全网唯一标准王
2nd Draft NIST IR 8286A 1 Identifying and Estimating 2 Cybersecurity Risk for Enterprise Risk 3 Management (ERM) 4 5 Kevin Stine 6 Stephen Quinn 7 Nahla Ivy 8 Larry Feldman 9 Greg Witte 10 R. K. Gardner 11 12 13 14 15 This publication is available free of charge from: 16 https://doi.org/10.6028/ NIST.IR.8286A -draft2 17 18 19 20 2nd Draft NISTIR 8286A 21 Identifying and Estimating 22 Cybersecurity Risk for Enterprise Risk 23 Management (ERM) 24 25 Kevin Stine Larry Feldman 26 Applied Cybersecurity Division Greg Witte 27 Information Technology Laboratory Huntington Ingalls Industries 28 Annapolis Junction, MD 29 30 Stephen Quinn R. K. Gardner 31 Computer Security Division New World Technology Partners 32 Information Technology Laboratory Annapolis, MD 33 34 Nahla Ivy 35 Enterprise Risk Management Office 36 Office of Financial Resource Management 37 38 39 This publication is available free of charge from: 40 https://doi.org/10.6028/ NIST.IR.8286A -draft2 41 42 July 2021 43 44 45 46 U.S. Department of Commerce 47 Gina M. Raimondo, Secretary 48 49 National Institute of Standards and Technology 50 James K. Olthoff, Performing the Non -Exclusive Functions and Duties of the Under Secretary of 51 Commerce for Standards and Technology & Director, National Institute of Standards and Technology 52 National Institute of Standards and Technology Interagency or Internal Report 8286A 53 60 pages ( July 2021) 54 This publication is available free of charge from: 55 https://doi.org/10.6028/ NIST.IR.8286A -draft2 56 Certain commercial entities, equipment, or materials may be identified in this document in order to describe an 57 experimental procedure or concept adequately. Such identification is not intended to imply recommendation or 58 endorsement by NIST, nor is it inte nded to imply that the entities, materials, or equipment are necessarily the best 59 available for the purpose. 60 There may be references in this publication to other publications currently under development by NIST in accordance 61 with its assigned statutory responsibilities. The information in this publication, including concepts and methodologies, 62 may be used by federal agencies even before the completion of such companion publications. Thus, until each 63 publication is completed, current requirement s, guideline s, and procedures, where they exist, remain operative. For 64 planning and transition purposes, federal agencies may wish to closely follow the development of these new 65 publications by NIST. 66 Organizations are encouraged to review all draft publications during public comment periods and provide feedback to 67 NIST. Many NIST cybersecurity publications , ot her than the ones noted above, are available at 68 https://csrc.nist.gov/publications . 69 Public comment period: July 6 through August 6, 2021 70 National Institute of Standards and Technology 71 Attn: Applied Cybers ecurity Division, Information Technology Laboratory 72 100 Bureau Drive (Mail Stop 2000) Gaithersburg, MD 20899 -2000 73 Email: [email protected] 74 All comments are subject to release under the Freedom of Information Act (FOIA). 75 NISTIR 8286A (2ND DRAFT) IDENTIFYING AND ESTIMATING CYBERSECURITY RISK FOR ENTERPRISE RISK MANAGEMENT (ERM) ii Reports on Computer Systems Technology 76 The Information Technology Laboratory (ITL) at the National Institute of Standards and 77 Technology (NIST) promotes the U.S. economy and public welfare by providing technical 78 leadership for the Nation’s measurement and standards infrastructure. ITL develops tests, test 79 methods, refere nce data, proof of concept implementations, and technical analyses to advance the 80 development and productive use of information technology. ITL’s responsibilities include the 81 development of management, administrative, technical, and physical st

pdf文档 NIST.IR.8286A-draft2

文档预览
中文文档 60 页 50 下载 1000 浏览 0 评论 0 收藏 3.0分
温馨提示:本文档共60页,可预览 3 页,如浏览全部内容或当前文档出现乱码,可开通会员下载原始文档
NIST.IR.8286A-draft2 第 1 页 NIST.IR.8286A-draft2 第 2 页 NIST.IR.8286A-draft2 第 3 页
下载文档到电脑,方便使用
本文档由 思安 于 2022-12-05 09:07:26上传分享
友情链接
站内资源均来自网友分享或网络收集整理,若无意中侵犯到您的权利,敬请联系我们微信(点击查看客服),我们将及时删除相关资源。