DFARS UCTI

Size: px
Start display at page:

Download "DFARS UCTI 252.204-7012"

Transcription

1 DFARS UCTI DFARS, SMEAFARS and NIST, OH MY! J. Chandler Hall Cyber Security Evangelist Innovate. Build. Secure. 1

2 Sentar CorporaJon Presenters: Chandler Hall, Program Manager & Cyber Evangelist Rick Koch, Sr. Analyst & SME for IA/CS IntroducJon Innovate. Build. Secure. 2

3 Our Quals Rick Koch 10 years specialized in Cyber Security design, assessment, and management & 30 years holisjc InformaJon Technology experience Cer$fica$ons: CISSP # CerJfied InformaJon Systems Security Professional from (ISC) 2 NSA IAM/IEM - NSA s INFOSEC Assessment / EvaluaJon Methodology MCSE: Security - Microso^ CerJfied Systems Engineer: Security on NT 2000/2003 MCT/MCP+IS - MS CerJfied Trainer / MS CerJfied Professional: Internet Specialist CNE/CNA - CerJfied Novell Engineer / CerJfied Novell Administrator Netware 5.0 CompTIA Linux+, Security+, A+, Network+, and Project+ Chandler Hall Co- Founded AnJ- DDoS Product Company that received Secure CompuJng Magazine s Editor s recommendajon Almost expelled from college hacking the registrajon system Has Rick s Phone Number Has stayed at Holiday Inn Express muljple Jmes Extensive reader & Internet hacker for decades Jailbreaks iphones & ipads for street cred Innovate. Build. Secure. 3

4 Security Soup Anyone? Back in the day DoD, Intel and Civil Agencies were all using different security controls DIACAP is used by DoD; ~100+ high- level security controls Intel has its own (and I can t tell you what they are HaHa) Civil agencies (NASA, etc) use NIST security guidelines and controls from NIST SP (Rev 4 added DoD/Intel controls) DIACAP includes ~200+ NIST security controls NaJonal InsJtute of Standards & Technology (NIST) has a secjon of security controls, used by RMF, etc Innovate. Build. Secure. 4

5 Risk Management Framework Maybe you ve been hearing about this DIACAP replacement called RMF: Risk Management Framework (RMF) Also being adopted by more than DoD/DIACAP contracts DoD Contracts are now adding RMF requirements (includes 800+ NIST controls) Some agencies are in transijon, such as the Army. MDA has implemented it and makes it a contractual requirement. Innovate. Build. Secure. 5

6 DIACAP, RMF, NIST & DFARS DoD Contracts that require DIACAP or RMF compliance now or will include DFARS For example, if you re issuing a contract for development of a leading edge missile system, DFARS applies ProtecJon of CUI has always been required; this ~clarifies DFARS is expected to apply to all DoD contracts and solicitajons (what about Intel ones?) Defense Federal AcquisiJon RegulaJon Supplement (DFARS) covers MANY areas DFARS requires meejng ~51 NIST Controls Innovate. Build. Secure. 6

7 Background on DFARS UCTI Clause Final Rule Issued November 18, 2013 New contracts and renewed contracts now contain compliance requirements Safeguarding of Unclassified Controlled Technical InformaJon imposed mandatory security controls and repor$ng obliga$ons on prime- and sub- contractors (DoD contracts) Innovate. Build. Secure. 7

8 What s this mean? ObligaJon: Contractors will now need to meet minimum cyber security requirements for non- classified informajon that may not have been previously controlled The DFARS requirement is expected to be in ALL DoD solicitajons and contracts going forward. SASC investigation finds Chinese intrusions into key defense contractors Report describes threats to transportation systems, gaps in reporting requirements Wednesday, September 17, 2014 WASHINGTON Hackers associated with the Chinese government successfully penetrated the computer systems of U.S. Transportation Command contractors at least 20 times in a single year, intrusions that show vulnerabilities in the military s system to deploy troops and equipment in a crisis, a Senate Armed Services Committee investigation has found. Innovate. Build. Secure. 8

9 What s GovcWiki.Org Say? EffecJve November 18, 2013 the Rule for Defense Federal AcquisiJon RegulaJon Supplement: Safeguarding Unclassified Controlled Technical InformaJon was published for inclusion into DoD contracts and Prime subcontracts [1]. With the new rule there are: DefiniJons for Controlled Technical InformaJon, Cyber Incident, & Technical InformaJon Reference to DOD InstrucJon DistribuJon Statements on Technical Documents Incident ReporJng Data Requirements Damage Assessment Process Requirements NIST Controls Inclusion of the Clause to Subcontracts Innovate. Build. Secure. 9

10 Simplified PerspecJve Requires DoD Contractors and subcontractors: Safeguard Unclassified Controlled Technical InformaJon (UCTI), somejmes called Controlled Unclassified InformaJon (CUI) Report cyber security incidents within 72 hours Issue: Prime vs Sub: Who reports what? Who polices? (Answers vary) Who is responsible? Safe Answer: The Prime Contractor Innovate. Build. Secure. 10

11 UCTI DefiniJon Controlled Technical InformaJon is defined as technical data or computer so^ware (as defined in DFARS ) with military or space applicajon, modificajon, performance, display, release, disclosure or disseminajon Contractors that have UCTI resident on, or transijng through, their unclassified systems must comply with certain safeguarding protecjons selected using risk- based processes FINAL RULING: regardless of whether or not the clause is incorporated in this solicitajon or contract. Innovate. Build. Secure. 11

