<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=Industry%3AProject_Review%2FNIST_SP_800-37r1_FPD_Chapter_2</id>
		<title>Industry:Project Review/NIST SP 800-37r1 FPD Chapter 2 - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=Industry%3AProject_Review%2FNIST_SP_800-37r1_FPD_Chapter_2"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_2&amp;action=history"/>
		<updated>2026-04-10T12:20:47Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_2&amp;diff=74928&amp;oldid=prev</id>
		<title>Dan Philpott: /* 2.3.2  Boundaries for Complex Information Systems (System of Systems) */</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_2&amp;diff=74928&amp;oldid=prev"/>
				<updated>2009-12-08T03:40:24Z</updated>
		
		<summary type="html">&lt;p&gt;‎&lt;span dir=&quot;auto&quot;&gt;&lt;span class=&quot;autocomment&quot;&gt;2.3.2  Boundaries for Complex Information Systems (System of Systems)&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;tr style='vertical-align: top;' lang='en'&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 03:40, 8 December 2009&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l94&quot; &gt;Line 94:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 94:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;In the above example, an information system contains a system guard that monitors the flow of information between two local area networks. The information system, in this case, can be partitioned into multiple [http://fismapedia.org/index.php?title=Term:Subsystem subsystem] components: (i) [http://fismapedia.org/index.php?title=Term:Local_Area_Network local area network] one; (ii) [http://fismapedia.org/index.php?title=Term:Local_Area_Network local area network] two; (iii) the system guard separating the two networks; and ([http://fismapedia.org/index.php?title=AnA:IV iv]) several dynamic subsystems that become part of the system at various points in time (see Section 2.3.3). Each [http://fismapedia.org/index.php?title=Term:Subsystem subsystem] component within the information system may be categorized individually. The [http://fismapedia.org/index.php?title=Term:Security_Categorization security categorization] of the information system is determined by taking into consideration all of the individual [http://fismapedia.org/index.php?title=Term:Subsystem subsystem] categorizations. When all subsystems within the information system have completed the [http://fismapedia.org/index.php?title=Term:Security_Control_Assessment security control assessment], an additional [http://fismapedia.org/index.php?title=Term:Assessment assessment] is performed on the system-level [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] not covered by the individual [http://fismapedia.org/index.php?title=Term:Subsystem subsystem] assessments, and the results are &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;bu&lt;/del&gt;, the determination of subsystems is established at system initiation and maintained throughout the [http://fismapedia.org/index.php?title=Term:Life_Cycle life cycle] of the system. However, there are some instances, most notably in [http://fismapedia.org/index.php?title=Term:Net-Centric net-centric] [http://fismapedia.org/index.php?title=Term:Architectures architectures] (e.g., cloud computing, service-oriented [http://fismapedia.org/index.php?title=Term:Architectures architectures]),&amp;lt;ref&amp;gt;A [http://fismapedia.org/index.php?title=Term:Net-Centric net-centric] [http://fismapedia.org/index.php?title=Term:Architecture architecture] is a complex system of systems comprised of subsystems and services that are part of a continuously-evolving, complex community of people, devices, information and services interconnected by a network that enhances [http://fismapedia.org/index.php?title=Term:Information_Sharing information sharing] and collaboration.&amp;lt;/ref&amp;gt; where the subsystems that compose the system may not be present at all stages of the [http://fismapedia.org/index.php?title=Term:Life_Cycle life cycle]. Some subsystems may not become part of an information system until sometime after system initiation, while other subsystems may leave the system sometime prior to system [http://fismapedia.org/index.php?title=Term:Termination termination]. Generally, this will not impact the external [http://fismapedia.org/index.php?title=Term:Boundary boundary] of the information system if the dynamic subsystems are in the system design and the appropriate [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] are reflected in the [http://fismapedia.org/index.php?title=Term:Security_Plan security plan]. But it does impact the subsystems that exist within the [http://fismapedia.org/index.php?title=Term:Boundary boundary] at any given point in time.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;In the above example, an information system contains a system guard that monitors the flow of information between two local area networks. The information system, in this case, can be partitioned into multiple [http://fismapedia.org/index.php?title=Term:Subsystem subsystem] components: (i) [http://fismapedia.org/index.php?title=Term:Local_Area_Network local area network] one; (ii) [http://fismapedia.org/index.php?title=Term:Local_Area_Network local area network] two; (iii) the system guard separating the two networks; and ([http://fismapedia.org/index.php?title=AnA:IV iv]) several dynamic subsystems that become part of the system at various points in time (see Section 2.3.3). Each [http://fismapedia.org/index.php?title=Term:Subsystem subsystem] component within the information system may be categorized individually. The [http://fismapedia.org/index.php?title=Term:Security_Categorization security categorization] of the information system is determined by taking into consideration all of the individual [http://fismapedia.org/index.php?title=Term:Subsystem subsystem] categorizations. When all subsystems within the information system have completed the [http://fismapedia.org/index.php?title=Term:Security_Control_Assessment security control assessment], an additional [http://fismapedia.org/index.php?title=Term:Assessment assessment] is performed on the system-level [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] not covered by the individual [http://fismapedia.org/index.php?title=Term:Subsystem subsystem] assessments, and the results are &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;bundled together into the authorization package and presented as evidence to the authorizing official.