CMMI Consultant Blog

CMMI Frequently Asked Questions and their responses from CMMI Consultant(s)

  • Home
  • CMMI FAQ
  • CMMI Services
  • About Rajendra Khare
  • « Go to Parent Site – DQSIndia.com

Search CMMI Consultant Blog




Information Security

What is Security by Design with CMMI for Development?

Information Security 0

CMMI Institute released a guide for improving processes for secure products with the name of Security by Design with CMMI for Development, Version 1.3. It was a constant need to develop and deliver secure applications but the processes in the organizations that were developed based on CMMI for Development Models…

February 20, 2015


Share this:

  • Click to email a link to a friend (Opens in new window)
  • Click to print (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • Click to share on Twitter (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Tumblr (Opens in new window)
  • Click to share on Pinterest (Opens in new window)
  • Click to share on Reddit (Opens in new window)

Like this:

Like Loading...

Information security attacks that would matter in year 2014

Information Security 0

As Information is getting more and more in quantum and important in nature, it is becoming difficult to secure this information from stealer. Information Security plays an important aspect in our lives no matter what we are involved into. In the year 2014, here are the things to look out…

January 3, 2014


Share this:

  • Click to email a link to a friend (Opens in new window)
  • Click to print (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • Click to share on Twitter (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Tumblr (Opens in new window)
  • Click to share on Pinterest (Opens in new window)
  • Click to share on Reddit (Opens in new window)

Like this:

Like Loading...

CMMI Institute upcoming Webinar – Considering Security with CMMI-DEV & CMMI-SVC

Information Security 0

CMMI Institute is going to organise a Webinar on the topic Considering Security with CMMI for Development and CMMI for Services. Day by day information security is becoming an important aspect of the Software development, acquisition, products and even services. Today millions of dollars are spend on recovering the data…

December 9, 2013


Share this:

  • Click to email a link to a friend (Opens in new window)
  • Click to print (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • Click to share on Twitter (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Tumblr (Opens in new window)
  • Click to share on Pinterest (Opens in new window)
  • Click to share on Reddit (Opens in new window)

Like this:

Like Loading...

Patient Data and Information Security

Information Security 0

Handling of confidential data is a big and complex activity and when it comes to handling patient data it become nightmare to handle such data. HIPAA Compliance has put a define confidentiality and care require to handle the Protected Health Information (PHI).

Share this:

  • Click to email a link to a friend (Opens in new window)
  • Click to print (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • Click to share on Twitter (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Tumblr (Opens in new window)
  • Click to share on Pinterest (Opens in new window)
  • Click to share on Reddit (Opens in new window)

Like this:

Like Loading...

Gap in Information Security skill set and staff requirements in India

Information Security 0

As per the report published by the EC Council (International Council of Electronic Commerce Consultants) in October, 2013 by the title ‘The Talent Crisis in Infosec’, Information Security manpower in India is extremely weak in terms of the skill set. This creates a gap between the skilled manpower requirements and…

November 22, 2013


Share this:

  • Click to email a link to a friend (Opens in new window)
  • Click to print (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • Click to share on Twitter (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Tumblr (Opens in new window)
  • Click to share on Pinterest (Opens in new window)
  • Click to share on Reddit (Opens in new window)

Like this:

Like Loading...

What is FISMA?

Information Security 0

The Federal Information Security Management Act is Title III of the E-Government Act of 2002 of United States federal law enacted in 2002. FISMA Act focuses on the development, documentation, and implementation an Information Security Program.

Share this:

  • Click to email a link to a friend (Opens in new window)
  • Click to print (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • Click to share on Twitter (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Tumblr (Opens in new window)
  • Click to share on Pinterest (Opens in new window)
  • Click to share on Reddit (Opens in new window)

Like this:

Like Loading...

What is FIPS 200 (Federal Information Processing Standard Publication 200)?

Information Security 0

FIPS 200 is the acronym for Federal Information Processing Standard Publication 200. It is the second of the mandatory security standards, FIPS 199 being the first one, defined by the Federal Information and Information Systems of the United States Federal Government. FIPS 200 is the Standards for Security Categorization.