12 UCTI Exposure Where do you think it may reside? On laptop, on phone; within in- house server, in Dropbox, icloud, Skydrive SNAPCHAT? Bring Your On Device (BYOD) creates exposure UCTI specificajons clarificajon is requested in ; is on phone; phone is backed- up to home computer or icloud Examples: Contracts, Cost Data, Technical reports & orders; Research & Engineering data; Computer s/w & source; Engineering drawings; SpecificaJons; Data sets; and Studies or Analyses Innovate. Build. Secure. 12

13 NIST controls The DFARS UCTI requirement is based on exisjng NaJonal InsJtute of Standards and Technology (NIST) controls What controls must be used? Contractors must meet a subset of 51 controls from NIST SP (Rev. 4) DFARS defines parts of the 51 that must be evaluated; these are the minimum requirements They do not have to do the full Risk Management Framework (RMF) exercise (such as categorizing and serng the security controls) Innovate. Build. Secure. 13

14 NIST 51 controls CNTL NO. AC-2 AC-3 AC-4 AC-6 AC-7 AC-11 AC-17 AC-18 AC-19 AC-20 AC-22 CNTL NO. ACCESS CONTROL Account Management Access Enforcement Information Flow Enforcement Least Privilege Unsuccessful Logon Attempts Session Lock Remote Access Wireless Access Access Control for Mobile Devices Use of External Information Systems Publicly Accessible Content AWARENESS & TRAINING CNTL NO. AU-2 AU-3 AU-6 AU-7 AU-8 AU-9 CNTL NO. CM-1 CM-6 CM-7 CM-8 CNTL NO. CP-9 AUDIT AND ACCOUNTABILITY Audit Events Content of Audit Records Audit Review, Analysis, and Reporting Audit Reduction and Report Generation Time Stamps Protection of Audit Information CONFIGURATION MANAGEMENT Configuration Management Policy and Procedures Configuration Settings Least Functionality Information System Component Inventory CONTINGENCY PLANNING Information System Backup CNTL NO. IR-2 IR-3 IR-4 IR-5 IR-6 CNTL NO. MA-4 MA-5 MA-6 CNTL NO. MP-4 MP-6 CNTL NO. INCIDENT RESPONSE Incident Response Training Incident Response Testing Incident Handling Incident Monitoring Incident Reporting MAINTENANCE Nonlocal Maintenance Maintenance Personnel Timely Maintenance MEDIA PROTECTION Media Storage Media Sanitization PHYSICAL AND ENVIRONMENTAL PROTECTION CNTL NO. PM-10 PROGRAM MANAGEMENT Security Authorization Process CNTL RISK ASSESSMENT NO. RA-5 VULNERABILITY SCANNING UPDATE TOOL CAPABILITY CNTL NO. SC-2 SC-4 SC-7 SC-8 SC-13 SC-15 SC-28 SYSTEM AND COMMUNICATIONS PROTECTION Application Partitioning Information in Shared Resources Boundary Protection Transmission Confidentiality and Integrity Cryptographic Protection Collaborative Computing Devices Protection of Information at Rest AT-2 Security Awareness Training CNTL NO. IA-2 IA-4 IA-5 AUTHENTICATION Identification and Authentication (Organizational Users) Identifier Management Authenticator Management PE-2 PE-3 PE-5 Physical Access Authorizations Physical Access Control Access Control for Output Devices CNTL NO. SI-2 SI-3 SI-4 SYSTEM AND INFORMATION INTEGRITY Flaw Remediation Malicious Code Protection Information System Monitoring Innovate. Build. Secure. 14

15 Example of Assessment Access Control Audit & Accountability Iden$fica$on and Authen$ca$on Media Protec$on Program Management AC- 2 AU- 2 IA- 2 MP- 4 PM- 10 AC- 3(4) AU- 3 IA- 4 MP- 6 AC- 4 AU- 6(1) IA- 5(1) Physical and Environmental Protec$on System & Informa$on Integrity AC-3(4) means only paragraph 4 of AC-3 must be met AC- 6 AU- 7 Incident Response PE- 2 SI- 2 AC- 7 AU- 8 IR- 2 PE- 3 SI- 3 AC- 11(1) AU- 9 IR- 4 PE- 5 SI- 4 AC- 17(2) AC- 18(1) Configura$on Management IR- 5 System & Comm Protec$on IR- 6 Maintenance SC- 2 AC- 19 CM- 2 Con$ngency Planning MA- 4(6) SC- 4 AC- 20(1) CM- 6 CP- 9 MA- 5 SC- 7 AC- 20(2) CM- 7 Awareness & Training MA- 6 SC- 8(1) AC- 22 CM- 8 AT- 2 Risk Assessment SC- 13 System Interconnec$ons RA- 5 SC- 15 CA- 2(5) SC- 28 Innovate. Build. Secure. 15

16 How Hard is This? You only have to do certain secjons within each control Compliance audit takes less than a week if you have experience understanding the controls and what they mean Reminder: MeeJng this Requirement doesn t guarantee you re protected Be Ready to Report! Are you Set Up? How about the Sub- Contractors? AlternaJve Controls or ProtecJve Measures may be allowed; must be submited in wrijng Innovate. Build. Secure. 16

17 Compliance with Holes? Minimal: perform the compliance audit and idenjfy holes or weakness in a POA&M (Plan Of AcJon and Milestones) Some contracts have stronger wording, stajng they must be compliant with the controls TEAMS (MiDAESS) Industry Day stated they will require contractors that submit PROPOSALs to submit a DFARS UCTI Compliance Report included in a Cyber Security Plan We believe meejng a defined maturity level with proof points is the Best PracJces goal and beter than merely a Pass Fail score Should you request that the contractor provide evidence of compliance or audit? Can You? Its Seems You Should Be Better Safe than Sorry Innovate. Build. Secure. 17

