NIST SP 800-53 r4 Security Control PL-8: Information Security Architecture, v4

Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control PL-8: Information Security Architecture. Applicable to MODERATE impact and HIGH impact systems.
Identifier https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-pl-8_-information-security-architecture/4/
Publication Date 2021-04-26
Issuing Organization
Trustmark Support help@trustmarkinitiative.org 555-555-5555 No Mailing Address
Keywords 800-53, High, Information Security Architecture, Moderate, NIST, P1, Planning, Security
Legal Notice This document and the information contained herein is provided on an "AS IS" basis, and the Georgia Tech Research Institute disclaims all warranties, express or implied, including but not limited to any warranty that the use of the information herein will not infringe any rights or any implied warranties or merchantability or fitness for a particular purpose. In addition, the Georgia Tech Research Institute disclaims legal liability for any loss incurred as a result of the use or reliance on the document or the information contained herein.
Loading...

Trust Expression:

TD_ref1 and TD_ref2 and TD_ref3 and TD_ref4 and TD_ref5 and TD_ref6 and TD_ref7

References (7)

 TD  Information Security Architecture Integrated With Enterprise Architecture, v1.0
Description Defines conformance and assessment criteria for verifying that an organization develops an information security architecture for the information system that describes how the information security architecture is integrated into and supports the enterprise architecture.
ID TD_ref1
Provider Reference
 TD  Information Security Architecture - Review and Update, v1.0
Description Defines conformance and assessment criteria for verifying that an organization reviews and updates the information security architecture at an organization-defined frequency to reflect updates in the enterprise architecture.
ID TD_ref2
Provider Reference
 TD  Information Security Architecture - Approach, v1.0
Description Defines conformance and assessment criteria for verifying that an organization develops an information security architecture for the information system that describes the overall philosophy, requirements, and approach to be taken with regard to protecting the confidentiality, integrity, and availability of organizational information.
ID TD_ref3
Provider Reference
 TD  Information Security Architecture - Security Plan, v1.0
Description Defines conformance and assessment criteria for verifying that an organization ensures that planned information security architecture changes are reflected in the security plan.
ID TD_ref4
Provider Reference
 TD  Information Security Architecture - Organizational Procurement, v1.0
Description Defines conformance and assessment criteria for verifying that an organization ensures that planned information security architecture changes are reflected in organizational procurements/acquisitions.
ID TD_ref5
Provider Reference
 TD  Information Security Architecture - Security CONOPS, v1.0
Description Defines conformance and assessment criteria for verifying that an organization ensures that planned information security architecture changes are reflected in the security Concept of Operations (CONOPS).
ID TD_ref6
Provider Reference
 TD  Information Security Architecture Addresses External Services, v1.0
Description Defines conformance and assessment criteria for verifying that an organization develops an information security architecture for the information system that describes any information security assumptions about, and dependencies on, external services.
ID TD_ref7
Provider Reference

Sources (1)

SP800-53R4 NIST Special Publication 800-53 Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations, National Institute of Standards and Technology, April 2013 (Includes updates as of 01-15-2014). Available at http://dx.doi.org/10.6028/NIST.SP.800-53r4.
Also available as XML or JSON