Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Kelley L. Dempsey is active.

Publication


Featured researches published by Kelley L. Dempsey.


Special Publication (NIST SP) - 800-128 | 2011

Guide for Security-Focused Configuration Management of Information Systems

L A. Johnson; Kelley L. Dempsey; Ronald S. Ross; Sarbari Gupta; Dennis Bailey

The purpose of the National Institute of Standards and Technology Special Publication 800-128, Guide for Security-Focused Configuration Management of Information Systems, is to provide guidelines for organizations responsible for managing and administering the security of federal information systems and associated environments of operation. Configuration management concepts and principles described in NIST SP 800-128, provide supporting information for NIST SP 800-53, Recommended Security Controls for Federal Information Systems and Organizations. NIST SP 800-128 assumes that information security is an integral part of an organizations overall configuration management. The focus of this document is on implementation of the information system security aspects of configuration management, and as such the term security-focused configuration management (SecCM) is used to emphasize the concentration on information security. In addition to the fundamental concepts associated with SecCM, the process of applying SecCM practices to information systems is described. The goal of SecCM activities is to manage and monitor the configurations of information systems to achieve adequate security and minimize organizational risk while supporting the desired business functionality and services.~


Special Publication (NIST SP) - 800-171 Rev. 1 | 2018

Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations [including updates as of 06-07-2018] | NIST

Ronald S. Ross; Kelley L. Dempsey; Mark Riddle; Gary Guissanie

The protection of Controlled Unclassified Information (CUI) resident in nonfederal systems and organizations is of paramount importance to federal agencies and can directly impact the ability of the federal government to successfully conduct its essential missions and functions. This publication provides agencies with recommended security requirements for protecting the confidentiality of CUI when the information is resident in nonfederal systems and organizations; when the nonfederal organization is not collecting or maintaining information on behalf of a federal agency or using or operating a system on behalf of an agency; and where there are no specific safeguarding requirements for protecting the confidentiality of CUI prescribed by the authorizing law, regulation, or governmentwide policy for the CUI category listed in the CUI Registry. The requirements apply to all components of nonfederal systems and organizations that process, store, or transmit CUI, or that provide security protection for such components. The requirements are intended for use by federal agencies in contractual vehicles or other agreements established between those agencies and nonfederal organizations.


National Institute of Standards and Technology (U.S.) | 2018

Assessing Security Requirements for Controlled Unclassified Information

Ronald S. Ross; Kelley L. Dempsey; Victoria Yan Pillitteri

The protection of Controlled Unclassified Information (CUI) resident in nonfederal systems and organizations is of paramount importance to federal agencies and can directly impact the ability of the federal government to successfully conduct its assigned missions and business operations. This publication provides federal and nonfederal organizations with assessment procedures and a methodology that can be employed to conduct assessments of the CUI security requirements in NIST Special Publication 800-171, Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations. The assessment procedures are flexible and can be customized to the needs of the organizations and the assessors conducting the assessments. Security assessments can be conducted as self-assessments; independent, third-party assessments; or governmentsponsored assessments and can be applied with various degrees of rigor, based on customerdefined depth and coverage attributes. The findings and evidence produced during the security assessments can facilitate risk-based decisions by organizations related to the CUI requirements.


Archive | 2011

Information Security Continuous Monitoring (Iscm) for Federal Information Systems and Organizations

Kelley L. Dempsey; Nirali Shah Chawla; L A. Johnson; Ronald Johnston; Alicia Clay Jones; Angela Orebaugh; Matthew A. Scholl; Kevin M. Stine


National Institute of Standards and Technology (U.S.) | 2010

Information Security Continuous Monitoring for Federal Information Systems and Organizations [draft]

Arnold Johnson; Kelley L. Dempsey; Alicia Clay Jones


Special Publication (NIST SP) - 800-171 | 2015

Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations

Ronald S. Ross; Kelley L. Dempsey; Mark Riddle; Gary Guissanie


Archive | 2011

SP 800-137. Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations

Kelley L. Dempsey; Nirali Shah Chawla; L. Arnold Johnson; Ronald Johnston; Alicia Clay Jones; Angela Orebaugh; Matthew A. Scholl; Kevin M. Stine


Special Publication (NIST SP) - 800-171 | 2018

Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations [including updates as of 02-20-2018]

Ronald S. Ross; Gary Guissanie; Kelley L. Dempsey; Mark Riddle


Archive | 2018

Assessing Security Requirements for Controlled Unclassified Information (Final Draft)

Ron Ross; Kelley L. Dempsey; Victoria Yan Pillitteri


Special Publication (NIST SP) - 800-171 Rev 1 | 2016

Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations

Ronald S. Ross; Gary Guissanie; Kelley L. Dempsey; Mark Riddle

Collaboration


Dive into the Kelley L. Dempsey's collaboration.

Top Co-Authors

Avatar

Ronald S. Ross

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Kevin M. Stine

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Arnold Johnson

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

Matthew A. Scholl

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

L. Arnold Johnson

National Institute of Standards and Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge