home/dictionary/framework/NIST SP 800-137

Dictionary · NIST SP 800-137

L2 — definitions grouped by regulatory framework.

Sort
Filtercosmetic affordance — live filters Phase 2
10 senses under NIST SP 800-137

Nouns

10 senses
Continuous Monitoring

Maintaining ongoing awareness to support organizational risk decisions.

data loss

The exposure of proprietary, sensitive, or classified information through either data theft or data leakage.

Expected Output

Any data collected from monitoring and assessments as part of the Information Security Continuous Monitoring (ISCM) strategy.

Information Security Continuous Monitoring Program

A program established to collect information in accordance with pre-established metrics, utilizing information readily available in part through implemented security controls.

Information Security Continuous Monitoring

Maintaining ongoing awareness of information security, vulnerabilities, and threats to support organizational risk management decisions. [Note: The terms “continuous” and “ongoing” in this context mean that security controls and organizational risks are assessed and analyzed at a frequency sufficient to support risk-based security decisions to adequately protect organization information.]

Information Security Continuous Monitoring Process

A process to: • Define an ISCM strategy; • Establish an ISCM program; • Implement an ISCM program; • Analyze data and Report findings; • Respond to findings; and • Review and Update the ISCM strategy and program.

Organizational Information Security Continuous Monitoring

Ongoing monitoring sufficient to ensure and assure effectiveness of security controls related to systems, networks, and cyberspace, by assessing security control implementation and organizational security status in accordance with organizational risk tolerance – and within a reporting structure designed to make real-time, data-driven risk management decisions.

Security Control Effectiveness

The measure of correctness of implementation (i.e., how consistently the control implementation complies with the security plan) and how well the security plan meets organizational needs in accordance with current risk tolerance.

Security Automation Domain

An information security area that includes a grouping of tools, technologies, and data.

Status Monitoring

Monitoring the information security metrics defined by the organization in the information security ISCM strategy.