U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

This is an archive
(replace .gov by .rip)

NISTIR 8011 Vol. 2

Automation Support for Security Control Assessments: Volume 2: Hardware Asset Management

Date Published: June 2017

Author(s)

Kelley Dempsey (NIST), Paul Eavy (DHS), George Moore (APL)

Abstract

Keywords

actual state; assessment; assessment boundary; assessment method; authorization boundary; automated assessment; automation; capability; continuous diagnostics and mitigation; dashboard; defect; defect check; desired state specification; hardware asset management; information security continuous monitoring; inventory management; mitigation; ongoing assessment; root cause analysis; security automation; security capability; security control; security control assessment; security control item
Control Families

Audit and Accountability; Assessment, Authorization and Monitoring; Risk Assessment

Documentation

Publication:
NISTIR 8011 Vol. 2 (DOI)
Local Download

Supplemental Material:
None available

Other Parts of this Publication:
NISTIR 8011 Vol. 1
NISTIR 8011 Vol. 3
NISTIR 8011 Vol. 4

Related NIST Publications:
SP 800-53A Rev. 4
SP 800-53 Rev. 4

Document History:
02/02/16: NISTIR 8011 Vol. 2 (Draft)
06/06/17: NISTIR 8011 Vol. 2 (Final)

Topics

Security and Privacy
asset management; continuous monitoring; security automation; security controls

Technologies
hardware

Laws and Regulations
laws; OMB Circular A-130