O'Reilly logo

The Definitive Guide to the C Transformation Process by Waylon Krush, Dr. Julie Mehan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 12: AUTHORIZATION IN THE FEDERAL GOVERNMENT

Each federal agency shall develop, document, and implement an agency-wide information security program to provide information security for the information and information systems that support the operations and assets of the agency, including those provided or managed by another agency, contractor, or other source.

Federal Information Security Management Act (FISMA), 2002

In this chapter:

System security authorization boundaries Federal security authorization process

So where and how do we start the authorization process in accordance with FISMA? Well, first we need to define the boundary of the information system. We define the boundary through drawing real network boundaries, logical ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required