The IT Law Wiki
Explore
Main Page
All Pages
Community
Interactive Maps
Random page
TopContent
Most Visited Pages
Cell phone
Radio frequency spectrum
RFID tag
Cloud consumer
Internet
Newly Changed Pages
Computer terminal
Persuasive evidence
Website operator
Bfdi
Email bombing
Pornography
Message modification
Most Popular Pages
community
Community portal
forum
FANDOM
Fan Central
BETA
Games
Anime
Movies
TV
Video
Wikis
Explore Wikis
Community Central
Start a Wiki
Don't have an account?
Register
Sign In
Sign In
Register
The IT Law Wiki
34,539
pages
Explore
Main Page
All Pages
Community
Interactive Maps
Random page
TopContent
Most Visited Pages
Cell phone
Radio frequency spectrum
RFID tag
Cloud consumer
Internet
Newly Changed Pages
Computer terminal
Persuasive evidence
Website operator
Bfdi
Email bombing
Pornography
Message modification
Most Popular Pages
community
Community portal
forum
Editing
NIST Special Publication 1800-5
Back to page
Edit
Edit source
View history
Talk (0)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
== Citation == [[National Institute of Standards and Technology]], [[National Cybersecurity Center of Excellence]], '''NIST Special Publication 1800-5:''' (DRAFT) IT Asset Management (Oct. 29, 2015) ([http://csrc.nist.gov/publications/PubsDrafts.html#SP-1800-5 full-text]). == Overview == The [[National Cybersecurity Center of Excellence]] ([[NCCoE]]) invites comments on a draft practice guide designed to help [[financial services]] companies [[monitor]] and manage [[IT]] [[hardware]] and [[software]] [[asset]]s more [[secure]]ly and [[efficient]]ly. [[Financial institution]]s can employ large numbers of people who use a variety of [[technology]] [[device]]s and [[application]]s across a wide geographic area. While these [[physical asset]]s can be labeled and tracked using [[bar code]]s and [[database]]s, knowing what [[system]]s and [[application]]s are [[running]] on these [[device]]s is a much larger challenge. The inability to [[track]] the location and [[configuration]] of [[networked device]]s and [[software]] can leave an organization [[vulnerable]] to [[security threat]]s. The draft guide demonstrates how commercially available [[technologies]] can be used to [[track]] the location and [[configuration]] of [[networked device]]s and [[software]] across an organization. The guide explains how users can tie existing separate [[data system]]s for [[physical asset]]s, [[security system]]s and [[IT]] support into a single [[system]] that makes it easier to gain insight into their entire [[IT]] asset portfolio. With a single [[system]], companies will be better able to [[track]], manage and report on an [[information asset]] throughout its entire [[life cycle]]. Benefits include lower total cost of ownership and less time needed to respond to [[incident]]s and to perform [[system]] [[patching]] and other tasks. Developed with input from the [[financial services industry]], and in [[collaboration]] with ten [[technology vendor]]s, the guide maps [[security]] characteristics to guidance and [[best practices]] from [[NIST]] and other [[standards]] organizations. Its instructions for [[implementer]]s and [[security engineer]]s include examples of [[installation]], [[configuration]] and [[integration]]. While the guide uses as examples a suite of commercial products to address this challenge, it does not endorse any particular products, nor does it guarantee [[regulatory]] [[compliance]]. A company can adopt this solution or one that adheres fully to these [[guideline]]s in whole, or it can use the guide as a starting point for tailoring and [[implement]]ing parts of a solution. [[Category:Publication]] [[Category:Security]] [[Category:Financial]]
Summary:
Please note that all contributions to the The IT Law Wiki are considered to be released under the CC-BY-SA
Cancel
Editing help
(opens in new window)
Follow on IG
TikTok
Join Fan Lab