GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Assessing Information Security Continuous Monitoring (ISCM) Programs: Developing an ISCM Program Assessment

This publication describes an approach for the development of Information Security Continuous Monitoring (ISCM) program assessments that can be used to evaluate ISCM programs within federal, state, and local governmental organizations and commercial enterprises. An ISCM program assessment provides organizational leadership with information on the effectiveness and completeness of the organization’s ISCM program, including the review of ISCM strategies, policies, procedures, operations, and analysis of continuous monitoring data. The ISCM assessment approach can be used as presented or as the starting point for an organization-specific methodology. It includes example evaluation criteria and assessment procedures that can be applied to organizations.

  • Author(s):
  • Kelley Dempsey
  • Victoria Yan Pillitteri
  • Chad Baer
  • Robert Niemeyer
  • Ron Rudman
  • Susan Urban
  • Share this:
  • Share on Facebook
  • Share on Twitter
  • Share via Email
  • Share on LinkedIn
Assessing Information Security Continuous Monitoring (ISCM) Programs: Developing an ISCM Program Assessment
Format:
  • White Paper
Topics:
Website:Visit Publisher Website
Publisher:National Institute of Standards and Technology (NIST)
Published:May 1, 2020
License:Public Domain

Featured Content

Contact Publisher

Claim Content