X hits on this document

Powerpoint document

HHS Cybersecurity Program Training Information Security for Information Technology (IT) Administrato... - page 124 / 158

586 views

0 shares

0 downloads

0 comments

124 / 158

U.S. Department of Health and Human Services

Triggers for reauthorization include significant changes in the IT system or software applications that:

Alter mission

Alter operating environment

Alter basic vulnerabilities of the IT system

Change protection requirements

Produce the occurrence of a significant violation or incident

Produce audit/evaluation findings that identify significant unmitigated risks

Page 7 of 8

System Security Authorization

Reauthorization

Document info
Document views586
Page views586
Page last viewedSat Jan 21 20:18:42 UTC 2017
Pages158
Paragraphs2058
Words16945

Comments