NIST Site Search
Search NIST.GOV
Custom Search
[Official NIST.GOV TIME]
Product Research

Advertise on this site
NIST SP 800-30 Risk Management Guide for Information Technology Systems
on Saturday 21 January 2006 print the content item {PDF=create pdf file of the content item^plugin:content.40}
in NIST.gov Publications > Special Publications - SP 800 series

Every organization has a mission. In this digital era, as organizations use automated information technology (IT) systems to process their information for better support of their missions, risk management plays a critical role in protecting an organization’s information assets, and therefore its mission, from IT-related risk.

Download NIST Special Publication 800-30

Please use the NIST.org Forum to ask questions or discuss this document. Members can use the comment link below for short comments about this publication.


(The below SP 800-40 description is from NIST.gov, edited)

An effective risk management process is an important component of a successful IT security program. The principal goal of an organization’s risk management process should be to protect the organization and its ability to perform their mission, not just its IT assets. Therefore, the risk management process should not be treated primarily as a technical function carried out by the IT experts who operate and manage the IT system, but as an essential management function of the organization.

The SP 800-30 document was created by the National Institute of Standards and Technology and is public domain (not subject to copyright).



NIST Special Publication # 800-30


Translate to: French German Italian Spanish Portuguese GTM_LAN_DUTCH Russian Chinese Arabic Korean English
Google Ads




Headlines

»Federal Funding Opportunity Solicits Projects That Support Online Privacy
»Spotlight on Commerce: Donna F. Dodson
»Lack of Effective Timing Signals Could Hamper Internet of Things Development
»NIST 2015 SBIR Grants to Fund Research in Manufacturing, Clean Energy, Cybersecurity and Bioscience
»NCCoE Speaker Series March 2015
»New NIST Tools to Help Boost Wireless Channel Frequencies and Capacity
»NIST Announces Pilot Grants Competition to Improve Security and Privacy of Online Identity Verification Systems
»Vendors Sought to Develop Model System to Monitor Security of Energy Industry Networked Control Systems
»NIST Releases Update of Industrial Control Systems Security Guide for Final Public Review
»Cybersecurity Summit Technical Workshop
»NIST Forensic Science Standards Committees to Hold First Public Meetings in February 2015
»NIST Security Guide Walks Organizations Through the Mobile App Security Vetting Process
»Open-Source Software for Quantum Information
»NIST Requests Round Two Comments on its Cryptographic Standards Process
»Symposium to Focus on Future of Voting Systems


Date published: not known
Details

»Google Releases Security Update for Chrome
Original release date: April 01, 2015 Google has released Chrome 41.0.2272.118 for Windows, M ...
»Mozilla Releases Security Updates for Firefox, Firefox ESR, and Thunderbird
Original release date: March 31, 2015 The Mozilla Foundation has released security updates to ...
»Cisco Releases Semiannual IOS Software Security Advisory Bundled Publication
Original release date: March 26, 2015 Cisco has released its semiannual Cisco IOS Software Se ...
»Installer Hijacking Vulnerability in Android Devices
Original release date: March 24, 2015 A vulnerability in Google's Android OS has been discove ...
»Apple Releases Security Update for OS X Yosemite
Original release date: March 20, 2015 Apple has released Security Update 2015-003 for OS X Yo ...
»Mozilla Releases Security Updates for Firefox, Firefox ESR, and SeaMonkey
Original release date: March 20, 2015 | Last revised: March 23, 2015 The Mozilla Foundation h ...
»Drupal Releases Security Updates
Original release date: March 19, 2015 | Last revised: March 20, 2015 Drupal has released upda ...
»OpenSSL Patches Multiple Vulnerabilities
Original release date: March 19, 2015 OpenSSL has released new updates addressing multiple vu ...
»Ubuntu Releases Security Update
Original release date: March 19, 2015 Ubuntu has released a security update to address multip ...
»Apple Releases Security Updates for Safari
Original release date: March 18, 2015 | Last revised: March 19, 2015 Apple has released secur ...


Date published: not known
Details

»VB2015 conference programme announced
From drones to elephants: an exciting range of topics will be covered in Prague. In six months' time ...
»Paper: a timeline of mobile botnets
Ruchna Nigam provides an overview of more than 60 mobile malware families. The rise of mobile malwar ...
»Paper: Dylib hijacking on OS X
Patrick Wardle shows how OS X is also vulnerable to once common Windows attacks. A few years ago, DL ...
»Will DIME eventually replace email?
Protocol has all the advantages of email, yet is orders of magnitude more secure. In the current Int ...
»Paper: Windows 10 patching process may leave enterprises vulnerable to zero-day attacks
Aryeh Goretsky gives advice on how to adapt to Windows 10's patching strategy. Patching is hard, esp ...
»The ghost of Stuxnet past
Microsoft patches .LNK vulnerability after 2010 patch was found to be incomplete. Mention Stuxnet an ...
»Virus Bulletin seeks hackers, network researchers for VB2015
One week left to submit an abstract for the 25th Virus Bulletin conference. A few weeks ago, I made ...
»Canadian firm fined $1.1m for breaching anti-spam law
First success story for long-awaited CASL. The Canadian Radio-television and Telecommunications Comm ...
»VB2014 paper: Leaving our ZIP undone: how to abuse ZIP to deliver malware apps
Gregory Panakkal explains that there are different ways of looking at APK files - and that sometimes ...


