What The OMB Cybersecurity Proposal Does And Doesn't Do
|
|
|
- Warren Allan Gilbert
- 10 years ago
- Views:
Transcription
1 Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY Phone: Fax: What The OMB Cybersecurity Proposal Does And Doesn't Do Law360, New York (August 19, 2015, 10:59 AM ET) -- On Aug. 11, the U.S. Office of Management and Budget published the proposed guidance "Improving Cybersecurity Protections in Federal Acquisitions," and is seeking feedback through Sept. 10. Ostensibly, the proposal aims to strengthen cybersecurity in federal procurement and thus highlights the critical role that the private sector plays in protecting the federal government s sensitive information. The proposed guidance comes as part of the Obama administration s ongoing efforts to better educate the nation about, and secure it from, cyberthreats. Early last year, the National Institute of Standards and Technology, in response to an executive order, released the first iteration of its cybersecurity framework to help private sector entities, particularly those involved in critical infrastructure, better address cyberrisks. Just one year later, the president issued another executive order calling for enhanced cyberinformation sharing between the public and private sectors, including through the use of information sharing and analysis organizations. Evan D. Wolff The contracting community is no stranger to cybersecurity requirements. The Federal Information Security Management Act (FISMA) has been on the books since 2002 and was revised just last year reflecting Congress willingness to impose data security requirements on private federal contractors in a way that it has thus far been reluctant to do for the private sector as a whole. We have also seen a slew of cyber-specific contracting regulations in the past few years. The details of many are still pending with one exception. The Defense Federal Acquisition Regulation Supplement Safeguarding Clause has applied to U.S. Department of Defense contracts for almost two years now. It is not surprising, then, that the proposed OMB guidance appears to take an approach similar to the DFARS requirements but with applicability to all federal contractors. Final since Nov. 18, 2013, the DFARS Clause , Safeguarding of Unclassified Controlled Technical Information, imposes two sets of requirements on defense contractors who handle unclassified but controlled technical information (UCTI). First, covered defense contractors must implement adequate security on their information systems housing UCTI. They can achieve adequate security by, at a minimum, adopting 51 specific security
2 controls listed in NIST Special Publication (SP) Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations, a complex and evolving federal standard currently undergoing a fifth revision. Covered defense contractors may adopt other standards, such as ISO 27002, but they must persuade the DOD that their alternative controls provide protection that is at least equivalent to that provided by the NIST controls. Notably, achieving adequate security is not a check-the-box exercise. Covered defense contractors must go beyond the specified controls when known risks demand additional security. Meeting the Safeguarding Clause s adequate security requirement thus entails a dynamic and considered response to a shifting threat environment. Second, covered defense contractors must report defined cyberincidents to the DOD within 72 hours of their discovery. The Safeguarding Clause defines a cyberincident as actions taken through the use of computer networks that result in an actual or potentially adverse effect on an information system and/or the information residing therein. Examples of reportable cyberincidents include the possible exfiltration, manipulation, or other loss or compromise of any [UCTI] resident on or transiting through a contractor s or its subcontractor s unclassified information systems, and also any other activities that allow unauthorized access to a contractor s unclassified information systems on which UCTI is resident or transiting. Somewhat confusingly, not all reportable cyberincidents need be reported. Covered defense contractors need only report cyberincidents that affect UCTI, though neither the clause nor related guidance explains what constitutes an affect. While the Safeguarding Clause is certainly at the vanguard of cyber regulations, it has not been resoundingly embraced. Contracting officers and defense contractors alike have struggled with what the clause actually requires and how to feasibly meet those requirements. These difficulties have led to mixed implementation. In February, however, the DOD released a formal memorandum reiterating how vital UCTI is to national security, and then chastising its components for not adequately incorporating the clause into DOD contracts and solicitations, despite the fact that they are obliged to do so. The message was clear: The Safeguarding Clause is not optional. The proposed OMB guidance, on the other hand, is