X hits on this document

Powerpoint document

HHS Cybersecurity Program Training Information Security for Information Technology (IT) Administrato... - page 124 / 158

356 views

0 shares

0 downloads

0 comments

124 / 158

U.S. Department of Health and Human Services

Triggers for reauthorization include significant changes in the IT system or software applications that:

Alter mission

Alter operating environment

Alter basic vulnerabilities of the IT system

Change protection requirements

Produce the occurrence of a significant violation or incident

Produce audit/evaluation findings that identify significant unmitigated risks

Page 7 of 8

System Security Authorization

Reauthorization

Document info
Document views356
Page views356
Page last viewedSun Dec 04 00:10:56 UTC 2016
Pages158
Paragraphs2058
Words16945

Comments