18 Clause & Proof Examples ExisJng Contract Updated: MDA TEAMS Proposals Requirement (Feb 11, 2014): Stated at Industry Day: Bidders must provide a cyber security plan that includes DFARS UCTI Industry Day PowerPoint: TEAMS Performance Work Statements will contain specific Cybersecurity requirements (Must be flowed- down to subs) that addresses Contractor s Compliance with DFARS UCTI Innovate. Build. Secure. 18

19 Incident ReporJng Incident ReporJng is required within 72 hours of a cyber incident that affects DoD UCTI ExfiltraJon, manipulajon or compromise of UCTI resident on, or transipng through, a contractor s or its subcontractors unclassified informajon systems Set Up Your ReporJng Account before it s needed What is a reportable incident? Web server hacked? server compromised! Router is hacked! Innovate. Build. Secure. 19

20 We re an Easy Target Due to our policies and freedom, our society is much more dependent on the Internet Many of the cyber- atacking najon state sociejes could survive Internet outages for longer, it is believed Innovate. Build. Secure. 20

21 Cyber Atacks Are Rampant Nov 6, 2014 Nov 6, 2014 Oct 13, 2014 Innovate. Build. Secure. 21

22 Summary It s about NaJonal Security and the Time is Now! To be compliant with DFARS , contractors must establish repor$ng and accountability requirements and flow UCTI requirements to subcontractors. Contractors must also maintain knowledge of the company s and subcontractors current state of compliance, including gaps to the required controls and documented mijgajng controls. Finally, contractors must ac$vely monitor all systems that store, manipulate or transmit UCTI for cyber events You Have to Report within 72 Hours As a Prime, you may be held responsible for monitoring and reporjng sub- contractor breeches It s becoming a requirement for submirng bids Innovate. Build. Secure. 22

23 What to do Now? Determine if you have or expect to have any DoD contracts with this clause Will there be any UCTI residing or transijng through your IT system IF so, determine if they comply with the NIST standards, modify if not or request an excepjon Develop a process/protocol for responding to any IOC Determine what conjnuous review is required (especially if RMF will be a requirement) Innovate. Build. Secure. 23

24 Help is Available Sentar (Hey boss, here s the Shameless Plug!) Defense Industrial Base Cybersecurity & InformaJon Assurance Program (DB CS/IA) This program allows eligible DIB companies to receive U.S. Government (USG) threat informapon and to share informa6on about network intrusions that could compromise DoD programs and missions. [ ]Furthermore, the informapon sharing arrangements are memorialized in a standardized bilateral agreement, known as a Framework Agreement (FA), signed by the parpcipapng DIB company and the Government. htp://goo.gl/ixvy4b Innovate. Build. Secure. 24

25 Who You Gonna Call? Contractor shall report as much of the following informajon as can be obtained to the DoD within 72 hours of discovery: (i) Data Universal Numbering System (DUNS). (ii) Contract numbers affected unless all contracts by the company are affected. (iii) Facility CAGE code if the locajon of the event is different than the prime Contractor locajon. (iv) Point of contact if different than the POC recorded in the System for Award Management (address, posijon, telephone, ). (v) ContracJng Officer point of contact (address, posijon, telephone, ). (vi) Contract clearance (vii) Name of subcontractor and CAGE code if this was an incident on a subcontractor network. (viii) DOD programs, pla{orms or systems involved. (ix) LocaJon(s) of compromise. (x) Date incident discovered. (xi) Type of compromise (e.g., unauthorized access, inadvertent release, other). (xii) DescripJon of technical informajon compromised. (xiii) Any addijonal informajon relevant to the informajon compromise. Innovate. Build. Secure. 25

26 Is this the Org You Seek? DSIE.net is the Defense Industrial Base InformaJon Sharing & Analysis OrganizaJon (see later slide). It is now incorporated into the DIB ISAO/DSIE dibnet.dod.mil ; uses DoD- approved PKI CerJficates to exchange encrypted info (iase.dod.mil/pki/eca) DiBISAC.net: located in Huntsville; alternajve to DSIE.net Innovate. Build. Secure. 26

27 Other Resources Federal Register Final Ruling Language: htps:// 2013/11/18/ /defense- federal- acquisijon- regulajon- supplement- safeguarding- unclassified- controlled- technical pdf/523025p.pdf Nice brochure that captures the basic facts: htp://goo.gl/djvlqb (aia- aerospace.org ; look for Def & Security) Innovate. Build. Secure. 27

28 Any QuesJons? Sentar provides a DFARS UCTI compliance service. It typically takes less than four days onsite. Your report will be provided within two weeks of the on-site service. You ll be given the tools and training to perform annual compliance updates on your own. Please contact me today if you are interested in learning more: [email protected] Innovate. Build. Secure. 28

29 QuesJon: Who Decides? Another thing the clause states is if you cannot meet a required NIST control; or if it doesn t apply to you, you must submit it in wrijng to the contract officer. Are contracjng officers supposed to make a technical, informed decision on whether or not an alternate control is adequate? Do they have a guideline; or training that states how they assess an alternate control? Or is it similar to that of a DSS rep; that a system could pass under one rep? Innovate. Build. Secure. 29

30 Q: How to register for reporjng? DSIE? DIB ISAO? DIB ISAC? The Defense Security InformaJon Exchange (DSIE) is (WAS?) an NDIA membership- based cyber informajon- sharing body focused on protecjng and defending the Defense Industrial Base (DIB) crijcal cyber networks and systems, and the informajon residing thereon. For more informajon Was a sub- org under NDIA, but is now incorporated to the DIB ISAO and is now a single enjty The DFARS clause requires you to report incidents into the DOD DIB portal. RegistraJon at dibnet.dod.mil Contact: Saundra Sandee Throneberry for more info. ([email protected]) Innovate. Build. Secure. 30

