Skip to content
Menu
Cloud Gal 42
  • Home
Cloud Gal 42

An Effective Information Security Continuous Monitoring (ISCM) Strategy

July 26, 2021July 19, 2021 by admin

Continuous monitoring is a concept that has grown in importance during the transition to cloud computing. Information Security Continuous Monitoring (ISCM) is defined as “maintaining ongoing awareness of information security, vulnerabilities, and threats to support organizational risk management decisions.”

Resource: NIST SP 800-137, page vi http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-137.pdf

The terms continuous and ongoing in this context mean that security controls and organizational risks are assessed and analyzed at a frequency sufficient to support risk-based security decisions that adequately protect the organization’s information. In NIST SP 800-137r1, this is described as a disciplined and structured process that integrates information security and risk management activities into the system development lifecycle. Ongoing monitoring is a critical part of that risk management process. In addition, an organization’s overall security architecture and accompanying security program are monitored to ensure that organization-wide operations remain within an acceptable level of risk, despite any changes that occur. Timely, relevant, and accurate information is vital, particularly when resources are limited, and agencies must prioritize their efforts.

An ISCM strategy:

  • Is grounded in a clear understanding of organizational risk tolerance and helps officials set priorities and manage risk consistently throughout the organization
  • Includes metrics that provide meaningful indications of security status at all organizational tiers
  • Ensures continued effectiveness of all security controls
  • Verifies compliance with information security requirements derived from organizational missions/business functions, federal legislation, directives, regulations, policies, and standards/guidelines
  • Is informed by all organizational IT assets and helps to maintain visibility into the security of the assets
  • Ensures knowledge and control of changes to organizational systems and environments of operation
  • Maintains awareness of threats and vulnerabilities

Related article – Data Event Logging & Event Attributes

Related

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • Role of AI/ML in Cybersecurity
  • QuickGuide: Security on OCI
  • The Cloud Management Plane
  • Secure Installation and Configuration of Virtualized Cloud Datacenters
  • Cloud Datacenter: Hardware-specific Security Configuration Requirements

Recent Comments

  • Rafael on Installing Debian on OCI
  • Jorge on Installing Debian on OCI
  • admin on Installing Debian on OCI
  • Andreas on Installing Debian on OCI
  • admin on Installing Debian on OCI

Archives

  • December 2022
  • February 2022
  • September 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • February 2021
  • January 2021
  • November 2020
  • October 2020

Categories

  • aws
  • bcdr
  • cloud
  • cloudsecurity
  • compliance
  • informationsecurity
  • oracle
  • pci
  • QuickGuide
  • security
©2025 Cloud Gal 42 | Powered by WordPress and Superb Themes!