Appendix A. Information Security Program Resources

National Institute of Standards and Technology (NIST) Special Publications

http://csrc.nist.gov/publications/PubsSPs.html

Image SP 800-12: An Introduction to Computer Security: The NIST Handbook

Image SP 800-14: Generally Accepted Principles and Practices for Securing Information Technology Systems

Image SP 800-16: Information Technology Security Training Requirements: A Role- and Performance-Based Model

Image SP 800-23: Guidelines to Federal Organizations on Security Assurance and Acquisition/Use of Tested/Evaluated Products

Image SP 800-30: Risk Management Guide for Information Technology Systems

Image SP 800-34: Contingency Planning Guide for Information Technology System, Revision 1

Image SP 800-37: Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach

Image SP 800-39: Managing Information Security Risk: Organization, Mission, and Information System View

Image SP 800-40: Creating a Patch and Vulnerability Management Program

Image SP 800-41: Guidelines on Firewalls and Firewall Policy

Image SP 800-42: Guidelines on Network Security Testing

Image SP 800-45: Guidelines on Electronic Mail Security

Image SP 800-46: Guide to Enterprise Telework and Remote Access Security

Image SP 800-50: Building an Information Technology Security Awareness and Training Program

Image SP 800-53: Recommended Security Controls for Federal Information Systems and Organizations

Image SP 800-57: Recommendations for Key Management—Part 1: General (Revision 3)

Image SP 800-57: Recommendations for Key Management—Part 2: Best Practices for Key Management Organization

Image SP 800-60: Guide for Mapping Types of Information and Information Systems to Security Categories (Two Volumes)

Image SP 800-61: Computer Security Incident Handling Guide

Image SP 800-64: Security Considerations in the System Development Life Cycle

Image SP 800-66: Guide to Integrating Forensic Techniques into Incident Response

Image SP 800-77: Guide to IPsec VPNs

Image SP 800-83: Guide to Malware Incident Prevention and Handling for Desktops and Laptops

Image SP 800-84: Guide to Test, Training, and Exercise Programs for Information Technology Plans and Capabilities

Image SP 800-88: Guidelines for Media Sanitization

Image SP 800-92: Guide to Computer Security Log Management

Image SP 800-94: Guide to Intrusion Detection and Prevention Systems

Image SP 800-100: Information Security Handbook: A Guide for Managers

Image SP 800-111: Guide to Storage Encryption Technologies for End User Devices

Image SP 800-113: Guide to SSL VPNs

Image SP 880-114: User’s Guide to Securing External Devices for Telework and Remote Access

Image SP 800-153: Guidelines for Securing Wireless Local Area Networks (WLANs)

Federal Financial Institutions Examination Council (FFIEC) IT Handbooks

http://ithandbook.ffiec.gov/it-booklets.aspx

Image Business Continuity Planning

Image Development and Acquisition

Image Information Security

Image (Risk) Management

Image Outsourcing Technology Services

Image Supervision of Technology Service Providers (TSP)

Department of Health and Human Services HIPAA Security Series

www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/securityruleguidance.html

1. Security 101 for Covered Entities

2. Security Standards, Administrative Safeguards

3. Security Standards, Physical Safeguards

4. Security Standards, Technical Safeguards

5. Security Standards: Organizational, Policies, and Procedures and Documentation Requirements

6. Basics of Risk Analysis and Risk Management

7. Security Standards: Implementation for the Small Provider

Payment Security Standards Council Documents Library

https://www.pcisecuritystandards.org/security_standards/documents.php

Image PCI DSS v3.0

Image PCI DSS Summary of Changes v2.0 to v3.0

Image PCI DSS Quick Start Guide

Information Security Professional Development and Certification Organizations

Image International Information Systems Security Certification Consortium (ISC2): www.isc2.org

Image Information Systems Audit and Control Association (ISACA): www.isaca.org

Image Information Systems Security Association, Inc. (ISSA): www.issa.org

Image SANS Institute: www.sans.org

Image Disaster Recovery Institute (DRI): www.drii.org

Image The Institute of Internal Auditors: www.theiia.org

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.133.158.36