U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

NIST IR 8212 (Initial Public Draft)

ISCMA: An Information Security Continuous Monitoring Program Assessment

Date Published: October 2020
Comments Due: November 13, 2020 (public comment period is CLOSED)
Email Questions to: sec-cert@nist.gov

Author(s)

Kelley Dempsey (NIST), Victoria Pillitteri (NIST), Chad Baer (DHS), Ron Rudman (MITRE), Robert Niemeyer (MITRE), Susan Urban (MITRE)

Announcement

Draft NIST Interagency Report (NISTIR) 8212 provides an operational approach to the assessment of an organization's information security continuous monitoring (ISCM) program.  The ISCM assessment (ISCMA) approach is consistent with the ISCM Program Assessment, as described in NIST SP 800-137A, Assessing ISCM Programs: Developing an ISCM Program Assessment.  The ISCMA process proceeds according to the following five steps:

  1. Plan the approach
  2. Evaluate the elements
  3. Score the judgments
  4. Analyze the results
  5. Formulate actions

Included with the ISCMA approach in this report is ISCMAx, a free, publicly-available working implementation of ISCMA that can be tailored to fit the needs of the implementing organization. ISCMAx produces a detailed scorecard, associated graphical output, and identifies conditions that may warrant further analysis. The ISCMAx tool is a Microsoft Excel application and can be used in the Windows operating system; it does not run on the Macintosh operating system. NISTIR 8212 provides complete instructions for both using ISCMAx as provided, and for tailoring ISCMAx, if desired.

See the Supplemental Material on this page for two ISCMAx tool macro-enabled spreadsheets, for Recommended Judgments and Alternate Judgments. For instructions on how to use those workbooks, please refer to Sections 3, 4, and 5 of Draft NISTIR 8212.

We encourage you to use the comment template for organizing and submitting your comments.

NOTE: A call for patent claims is included on page vi of this draft. For additional information, see the Information Technology Laboratory (ITL) Patent Policy--Inclusion of Patents in ITL Publications.

Abstract

Keywords

assessment; continuous monitoring; information security continuous monitoring; information security continuous monitoring assessment; ISCM; ISCMA; ISCMAx
Control Families

None selected