X hits on this document

48 views

0 shares

0 downloads

0 comments

2 / 19

ABSTRACT............................................................................................................................................ 1

BRIEF HISTORY OF ELECTRONIC LAW........................................................................................ 2

WHICH LAWS APPLY TO FEDERAL CONTRACTORS?............................................................... 3

THE PLAYERS...................................................................................................................................... 4

THE FIVE COMMANDMENTS........................................................................................................... 6

FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION (FIPS PUB) 199: ................................ 7 NIST SP 800-37:.................................................................................................................................. 7 GUIDE FOR THE SECURITY CERTIFICATION AND ACCREDITATION OF FEDERAL INFORMATION SYSTEMS... 7

Initiation Phase............................................................................................................................... 8 Certification and Accreditation........................................................................................................ 9 Continuous Monitoring Phase ......................................................................................................... 9 NIST SPECIAL PUBLICATION 800-53:.................................................................................................. 11 NIST SPECIAL PUBLICATION 800-53A: ............................................................................................... 12

LESSONS LEARNED AND CONTRACTOR RESPONSIBILITIES................................................ 12

CONCLUSION..................................................................................................................................... 13

REFERENCES ..................................................................................................................................... 15

© SANS Institute 2004, Author retains full rights.

© SANS Institute 2004,

As part of the Information Security Reading Room

Author retains full rights.

Document info
Document views48
Page views48
Page last viewedFri Dec 09 15:42:14 UTC 2016
Pages19
Paragraphs319
Words7216

Comments