Summary of Information Security Risk & Continuous Monitoring (Rev A): NIST 800-39, 800-30 Rev 1, 800-37 Rev 2, & 800-137 by National Institute of Standards & Technology

Uncover the vital insights of NIST's information security risk guidelines. Navigate risks with confidence and master continuous monitoring today!

Sunday, September 28, 2025

Information Security Risk & Continuous Monitoring (rev a): NIST 800-39, 800-30 rev 1, 800-37 rev 2, & 800-137, written by National Institute of Standards & Technology

Welcome, dear reader, to the exhilarating world of information security! Fasten your seatbelts, because we're diving headfirst into the riveting journey of Information Security Risk & Continuous Monitoring! If you thought that reading a book published by a government agency was going to be as dry as the Sahara Desert, think again! Well, maybe don't think too highly of it, but it's packed with enough jargon and procedures to make your eyes glaze over in delight.

First off, this book is basically like an all-you-can-eat buffet of security protocols, where the National Institute of Standards & Technology (NIST)-yes, they're the folks who love their acronyms-presents a smorgasbord of guidelines and best practices for managing information security risks. So, grab your pen and notepad because you might actually want to take some notes (or not, who really wants to work that hard?).

The book discusses the NIST 800-series, which includes a quartet of delightful titles: NIST 800-39, 800-30 Rev 1, 800-37 Rev 2, and 800-137. If you're not yet familiar with these, don't worry, they're like the superheroes of the information security universe! Let's break them down, shall we?

1. NIST 800-39: This one is all about the risk management framework. It's a bit like a GPS for navigating the murky waters of potential threats to your info. If you don't follow this guide, you might as well be throwing darts blindfolded at a board labeled "Data Breaches."

2. NIST 800-30 Rev 1: Next up is our charming friend that focuses on risk assessment. This guide helps you identify what needs protecting and the odds of something nasty happening. Picture it as a game of Monopoly where you're trying to avoid landing on Boardwalk with a hotel-always a bad idea.

3. NIST 800-37 Rev 2: Oh, but wait! Here comes the darling of security authorization. This is where we ensure that all systems are a go before launching them into cyberspace. Think of it as making sure your parachute is packed right before jumping out of a plane-you really do want to have everything in order before you plummet into the unknown.

4. NIST 800-137: And finally, we arrive at continuous monitoring. This one's like that overzealous parent who checks in on you constantly to make sure you're not doing anything dangerous. Monitoring helps ensure that you actually stay secure after all the hard work you've put in. There's no rest for the wicked!

As you trudge through the pages, you'll encounter metrics and methodologies that will make you feel like a wizard of data. You'll learn things like risk tolerances, vulnerabilities, and how to create a plan so impressive that even your IT department will praise you (or roll their eyes, depending on their caffeine intake).

Now, I won't spoil the ending or anything-because, spoiler alert, it's more about guidelines than an actual plot twist-but you will walk away with the knowledge to navigate the perilous seas of information security.

So grab your best analysis tools, channel your inner security guru, and dive into this dense compendium. By the end of it, you may not be the coolest kid at the brunch, but hey, you'll definitely be the one with the most knowledge on how to avoid getting hacked! Cheers to that!

Author's photo - Maddie Page

Classics, bestsellers, and guilty pleasures-none are safe from my sarcastic recaps. I turn heavy reads into lighthearted summaries you can actually enjoy. Warning: may cause random outbursts of laughter while pretending to study literature.

X

You deserve a great discount for this book!

➡️ Information Security Risk & Continuous Monitoring (rev a): NIST 800-39, 800-30 rev 1, 800-37 rev 2, & 800-137

Please click on button below and check availability!