02214aam 2200433I 450 991071117990332120151105023937.0GOVPUB-C13-c4cc276cdc061a4da1e954bb4c2b0866(CKB)5470000002480209(OCoLC)927737034(EXLCZ)99547000000248020920151105d1998 ua 0engrdacontentrdamediardacarrierGuide for developing security plans for information technology systems /Marianne SwansonGaithersburg, MD :U.S. Dept. of Commerce, National Institute of Standards and Technology,1998.1 online resourceNIST special publication ;800-181998.Contributed record: Metadata reviewed, not verified. Some fields updated by batch processes.Superseded by NIST Special Publication 800-18r1.Title from PDF title page.Includes bibliographical references.Today⁰₉s rapidly changing technical environment requires federal agencies to adopt a minimum set of management controls to protect their information technology (IT) resources. These management controls are directed at individual information technology users in order to reflect the distributed nature of today⁰₉s technology. Technical and operational controls support management controls. To be effective, these controls all must interrelate. This document provides a guideline for federal agencies to follow when developing the security plans that document the management, technical, and operational controls for federal automated information systems.Computer securitySecurity management controlsSecurity plansSwanson Marianne1352963Swanson Marianne1352963National Institute of Standards and Technology (U.S.).Computer Security Division.NBSNBSGPOBOOK9910711179903321Guide for developing security plans for information technology systems3498620UNINA