31 Q: Marked Documents What about the technical data transijng around the IT system prior to the official marking of the document done when provided formally to the DoD? We believe the exposure and responsibility exists even if all the informajon isn t marked accordingly DoD Directive Withholding of Unclassified Technical Info from Public Innovate. Build. Secure. 31

32 QuesJon on NIST A quesjon regarding the 51 controls: The DFARS table somejmes specifies certain segments of the control; such as AC- 3 (4); which I read as the minimum requirement is AC- 3 (4), and AC- 3 (1), (2), etc are opjonal. For other controls, segments are not specified, such as AC- 2. My quespon is, for the unspecified control segments, are we expected to meet NIST Low, Moderate, or High; or should we assume all segments for these controls? Innovate. Build. Secure. 32

Looking at the SANS 20 Critical Security Controls

Looking at the SANS 20 Critical Security Controls Looking at the SANS 20 Critical Security Controls Mapping the SANS 20 to NIST 800-53 to ISO 27002 by Brad C. Johnson The SANS 20 Overview SANS has created the 20 Critical Security Controls as a way of

More information

AF Life Cycle Management Center

AF Life Cycle Management Center AF Life Cycle Management Center Avionics Weapon Systems Cybersecurity Risk Management Framework Assessment & Authorization Update Harrell Van Norman AFLCMC/EZAS Cybersecurity Technical Expert [email protected]

More information

NIST 800-53A: Guide for Assessing the Security Controls in Federal Information Systems. Samuel R. Ashmore Margarita Castillo Barry Gavrich

NIST 800-53A: Guide for Assessing the Security Controls in Federal Information Systems. Samuel R. Ashmore Margarita Castillo Barry Gavrich NIST 800-53A: Guide for Assessing the Security Controls in Federal Information Systems Samuel R. Ashmore Margarita Castillo Barry Gavrich CS589 Information & Risk Management New Mexico Tech Spring 2007

More information

Altius IT Policy Collection Compliance and Standards Matrix

Altius IT Policy Collection Compliance and Standards Matrix Governance IT Governance Policy Mergers and Acquisitions Policy Terms and Definitions Policy 164.308 12.4 12.5 EDM01 EDM02 EDM03 Information Security Privacy Policy Securing Information Systems Policy

More information

COORDINATION DRAFT. FISCAM to NIST Special Publication 800-53 Revision 4. Title / Description (Critical Element)

COORDINATION DRAFT. FISCAM to NIST Special Publication 800-53 Revision 4. Title / Description (Critical Element) FISCAM FISCAM 3.1 Security (SM) Critical Element SM-1: Establish a SM-1.1.1 The security management program is adequately An agency/entitywide security management program has been developed, An agency/entitywide

More information

Security and Privacy Controls for Federal Information Systems and Organizations

Security and Privacy Controls for Federal Information Systems and Organizations NIST Special Publication 800-53 Revision 4 Security and Privacy Controls for Federal Information Systems JOINT TASK FORCE TRANSFORMATION INITIATIVE This document contains excerpts from NIST Special Publication

More information

CTR System Report - 2008 FISMA

CTR System Report - 2008 FISMA CTR System Report - 2008 FISMA February 27, 2009 TABLE of CONTENTS BACKGROUND AND OBJECTIVES... 5 BACKGROUND... 5 OBJECTIVES... 6 Classes and Families of Security Controls... 6 Control Classes... 7 Control

More information

U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL

U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT: U.S. Election Assistance Commission Compliance with the Requirements of the Federal Information Security Management Act Fiscal

More information

Security Self-Assessment Tool

Security Self-Assessment Tool Security Self-Assessment Tool State Agencies Receiving FPLS Information, 7/15/2015 Contents Overview... 2 Access Control (AC)... 3 Awareness and Training (AT)... 8 Audit and Accountability (AU)... 10 Security

More information

Industrial Security Field Operations

Industrial Security Field Operations Defense Security Service Industrial Security Field Operations NISP Authorization Office (NAO) (Formerly Office of the Designated Approving Authority) NISPOM to NIST (800-53r4) Security Control Mapping

More information

Requirements For Computer Security

Requirements For Computer Security Requirements For Computer Security FTA/IRS Safeguards Symposium & FTA/IRS Computer Security Conference April 2, 2008 St. Louis 1 Agenda Security Framework Safeguards IT Security Review Process Preparing

More information

Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org

Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org Promoting Application Security within Federal Government AppSec DC November 13, 2009 Dr. Sarbari Gupta, CISSP, CISA Founder/President Electrosoft [email protected] 703-437-9451 ext 12 The Foundation

More information

Security Language for IT Acquisition Efforts CIO-IT Security-09-48

Security Language for IT Acquisition Efforts CIO-IT Security-09-48 Security Language for IT Acquisition Efforts CIO-IT Security-09-48 Office of the Senior Agency Information Security Officer VERSION HISTORY/CHANGE RECORD Change Number Person Posting Change Change Reason

More information

Get Confidence in Mission Security with IV&V Information Assurance

Get Confidence in Mission Security with IV&V Information Assurance Get Confidence in Mission Security with IV&V Information Assurance September 10, 2014 Threat Landscape Regulatory Framework Life-cycles IV&V Rigor and Independence Threat Landscape Continuously evolving

More information

Security Controls Assessment for Federal Information Systems

Security Controls Assessment for Federal Information Systems Security Controls Assessment for Federal Information Systems Census Software Process Improvement Program September 11, 2008 Kevin Stine Computer Security Division National Institute of Standards and Technology

