Information Security Continuous Monitoring (ISCM) Process

February 28, 2018

How Can We Help?

Information Security Continuous Monitoring (ISCM) Process

You are here:
< Back

A process to:
• Define an ISCM strategy;
• Establish an ISCM program;
• Implement an ISCM program;
• Analyze data and Report findings;
• Respond to findings; and
• Review and Update the ISCM strategy and program.
SOURCE: SP 800-137