just that guidance. It is not final. Nor is it a rule, at least for now, as it calls for the amendment of the Federal Acquisition Regulation and actions by the General Services Administration and others to incorporate its recommendations. But the practical impact cannot be overstated. It foreshadows the likely inevitability that all federal contractors will eventually grapple with the challenges that defense contractors already face under the Safeguarding Clause. If released as drafted, the proposed guidance will have a broad reach and significant impact on the entire federal acquisition process. To start, it applies to all federal contractors, not just those working under the DOD. It also applies to any form of controlled but unclassified information (CUI), going beyond the unclassified controlled technical information regulated by the Safeguarding Clause. And finally, it applies to two types of information systems: those a contractor operates on behalf of the government, i.e., systems that an agency could operate itself but has nevertheless outsourced, and internal information systems that a contractor uses to process CUI incidental to developing a product or service for the government. It also prescribes more than just security and incident reporting requirements. It also addresses security assessments, continuous monitoring, and agency due diligence. All contractors should pay particular attention to the five key areas identified in the proposed guidance:
3 1. Security Controls For contractor systems operated on behalf of the government, the proposed guidance provides that NIST SP only parts of which are required under the Safeguarding Clause would serve as the baseline for mandatory information security and privacy controls. Contractors whose internal information systems incidentally process CUI must meet the requirements of the recently published NIST SP , Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations. The proposed guidance directs agencies to adjust and tailor the applicable NIST standard to meet, among other things, agency risk management requirements. 2. Cyberincident Reporting Regarding internal contractor systems, the proposed guidance limits a contractor s reporting obligations to cyberincidents that impact CUI in their system. Although the proposed guidance defines cyberincident to mean actions taken through the use of computer networks that result in a compromise or an actual or potentially adverse effect on an information system and/or the information residing therein, each agency may craft its own definition. Agencies must include contract clauses establishing an incident reporting timeline (which must account for the sensitivity of the stored information); the types of information to be reported; and specific remedies for failing to report incidents as required. Paralleling the Safeguarding Clause, all contracts must also make clear that a properly reported cyberincident, shall not, by itself, be a basis for concluding that the contractor failed to adequately protect CUI. 3. Information System Security Assessments Under the proposed guidance, contractors operating on behalf of government agencies will be subject to initial and ongoing compliance reviews and must have an agency-issued authority to operate their information system, in accordance with NIST SP , Guide for Applying the Risk Management Framework to Federal Information Systems. This guide imposes a complex and multistep review and certification process and, like SP , the standard is continually evolving. The proposed guidance directs agencies to consider certain factors when assessing a contractor s information systems, including the Federal Information Processing Standard-199, which agencies use to assess the impact level of the relevant data and thus to determine whether an independent security assessment is required. Similar to requirements already imposed through the Safeguarding Clause, contractors must provide government access to resources used in performance of the contract, to the extent required to conduct an inspection, evaluation, investigation or audit and to preserve evidence of information security incidents. In addition, agencies must include contract language requiring contractors to certify, prior to contract closeout, the sanitization of government and government-activity-related files and information. 4. Information Security Continuous Monitoring The proposed guidance requires continuous monitoring of all information systems containing CUI, whether internal or operated on behalf of the government. Agencies must either use contract clauses requiring compliance with Federal Information Security Continuous Monitoring (ISCM) requirements
4 and participation in the U.S. Department of Homeland Security-run Continuous Diagnostics and Mitigation program, or clauses ensuring that the information system otherwise meets or exceeds the ISCM requirements established by OMB Memorandum M Contracts using the latter approach must also include a clause permitting agencies to use tools and infrastructure of [their] choosing to continuously monitor and scan contractor systems. 5. Business Due Diligence The proposed guidance also formalizes the role of robust business due diligence in agency risk management by requiring agency program officers to work with their chief information officers to identify and prioritize planned acquisitions and contracts that could benefit from research providing comprehensive information about current and prospective contractors and subcontractors and highlighting potential security and other risks. In addition, the proposed guidance requires the GSA to make business due diligence information and research tools available to agencies for use throughout the acquisition, sustainment, and disposal lifecycles. Lastly, within 90 days of publishing the finalized guidance, an interagency working group must identify and make recommendations regarding risk indicators that will form a baseline for the GSA s business due diligence research and analysis, among other components. To the extent that the proposed guidance is intended to improve cybersecurity for information systems containing CUI, it is not clear that, as written, it will provide the clarity and practical guidance sought by federal agencies and contractors alike. The current administration may be missing an opportunity to significantly improve and standardize cybersecurity practices. First, the proposed guidance perpetuates information security challenges that agencies and contractors currently face. It identifies information security requirements and specific considerations, but ultimately leaves agencies with the discretion to interpret and apply those requirements and considerations on a contract-specific basis, based on a complex interplay of FISMA requirements, OMB memoranda, NIST guidance, and agency-specific and contract-specific issues. As has become apparent in recent months, federal agencies already have difficulty interpreting and applying existing information security requirements in a predictable and consistent manner. Second, it is unclear whether the OMB considered alternatives to the current FISMA-based cybersecurity compliance regime. FISMA requires significant agency resources for reporting and analysis. And it has been criticized for not efficiently improving cybersecurity practices, even for those agencies that comply or almost comply with its requirements. The current momentum to improve federal cybersecurity practices should not reinforce prior, less-effective practices. A practical, efficient and effective approach to information security, based on collaboration between the public and private sector, seems preferable. Given the short time frame for comments on the proposed guidance, such a solution seems unlikely to emerge. Finally, even accepting the proposed guidance s overall approach, there are many areas in which different agencies and their contractors will continue to use inconsistent information security requirements. For example, the proposed guidance allows different agencies to impose different security controls to protect the same type of information; establish different reporting requirements for cyberincidents; and apply different risk management analyses when assessing information system security. In addition, the deference to agency discretion, and differences of opinion about how that discretion should be exercised, means that federal agencies and the contractors working with them will
5 continue to face heightened cybersecurity scrutiny from Congress, the OMB, the Government Accountability Office and inspectors general about information security practices. As important as it is to identify key issues underlying information security, which the proposed guidance does in its five principles, it is equally important to provide sufficient detail about those principles, whether in the FAR or other materials, to guide agencies and contractors in meaningful ways. We cannot yet tell whether the proposed guidance does so. Whether its implementation will significantly improve federal cybersecurity thus remains equally unclear. By Kate M. Growley, Peter B. Miller, Maida Oringher Lerner and Evan D. Wolff, Crowell & Moring LLP Kate Growley is an associate in the Privacy & Cybersecurity Group of Crowell & Moring's Washington, D.C. office. Peter Miller is senior counsel in the firm's Washington office and former chief privacy officer at the Federal Trade Commission. Maida Lerner is senior counsel in the firm's Washington office. Evan Wolff is a partner in the firm's Washington office, co-chairman of the firm's privacy and cybersecurity group, and former adviser to the senior leadership at the Department of Homeland Security. The opinions expressed are those of the author(s) and do not necessarily reflect the views of the firm, its clients, or Portfolio Media Inc., or any of its or their respective affiliates. This article is for general information purposes and is not intended to be and should not be taken as legal advice. All Content , Portfolio Media, Inc.
Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues
Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues Todd Bertoson Daniel Gibb Erin Sheppard Principal Senior Managing Associate Counsel [email protected]
Why Cybersecurity Matters in Government Contracting. Robert Nichols, Covington & Burling LLP
Why Cybersecurity Matters in Government Contracting Robert Nichols, Covington & Burling LLP Cybersecurity is the No. 1 Concern of General Counsel and Directors 2 Cybersecurity Concerns in the Government
DoD Issues Interim Rule Addressing New Requirements for Cyber Incidents and Cloud Computing Services
DoD Issues Interim Rule Addressing New Requirements for Cyber Incidents and Cloud Computing Services August 27, 2015 Government Contracts Overview On August 26, 2015, the Department of Defense (DoD) issued
CRISIS MANAGEMENT AND FIRST AID: WHEN GOVERNMENT CONTRACTORS ARE THE HEADLINERS WELCOME
CRISIS MANAGEMENT AND FIRST AID: WHEN GOVERNMENT CONTRACTORS ARE THE HEADLINERS WELCOME CYBER CRISIS MANAGEMENT: ARE YOU PREPARED? Evan Wolff David Bodenheimer Kelly Currie Kate Growley Overview Cybersecurity
December 8, 2011. Security Authorization of Information Systems in Cloud Computing Environments
December 8, 2011 MEMORANDUM FOR CHIEF INFORMATION OFFICERS FROM: SUBJECT: Steven VanRoekel Federal Chief Information Officer Security Authorization of Information Systems in Cloud Computing Environments
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015 OIG-16-A-03 November 12, 2015 All publicly available OIG reports (including
[SUBPART 239.99 CLOUD COMPUTING (DEVIATION 2015-O0011) Prescribes policies and procedures for the acquisition of cloud computing services.
Attachment #1 [SUBPART 239.99 CLOUD COMPUTING (DEVIATION 2015-O0011) 239.9900 Scope of subpart. (DEVIATION 2015-O0011) Prescribes policies and procedures for the acquisition of cloud computing services.
Audit of the Department of State Information Security Program
UNITED STATES DEPARTMENT OF STATE AND THE BROADCASTING BOARD OF GOVERNORS OFFICE OF INSPECTOR GENERAL AUD-IT-15-17 Office of Audits October 2014 Audit of the Department of State Information Security Program
CYBERSECURITY RISK MANAGEMENT
CYBERSECURITY RISK MANAGEMENT Evan Wolff Maida Lerner Peter Miller Kate Growley 233 Roadmap Cybersecurity Risk Overview Cybersecurity Trends Selected Cybersecurity Topics Critical Infrastructure DFARS
Public Law 113 283 113th Congress An Act
PUBLIC LAW 113 283 DEC. 18, 2014 128 STAT. 3073 Public Law 113 283 113th Congress An Act To amend chapter 35 of title 44, United States Code, to provide for reform to Federal information security. Be it
Department of Defense INSTRUCTION. Security of Unclassified DoD Information on Non-DoD Information Systems
Department of Defense INSTRUCTION NUMBER 8582.01 June 6, 2012 DoD CIO SUBJECT: Security of Unclassified DoD Information on Non-DoD Information Systems References: See Enclosure 1 1. PURPOSE. This Instruction:
EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07
EVALUATION REPORT Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review March 13, 2015 REPORT NUMBER 15-07 EXECUTIVE SUMMARY Weaknesses Identified During the FY 2014
Security Language for IT Acquisition Efforts CIO-IT Security-09-48
Security Language for IT Acquisition Efforts CIO-IT Security-09-48 Office of the Senior Agency Information Security Officer VERSION HISTORY/CHANGE RECORD Change Number Person Posting Change Change Reason
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT: U.S. Election Assistance Commission Compliance with the Requirements of the Federal Information Security Management Act Fiscal
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 8910.01 May 19, 2014 DoD CIO SUBJECT: Information Collection and Reporting References: See Enclosure 1 1. PURPOSE. This instruction: a. Reissues DoD Instruction
NASA OFFICE OF INSPECTOR GENERAL
NASA OFFICE OF INSPECTOR GENERAL OFFICE OF AUDITS SUITE 8U71, 300 E ST SW WASHINGTON, D.C. 20546-0001 April 14, 2016 TO: SUBJECT: Renee P. Wynn Chief Information Officer Final Memorandum, Review of NASA
Corporate Perspectives On Cybersecurity: A Survey Of Execs
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 [email protected] Corporate Perspectives On Cybersecurity: A Survey
AUDIT REPORT. The Energy Information Administration s Information Technology Program
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT The Energy Information Administration s Information Technology Program DOE-OIG-16-04 November 2015 Department
Privacy and Data Security Update for Defense Contractors
Privacy and Data Security Update for Defense Contractors T.J. Crane May 19, 2017 Overview DoD interim rule Expanded DFAR reporting obligations New DFAR definitions Cloud services Changes to local breach
The Council of the Inspectors General on Integrity and Efficiency s Cloud Computing Initiative
The Council of the Inspectors General on Integrity and Efficiency s Cloud Computing Initiative September 2014 Council of the Inspectors General on Integrity and Efficiency Cloud Computing Initiative Executive
Audit of NRC s Network Security Operations Center
Audit of NRC s Network Security Operations Center OIG-16-A-07 January 11, 2016 All publicly available OIG reports (including this report) are accessible through NRC s Web site at http://www.nrc.gov/reading-rm/doc-collections/insp-gen
AUDIT REPORT. Cybersecurity Controls Over a Major National Nuclear Security Administration Information System
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT Cybersecurity Controls Over a Major National Nuclear Security Administration Information System DOE/IG-0938
OFFICE OF THE INSPECTOR GENERAL SOCIAL SECURITY ADMINISTRATION
OFFICE OF THE INSPECTOR GENERAL SOCIAL SECURITY ADMINISTRATION CONTRACTOR SECURITY OF THE SOCIAL SECURITY ADMINISTRATION S HOMELAND SECURITY PRESIDENTIAL DIRECTIVE 12 CREDENTIALS June 2012 A-14-11-11106
NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL
NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL INDEPENDENT EVALUATION OF THE NATIONAL CREDIT UNION ADMINISTRATION S COMPLIANCE WITH THE FEDERAL INFORMATION SECURITY MANAGEMENT ACT (FISMA)
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections. Evaluation Report
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Evaluation Report The Department's Unclassified Cyber Security Program 2011 DOE/IG-0856 October 2011 Department of
U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems
U.S. Office of Personnel Management Actions to Strengthen Cybersecurity and Protect Critical IT Systems June 2015 1 I. Introduction The recent intrusions into U.S. Office of Personnel Management (OPM)
FedRAMP Standard Contract Language
FedRAMP Standard Contract Language FedRAMP has developed a security contract clause template to assist federal agencies in procuring cloud-based services. This template should be reviewed by a Federal
E X E C U T I V E O F F I CE O F T H E P R E S I D EN T
EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C. 20503 THE DIRECTOR M-05-24 August 5, 2005 MEMORANDUM FOR THE HEADS OF ALL DEPARTMENTS AND AGENCIES FROM: SUBJECT: Joshua
Complying with the Federal Information Security Management Act. Parallels with Sarbanes-Oxley Compliance
WHITE paper Complying with the Federal Information Security Management Act How Tripwire Change Auditing Solutions Help page 2 page 3 page 3 page 3 page 4 page 4 page 5 page 5 page 6 page 6 page 7 Introduction
Briefing Outline. Overview of the CUI Program. CUI and IT Implementation
Briefing Outline Overview of the CUI Program Establishment of the Program Elements of the CUI Executive Order Categories and Registry Handling CUI Current Efforts Implementation Plan CUI and IT Implementation
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Audit Report The Department's Configuration Management of Non-Financial Systems OAS-M-12-02 February 2012 Department
Legislative Language
Legislative Language SEC. 1. COORDINATION OF FEDERAL INFORMATION SECURITY POLICY. (a) IN GENERAL. Chapter 35 of title 44, United States Code, is amended by striking subchapters II and III and inserting
2015 List of Major Management Challenges for the CFPB
September 30, 2015 MEMORANDUM TO: FROM: SUBJECT: Richard Cordray Director Consumer Financial Protection Bureau Mark Bialek Inspector General 2015 List of Major Management Challenges for the CFPB We are
Briefing Report: Improvements Needed in EPA s Information Security Program
U.S. ENVIRONMENTAL PROTECTION AGENCY OFFICE OF INSPECTOR GENERAL Briefing Report: Improvements Needed in EPA s Information Security Program Report No. 13-P-0257 May 13, 2013 Scan this mobile code to learn
TITLE III INFORMATION SECURITY
H. R. 2458 48 (1) maximize the degree to which unclassified geographic information from various sources can be made electronically compatible and accessible; and (2) promote the development of interoperable
U.S. Department of Energy Office of Inspector General Office of Audits & Inspections. Evaluation Report
U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Evaluation Report The Department's Unclassified Cyber Security Program - 2012 DOE/IG-0877 November 2012 MEMORANDUM FOR
Compliance Risk Management IT Governance Assurance
Compliance Risk Management IT Governance Assurance Solutions That Matter Introduction to Federal Information Security Management Act (FISMA) Without proper safeguards, federal agencies computer systems
Evaluation Report. Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review. April 30, 2014 Report Number 14-12
Evaluation Report Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review April 30, 2014 Report Number 14-12 U.S. Small Business Administration Office of Inspector General
Overview. FedRAMP CONOPS
Concept of Operations (CONOPS) Version 1.0 February 7, 2012 Overview Cloud computing technology allows the Federal Government to address demand from citizens for better, faster services and to save resources,
Statement of Danny Harris, Ph.D. Chief Information Officer U.S. Department of Education
Statement of Danny Harris, Ph.D. Chief Information Officer U.S. Department of Education Before the U.S. House Oversight and Government Reform Committee Hearing on Agency Compliance with the Federal Information
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 8140.01 August 11, 2015 DoD CIO SUBJECT: Cyberspace Workforce Management References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues and renumbers DoD Directive
INFORMATION SECURITY. Additional Oversight Needed to Improve Programs at Small Agencies
United States Government Accountability Office Report to Congressional Requesters June 2014 INFORMATION SECURITY Additional Oversight Needed to Improve Programs at Small Agencies GAO-14-344 June 2014 INFORMATION
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
FEDERAL INFORMATION SECURITY. Mixed Progress in Implementing Program Components; Improved Metrics Needed to Measure Effectiveness
United States Government Accountability Office Report to Congressional Committees September 2013 FEDERAL INFORMATION SECURITY Mixed Progress in Implementing Program Components; Improved Metrics Needed
Delving Into FCC's 'Damn Important' Cybersecurity Report
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 [email protected] Delving Into FCC's 'Damn Important' Cybersecurity
2014 Audit of the Board s Information Security Program
O FFICE OF I NSPECTOR GENERAL Audit Report 2014-IT-B-019 2014 Audit of the Board s Information Security Program November 14, 2014 B OARD OF G OVERNORS OF THE F EDERAL R ESERVE S YSTEM C ONSUMER FINANCIAL
Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program
U.S. ENVIRONMENTAL PROTECTION AGENCY OFFICE OF INSPECTOR GENERAL Information Technology Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program Report.
GAO. IT SUPPLY CHAIN Additional Efforts Needed by National Security- Related Agencies to Address Risks
GAO For Release on Delivery Expected at 10:00 a.m. EDT Tuesday, March 27, 2012 United States Government Accountability Office Testimony Before the Subcommittee on Oversight and Investigations, Committee
AUDIT REPORT. Federal Energy Regulatory Commission s Unclassified Cybersecurity Program 2015
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT Federal Energy Regulatory Commission s Unclassified Cybersecurity Program 2015 OAI-L-16-02 October 2015
IT SECURITY EDUCATION AWARENESS TRAINING POLICY OCIO-6009-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: Section I. PURPOSE II. AUTHORITY III. SCOPE IV. DEFINITIONS V. POLICY VI. RESPONSIBILITIES
AUDIT REPORT. The Department of Energy's Management of Cloud Computing Activities
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT The Department of Energy's Management of Cloud Computing Activities DOE/IG-0918 September 2014 Department
Report No. D-2010-058 May 14, 2010. Selected Controls for Information Assurance at the Defense Threat Reduction Agency
Report No. D-2010-058 May 14, 2010 Selected Controls for Information Assurance at the Defense Threat Reduction Agency Additional Copies To obtain additional copies of this report, visit the Web site of
Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.
Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Continuous Monitoring 1. What is continuous monitoring? Continuous monitoring is one of six steps in the Risk Management Framework (RMF) described in NIST Special Publication
United States Patent and Trademark Office
U.S. DEPARTMENT OF COMMERCE Office of Inspector General United States Patent and Trademark Office FY 2009 FISMA Assessment of the Patent Cooperation Treaty Search Recordation System (PTOC-018-00) Final
Diane Honeycutt National Institute of Standards and Technology (NIST) 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899
Submitted via email: [email protected] April 8, 2013 Diane Honeycutt National Institute of Standards and Technology (NIST) 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899 Re: Developing a Framework
FSIS DIRECTIVE 1306.3
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC FSIS DIRECTIVE 1306.3 REVISION 1 12/13/12 CONFIGURATION MANAGEMENT (CM) OF SECURITY CONTROLS FOR INFORMATION SYSTEMS
PROCUREMENT. Actions Needed to Enhance Training and Certification Requirements for Contracting Officer Representatives OIG-12-3
PROCUREMENT Actions Needed to Enhance Training and Certification Requirements for Contracting Officer Representatives OIG-12-3 Office of Inspector General U.S. Government Accountability Office Report Highlights
Advancing Access to Restricted Data: Regulations, Compliance, Continuous Monitoring. OH MY!!!
Advancing Access to Restricted Data: Regulations, Compliance, Continuous Monitoring. OH MY!!! Cornell Institute for Social and Economic Research and Cornell Restricted Access Data Center CISER s Mission:.anticipate
INFORMATION MANAGEMENT
United States Government Accountability Office Report to the Committee on Homeland Security and Governmental Affairs, U.S. Senate May 2015 INFORMATION MANAGEMENT Additional Actions Are Needed to Meet Requirements
INSPECTION U.S. DEPARTMENT OF THE INTERIOR WEB HOSTING SERVICES
INSPECTION U.S. DEPARTMENT OF THE INTERIOR WEB HOSTING SERVICES Report No.: ISD-IS-OCIO-0001-2014 June 2014 OFFICE OF INSPECTOR GENERAL U.S.DEPARTMENT OF THE INTERIOR Memorandum JUN 0 4 2014 To: From:
I. U.S. Government Privacy Laws
I. U.S. Government Privacy Laws A. Privacy Definitions and Principles a. Privacy Definitions i. Privacy and personally identifiable information (PII) b. Privacy Basics Definition of PII 1. Office of Management
EPA Needs to Improve Security Planning and Remediation of Identified Weaknesses in Systems Used to Protect Human Health and the Environment
