[iwar] [fc:NIST.publishes.security.self-assessment.guide]

From: Fred Cohen (fc@all.net)
Date: 2001-09-26 22:16:21


Return-Path: <sentto-279987-2397-1001567715-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Wed, 26 Sep 2001 22:18:11 -0700 (PDT)
Received: (qmail 762 invoked by uid 510); 27 Sep 2001 05:16:43 -0000
Received: from n5.groups.yahoo.com (216.115.96.55) by 204.181.12.215 with SMTP; 27 Sep 2001 05:16:43 -0000
X-eGroups-Return: sentto-279987-2397-1001567715-fc=all.net@returns.onelist.com
Received: from [10.1.1.221] by hl.egroups.com with NNFMP; 27 Sep 2001 05:16:25 -0000
X-Sender: fc@big.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_3_2_2); 27 Sep 2001 05:15:15 -0000
Received: (qmail 33479 invoked from network); 27 Sep 2001 05:15:14 -0000
Received: from unknown (10.1.10.27) by 10.1.1.221 with QMQP; 27 Sep 2001 05:15:14 -0000
Received: from unknown (HELO big.all.net) (65.0.156.78) by mta2 with SMTP; 27 Sep 2001 05:16:25 -0000
Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id WAA02537 for iwar@onelist.com; Wed, 26 Sep 2001 22:16:21 -0700
Message-Id: <200109270516.WAA02537@big.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen <fc@all.net>
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Wed, 26 Sep 2001 22:16:21 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] [fc:NIST.publishes.security.self-assessment.guide]
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

NIST publishes security self-assessment guide

Available at: http://csrc.nist.gov/publications/nistbul/09-01.pdf

The National Institute of Standards and Technology (NIST) this week
released a guide for federal agencies to follow in their mandated IT
security evaluations. The "Security Self-Assessment Guide for
Information Technology Systems," a special publication by Marianne
Swanson, includes a questionnaire to determine current network and
system protection through management, operational and technical
controls. Each question includes correlating regulations or mandates and
should be used in conjunction with a detailed guidance list included in
the step-by-step guide, which complements the CIO Council's "Federal IT
Security Assessment Framework." Both guides help fulfill review
requirements under the Government Information Security Reform Act, which
requires government agencies to submit annual security reports to the
Office of Management and Budgets.

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Get your FREE VeriSign guide to security solutions for your web site: encrypting transactions, securing intranets, and more!
http://us.click.yahoo.com/UnN2wB/m5_CAA/yigFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-09-29 21:08:50 PDT