&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;=== 2.3.3 Dynamic Subsystems ===&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;For many information systems,&lt;/ins&gt;, the determination of subsystems is established at system initiation and maintained throughout the [http://fismapedia.org/index.php?title=Term:Life_Cycle life cycle] of the system. However, there are some instances, most notably in [http://fismapedia.org/index.php?title=Term:Net-Centric net-centric] [http://fismapedia.org/index.php?title=Term:Architectures architectures] (e.g., cloud computing, service-oriented [http://fismapedia.org/index.php?title=Term:Architectures architectures]),&amp;lt;ref&amp;gt;A [http://fismapedia.org/index.php?title=Term:Net-Centric net-centric] [http://fismapedia.org/index.php?title=Term:Architecture architecture] is a complex system of systems comprised of subsystems and services that are part of a continuously-evolving, complex community of people, devices, information and services interconnected by a network that enhances [http://fismapedia.org/index.php?title=Term:Information_Sharing information sharing] and collaboration.&amp;lt;/ref&amp;gt; where the subsystems that compose the system may not be present at all stages of the [http://fismapedia.org/index.php?title=Term:Life_Cycle life cycle]. Some subsystems may not become part of an information system until sometime after system initiation, while other subsystems may leave the system sometime prior to system [http://fismapedia.org/index.php?title=Term:Termination termination]. Generally, this will not impact the external [http://fismapedia.org/index.php?title=Term:Boundary boundary] of the information system if the dynamic subsystems are in the system design and the appropriate [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] are reflected in the [http://fismapedia.org/index.php?title=Term:Security_Plan security plan]. But it does impact the subsystems that exist within the [http://fismapedia.org/index.php?title=Term:Boundary boundary] at any given point in time.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Dynamic subsystems that become part of an organizational information system at various points in time may or may not be under the direct control of the organization. These subsystems may be provided by external providers (e.g., through contracts, interagency agreements, [http://fismapedia.org/index.php?title=Term:Lines_of_Business lines of business] arrangements, licensing agreements, and/or [http://fismapedia.org/index.php?title=Term:Supply_Chain supply chain] exchanges). Regardless of whether the [http://fismapedia.org/index.php?title=Term:Subsystem subsystem] is or is not controlled by the organization, the expectations of its capabilities have to be considered. The dynamic inclusion or exclusion of the subsystems may or may not require reassessment of the information system as a whole. This is determined based on constraints and assumptions (e.g., functions the subsystems perform, connections to other subsystems and other information systems) imposed upon the subsystems at system design and incorporated in the [http://fismapedia.org/index.php?title=Term:Security_Plan security plan]. So long as the subsystems conform to the identified constraints and assumptions, they can be dynamically added or removed from the information system without requiring reassessments of the system.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Dynamic subsystems that become part of an organizational information system at various points in time may or may not be under the direct control of the organization. These subsystems may be provided by external providers (e.g., through contracts, interagency agreements, [http://fismapedia.org/index.php?title=Term:Lines_of_Business lines of business] arrangements, licensing agreements, and/or [http://fismapedia.org/index.php?title=Term:Supply_Chain supply chain] exchanges). Regardless of whether the [http://fismapedia.org/index.php?title=Term:Subsystem subsystem] is or is not controlled by the organization, the expectations of its capabilities have to be considered. The dynamic inclusion or exclusion of the subsystems may or may not require reassessment of the information system as a whole. This is determined based on constraints and assumptions (e.g., functions the subsystems perform, connections to other subsystems and other information systems) imposed upon the subsystems at system design and incorporated in the [http://fismapedia.org/index.php?title=Term:Security_Plan security plan]. So long as the subsystems conform to the identified constraints and assumptions, they can be dynamically added or removed from the information system without requiring reassessments of the system.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;As noted above, the assumptions and constraints on the dynamic subsystems are reflected in the information system design and the [http://fismapedia.org/index.php?title=Term:Security_Plan security plan]. The determination as to whether the subsystems conform to the assumptions and constraints is addressed during the continuous monitoring phase of the [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] process. Depending upon the nature of the subsystems (including the functions, connections, and relative trust relationships established with the [http://fismapedia.org/index.php?title=Term:Subsystem subsystem] providers), the determination of conformance may be performed in a manual or automated manner, and may occur prior to, or during the [http://fismapedia.org/index.php?title=Term:Subsystem subsystem] connecting/disconnecting to the information system.