More information

System Security Certification and Accreditation (C&A) Framework

System Security Certification and Accreditation (C&A) Framework System Security Certification and Accreditation (C&A) Framework Dave Dickinson, IOAT ISSO Chris Tillison, RPMS ISSO Indian Health Service 5300 Homestead Road, NE Albuquerque, NM 87110 (505) 248-4500 fax:

More information

Independent Security Operations Oversight and Assessment. Captain Timothy Holland PM NGEN

Independent Security Operations Oversight and Assessment. Captain Timothy Holland PM NGEN Independent Security Operations Oversight and Assessment Captain Timothy Holland PM NGEN 23 June 2010 Independent Security Operations Oversight and Assessment Will Jordan NGEN Cyber Security 23 June 2010

More information

Department of Defense INSTRUCTION. Security of Unclassified DoD Information on Non-DoD Information Systems

Department of Defense INSTRUCTION. Security of Unclassified DoD Information on Non-DoD Information Systems Department of Defense INSTRUCTION NUMBER 8582.01 June 6, 2012 DoD CIO SUBJECT: Security of Unclassified DoD Information on Non-DoD Information Systems References: See Enclosure 1 1. PURPOSE. This Instruction:

More information

Sample CDC Certification and Accreditation Checklist For an Application That Is Considered a Moderate Threat

Sample CDC Certification and Accreditation Checklist For an Application That Is Considered a Moderate Threat Sample CDC Certification and Accreditation Checklist For an Application That Is Considered a Moderate Threat Centers for Disease and Prevention National Center for Chronic Disease Prevention and Health

More information

The Cloud in Regulatory Affairs - Validation, Risk Management and Chances -

The Cloud in Regulatory Affairs - Validation, Risk Management and Chances - 45 min Webinar: November 14th, 2014 The Cloud in Regulatory Affairs - Validation, Risk Management and Chances - www.cunesoft.com Rainer Schwarz Cunesoft Holger Spalt ivigilance 2014 Cunesoft GmbH PART

More information

Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org

Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org Promoting Application Security within Federal Government AppSec DC November 13, 2009 Dr. Sarbari Gupta, CISSP, CISA Founder/President Electrosoft [email protected] 703-437-9451 ext 12 The Foundation

More information

DIVISION OF INFORMATION SECURITY (DIS)

DIVISION OF INFORMATION SECURITY (DIS) DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Information Systems Acquisitions, Development, and Maintenance v1.0 October 15, 2013 Revision History Update this table every time a new

More information

CONTINUOUS MONITORING

CONTINUOUS MONITORING CONTINUOUS MONITORING Monitoring Strategy Part 2 of 3 ABSTRACT This white paper is Part 2 in a three-part series of white papers on the sometimes daunting subject of continuous monitoring (CM) and how

More information

VIRGINIA DEPARTMENT OF MOTOR VEHICLES IT SECURITY POLICY. Version 2.

VIRGINIA DEPARTMENT OF MOTOR VEHICLES IT SECURITY POLICY. Version 2. VIRGINIA DEPARTMENT OF MOTOR VEHICLES IT SECURITY POLICY Version 2., 2012 Revision History Version Date Purpose of Revision 2.0 Base Document 2.1 07/23/2012 Draft 1 Given to ISO for Review 2.2 08/15/2012

More information

Security Control Standard

Security Control Standard Department of the Interior Security Control Standard Maintenance January 2012 Version: 1.2 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior, Chief Information Officer

More information

IT Security Management Risk Analysis and Controls

IT Security Management Risk Analysis and Controls IT Security Management Risk Analysis and Controls Steven Gordon Document No: Revision 770 3 December 2013 1 Introduction This document summarises several steps of an IT security risk analysis and subsequent

More information

CMS POLICY FOR THE INFORMATION SECURITY PROGRAM

CMS POLICY FOR THE INFORMATION SECURITY PROGRAM Chief Information Officer Office of Information Services Centers for Medicare & Medicaid Services CMS POLICY FOR THE INFORMATION SECURITY PROGRAM FINAL Version 4.0 August 31, 2010 Document Number: CMS-CIO-POL-SEC02-04.0

More information

5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE

5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE 5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE 5 FAH-11 H-510 GENERAL (Office of Origin: IRM/IA) 5 FAH-11 H-511 INTRODUCTION 5 FAH-11 H-511.1 Purpose a. This subchapter implements the policy

More information

Thank You To Our Sponsors

Thank You To Our Sponsors Thank You To Our Sponsors Thank You To Our Sponsors Thank You To Our Sponsors Cybersecurity Panel Managing Risk in the Aerospace and Defense Industry Peter S. Chiou Principal Strategist and Business Development

More information

System Security Engineering and Program Protection Integration into SE

System Security Engineering and Program Protection Integration into SE System Security Engineering and Program Protection Integration into SE Melinda Reed Deputy Director for Program Protection Office of the Deputy Assistant Secretary of Defense for Systems Engineering 17

More information

Office of Inspector General

Office of Inspector General DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,

More information

IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector

IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector V.2 Final Draft May 1, 2014 [email protected] This revision incorporates comments from the public. Page Use case 1 Comments

More information

Government of Canada Managed Security Services (GCMSS) Appendix D: Security Control Catalogue ITSG-33 - Annex 3 DRAFT 3.1

Government of Canada Managed Security Services (GCMSS) Appendix D: Security Control Catalogue ITSG-33 - Annex 3 DRAFT 3.1 Government of Canada Managed Security Services (GCMSS) Appendix D: Security Control Catalogue ITSG-33 - Annex 3 DRAFT 3.1 Date: June 15, 2012 Information Technology Security Guidance Guide to Managing

