510 KB | 3 files | DOC, PDF
If you don't test your security measures, you can never be certain that they are working to protect your data and network. This template will help you develop a testing program to validate your security measures.
Security assessments are focused on determining if information system security controls are correctly implemented, operating as intended and are producing the desired level of security. Without security assessments, the potential exists for information systems to not be as secure as intended or desired.
This publication provides guidelines for establishing and participating in cyber threat information sharing relationships. ... More >>
This document provides recommendations and guidelines for enhancing trust in email, including transmission and content security recommendations. ... More >>
This excerpt focuses on the conceptual aspects of defect management, including the basic concepts of a defect, how to manage defects, and an analysis of the root causes of defects. ... More >>