SP 800-35. Guide to Information Technology Security Services

  • Authors:
  • Timothy Grance;Joan Hash;Marc Stevens;Kristofor O'Neal;Nadya Bartol

  • Affiliations:
  • National Institute of Standards and Technology;National Institute of Standards and Technology;Booz Allen Hamilton;Booz Allen Hamilton;-

  • Venue:
  • SP 800-35. Guide to Information Technology Security Services
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

Organizations frequently must evaluate and select a variety of information technology (IT) security services in order to maintain and improve their overall IT security program and enterprise architecture. IT security services, which range from security policy development to intrusion detection support, may be offered by an IT group internal to an organization, or by a growing group of vendors. It is difficult and challenging to determine service provider capabilities, measure service reliability and navigate the many complexities involved in security service agreements.This guide provides assistance with the selection, implementation, and management of IT security services by guiding organizations through the various phases of the IT security services life cycle. This life cycle provides a framework that enables the IT security decision makers to organize their IT security effortsfrom initiation to closeout. The factors to be considered when selecting, implementing, and managing IT security services include: the type of service arrangement; service provider qualifications, operational requirements and capabilities, experience, and viability; trustworthiness of service provider employees; and the service provider's capability to deliver adequate protection for the organization systems, applications, and information.