More information

Information Security for Managers

Information Security for Managers Fiscal Year 2015 Information Security for Managers Introduction Information Security Overview Enterprise Performance Life Cycle Enterprise Performance Life Cycle and the Risk Management Framework Categorize

More information

Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015

Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015 Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015 OIG-16-A-03 November 12, 2015 All publicly available OIG reports (including

More information

Risk Management Guide for Information Technology Systems. NIST SP800-30 Overview

Risk Management Guide for Information Technology Systems. NIST SP800-30 Overview Risk Management Guide for Information Technology Systems NIST SP800-30 Overview 1 Risk Management Process that allows IT managers to balance operational and economic costs of protective measures and achieve

More information

Critical Controls for Cyber Security. www.infogistic.com

Critical Controls for Cyber Security. www.infogistic.com Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability

More information

Cyber R &D Research Roundtable

Cyber R &D Research Roundtable Cyber R &D Research Roundtable 2 May 2013 N A T I O N A L S E C U R I T Y E N E R G Y & E N V I R O N M E N T H E A L T H C Y B E R S E C U R I T Y Changing Environment Rapidly Evolving Threat Changes

More information

POSTAL REGULATORY COMMISSION

POSTAL REGULATORY COMMISSION POSTAL REGULATORY COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT INFORMATION SECURITY MANAGEMENT AND ACCESS CONTROL POLICIES Audit Report December 17, 2010 Table of Contents INTRODUCTION... 1 Background...1

More information

Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program

Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program U.S. ENVIRONMENTAL PROTECTION AGENCY OFFICE OF INSPECTOR GENERAL Information Technology Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program Report.

More information

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014 DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014 Revision History Update this table every time a new edition of the document is

More information

FISMA NIST 800-53 (Rev 4) Audit and Accountability: Shared Public Cloud Infrastructure Standards

FISMA NIST 800-53 (Rev 4) Audit and Accountability: Shared Public Cloud Infrastructure Standards FISMA NIST 800-53 (Rev 4) Audit and Accountability: Shared Public Cloud Infrastructure Standards Standard Requirement per NIST 800-53 (Rev. 4) CloudCheckr Action AU-3/ AU3(1) AU-3 CONTENT OF AUDIT RECORDS

More information

Bellingham Control System Cyber Security Case Study

Bellingham Control System Cyber Security Case Study Bellingham Control System Cyber Security Case Study Marshall Abrams Joe Weiss Presented at at 2007 Annual Computer Security Applications Conference Case Study Synopsis Examine actual control system cyber

More information

FEDERAL HOUSING FINANCE AGENCY OFFICE OF INSPECTOR GENERAL

FEDERAL HOUSING FINANCE AGENCY OFFICE OF INSPECTOR GENERAL FEDERAL HOUSING FINANCE AGENCY OFFICE OF INSPECTOR GENERAL Clifton Gunderson LLP s Independent Audit of the Federal Housing Finance Agency s Information Security Program - 2011 Audit Report: AUD-2011-002

More information

HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY CONTROLS

HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY CONTROLS Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY

More information

Presented by Evan Sylvester, CISSP

Presented by Evan Sylvester, CISSP Presented by Evan Sylvester, CISSP Who Am I? Evan Sylvester FAST Information Security Officer MBA, Texas State University BBA in Management Information Systems at the University of Texas Certified Information

More information

Information Security @ Blue Valley Schools FEBRUARY 2015

Information Security @ Blue Valley Schools FEBRUARY 2015 Information Security @ Blue Valley Schools FEBRUARY 2015 Student Data Privacy & Security Blue Valley is committed to providing an education beyond expectations to each of our students. To support that

More information

HHS Information System Security Controls Catalog V 1.0

HHS Information System Security Controls Catalog V 1.0 Information System Security s Catalog V 1.0 Table of Contents DOCUMENT HISTORY... 3 1. Purpose... 4 2. Security s Scope... 4 3. Security s Compliance... 4 4. Security s Catalog Ownership... 4 5. Security

More information

2015 Security Training Schedule

2015 Security Training Schedule 2015 Security Training Schedule Risk Management Framework Course (RMF) / $1,950.00 Per Student Dates June 1-4 Location 4775 Centennial Blvd., Suite 103 / Colorado Springs, CO 80919 July 20 23 444 W. Third

More information

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013 An Overview of Information Security Frameworks Presented to TIF September 25, 2013 What is a framework? A framework helps define an approach to implementing, maintaining, monitoring, and improving information

More information

UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC INFORMATION SYSTEM CERTIFICATION AND ACCREDITATION (C&A)

UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC INFORMATION SYSTEM CERTIFICATION AND ACCREDITATION (C&A) UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC FSIS DIRECTIVE 1306.2 9/28/11 INFORMATION SYSTEM CERTIFICATION AND ACCREDITATION (C&A) I. PURPOSE This directive

More information

Overview of the HIPAA Security Rule

Overview of the HIPAA Security Rule Office of the Secretary Office for Civil Rights () Overview of the HIPAA Security Rule Office for Civil Rights Region IX Alicia Cornish, EOS Sheila Fischer, Supervisory EOS Topics Upon completion of this

More information

Security Control Standard

Security Control Standard Department of the Interior Security Control Standard Security Assessment and Authorization January 2012 Version: 1.2 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior,

More information

Security Compliance In a Post-ACA World

Security Compliance In a Post-ACA World 1 Security Compliance In a Post-ACA World Security Compliance in a Post-ACA World Discussion of building a security compliance framework as part of an ACA Health Insurance Exchange implementation. Further

More information

Discussion Draft of the Preliminary Cybersecurity Framework Illustrative Examples

Discussion Draft of the Preliminary Cybersecurity Framework Illustrative Examples 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 Discussion Draft of the Preliminary Cybersecurity Framework Illustrative Examples The

More information

WRITTEN INFORMATION SECURITY PROGRAM (WISP) ACME Consulting Services, Inc.

