X hits on this document

68 views

0 shares

0 downloads

0 comments

2 / 19

ABSTRACT............................................................................................................................................ 1

BRIEF HISTORY OF ELECTRONIC LAW........................................................................................ 2

WHICH LAWS APPLY TO FEDERAL CONTRACTORS?............................................................... 3

THE PLAYERS...................................................................................................................................... 4

THE FIVE COMMANDMENTS........................................................................................................... 6

FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION (FIPS PUB) 199: ................................ 7 NIST SP 800-37:.................................................................................................................................. 7 GUIDE FOR THE SECURITY CERTIFICATION AND ACCREDITATION OF FEDERAL INFORMATION SYSTEMS... 7

Initiation Phase............................................................................................................................... 8 Certification and Accreditation........................................................................................................ 9 Continuous Monitoring Phase ......................................................................................................... 9 NIST SPECIAL PUBLICATION 800-53:.................................................................................................. 11 NIST SPECIAL PUBLICATION 800-53A: ............................................................................................... 12

LESSONS LEARNED AND CONTRACTOR RESPONSIBILITIES................................................ 12

CONCLUSION..................................................................................................................................... 13

REFERENCES ..................................................................................................................................... 15

© SANS Institute 2004, Author retains full rights.

© SANS Institute 2004,

As part of the Information Security Reading Room

Author retains full rights.

Document info
Document views68
Page views68
Page last viewedTue Jan 24 18:47:09 UTC 2017
Pages19
Paragraphs319
Words7216

Comments