NIH | National Cancer Institute | NCI Wiki  

Error rendering macro 'rw-search'

null

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Once you have completed categorization step you can determine which security controls are required for your application. You should refer to two resources to aid in this step.  First, NIST 800-53, Security and Privacy Controls for Federal Information Systems and Organizations, which provides a catalog of security and privacy controls for federal information systems and organizations and a process for selecting controls to protect organizational operations.  Secondly, NCI maintains a Security Control Inheritance Matrix to help you identify the controls needed for your system, and it factors in pre-defined control inheritance settings so you can more easily identify controls that you are responsible for implementing and managing, and those that are partially or fully implemented and managed for you by CBIIT, NCI, or by NIH.

...