WRITTEN INFORMATION SECURITY PROGRAM (WISP) ACME Consulting Services, Inc. WRITTEN INFORMATION SECURITY PROGRAM (WISP) ACME Consulting Services, Inc. Copyright 2016 Table of Contents WRITTEN INFORMATION SECURITY PROGRAM (WISP) OVERVIEW 10 INTRODUCTION 10 PURPOSE 10 SCOPE & APPLICABILITY

More information

Cyber Security for Advanced Manufacturing Next Steps

Cyber Security for Advanced Manufacturing Next Steps Status Update Cyber Security for Advanced Manufacturing Next Steps NDIA Manufacturing Division February 19, 2015 Michael McGrath Consultant, Analytic Services Inc. [email protected] NDIA White

More information

Wasting Money on the Tools? Automating the Most Critical Security Controls. Mason Brown Director, The SANS Institute

Wasting Money on the Tools? Automating the Most Critical Security Controls. Mason Brown Director, The SANS Institute Wasting Money on the Tools? Automating the Most Critical Security Controls Bonus: Gaining Support From Top Managers for Security Investments Mason Brown Director, The SANS Institute The Most Trusted Name

More information

ForeScout CounterACT and Compliance June 2012 Overview Major Mandates PCI-DSS ISO 27002

ForeScout CounterACT and Compliance June 2012 Overview Major Mandates PCI-DSS ISO 27002 ForeScout CounterACT and Compliance An independent assessment on how network access control maps to leading compliance mandates and helps automate GRC operations June 2012 Overview Information security

More information

Enterprise Audit Management Instruction for National Security Systems (NSS)

Enterprise Audit Management Instruction for National Security Systems (NSS) UNCLASSIFIED September 2013 Enterprise Audit Management Instruction for National Security Systems (NSS) THIS DOCUMENT PRESCRIBES STANDARDS YOUR DEPARTMENT OR AGENCY MAY REQUIRE FURTHER IMPLEMENTATION UNCLASSIFIED

More information

Privacy Impact Assessment

Privacy Impact Assessment For: Great Lakes Computer System (GLCS) Great Lakes Educational Loan Services, Inc. (GOALS) Date: June 18, 2013 Point of Contact: Gregory Plenty (202) 377-3253 [email protected] System Owner: Keith

More information

Security Control Standard

Security Control Standard Department of the Interior Security Control Standard Risk Assessment January 2012 Version: 1.2 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior, Chief Information

More information

CRR-NIST CSF Crosswalk 1

CRR-NIST CSF Crosswalk 1 IDENTIFY (ID) Asset Management (AM): The data, personnel, devices, systems, and facilities that enable the organization to achieve business purposes are identified and managed consistent with their relative

More information

C. Author(s): David Millar (ISC Information Security) and Lauren Steinfeld (Chief Privacy Officer)

C. Author(s): David Millar (ISC Information Security) and Lauren Steinfeld (Chief Privacy Officer) I. Title A. Name: Information Systems Security Incident Response Policy B. Number: 20070103-secincidentresp C. Author(s): David Millar (ISC Information Security) and Lauren Steinfeld (Chief Privacy Officer)

More information

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University

More information

Understanding HITRUST s Approach to Risk vs. Compliance-based Information Protection

Understanding HITRUST s Approach to Risk vs. Compliance-based Information Protection Understanding Compliance vs. Risk-based Information Protection 1 Understanding HITRUST s Approach to Risk vs. Compliance-based Information Protection Why risk analysis is crucial to HIPAA compliance and

More information

OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii

OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii The Office of the Auditor General has conducted a procedural review of the State Data Center (Data Center), a part of the Arizona Strategic Enterprise Technology (ASET) Division within the Arizona Department

More information

Minimum Security Requirements for Federal Information and Information Systems

Minimum Security Requirements for Federal Information and Information Systems FIPS PUB 200 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Minimum Security Requirements for Federal Information and Information Systems Computer Security Division Information Technology Laboratory

More information

OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DC 20301-1700

OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DC 20301-1700 OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DC 20301-1700 OPERATIONAL TEST AND EVALUATION AUG 0 1 2014 MEMORANDUM FOR COMMANDER, ARMY TEST AND EVALUATION COMMAND COMMANDER, AIR

More information

Health Insurance Portability and Accountability Act Enterprise Compliance Auditing & Reporting ECAR for HIPAA Technical Product Overview Whitepaper

Health Insurance Portability and Accountability Act Enterprise Compliance Auditing & Reporting ECAR for HIPAA Technical Product Overview Whitepaper Regulatory Compliance Solutions for Microsoft Windows IT Security Controls Supporting DHS HIPAA Final Security Rules Health Insurance Portability and Accountability Act Enterprise Compliance Auditing &

More information

Supporting FISMA and NIST SP 800-53 with Secure Managed File Transfer

Supporting FISMA and NIST SP 800-53 with Secure Managed File Transfer IPSWITCH FILE TRANSFER WHITE PAPER Supporting FISMA and NIST SP 800-53 with Secure Managed File Transfer www.ipswitchft.com Adherence to United States government security standards can be complex to plan

More information

HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS

HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS AT STATE MEDICAID AGENCIES Inquiries

More information

Using the HITRUST CSF to Assess Cybersecurity Preparedness 1 of 6

Using the HITRUST CSF to Assess Cybersecurity Preparedness 1 of 6 to Assess Cybersecurity Preparedness 1 of 6 Introduction Long before the signing in February 2013 of the White House Executive Order Improving Critical Infrastructure Cybersecurity, HITRUST recognized

More information

Information Technology Security Review April 16, 2012

Information Technology Security Review April 16, 2012 Information Technology Security Review April 16, 2012 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing

More information

Information Technology Security Requirements Summary

Information Technology Security Requirements Summary Information Technology Security Requirements Summary 1. Background Investigation Contractor employees who will have access to federal information technology (IT) systems are subject to background investigations

More information

The Protection Mission a constant endeavor

The Protection Mission a constant endeavor a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring

More information

Report of Evaluation OFFICE OF INSPECTOR GENERAL. OIG 2014 Evaluation of the Farm Credit OIG 2014 Administration s. Management Act.

