CA-2(2)—Security Assessments
>Control Description
>Supplemental Guidance
Organizations can employ information system monitoring, insider threat assessments, malicious user testing, and other forms of testing (e.g., verification and validation) to improve readiness by exercising organizational capabilities and indicating current performance levels as a means of focusing actions to improve security. Organizations conduct assessment activities in accordance with applicable directives, policies, regulations, and standards. Authorizing officials approve the assessment methods in coordination with the organizational risk management strategy.
Organizations can incorporate vulnerabilities uncovered during assessments into vulnerability remediation processes. Related controls: PE-3, SI-2.
Ask AI
Configure your API key to use AI features.