Mark
asked on
Security controls mapping
Hello,
We just started working on our compliance program and I am looking to create a process for continuous mapping of the security controls and systems.
I am looking for an example process or a feedback on what would be a good start. We would like to start simple and then expand down the road.
Thanks!
We just started working on our compliance program and I am looking to create a process for continuous mapping of the security controls and systems.
I am looking for an example process or a feedback on what would be a good start. We would like to start simple and then expand down the road.
Thanks!
This question needs an answer!
Become an EE member today
7 DAY FREE TRIALMembers can start a 7-Day Free trial then enjoy unlimited access to the platform.
View membership options
or
Learn why we charge membership fees
We get it - no one likes a content blocker. Take one extra minute and find out why we block content.
CSF
- main https://www.nist.gov/cyberframework
- (pdf) https://doi.org/10.6028/NIST.CSWP.04162018
Making The RIGHT Security
- https://www.experts-exchange.com/articles/31709/Making-The-RIGHT-Security.html
What is a good security plan
- https://www.experts-exchange.com/articles/17367/What-is-a-good-Security-Action-Plan.html
Doing Right Security - Compliance by Design or Security by Design?
- https://www.experts-exchange.com/articles/15679/Doing-Right-Security-Compliance-by-Design-or-Security-by-Design.html