Enterprises rely upon strong access control mechanisms to ensure that corporate resources (e.g., applications, networks, systems, and data) are not exposed to anyone other than an authorized user. As business requirements change, enterprises need highly flexible access control mechanisms that can adapt. The application of attribute based policy definitions enables enterprises to accommodate a diverse set of business cases. This NCCoE practice guide details a collaborative effort between the NCCoE and technology providers to demonstrate a standards-based approach to attribute based access control (ABAC).
Includes a list of applicable NIST, UFC, and MIL-HDBK cybersecurity publications for consideration.
Why buy a book you can download for free?
First you gotta find a good clean (legible) copy and make sure it’s the latest version (not always easy). Some documents found on the web are missing some pages or the image quality is so poor, they are difficult to read. We look over each document carefully and replace poor quality images by going back to the original source document. We proof each document to make sure it’s all there – including all changes. If you find a good copy, you could print it using a network printer you share with 100 other people (typically its either out of paper or toner). If it’s just a 10-page document, no problem, but if it’s 250-pages, you will need to punch 3 holes in all those pages and put it in a 3-ring binder. Takes at least an hour.
It’s much more cost-effective to just order the latest version from Amazon.com
This book is published by 4th Watch Books and includes copyright material. We publish compact, tightly-bound, full-size books (8 ½ by 11 inches), with glossy covers. 4th Watch Books is a Service Disabled Veteran-Owned Small Business (SDVOSB). If you like the service we provide, please leave positive review on Amazon.com.
For more titles published by 4th Watch Books, please cybah.webplus.net
NISTIR 8170 The Cybersecurity Framework
NISTIR 8089 An Industrial Control System Cybersecurity Performance Testbed
NIST SP 800-12 An Introduction to Information Security
NIST SP 800-18 Developing Security Plans for Federal Information Systems
NIST SP 800-31 Intrusion Detection Systems
NIST SP 800-34 Contingency Planning Guide for Federal Information Systems
NIST SP 800-35 Guide to Information Technology Security Services
NIST SP 800-39 Managing Information Security Risk
NIST SP 800-40 Guide to Enterprise Patch Management Technologies
NIST SP 800-41 Guidelines on Firewalls and Firewall Policy
NIST SP 800-44 Guidelines on Securing Public Web Servers
NIST SP 800-47 Security Guide for Interconnecting Information Technology Systems