This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. FISMA Compliance Handbook Second Edition explains what the requirements are for FISMA compliance and why FISMA compliance is mandated by federal law. The evolution of Certification and Accreditation is discussed.
This book walks the reader through the entire FISMA compliance process and includes guidance on how to manage a FISMA compliance project from start to finish. The book has chapters for all FISMA compliance deliverables and includes information on how to conduct a FISMA compliant security assessment.
Various topics discussed in this book include the NIST Risk Management Framework, how to characterize the sensitivity level of your system, contingency plan, system security plan development, security awareness training, privacy impact assessments, security assessments and more. Readers will learn how to obtain an Authority to Operate for an information system and what actions to take in regards to vulnerabilities and audit findings.
FISMA Compliance Handbook Second Edition, also includes all-new coverage of federal cloud computing compliance from author Laura Taylor, the federal government's technical lead for FedRAMP, the government program used to assess and authorize cloud products and services.
- Includes new information on cloud computing compliance from Laura Taylor, the federal government's technical lead for FedRAMP
- Includes coverage for both corporate and government IT managers
- Learn how to prepare for, perform, and document FISMA compliance projects
- This book is used by various colleges and universities in information security and MBA curriculums.
Table of Contents
Chapter 1. FISMA Compliance Overview
Chapter 2. FISMA Trickles into the Private Sector
Chapter 3. FISMA Compliance Methodologies
Chapter 4. Understanding the FISMA Compliance Process
Chapter 5. Establishing a FISMA Compliance Program
Chapter 6. Getting Started on Your FISMA Project
Chapter 7. Preparing the Hardware and Software Inventory
Chapter 8. Categorizing Data Sensitivity
Chapter 9. Addressing Security Awareness and Training
Chapter 10. Addressing Rules of Behavior
Chapter 11. Developing an Incident Response Plan
Chapter 12. Conducting a Privacy Impact Assessment
Chapter 13. Preparing the Business Impact Analysis
Chapter 14. Developing the Contingency Plan
Chapter 15. Developing a Configuration Management Plan
Chapter 16. Preparing the System Security Plan
Chapter 17. Performing the Business Risk Assessment
Chapter 18. Getting Ready for Security Testing
Chapter 19. Submitting the Security Package
Chapter 20. Independent Assessor Audit Guide
Chapter 21. Developing the Security Assessment Report
Chapter 22. Addressing FISMA Findings
Chapter 23. FedRAMP: FISMA for the Cloud