Security Assessment for an enterprise must be incorporated into the Software Development Life Cycle (SDLC) in order to be a secure, integrated process. Testing of selected security controls ensures that applications meet business requirements, function as planned, and protect associated data securely from attack. A security assessment of the targeted environment identifies vulnerabilities that may cause a security breach and specifies the security controls that mitigate the vulnerabilities. Refer to NIST SP 800-53 rev 4 for identification of the eighteen candidate security control families and associated security controls.
Choose five distinct security control families as specified in SP 800-53 rev 4, click on the chosen familites, and create a spreadsheet that identifies the following criteria for each family:
- Control ID
- Control Name
- Vulnerability
Provide a short paragraph for each family describing the testing procedure that will mitigate the vulnerability.
Example:
Family – Identification and Authentication
Control ID – IA-2
Control Name – Identification and Authentication (Organizational Users)
Vulnerability – Illegal user access
“Is this question part of your assignment? We Can Help!”
Control ID was first posted on September 18, 2019 at 10:37 pm.
©2019 “Nursing Papers”. Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at
ukbestwriting@gmail.com
“Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!”

Control ID was first posted on September 18, 2019 at 10:39 pm.
©2019 “nursing Writers”. Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at
admin@prowriterhub.com