Design Your ISMS to Protect Your Assets on AWS

Information

After you have determined assets, categories, and costs, establish a standard for implementing, operating, monitoring, reviewing, maintaining, and improving your information security management system (ISMS) on AWS.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

These factors can change over time, so it is a good practice to build a cyclical process for managing all of this information.

See Also

https://d1.awsstatic.com/whitepapers/Security/AWS_Security_Best_Practices.pdf

Item Details

Category: ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, MEDIA PROTECTION, PHYSICAL AND ENVIRONMENTAL PROTECTION, PROGRAM MANAGEMENT, RISK ASSESSMENT, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

References: 800-53|AC-4, 800-53|AC-16, 800-53|CA-2, 800-53|CA-6, 800-53|MP-1, 800-53|MP-3, 800-53|PE-16, 800-53|PM-9, 800-53|RA-1, 800-53|SC-9, 800-53|SI-12

Plugin: amazon_aws

Control ID: 424af7e6111cc1a5ba1cd9a2deba54e8d839d3ad51d90000570691916aac9658