Choose five distinct security control families as specified in SP 800-53 rev 4, click on the chosen familites, and create a spreadsheet that identifies the following criteria for each family

Choose five distinct security control families

Security Assessment for an enterprise must be incorporated into the Software Development Life Cycle (SDLC) in order to be a secure, integrated process. Testing of selected security controls ensures that applications meet business requirements, function as planned, and protect associated data securely from attack. A security assessment of the targeted environment identifies vulnerabilities that may cause a security breach and specifies the security controls that mitigate the vulnerabilities. Refer to NIST SP 800-53 rev 4 for identification of the eighteen candidate security control families and associated security controls.

Choose five distinct security control families as specified in SP 800-53 rev 4, click on the chosen familites, and create a spreadsheet that identifies the following criteria for each family:

  • Control ID
  • Control Name
  • Vulnerability

Provide a short paragraph for each family describing the testing procedure that will mitigate the vulnerability.

Example:

Family – Identification and Authentication

Control ID – IA-2

Control Name – Identification and Authentication (Organizational Users)

Vulnerability – Illegal user access

Submit your assignment using the Assignment Files tab.

find the cost of your paper