A Cyber Security practitioner with regards to Authorization of information systems and all associated cybersecurity policies and procedures. Fully versed in the general tenets supporting the overall implementation of its authorization process, to include supporting cybersecurity policy, procedures and processes. Leads and executes cybersecurity processes while either authorizing an information system or serving as a SME for an information system undergoing authorization. Possess an understanding of how the security controls identified in the NIST 800-53 apply to the process of assessing and authorizing large organization IT infrastructure and cloud technologies, in which there is a compilation of large and small enclaves, AIS applications and outsourced IT processes. Determines the applicable severity value for an identified vulnerability (e.g., non-compliant security control), and determines the possible ramifications on the system’s current or future authorization. Required to brief customer on the progress or results of an information system undergoing the authorization process.
Here's what you need :