FISCAM - Federal Information System
Controls Audit Manual
NNT Change Tracker’s real-time, non-stop approach to compliance, configuration drift reporting, and breach detection present an ideal solution to demonstrating compliance with FISCAM requirements.
FISCAM is a manual developed by the Government Accountability Office intended to provide auditors with specific guidance for evaluating the confidence, integrity, and availability of information systems. FISCAM is consistent with the National Institute of Standards and Technology (NIST SP 800-53) guidelines for complying with the Federal Information Security Modernization Act of 2014 (FISMA).
FISCAM focuses on 5 key areas: Security Management, Access Controls, Configuration Management, Contingency Planning, and Segregation of Duties.
Controls provide reasonable assurance that security management is effective, including effective:
- Remediation of information security weaknesses
- Periodic assessments and validation of risk
- Security awareness and security training
- Security control policies & procedures
The FISCAM is organized to facilitate effective and efficient IS control audits by incorporating the following controls:
- A top-down, risk-based approach that considers materiality and significance in determining effective and efficient audit procedures
- Evaluation of entity-wide controls and their effect on audit risk
- Evaluation of general controls and their pervasive impact on business process application controls
- Evaluation of security management at all levels (entity-wide, system, and business process application levels)
- A control hierarchy (control categories, critical elements, and control activities) to assist in evaluating the significance of identified IS control weaknesses
- Groupings of control categories consistent with the nature of the risk
- Experience gained in GAO's performance and review of IS control audits, including field testing the concepts in this revised FISCAM
Change Tracker Gen 7R2: Complete configuration and system integrity assurance combined with the most comprehensive and intelligent change control solution available.
Vulnerability Tracker: The world’s only limitless and unrestricted vulnerability scanning solution with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.