
Federal Information Security Modernization Act | CISA
Jan 7, 2021 · Simplifies existing FISMA reporting to eliminate inefficient or wasteful reporting while adding new reporting requirements for major information security incidents. The Federal …
SP 800-53 Rev. 5, Security and Privacy Controls for Information …
Dec 10, 2020 · This publication provides a catalog of security and privacy controls for information systems and organizations to protect organizational operations and assets, individuals, other …
CSRC Topics - Federal Information Security Modernization Act
Jun 10, 2016 · The original FISMA was Federal Information Security Management Act of 2002 (Public Law 107-347 (Title III); December 17, 2002), in the E-Government Act of 2002.
NIST Computer Security Resource Center | CSRC
The Computer Security Resource Center (CSRC) has information on many of NIST's cybersecurity- and information security-related projects, publications, news and events.
NIST Risk Management Framework | CSRC
Nov 30, 2016 · The suite of NIST information security risk management standards and guidelines is not a 'FISMA Compliance checklist.' Federal agencies, contractors, and other sources that …
FIPS 140-2, Security Requirements for Cryptographic Modules | CSRC
Dec 3, 2002 · This Federal Information Processing Standard (140-2) specifies the security requirements that will be satisfied by a cryptographic module, providing four increasing, …
SP 800-171 Rev. 3, Protecting Controlled Unclassified Information …
May 14, 2024 · The protection of Controlled Unclassified Information (CUI) is of paramount importance to federal agencies and can directly impact the ability of the Federal Government …
NIST Risk Management Framework | CSRC
Nov 30, 2016 · The NIST Risk Management Framework (RMF) provides a comprehensive, flexible, repeatable, and measurable 7-step process that any organization can use to manage …
FY 2024 CIO FISMA Metrics - CISA
Oct 30, 2025 · About CISA Budget and Performance DHS.gov FOIA Requests No FEAR Act Office of Inspector General Privacy Policy Subscribe The White House USA.gov Website …
Figure 1 below depicts an overview of the data discovery, collection, and reporting approaches discussed throughout this document, i.e., cryptographic asset data via ACDI tools integrated …