Page 33 - Cyber Defense eMagazine July 2024
P. 33

References

               •  NIST SP 800-53: Security and Privacy Controls for Information Systems and Organizations  [12].
               •  NIST  SP  800-137:  Information  Security  Continuous  Monitoring  (ISCM)  for  Federal  Information
                   Systems and Organizations [14].
               •  NIST SP 800-207: Zero Trust Architecture [9].
               •  NIST Risk Management Framework (RMF) [14].

            Citations:
            [1] https://csrc.nist.gov/news/2022/guide-to-operational-technology-ot-security
            [2] https://www.agilicus.com/webinars/2023-04-11-protecting-critical-infrastructure-zero-trust-and-nist-
            800-53/
            [3] https://insights.sei.cmu.edu/documents/73/2022_500_001_887544.pdf
            [4] https://csrc.nist.gov/pubs/sp/800/207/a/ipd
            [5] https://www.nccoe.nist.gov/sites/default/files/legacy-files/zta-project-description-final.pdf
            [6] https://csrc.nist.gov/pubs/sp/1800/35/2prd
            [7] https://www.energy.gov/femp/articles/cyber-securing-facility-related-control-systems
            [8] https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-137.pdf
            [9] https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-207.pdf
            [10] https://www.nccoe.nist.gov/sites/default/files/legacy-files/ch-pe-project-description-final.pdf
            [11] https://www.energy.gov/femp/operational-technology-cybersecurity-energy-systems
            [12] https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r5.pdf
            [13] https://grcacademy.io/nist-800-53/controls/sa-15-5/
            [14]
            https://csrc.nist.gov/csrc/media/projects/forum/documents/2012/dec2012_cont_montor_risk_mgmt.pdf
            [15] https://www.upguard.com/blog/third-party-risk-requirements-nist-800-53
            [16] https://www.ivanti.com/blog/the-8-best-practices-for-reducing-your-organization-s-attack-surface
            [17] https://www.titania.com/resources/guides/nist-sp-800-53-compliance-explained-how-to-be-
            compliant
            [18] https://www.linkedin.com/pulse/assessing-improving-security-posture-critical-good-cyber-robert-
            bond
            [19] https://www.cisa.gov/sites/default/files/2023-04/zero_trust_maturity_model_v2_508.pdf
            [20] https://cvgstrategy.com/nist-special-publication-800-53/



















            Cyber Defense eMagazine – July 2024 Edition                                                                                                                                                                                                          33
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   28   29   30   31   32   33   34   35   36   37   38