Security Authorization of Information Systems
Security authorization includes a tiered risk management approach to evaluate both strategic and tactical risk across the enterprise. The authorization process incorporates the application of a Risk Management Framework (RMF), a review of the organizational structure, and the business process/missio...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buchkapitel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Security authorization includes a tiered risk management approach to evaluate
both strategic and tactical risk across the enterprise. The authorization process incorporates the application of a Risk Management Framework (RMF),
a review of the organizational structure, and the business process/mission as
the foundation for the implementation and assessment of specied security
controls. This authorization management process identies vulnerabilities and
countermeasures and determines residual risks. The residual risks are evaluated and deemed either acceptable or unacceptable. More controls must be
implemented to reduce unacceptable risk. The system may be deployed only
when the residual risks are acceptable to the enterprise. |
---|---|
DOI: | 10.1201/b12357-5 |