FISMA Compliance Handbook
Information Security professionals of all levels, systems administrators, information technology leaders, network administrators, information auditors, security managers, and an academic audience among information assurance majors.
Paperback, 350 Pages
Published: August 2013
Chapter 1: What Is Certification and Accreditation?
Chapter 2 FISMA Trickles into the Private Sector
Chapter 3: FISMA Compliance MethodologiesChapter 4: Understanding the FISMA Compliance Process
Chapter 5: Establishing a FISMA Compliance ProgramChapter 6: FISMA Compliance Project Management
Chapter 7: Preparing the Hardware and Software InventoryChapter 8: Determining the Information Sensitivity Level
Chapter 9: Addressing Security Awareness and Training RequirementsChapter 10: Addressing End-User Rules of Behavior
Chapter 11: Addressing Incident ResponseChapter 12: Performing Security Testing
Chapter 13: Conducting a Privacy Impact AssessmentChapter 14: Performing the Business Impact Analysis
Chapter 15: Developing the Contingency PlanChapter 16: Preparing the Security Assessment Report
Chapter 17: Developing a Configuration Management PlanChapter 18: Preparing the System Security Plan
Chapter 19: Before Submitting Your DocumentsChapter 20: Evaluating the Security Assessment Package for Authorization
Chapter 21: Addressing Compliance FindingsChapter 22: FedRAMP and Cloud Computing