Date Published: October 2020
Comments Due: November 13, 2020 (public comment period is CLOSED)
Email Questions to: sec-cert@nist.gov
, , , , ,
Draft NIST Interagency Report (NISTIR) 8212 provides an operational approach to the assessment of an organization's information security continuous monitoring (ISCM) program. The ISCM assessment (ISCMA) approach is consistent with the ISCM Program Assessment, as described in NIST SP 800-137A, Assessing ISCM Programs: Developing an ISCM Program Assessment. The ISCMA process proceeds according to the following five steps:
Included with the ISCMA approach in this report is ISCMAx, a free, publicly-available working implementation of ISCMA that can be tailored to fit the needs of the implementing organization. ISCMAx produces a detailed scorecard, associated graphical output, and identifies conditions that may warrant further analysis. The ISCMAx tool is a Microsoft Excel application and can be used in the Windows operating system; it does not run on the Macintosh operating system. NISTIR 8212 provides complete instructions for both using ISCMAx as provided, and for tailoring ISCMAx, if desired.
See the Supplemental Material on this page for two ISCMAx tool macro-enabled spreadsheets, for Recommended Judgments and Alternate Judgments. For instructions on how to use those workbooks, please refer to Sections 3, 4, and 5 of Draft NISTIR 8212.
We encourage you to use the comment template for organizing and submitting your comments.
NOTE: A call for patent claims is included on page vi of this draft. For additional information, see the Information Technology Laboratory (ITL) Patent Policy--Inclusion of Patents in ITL Publications.
None selected
Publication:
NISTIR 8212 (Draft) (DOI)
Local Download
Supplemental Material:
Comment template (xls)
ISCMAx: Recommended Judgments (xls)
ISCMAx: Alternate Judgments (xls)
Document History:
10/01/20: NISTIR 8212 (Draft)
03/31/21: NISTIR 8212 (Final)
Security and Privacy
continuous monitoring; program management; risk assessment
Laws and Regulations
Federal Information Security Modernization Act; OMB Circular A-130