the Risk Managment Framework requires an organization to implement security controls and describe how the controls are employed within the information system and its environment of operation. Policies and configuration settings should be tailored to each device to align with the required security documentation.

References: FIPS Publication 200; NIST Special Publications 800-34, 800-61, 800-128; CNSS Instruction 1253; Web: SCAP.NIST.GOV.

Previous
Previous

How to monitor security controls