About 540,000 results
Open links in new tab
  1. Information Security Continuous Monitoring (ISCM) for Federal ...

    Sep 30, 2011 · The purpose of this guideline is to assist organizations in the development of a continuous monitoring strategy and the implementation of a continuous monitoring program providing …

  2. Jun 5, 2013 · Continuous monitoring applies to all security controls implemented in organizational information systems and the environments in which those systems operate. Continuous monitoring …

  3. NIST Risk Management Framework | CSRC

    Nov 30, 2016 · At A Glance Purpose: Maintain ongoing situational awareness about the security and privacy posture of the system and organization to support risk management decisions Outcomes: …

  4. continuous monitoring - Glossary | CSRC

    Sources: CNSSI 4009-2015 under automated security monitoring Maintaining ongoing awareness to support organizational risk decisions. See Information Security Continuous Monitoring, Risk …

  5. Continuous monitoring is one of six steps in the Risk Management Framework (RMF) described in NIST Special Publication 800‐37, Revision 1, Applying the Risk Management Framework to Federal …

  6. Testable Controls and Security Capabilities for Continuous Monitoring ...

    Feb 20, 2025 · These testable controls are organized by continuous monitoring security capabilities which are sets of controls with a common defense purpose.

  7. What is Continuous Monitoring?(cont’d) Continuous Monitoring plays a central role in the NIST Risk Management Framework (RMF), which provides a structured but dynamic process for near real-time …

  8. IR 8212, ISCMA: An Information Security Continuous Monitoring …

    Mar 31, 2021 · This publication describes an example methodology for assessing an organization’s Information Security Continuous Monitoring (ISCM) program. It was developed directly from NIST …

  9. Dec 21, 2010 · Promotes near real-time risk management and ongoing system authorization through the implementation of robust continuous monitoring processes. Provides senior leaders with necessary …

  10. Assessing Information Security Continuous Monitoring (ISCM) …

    May 21, 2020 · This publication describes an approach for the development of Information Security Continuous Monitoring (ISCM) program assessments that can be used to evaluate ISCM programs …