Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
This lesson discusses the tasks required to select the security controls for an information system and create a continuous monitoring strategy. Upon completing this unit, participants will be able to identify a systems common controls and select the appropriate baseline controls for an information system. In addition, participants will be able to tailor security controls for a specific system, supplement the baseline and tailored controls as well as develop and/or support a continuous monitoring strategy for an information system.