O'Reilly logo

Official (ISC)2® Guide to the CAP® CBK®, Second Edition, 2nd Edition by Patrick D. Howard

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4

Application of Security Controls

The security controls specified in the security plan are implemented by taking into account the minimum organizational assurance requirements. The security plan describes how the controls are employed within the information system and its operational environment. The security assessment plan documents the methods for testing these controls and the expected results throughout the systems life-cycle.
Certified Authorization Professional (CAP®) Candidate Information Bulletin, November 2010

Topics

  • Security Procedures
  • Remediation Planning
  • NIST Guidance on Implementation of Security Controls

Objectives

As a Certified Authorization Professional (CAP®), you are expected to

  • Implement selected security controls ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required