Date published: not known
Details

»Laziok Trojan Exploits Three Year-Old Windows Flaw
»Obama Signs Executive Order For Sanctions Against Cybercriminals, Cyberspies
President cites International Emergency Economic Powers Act to allow feds to blacklist foreign indiv ...
»Dance Of The 'Next-Gen' CISO
»Black Hat USA 2015: Barkeep, Another Round of Pentests
Three weeks ago, we inaugurated a series of intel updates with a glimpse at the beginner-level pente ...
»Spring Cleaning In The SOC: Focus On the Inside Threat
»Application of Threat Indicators: A Temporal View
»BH Mobile Security Summit
»3 Big-Picture Themes CISOs Should Track At Interop
»30% Of Companies Would Pay Ransoms To Cybercriminals


Date published: Thu, 02 Apr 2015 02:58:28 EDT
Details
Main Menu
· Home
Current Security News
 
SANS Internet Storm Center, InfoCON: green

» Infocon: green

» ISC StormCast for Thursday, April 2nd 2015 http://isc.sans.edu/podcastdetail.html?id=4423, (Thu, Apr 2nd)
[01 Apr 2015 08:11pm]

» Angler Exploit Kit - Recent Traffic Patterns, (Thu, Apr 2nd)
[01 Apr 2015 07:40pm]

» ISC StormCast for Wednesday, April 1st 2015 http://isc.sans.edu/podcastdetail.html?id=4421, (Wed, Apr 1st)
[31 Mar 2015 10:09pm]

» Rig Exploit Kit Changes Traffic Patterns, (Wed, Apr 1st)
[31 Mar 2015 06:34pm]

» ISC StormCast for Tuesday, March 31st 2015 http://isc.sans.edu/podcastdetail.html?id=4419, (Tue, Mar 31st)
[30 Mar 2015 07:58pm]

» Select Star from PCAP - Treating Packet Captures as Databases, (Tue, Mar 31st)
[30 Mar 2015 07:29pm]

» YARA Rules For Shellcode, (Mon, Mar 30th)
[30 Mar 2015 10:11am]

» ISC StormCast for Monday, March 30th 2015 http://isc.sans.edu/podcastdetail.html?id=4417, (Sun, Mar 29th)
[29 Mar 2015 05:35pm]

» Malicious XML: Matryoshka Edition, (Sun, Mar 29th)
[29 Mar 2015 04:23am]

» Friday Digest - 27 MAR 2015, (Fri, Mar 27th)
[27 Mar 2015 06:59pm]

***
CNET News.com

» Microsoft defends opening Hotmail account of blogger in espionage case
[20 Mar 2014 06:47pm]

» Syria's Internet goes dark for several hours
[20 Mar 2014 04:25pm]

» Symantec fires CEO Steve Bennett
[20 Mar 2014 03:07pm]

» Microsoft sniffed blogger's Hotmail account to trace leak
[20 Mar 2014 01:28pm]

» Microsoft sniffed private Hotmail account to trace trade secret leak
[20 Mar 2014 01:28pm]

» IBM's new services zero in on fraud, financial crime
[20 Mar 2014 07:31am]

» Despite assault on privacy, Page sees value in online openness
[19 Mar 2014 08:00pm]

» Hackers transform EA Web page into Apple ID phishing scheme
[19 Mar 2014 05:21pm]

» NSA top lawyer says tech giants knew about data collection
[19 Mar 2014 02:57pm]

» Microsoft touts study showing the cost of pirated software
[19 Mar 2014 06:55am]

» Microsoft touts study showing cost of malware in pirated software
[19 Mar 2014 06:55am]

» How to spy on your lover, the smartphone way
[18 Mar 2014 01:24pm]

» Mt. Gox update lets users see their Bitcoin balances
[18 Mar 2014 06:38am]

» Fake Malaysia Airlines links spread malware
[17 Mar 2014 05:12pm]

» IBM: No, we did not help NSA spy on customers
[17 Mar 2014 01:15pm]

***

***



***


More IT Security
News Feeds
More Sponsors

Advertise on this site
RSS Feeds
Our news can be syndicated by using these rss feeds.
rss1.0
rss2.0
rdf
Symantec News

NIST.org is in no way connected to the U.S. government site NIST.gov

This site is © John Herron, CISSP. All Rights Reserved.

Please visit daily to stay up to date on all your IT Security compliance issues.

http://www.nist.org -
Hosted by BlueHost. We've never had a better hosting company.
{THEMEDISCLAIMER}