Page 1075 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1075

Other reviews may be automated, performed by security testing tools
               that verify the successful completion of a test, log the results, and

               remain silent unless there is a significant finding. When the system
               detects an issue requiring administrator attention, it may trigger an
               alert, send an email or text message, or automatically open a trouble
               ticket, depending on the severity of the alert and the administrator’s
               preference.


               Security Assessments


               Security assessments are comprehensive reviews of the security of a
               system, application, or other tested environment. During a security
               assessment, a trained information security professional performs a
               risk assessment that identifies vulnerabilities in the tested
               environment that may allow a compromise and makes
               recommendations for remediation, as needed.


               Security assessments normally include the use of security testing tools
               but go beyond automated scanning and manual penetration tests.
               They also include a thoughtful review of the threat environment,
               current and future risks, and the value of the targeted environment.

               The main work product of a security assessment is normally an
               assessment report addressed to management that contains the results

               of the assessment in nontechnical language and concludes with
               specific recommendations for improving the security of the tested
               environment.

               Assessments may be conducted by an internal team, or they may be
               outsourced to a third-party assessment team with specific expertise in
               the areas being assessed.



                  NIST SP 800-53A



                  The National Institute for Standards and Technology (NIST) offers
                  a special publication that describes best practices in conducting
                  security and privacy assessments. NIST Special Publication 800-
                  53A: Assessing Security and Privacy Controls in Federal
                  Information Systems and Organizations is available for download:
   1070   1071   1072   1073   1074   1075   1076   1077   1078   1079   1080