Skip to content
757-216-3656Monday – Friday 830 AM – 430 PMinfo@itdojo.com
Facebook page opens in new windowTwitter page opens in new windowYouTube page opens in new windowLinkedin page opens in new window
IT Dojo
I.T. Training for Government and Contractors
IT Dojo
  • About
  • Training
    • Amazon Web Services
    • Cisco
    • CISSP
    • Cloud Technologies
    • CompTIA
    • Cybersecurity
    • DevOps
    • Electronic Warfare
    • Fortinet Training
    • Google Cloud
    • ITIL
    • Juniper
    • Linux
    • Microsoft
    • Programming
    • Project Management
    • RMF
    • Scrum
    • Splunk
    • STIGs
    • Tableau
    • VMware
    • Wireless
    • Wireshark
  • Consulting
  • Testimonials
  • Blog
  • Contact
Search:
  • About
  • Training
    • Amazon Web Services
    • Cisco
    • CISSP
    • Cloud Technologies
    • CompTIA
    • Cybersecurity
    • DevOps
    • Electronic Warfare
    • Fortinet Training
    • Google Cloud
    • ITIL
    • Juniper
    • Linux
    • Microsoft
    • Programming
    • Project Management
    • RMF
    • Scrum
    • Splunk
    • STIGs
    • Tableau
    • VMware
    • Wireless
    • Wireshark
  • Consulting
  • Testimonials
  • Blog
  • Contact

Daily Archives: July 13, 2017

You are here:
  1. Home
  2. 2017
  3. July
  4. 13

Security Control Spotlight— Inheritance from a FedRAMP Approved CSP

Risk Management Framework, RMF TrainingBy Nick WebbJuly 13, 2017

This article was written by Kathryn M. Daily, CISSP, RDRP of BAI Information Security. In a previous article, security control inheritance from an external system hosted at a departmental or agency data center was discussed. In this article, we are going to discuss inheritance from a FedRAMP Approved Cloud Service Provider (CSP) such as Amazon…

Continuous Monitoring Today—And Tomorrow

Risk Management Framework, RMF TrainingBy Nick WebbJuly 13, 2017

This article was written by Lon Berman, CISSP, RDRP of BAI Information Security Step 6 of the Risk Management Framework (RMF) is entitled “Monitor Security Controls”. Many security professionals would argue it is the most important step, since monitoring is what transforms RMF from yet another “point in time” evaluation to a true life cycle…

©2003 - 2021 IT Dojo, Inc. All Rights Reserved.
Go to Top
X