Also found in: Encyclopedia.
FISMAFederal Information Security Management Act of 2002
FISMAFederal Information System Management Act
References in periodicals archive ?
QTS' custom data center and colocation services at its Richmond and Atlanta-Metro mega data centers were tested under the latest version of FISMA.
FISMA 2014 also modifies the scope of "reportable information" to include specific information about threats, security incidents, and compliance with security requirements.
Although third-party service providers have been subject to FISMA since its enactment, vendor compliance has been prioritized over the past few years.
FISMA certification has been at the heart of a war of words between Microsoft and Google.
With Google Apps for Government, we've gone beyond FISMA certification," Google spokesperson Andrew Kovacs told TechNewsWorld.
Overall, the OIG's evaluation showed that GAO has established an information security program consistent with the requirements of FISMA, Office of Management and Budget (OMB) implementing guidance, and guidance and standards issued by the National Institute of Standards and Technology (NIST).
Lunarline's FISMA course offers hands on development of the Systems Security Plan (SSP), Security Assessment Report (SAR), and Plan of Actions and Milestones (POA&M).
November is right around the corner and Feds should realize the value in embracing this new FISMA reporting tool," said Tom Conway, director of Federal business development, McAfee.
The nFX SIM One FISMA compliance framework provides a multitude of views and reports that support the SP 800-60 guidelines from the FISMA Federal Enterprise Architecture Business Reference Model and SP 800-53A controls.
General information regarding the FISMA certification and process can be viewed here:
Because of increasing security concerns and the need to comply with regulations like FISMA and FIPS 200, many federal IT Directors, CIO's, and CISO's are calling for a way to simplify data consolidations and migrations for greater visibility and control over their organizations' sensitive data.