Cybersecurity Governance
                      
                        
							- Comprehensive cyber security strategy
- Governing security policies
- Standards-ensuring procedures and guidelines comply with policies
- Institutionalized metrics and monitoring processes
 
                   
                 
               
              
                
                  
                  
                    
                      Information Risk Management (IRM)
                      
                        
							- Risk management strategies
- Risk assessment
- Risk treatment
- Acceptance of residual risk
- Risk communication and continuous monitoring (strategies)
- POAM Reviews
 
                   
                 
               
              
                
                  
                  
                    
                      Risk Management Framework (RMF)
                      
                        
							- Systems categorization
- Security authorization packages
- Security controls implementation 
- Risk assessment reports (RAR)
- POAM validation
- Change Management & Configuration Review Board (CM&CCB)
- FISMA Compliance & Reporting
 
                   
                 
               
              
                
                  
                  
                    
                       Cloud Computing & Security
                      
                        
							- Security documentation development
- Deliverables and security identification
- Data-in-transit
- Data-at rest
- Data integrity
- DevOps pipeline security
- Risk assessments
- Security controls implementation
- Cell level security
 
                   
                 
               
              
                
                  
                  
                    
                       Software and Application Security
                      
                        
							- Mobile code analysis and reviews
- Malicious code analysis and reviews
- Code analysis and reviews
- Security controls implementations
- Risk assessments & mitigation
- Scans
- POAM
 
                   
                 
               
              
                
                  
                  
                    
                       Continuity of Operations (COOP) & Disaster Recovery
                      
                        
							- FedRAMP compliance
- Identify Mission Essential Functions
- Development of Continuity Plans 
- Business Impact Assessments (BIA)
- Identify preventive controls
- Develop Recovery Strategies
- Conduct Site Surveys
- Exercises & Test drills
 
                   
                 
               
             
           
        
      
      
      
      
      © 2011-2017 DATechNet.com, All Rights Reserved. 
      
      Managed by: 
CWDOT4.com