Report of Evaluation OFFICE OF INSPECTOR GENERAL. OIG 2014 Evaluation of the Farm Credit OIG 2014 Administration s. Management Act. OFFICE OF INSPECTOR GENERAL Report of Evaluation OIG 2014 Evaluation of the Farm Credit OIG 2014 Administration s Evaluation of the Farm Compliance Credit Administration s with the Federal Information

More information

DoD CIO UNCLASSIFIED. DIB CS Program Value-Added

DoD CIO UNCLASSIFIED. DIB CS Program Value-Added DoD CIO DoD-Defense Industrial Base Cybersecurity (DIB CS) Information Sharing Program A Public-Private Cybersecurity Partnership Ms. Vicki Michetti Director, DoD-DIB CS Program October, 2015 1 DIB CS

More information

Solving the CIO s Cybersecurity Dilemma: 20 Critical Controls for Effective Cyber Defense

Solving the CIO s Cybersecurity Dilemma: 20 Critical Controls for Effective Cyber Defense Solving the CIO s Cybersecurity Dilemma: 20 Critical Controls for Effective Cyber Defense John M. Gilligan Information systems Security Association National Capital Chapter January 19, 2010 1 Topics Background

More information

Five keys to a more secure data environment

Five keys to a more secure data environment Five keys to a more secure data environment A holistic approach to data infrastructure security Compliance professionals know better than anyone how compromised data can lead to financial and reputational

More information

SUPPLIER SECURITY STANDARD

SUPPLIER SECURITY STANDARD SUPPLIER SECURITY STANDARD OWNER: LEVEL 3 COMMUNICATIONS AUTHOR: LEVEL 3 GLOBAL SECURITY AUTHORIZER: DALE DREW, CSO CURRENT RELEASE: 12/09/2014 Purpose: The purpose of this Level 3 Supplier Security Standard

More information

INFORMATION TECHNOLOGY SECURITY POLICY 60-702. Table of Contents

INFORMATION TECHNOLOGY SECURITY POLICY 60-702. Table of Contents Department of Commerce National Oceanic & Atmospheric Administration National Weather Service NATIONAL WEATHER SERVICE INSTRUCTION 60-702 December 21, 2009 Information Technology INFORMATION TECHNOLOGY

More information

External Supplier Control Requirements

External Supplier Control Requirements External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must

More information

SECURITY CONTROLS AND RISK MANAGEMENT FRAMEWORK

SECURITY CONTROLS AND RISK MANAGEMENT FRAMEWORK SECURITY CONTROLS AND RISK MANAGEMENT FRAMEWORK BACKGROUND The National Institute of Standards and Technology (NIST) Special Publication 800-53 defines a comprehensive set of controls that is the basis

More information

Complying with the Federal Information Security Management Act. Parallels with Sarbanes-Oxley Compliance

Complying with the Federal Information Security Management Act. Parallels with Sarbanes-Oxley Compliance WHITE paper Complying with the Federal Information Security Management Act How Tripwire Change Auditing Solutions Help page 2 page 3 page 3 page 3 page 4 page 4 page 5 page 5 page 6 page 6 page 7 Introduction

More information

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015 Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity

More information

Evaluation Report. Office of Inspector General

Evaluation Report. Office of Inspector General Evaluation Report OIG-08-035 INFORMATION TECHNOLOGY: Network Security at the Office of the Comptroller of the Currency Needs Improvement June 03, 2008 Office of Inspector General Department of the Treasury

More information

INFORMATION SECURITY SPECIFIC VENDOR COMPLIANCE PROGRAM (VCP) ACME Consulting Services, Inc.

INFORMATION SECURITY SPECIFIC VENDOR COMPLIANCE PROGRAM (VCP) ACME Consulting Services, Inc. INFORMATION SECURITY SPECIFIC VENDOR COMPLIANCE PROGRAM (VCP) ACME Consulting Services, Inc. Copyright 2016 Table of Contents INSTRUCTIONS TO VENDORS 3 VENDOR COMPLIANCE PROGRAM OVERVIEW 4 VENDOR COMPLIANCE

More information

Office of Inspector General

Office of Inspector General Office of Inspector General DEPARTMENT OF HOMELAND SECURITY U.S. Department of Homeland Security Washington, DC 20528 Office of Inspector General Security Weaknesses Increase Risks to Critical DHS Databases

More information

External Supplier Control Requirements

External Supplier Control Requirements External Supplier Control Requirements Cyber Security For Suppliers Categorised as High Cyber Risk Cyber Security Requirement Description Why this is important 1. Asset Protection and System Configuration

More information

DIACAP Presentation. Presented by: Dennis Bailey. Date: July, 2007

DIACAP Presentation. Presented by: Dennis Bailey. Date: July, 2007 DIACAP Presentation Presented by: Dennis Bailey Date: July, 2007 Government C&A Models NIST SP 800-37 - Guide for the Security Certification and Accreditation of Federal Information Systems NIACAP - National

More information