About 57,400 results
Open links in new tab
  1. Federal Information Security Modernization Act | CISA

    Jan 7, 2021 · Simplifies existing FISMA reporting to eliminate inefficient or wasteful reporting while adding new reporting requirements for major information security incidents. The Federal …

  2. CSRC Topics - Federal Information Security Modernization Act

    Jun 10, 2016 · The original FISMA was Federal Information Security Management Act of 2002 (Public Law 107-347 (Title III); December 17, 2002), in the E-Government Act of 2002.

  3. NIST Risk Management Framework | CSRC

    Nov 30, 2016 · The suite of NIST information security risk management standards and guidelines is not a 'FISMA Compliance checklist.' Federal agencies, contractors, and other sources that …

  4. Background and Methodology The Federal Information Security Modernization Act of 2014 (FISMA) requires each Federal agency with an Inspector General (IG), or an independent …

  5. FY 2025 CIO FISMA Metrics - CISA

    Nov 19, 2025 · PUBLICATION FY 2025 CIO FISMA Metrics Cybersecurity Best Practices FY 2025 CIO FISMA Metrics

  6. FY 2024 IG FISMA Metrics Evaluation Guide - CISA

    Oct 30, 2025 · About CISA Budget and Performance DHS.gov FOIA Requests No FEAR Act Office of Inspector General Privacy Policy Subscribe The White House USA.gov Website …

  7. NIST Risk Management Framework | CSRC

    Nov 30, 2016 · Who Determines The Adequacy Of FISMA Compliance? Is The Federal Information Security Management Act (FISMA) Mentioned In The Federal Acquisition …

  8. According to FISMA, the head of Federal agencies are responsible for providing information security protections commensurate with the risk and magnitude of the harm resulting from …

  9. maximize the degree to which unclassified geographic information from various sources can be made electronically compatible and accessible; and (2) promote the development of …

  10. FISMA 2002, Summary of NIST Responsibilities Information Security Standards that- Provide minimum information security requirements Are otherwise necessary to improve the security of …