O'Reilly logo

The Definitive Guide to the C Transformation Process by Waylon Krush, Dr. Julie Mehan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 7: VERIFY, VALIDATE & AUTHORIZE – CONDUCTING THE AUTHORIZATION

One must verify or expel his doubts, and convert them into the certainty of Yes or No.72

Thomas Carlyle, Scottish Essayist, Satirist, and Historian

In this chapter:

Assessing the security controls Developing the plan of action and milestones Authorizing the information system operation

The previous phase ended with the implementation of a set of security controls as defined in the system security plan. This phase begins with a review of the initial SSP and the independent assessment of the security controls and ends with a risk-based decision to either authorize or deny the operation of an information system.

Figure ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required