Official (ISC)2 Guide to the CAP CBK ((ISC)2 Press)
<P>Significant developments since the publication of its bestselling predecessor, <I>Building and Implementing a Security Certification and Accreditation Program, </I>warrant an updated text as well as an updated title. Reflecting recent updates to the Certified Authorization Professional (CAP<SUP></SUP>) Common Body of Knowledge (CBK<SUP></SUP>) and NIST SP 800-37, the <B>Official (ISC)<SUP>2</SUP> Guide to the CAP<SUP></SUP> CBK<SUP></SUP>, Second Edition </B>provides readers with the tools to effectively secure their IT systems via standard, repeatable processes.<br><br>Derived from the author€s<B> </B>decades of experience, including time as the CISO for the Nuclear Regulatory Commission, the Department of Housing and Urban Development, and the National Science Foundation€s Antarctic Support Contract, the book describes what it takes to build a system security authorization program at the organizational level in both public and private organizations. It analyzes the full range of system security authorization (formerly C&A) processes and explains how they interrelate. Outlining a user-friendly approach for top-down implementation of IT security, the book:</P> <UL> <P> <LI>Details an approach that simplifies the authorization process, yet still satisfies current federal government criteria</LI> <LI>Explains how to combine disparate processes into a unified risk management methodology</LI> <LI>Covers all the topics included in the Certified Authorization Professional (CAP<SUP></SUP>) Common Body of Knowledge (CBK<SUP></SUP>)</LI> <LI>Examines U.S. federal polices, including DITSCAP, NIACAP, CNSS, NIAP, DoD 8500.1 and 8500.2, and NIST FIPS</LI> <LI>Reviews the tasks involved in certifying and accrediting U.S. government information systems</LI> <P></P></UL> <P>Chapters 1 through 7 describe each of the domains of the (ISC)<SUP>2</SUP> CAP<SUP> </SUP>CBK<SUP></SUP>. This is followed by a case study on the establishment of a successful system authorization program in a major U.S. government department. The final chapter considers the future of system authorization. The book€s appendices include a collection of helpful samples and additional information to provide you with the tools to effectively secure your IT systems.</P>