This is a potential security issue, you are being redirected to https://nvd.nist.gov
Security and Privacy Controls for Federal Information Systems and Organizations
a. Implements a process for ensuring that organizational plans for conducting security testing, training, and monitoring activities associated with organizational information systems:
1. Are developed and maintained; and
2. Continue to be executed in a timely manner;
b. Reviews testing, training, and monitoring plans for consistency with the organizational risk management strategy and organization-wide priorities for risk response actions.
This control ensures that organizations provide oversight for the security testing, training, and monitoring activities conducted organization-wide and that those activities are coordinated. With the importance of continuous monitoring programs, the implementation of information security across the three tiers of the risk management hierarchy, and the widespread use of common controls, organizations coordinate and consolidate the testing and monitoring activities that are routinely conducted as part of ongoing organizational assessments supporting a variety of security controls. Security training activities, while typically focused on individual information systems and specific roles, also necessitate coordination across all organizational elements. Testing, training, and monitoring plans and activities are informed by current threat and vulnerability assessments.
|NIST Special Publication 800-16||https://csrc.nist.gov/publications/search?keywords-lg=800-16|
|NIST Special Publication 800-37||https://csrc.nist.gov/publications/search?keywords-lg=800-37|
|NIST Special Publication 800-53A||https://csrc.nist.gov/publications/search?keywords-lg=800-53A|
|NIST Special Publication 800-137||https://csrc.nist.gov/publications/search?keywords-lg=800-137|