Information security continuous monitoring (ISCM) process: Difference between revisions
Appearance
imported>Unknown user No edit summary |
imported>Unknown user No edit summary |
||
| Line 1: | Line 1: | ||
{{LanguageHeader|en}} | {{LanguageHeader|en}} | ||
{{CyberTerm|definition=A process to: • Define an ISCM strategy; • Establish an ISCM program; • Implement an ISCM program; • Analyze data and Report findings; • Respond to findings; and • Review and Update the ISCM strategy and program.|source=CNSSI 4009-2015}} | {{CyberTerm|definition=A process to: | ||
• Define an ISCM strategy; | |||
• Establish an ISCM program; | |||
• Implement an ISCM program; | |||
• Analyze data and Report findings; | |||
• Respond to findings; and | |||
• Review and Update the ISCM strategy and program.|source=CNSSI 4009-2015}} | |||
Revision as of 01:42, 15 January 2026
Information security continuous monitoring (ISCM) process
A process to: • Define an ISCM strategy; • Establish an ISCM program; • Implement an ISCM program; • Analyze data and Report findings; • Respond to findings; and • Review and Update the ISCM strategy and program.
Source: CNSSI 4009-2015 | Category: