O'Reilly logo

The Definitive Guide to the C Transformation Process by Waylon Krush, Dr. Julie Mehan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 10: AUTHORIZATION PACKAGE AND SUPPORTING EVIDENCE

It is wrong always, everywhere and for everyone to believe anything upon insufficient evidence.85

W. K. Clifford, British Mathematician and Philosopher

In this chapter:

The package: SSP, POA&M, security control assessment summary, certification statement

Supporting evidence: system inventory, security control assessment plan, security assessment report, configuration management plan, continuity of operations/contingency plan, user guides, incident response plan, privacy impact assessment, interconnection agreements

In the previous chapters, we presented a process for approaching information system authorization ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required