CHAPTER 7: VERIFY, VALIDATE & AUTHORIZE – CONDUCTING THE AUTHORIZATION

One must verify or expel his doubts, and convert them into the certainty of Yes or No.72

Thomas Carlyle, Scottish Essayist, Satirist, and Historian

In this chapter:

Assessing the security controls Developing the plan of action and milestones Authorizing the information system operation

The previous phase ended with the implementation of a set of security controls as defined in the system security plan. This phase begins with a review of the initial SSP and the independent assessment of the security controls and ends with a risk-based decision to either authorize or deny the operation of an information system.

Figure ...

Get The Definitive Guide to the C Transformation Process now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.