Important Notice: Our web hosting provider recently started charging us for additional visits, which was unexpected. In response, we're seeking donations. Depending on the situation, we may explore different monetization options for our Community and Expert Contributors. It's crucial to provide more returns for their expertise and offer more Expert Validated Answers or AI Validated Answers. Learn more about our hosting issue here.

How should NSTISSP #11 be viewed?

nstissp viewed
0
Posted

How should NSTISSP #11 be viewed?

0

NSTISSP #11 should be viewed as a tool for evaluating the security functionality provided by COTS IA and IA-enabled IT products at various robustness levels. A comprehensive risk management program must be considered from the outset in the design, acquisition and operation of all Information Technology (IT) systems. During the initial design phase of any information system, security considerations must be included. However, compliance with the policy in its most simplistic form (i.e., feel comfortable that a properly evaluated product has been acquired), should not be viewed as an “end result” IA solution in and by itself. The use of properly evaluated products certainly contributes toward the security and assurance of the overall system where they are employed and should be an important factor in IT procurement decisions. From an overall security perspective, however a properly evaluated product is only a part of the security solution. Other complementary controls are needed including

Related Questions

What is your question?

*Sadly, we had to bring back ads too. Hopefully more targeted.

Experts123