The Open Group Library

Security

Set Ascending Direction

1-10 of 19

Page:
  1. 1
  2. 2
  1. Open FAIR™ Risk Analysis Process Guide

    This Guide offers some best practices for performing an Open FAIR™ risk analysis: it aims to help risk analysts understand how to apply the Open FAIR risk analysis methodology.
    Learn More
  2. Open FAIR™ Tool with SIPmath™ Distributions: Guide to the Theory of Operation

    This document defines the algorithms that can be used to produce an acceptable implementation of the Open FAIR™ Risk Analysis (O-RA) standard, a standard of The Open Group.
    Learn More
  3. The Open FAIR™ – NIST Cybersecurity Framework Cookbook

    This document describes in detail how to apply the Open FAIR factor analysis for information risk methodology to the NIST Framework for Improving Critical Infrastructure Cybersecurity (NIST Cybersecurity Framework).
    Learn More
  4. Integrating Risk and Security within a TOGAF® Enterprise Architecture

    This document is an Open Group Guide addressing how to integrate considerations of security and risk into an Enterprise Architecture.
    Learn More
  5. Implementation Guide to Leveraging Open Trusted Technology Providers in the Supply Chain

    Guidelines for Implementers of the NIST Cybersecurity Framework (CSF)
    Learn More
  6. Optimizing ISO/IEC 27001:2013 using O-ISM3

    This Guide is aimed at users of the well-established ISO/IEC 27001 Information Security Management Standard, to explain how The Open Group O-ISM3 Standard (C102) complements and extends ISO/IEC 27001 by adding further security management controls and applying security performance metrics.
    Learn More
  7. Trust Ecosystem Guide

    A guide to operating in a trust ecosystem.
    Learn More
  8. Open Enterprise Security Architecture (O-ESA): A Framework and Template for Policy-Driven Security

    This Open Enterprise Security Architecture (O-ESA) Guide provides a valuable reference resource for practicing security architects and designers.
    Learn More
  9. FAIR - ISO/IEC 27005 Cookbook

    This Technical Guide describes in detail how to apply the FAIR (Factor Analysis for Information Risk) methodology to any selected risk management framework.
    Learn More
  10. Jericho Forum® Self-Assessment Scheme

    This Self-Assessment Scheme is designed to assess how effectively a given information security product or solution meets the criteria implicit in the Jericho Forum Commandments.
    Learn More

Set Ascending Direction

1-10 of 19

Page:
  1. 1
  2. 2