How to monitor security controls

Continuous Monitoring programs allows government agencies to maintain the security authorization of an information system over time while operating in an environment where systems adapt to changing threats, vulnerabilities, technologies and mission/business processes. Automated support tools are not required however risk management can become near real-time through the use of automated tools. This will help with potential security incidents associated with unexpected change on different core components and their configurations as well as provide ATO (Authorization to Operate) standard reporting.

Previous
Previous

Authorize Information System

Next
Next

How to implement Security Controls