Linchakin

Decisions, Decisions and the Role of Authorization

 December 21, 2021     No comments   

MAR-Blog-CAP_Role_of_Authorization-1024x512Technology and cybersecurity cannot be thought of as the responsibility of a siloed IT department – it is the lifeblood of the organization. In day-to-day operations, as well as during moments of crisis, a company’s different functional areas must be able to collaborate and must know who to turn to for leadership.

System authorization has been employed in government for over 20 years, and it is becoming recognized outside government for the promise it holds as a practical approach for identifying and documenting business requirements for security, for ensuring that cost-effective controls are functioning appropriately, and for ensuring that weaknesses in protective controls are managed effectively.  

Based on NIST standards, system authorization formalizes the decision-making process, placing clear directives and accountability up front where they can be communicated and clearly documented. It becomes the responsibility of the Certified Authorization Professional (CAP) to take on this role, or to assign it under the title of Authorizing Official (AO) to an appropriately qualified individual.

Read the full article.

Adblock test (Why?)


You may be interested in:
>> Is a Chromebook worth replacing a Windows laptop?
>> Find out in detail the outstanding features of Google Pixel 4a
>> Top 7 best earbuds you should not miss

Related Posts:
>> Recognizing 12 Basic Body Shapes To Choose Better Clothes
>>Ranking the 10 most used smart technology devices
>> Top 5+ Best E-readers: Compact & Convenient Pen
  • Share This:  
  •  Facebook
  •  Twitter
  •  Google+
  •  Stumble
  •  Digg
Email ThisBlogThis!Share to XShare to Facebook

Related Posts:

  • Apache Commons “Text4Shell” Flaw Could Trigger Code Execution With Malicious Input Many people are concerned about an RCE flaw in the Apache Commons Text library. They believe that this RCE flaw may turn out to be the next successiv… Read More
  • 3 Flipper Zero Hacks to Wow Your Friends (and How They Work) You may be interested in: >> Is a Chromebook worth replacing a Windows laptop? >> Find out in detail the outstanding features of Google P… Read More
  • Protecting Your Cloud Environments With Zero Trust When moving to a cloud infrastructure, businesses should be looking toward a Zero Trust strategy. This security model protects the cloud from the ins… Read More
  • How to Protect Your Smart Vehicle from Cyberattacks You may be interested in: >> Is a Chromebook worth replacing a Windows laptop? >> Find out in detail the outstanding features of Google P… Read More
  • Aptos Fumbles and Why a Killer App Wins Versus L1 You may be interested in: >> Is a Chromebook worth replacing a Windows laptop? >> Find out in detail the outstanding features of Google P… Read More
Newer Post Older Post Home

0 Comments:

Post a Comment


Copyright © 2025 Linchakin | Powered by Blogger
Design by Hardeep Asrani | Blogger Theme by NewBloggerThemes.com | Distributed By Gooyaabi Templates