Video Description

This lesson discusses the tasks required to select the security controls for an information system and create a continuous monitoring strategy. Upon completing this unit, participants will be able to identify a systems common controls and select the appropriate baseline controls for an information system. In addition, participants will be able to tailor security controls for a specific system, supplement the baseline and tailored controls as well as develop and/or support a continuous monitoring strategy for an information system.

Course Modules