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;As noted above, the assumptions and constraints on the dynamic subsystems are reflected in the information system design and the [http://fismapedia.org/index.php?title=Term:Security_Plan security plan]. The determination as to whether the subsystems conform to the assumptions and constraints is addressed during the continuous monitoring phase of the [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] process. Depending upon the nature of the subsystems (including the functions, connections, and relative trust relationships established with the [http://fismapedia.org/index.php?title=Term:Subsystem subsystem] providers), the determination of conformance may be performed in a manual or automated manner, and may occur prior to, or during the [http://fismapedia.org/index.php?title=Term:Subsystem subsystem] connecting/disconnecting to the information system.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== 2.4 SECURITY CONTROL ALLOCATION ==&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== 2.4 SECURITY CONTROL ALLOCATION ==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Dan Philpott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_2&amp;diff=74925&amp;oldid=prev</id>
		<title>Dan Philpott: Uploaded images and edited links to make them work properly</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_2&amp;diff=74925&amp;oldid=prev"/>
				<updated>2009-12-08T03:13:37Z</updated>
		
		<summary type="html">&lt;p&gt;Uploaded images and edited links to make them work properly&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;tr style='vertical-align: top;' lang='en'&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 03:13, 8 December 2009&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l18&quot; &gt;Line 18:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 18:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;http://fismapedia.org/index.php?title=&lt;/del&gt;Image:80037r1FPD_Figure2-1.png|500px|thumb|center|FIGURE 2-1: HIERARCHICAL RISK MANAGEMENT APPROACH]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;[&lt;/ins&gt;Image:80037r1FPD_Figure2-1.png|500px|thumb|center|FIGURE 2-1: HIERARCHICAL RISK MANAGEMENT APPROACH&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;]&lt;/ins&gt;]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l43&quot; &gt;Line 43:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 43:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;http://fismapedia.org/index.php?title=&lt;/del&gt;Image:80037r1FPD_Figure2-2.png|500px|thumb|center|FIGURE 2-2: RISK MANAGEMENT FRAMEWORK]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;[&lt;/ins&gt;Image:80037r1FPD_Figure2-2.png|500px|thumb|center|FIGURE 2-2: RISK MANAGEMENT FRAMEWORK&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;]&lt;/ins&gt;]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l91&quot; &gt;Line 91:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 91:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*&amp;#160; &amp;#160; [http://fismapedia.org/index.php?title=Term:Security_Authorization Security authorization] conducted on the information system as a whole.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;*&amp;#160; &amp;#160; [http://fismapedia.org/index.php?title=Term:Security_Authorization Security authorization] conducted on the information system as a whole.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;http://fismapedia.org/index.php?title=&lt;/del&gt;Image:80037r1FPD_Figure2-3.png|500px|thumb|center|FIGURE 2-3: &lt;del class=&quot;diffchange diffchange-inline&quot;&gt; &lt;/del&gt;DECOMPOSITION OF COMPLEX SYSTEMS]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;[&lt;/ins&gt;Image:80037r1FPD_Figure2-3.png|500px|thumb|center|FIGURE 2-3: DECOMPOSITION OF COMPLEX SYSTEMS&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;]&lt;/ins&gt;]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l105&quot; &gt;Line 105:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 105:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;There are three types of [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] for information systems that can be employed by an organization: (i) ''system-specific controls'' (i.e., controls that provide a security capability for a particular information system only); (ii) ''common controls'' (i.e., controls that provide a security capability for multiple information systems); or (iii) ''hybrid controls'' (i.e., controls that have both system-specific and common characteristics).&amp;lt;ref&amp;gt;NIST [http://fismapedia.org/index.php?title=Doc:Special_Publication_800-53 Special Publication 800-53] provides additional guidance on [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] for organizational information systems.