GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Assessing Information Security Continuous Monitoring (ISCM) Programs: Developing an ISCM Program Assessment

This publication describes an approach for the development of Information Security Continuous Monitoring (ISCM) program assessments that can be used to evaluate ISCM programs within federal, state, and local governmental organizations and commercial enterprises. An ISCM program assessment provides organizational leadership with information on the effectiveness and completeness of the organization’s ISCM program, including the review of ISCM strategies, policies, procedures, operations, and analysis of continuous monitoring data. The ISCM assessment approach can be used as presented or as the starting point for an organization-specific methodology. It includes example evaluation criteria and assessment procedures that can be applied to organizations.

  • Author(s):
  • Kelley Dempsey
  • Victoria Yan Pillitteri
  • Chad Baer
  • Robert Niemeyer
  • Ron Rudman
  • Susan Urban
  • Share this:
  • Share on Facebook
  • Share on Twitter
  • Share via Email
  • Share on LinkedIn
Assessing Information Security Continuous Monitoring (ISCM) Programs: Developing an ISCM Program Assessment
Format:
  • White Paper
Topics:
Website:Visit Publisher Website
Publisher:National Institute of Standards and Technology (NIST)
Published:May 1, 2020
License:Public Domain

Featured Content

Contact Publisher

Claim Content

Stay Ahead of Government Policy Changes

Get exclusive access to the latest white papers, executive orders, and policy updates delivered to your inbox. Join 120K+ government professionals who rely on GovWhitePapers for critical intelligence.