Transcription of Job Aid: Security Configuration Assessment of Information ...
{{id}} {{{paragraph}}}
job aid : Security Configuration Assessment of Information Systems (IS). Using this job aid This job aid provides an overview of the process for assessing the technical Security controls and system Configuration of contractor Information systems (IS) using the Defense Information system Agency (DISA) vulnerability scanning protocols in accordance with the National Industrial Security Program (NISP). The steps the Information system Security Professional (ISSP), Information system Security Officer (ISSO), or Information system Security Manager (ISSM), if applicable, must follow are: 1.
Center for Development of Security Excellence Page 1 Job Aid: Security Configuration Assessment of Information Systems (IS) Using this job aid This job aid provides an overview of the process for assessing the technical security controls and system configuration of contractor
Domain:
Source:
Link to this page:
Please notify us if you found a problem with this document:
{{id}} {{{paragraph}}}
Assessment Management Systems, Auditing Process-based Quality Management Systems, Learning Outcomes Assessment in Community Colleges, Assessment, Management, EPortfolio for Assessment of Learning, Systems, State of Human Resource Management, Risk Management Framework RMF, Assessment, Accountability, and Improvement