Special Publication 800-12: An Introduction to Computer Security - The NIST Handbook |
The following is a cross reference of the interdependencies sections. Note that the references only include specific controls. Some controls were referenced in groups, such as technical controls and occasionally interdependencies were noted for all controls.
Control |
Chapters
Where It Is Cited |
Policy | Program
Management Life Cycle Personnel/User Contingency Awareness and Training Logical Access Audit |
Program Management | Policy Awareness and Training |
Risk Management | Life
Cycle Contingency Incident |
Life Cycle | Program
Management Assurance |
Assurance | Life
Cycle Support and Operations Audit Cryptography |
Personnel | Training
and Awareness Support and Operations Access |
Training and Awareness | Personnel/User Incident Support and Operations |
Contingency | Incident Support and Operations Physical and Environmental Audit |
Incident | Contingency Support and Operations Audit |
Physical and Environment | Contingency Support and Operations Logical Access Cryptography |
Support and Operations | Contingency Incident |
Identification and Authentication | Personnel/User Physical and Environmental Logical Access Audit Cryptography |
Access Controls | Policy Personnel/User Physical and Environmental Identification and Authentication Audit Cryptography |
Audit | Identification
and Authentication Logical Access Cryptography |
Cryptography |
Identification
and Authentication |
Back
to Previous Page | Back
to Special Publication 800-12 Home Page
|
Last
updated:
March 29, 2005
Page created: July 1, 2004