Did you know Cybrary's video training is FREE? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
This unit discusses the tasks associated with implementing security controls for an information system as well as describing the information for documentation. Upon completion of this unit, participants will be able to allocate the appropriate security controls for an information system and implement the security control for an information system. In addition, participants will be able to describe an information system in a functional manner appropriate for documentation in a security plan. Implementation of a security control consists of the following two tasks: Task 3-1: Security Control Implementation Task 3-2: Security Control Documentation