Share this:

  • Click to email a link to a friend (Opens in new window)
  • Click to print (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • Click to share on Twitter (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Tumblr (Opens in new window)
  • Click to share on Pinterest (Opens in new window)
  • Click to share on Reddit (Opens in new window)

Like this:

Like Loading...

What is FIPS 199 (Federal Information Processing Standard Publication 199)?

Information Security 0

FIPS 199 is the acronym for Federal Information Processing Standard Publication 199. FIPS 199 is the Standards for Security Categorization of Federal Information and Information Systems of the United States Federal Government standard. It establishes security categorization of the information systems used by the Federal Government, one component of risk…

November 5, 2013


Share this:

  • Click to email a link to a friend (Opens in new window)
  • Click to print (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • Click to share on Twitter (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Tumblr (Opens in new window)
  • Click to share on Pinterest (Opens in new window)
  • Click to share on Reddit (Opens in new window)

Like this:

Like Loading...

CMMI Implementation and Information Security

CMMI FAQ 0

Most of organization implementing CMMI, complains about the lack of Information Security practices in the CMMI Model. For this CMMI Institute with Siemens AG Corporate Technology has published a technical paper on CMMI for Development and Information Security.

Share this:

  • Click to email a link to a friend (Opens in new window)
  • Click to print (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • Click to share on Twitter (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Tumblr (Opens in new window)
  • Click to share on Pinterest (Opens in new window)
  • Click to share on Reddit (Opens in new window)

Like this:

Like Loading...


Sidebar


Author: Rajendra Khare


Rajendra's LinkedIn Profile
Rajendra is a qualified and certified Lead Appraiser and Instructor for the following :

  • SCAMPI High Maturity Lead Appraiser (Certified)
  • CMMI Institute-Certified SCAMPI v1.3 Lead Appraiser for Acquisition (Certified)
  • CMMI Institute-Certified SCAMPI v1.3 Lead Appraiser for Development (Certified)
  • CMMI Institute-Certified SCAMPI v1.3 Lead Appraiser for Services (Certified)
  • CMMI Institute-Certified Introduction to CMMI-DEV v1.3 Instructor (Certified)
  • CMMI Institute-Certified Services Supplement for CMMI-DEV Instructor (Certified)
  • CMMI Institute-Certified CMMI-DEV Level 2 for Practitioners Instructor (Certified)
  • CMMI Institute-Certified CMMI-DEV Level 3 for Practitioners Instructor (Certified)
  • CMMI Institute-Certified SCAMPI B & C Team Leader for Acquisition (Certified)
  • CMMI Institute-Certified SCAMPI B & C Team Leader for Development (Certified)
  • CMMI Institute-Certified SCAMPI B & C Team Leader for Services (Certified)

Rajendra is Lead Assessor for ISO 9001 (QMS), ISO 14001 (EMS), OHSAS 18001 (OHSMS) since 1994

International Automotive Task Force (IATF) approved Lead Assessor for Automotive Standard TS 16949:2009

Lead Assessor for ISO 27001 (ISMS) and ISO 20000-1 (ITSM)

Rajendra has 25 years experience in the industry.


Tags

cmmi cmmi-acq cmmi-dev cmmi-svc cmmi appraisal CMMI Assessment cmmi benefits CMMI Certification cmmi consultant cmmi consultants cmmi consulting cmmi faq CMMI for Acquisition cmmi for development cmmi for services cmmi high maturity cmmi implementation cmmi institute cmmi maintenance cmmi maturity level cmmi maturity level 2 cmmi maturity level 3 cmmi model cmmi process cmmi process improvement cmmi services configuration management dqs india high maturity Information Security iso 9001 maturity level metrics opd organizational training pal PPQA process improvement qms requirements management risk risk management sam sepg supplier agreement management

© 2023 Copyright © 2017 CMMI Consultant Blog.
Back to top
%d bloggers like this: