About 564,000 results
Open links in new tab
  1. Information Security Continuous Monitoring (ISCM) for Federal ...

    Sep 30, 2011 · The purpose of this guideline is to assist organizations in the development of a continuous monitoring strategy and the implementation of a continuous monitoring program …

  2. Jun 5, 2013 · Continuous monitoring applies to all security controls implemented in organizational information systems and the environments in which those systems operate. Continuous …

  3. NIST Risk Management Framework | CSRC

    Nov 30, 2016 · At A Glance Purpose: Maintain ongoing situational awareness about the security and privacy posture of the system and organization to support risk management decisions …

  4. Testable Controls and Security Capabilities for Continuous …

    Feb 20, 2025 · These testable controls are organized by continuous monitoring security capabilities which are sets of controls with a common defense purpose.

  5. Continuous monitoring is one of six steps in the Risk Management Framework (RMF) described in NIST Special Publication 800‐37, Revision 1, Applying the Risk Management Framework to …

  6. continuous monitoring - Glossary | CSRC

    Sources: CNSSI 4009-2015 under automated security monitoring Maintaining ongoing awareness to support organizational risk decisions. See Information Security Continuous Monitoring, Risk …

  7. What is Continuous Monitoring?(cont’d) Continuous Monitoring plays a central role in the NIST Risk Management Framework (RMF), which provides a structured but dynamic process for …

  8. IR 8212, ISCMA: An Information Security Continuous Monitoring …

    Mar 31, 2021 · This publication describes an example methodology for assessing an organization’s Information Security Continuous Monitoring (ISCM) program. It was developed …

  9. Assessing Information Security Continuous Monitoring (ISCM) …

    May 21, 2020 · This publication describes an approach for the development of Information Security Continuous Monitoring (ISCM) program assessments that can be used to evaluate …

  10. Dec 21, 2010 · Promotes near real-time risk management and ongoing system authorization through the implementation of robust continuous monitoring processes. Provides senior …