U.S. ENVIRONMENTAL PROTECTION AGENCY OFFICE OF INSPECTOR GENERAL Information Technology EPA Needs to Improve Security Planning and Remediation of Identified Weaknesses in Systems Used to Protect Human
PROTIVITI FLASH REPORT
PROTIVITI FLASH REPORT Cybersecurity Framework: Where Do We Go From Here? February 25, 2014 Just over a year ago, President Barack Obama signed an Executive Order (EO) calling for increased cybersecurity
Executive Order 13627 Strengthening Protections Against Trafficking in Persons in Federal Contracts September 25, 2012
Administration of Barack Obama, 2012 Executive Order 13627 Strengthening Protections Against Trafficking in Persons in Federal Contracts September 25, 2012 By the authority vested in me as President by
Department of Homeland Security
Implementation Status of EINSTEIN 3 Accelerated OIG-14-52 March 2014 Washington, DC 20528 / www.oig.dhs.gov March 24, 2014 MEMORANDUM FOR: FROM: SUBJECT: Bobbie Stempfley Acting Assistant Secretary Office
Cybersecurity Enhancement Account. FY 2017 President s Budget
Cybersecurity Enhancement Account FY 2017 President s Budget February 9, 2016 Table of Contents Section 1 Purpose... 3 1A Mission Statement... 3 1.1 Appropriations Detail Table... 3 1B Vision, Priorities
Re: FINRA Regulatory Notice 13-42: FINRA Requests Comments on a Concept Proposal to Develop the Comprehensive Automated Risk Data System
Ms. Marcia E. Asquith Office of the Corporate Secretary FINRA 1735 K Street, NW Washington, DC 20006 Re: FINRA Regulatory Notice 13-42: FINRA Requests Comments on a Concept Proposal to Develop the Comprehensive
STATEMENT OF MARK A.S. HOUSE OF REPRESENTATIVES
STATEMENT OF MARK A. FORMAN ASSOCIATE DIRECTOR FOR INFORMATION TECHNOLOGY AND ELECTRONIC GOVERNMENT OFFICE OF MANAGEMENT AND BUDGET BEFORE THE COMMITTEE ON GOVERNMENT REFORM SUBCOMMITTEE ON GOVERNMENT
DEPARTMENT OF VETERANS AFFAIRS VA HANDBOOK 6500.5 INCORPORATING SECURITY AND PRIVACY INTO THE SYSTEM DEVELOPMENT LIFE CYCLE
DEPARTMENT OF VETERANS AFFAIRS VA HANDBOOK 6500.5 Washington, DC 20420 Transmittal Sheet March 22, 2010 INCORPORATING SECURITY AND PRIVACY INTO THE SYSTEM DEVELOPMENT LIFE CYCLE 1. REASON FOR ISSUE: This
Your Agency Just Had a Privacy Breach Now What?
1 Your Agency Just Had a Privacy Breach Now What? Kathleen Claffie U.S. Customs and Border Protection What is a Breach The loss of control, compromise, unauthorized disclosure, unauthorized acquisition,
ClOP CHAPTER 1351.39. Departmental Information Technology Governance Policy TABLE OF CONTENTS. Section 39.1
ClOP CHAPTER 1351.39 Departmental Information Technology Governance Policy TABLE OF CONTENTS Section 39.1 Purpose... 1 Section 39.2 Section 39.3 Section 39.4 Section 39.5 Section 39.6 Section 39.7 Section
John Essner, CISO Office of Information Technology State of New Jersey
John Essner, CISO Office of Information Technology State of New Jersey http://csrc.nist.gov/publications/nistpubs/800-144/sp800-144.pdf Governance Compliance Trust Architecture Identity and Access Management
Minimum Security Requirements for Federal Information and Information Systems
FIPS PUB 200 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Minimum Security Requirements for Federal Information and Information Systems Computer Security Division Information Technology Laboratory
SECTION-BY-SECTION. Section 1. Short Title. The short title of the bill is the Cybersecurity Act of 2012.
SECTION-BY-SECTION Section 1. Short Title. The short title of the bill is the Cybersecurity Act of 2012. Section 2. Definitions. Section 2 defines terms including commercial information technology product,
(Billing Code 5001-06) Defense Federal Acquisition Regulation Supplement: Network. Penetration Reporting and Contracting for Cloud Services (DFARS
This document is scheduled to be published in the Federal Register on 08/26/2015 and available online at http://federalregister.gov/a/2015-20870, and on FDsys.gov (Billing Code 5001-06) DEPARTMENT OF DEFENSE