&amp;lt;/ref&amp;gt; As illustrated in Figure 2-4, [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] are allocated to organizational information systems as system-specific, hybrid, or common controls. The allocation of [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] is consistent with the organization's [http://fismapedia.org/index.php?title=Term:Enterprise_Architecture enterprise architecture] and information security [http://fismapedia.org/index.php?title=Term:Architecture architecture]. As part of the information security [http://fismapedia.org/index.php?title=Term:Architecture architecture], organizations are encouraged to identify and implement [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] that can support multiple information systems efficiently and effectively as a common capability (i.e., common controls). When these controls are used to support a specific information system, they are referenced by that specific system as ''inherited controls''. Common controls promote more cost-effective and consistent information security across the organization and can also simplify [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] activities. By allocating [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] to an information system as system-specific controls (e.g., [http://fismapedia.org/index.php?title=Term:Access_Controls access controls], [http://fismapedia.org/index.php?title=Term:Identification_and_Authentication identification and authentication] controls, system communications and protection controls, audit controls), as hybrid controls (e.g., [http://fismapedia.org/index.php?title=Term:Contingency_Planning contingency planning] controls), or as common controls that are inherited (e.g., physical and environmental protection controls, awareness and training controls, [http://fismapedia.org/index.php?title=Term:Personnel_Security personnel security] controls), the organization assigns responsibility to specific organizational entities for the development, implementation, [http://fismapedia.org/index.php?title=Term:Assessment assessment], authorization, and monitoring of those controls.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;There are three types of [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] for information systems that can be employed by an organization: (i) ''system-specific controls'' (i.e., controls that provide a security capability for a particular information system only); (ii) ''common controls'' (i.e., controls that provide a security capability for multiple information systems); or (iii) ''hybrid controls'' (i.e., controls that have both system-specific and common characteristics).&amp;lt;ref&amp;gt;NIST [http://fismapedia.org/index.php?title=Doc:Special_Publication_800-53 Special Publication 800-53] provides additional guidance on [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] for organizational information systems.&amp;lt;/ref&amp;gt; As illustrated in Figure 2-4, [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] are allocated to organizational information systems as system-specific, hybrid, or common controls. The allocation of [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] is consistent with the organization's [http://fismapedia.org/index.php?title=Term:Enterprise_Architecture enterprise architecture] and information security [http://fismapedia.org/index.php?title=Term:Architecture architecture]. As part of the information security [http://fismapedia.org/index.php?title=Term:Architecture architecture], organizations are encouraged to identify and implement [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] that can support multiple information systems efficiently and effectively as a common capability (i.e., common controls). When these controls are used to support a specific information system, they are referenced by that specific system as ''inherited controls''. Common controls promote more cost-effective and consistent information security across the organization and can also simplify [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] activities. By allocating [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] to an information system as system-specific controls (e.g., [http://fismapedia.org/index.php?title=Term:Access_Controls access controls], [http://fismapedia.org/index.php?title=Term:Identification_and_Authentication identification and authentication] controls, system communications and protection controls, audit controls), as hybrid controls (e.g., [http://fismapedia.org/index.php?title=Term:Contingency_Planning contingency planning] controls), or as common controls that are inherited (e.g., physical and environmental protection controls, awareness and training controls, [http://fismapedia.org/index.php?title=Term:Personnel_Security personnel security] controls), the organization assigns responsibility to specific organizational entities for the development, implementation, [http://fismapedia.org/index.php?title=Term:Assessment assessment], authorization, and monitoring of those controls.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;http://fismapedia.org/index.php?title=&lt;/del&gt;Image:80037r1FPD_Figure2-4.png|500px|thumb|center|FIGURE 2-4: &lt;del class=&quot;diffchange diffchange-inline&quot;&gt; &lt;/del&gt;SECURITY CONTROL ALLOCATION&amp;lt;ref&amp;gt;Security plans, security assessment reports, and plans of action and milestones are critical outputs from the RMF used to manage risk associated with the operation of information systems. See Appendix F for additional information.&amp;lt;/ref&amp;gt;]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;[&lt;/ins&gt;Image:80037r1FPD_Figure2-4.png|500px|thumb|center|FIGURE 2-4: SECURITY CONTROL ALLOCATION&amp;lt;ref&amp;gt;Security plans, security assessment reports, and plans of action and milestones are critical outputs from the RMF used to manage risk associated with the operation of information systems. See Appendix F for additional information.&amp;lt;/ref&amp;gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;]&lt;/ins&gt;]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Dan Philpott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_2&amp;diff=74698&amp;oldid=prev</id>
		<title>Dan Philpott: Initial add for GIC review of NIST SP 800-37r1 FPD</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_2&amp;diff=74698&amp;oldid=prev"/>
				<updated>2009-12-04T05:27:36Z</updated>
		
		<summary type="html">&lt;p&gt;Initial add for GIC review of NIST SP 800-37r1 FPD&lt;/p&gt;
&lt;a href=&quot;https://wiki.owasp.org/index.php?title=Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_2&amp;amp;diff=74698&quot;&gt;Show changes&lt;/a&gt;</summary>
		<author><name>Dan Philpott</name></author>	</entry>

	</feed>