The Benefits of FedRAMP. Shamun Mahmud, DLT Cloud Advisory Group
|
|
|
- Lionel Ellis
- 10 years ago
- Views:
Transcription
1 The Benefits of FedRAMP Shamun Mahmud, DLT Cloud Advisory Group
2 The Benefits of FedRAMP Shamun Mahmud, DLT Cloud Advisory Group, DLT Solutions LCC 2012 Executive Summary FedRAMP (Federal Risk and Authorization Management Program) serves as the primary program for federal acquisition of cloud computing services. FedRAMP uses a risk management approach to improve security postures in federal IT enterprises. Cloud service acquisition via FedRAMP is a form of outsourcing. The government already uses outsourcing as a strategic initiative to improve customer service, quality, and reduce costs. Agencies can use FedRAMP to outsource a portion of the security controls authorization process. FedRAMP allows one agency to leverage another agency s vetted security requirements and authorization packages. The leveraging of FedRAMP authorizations-to-operate (ATOs) also establishes a digital trust ecosystem. Further, this re-use adds a level of assessment transparency. Multi-agency assessment and authorization of common systems helps agencies address their program s technical requirements in a timely and cost-effective manner. Cloud Service Providers (CSPs) that attain FedRAMP authorization also reduce an agency s time-to-production. As a logical extension of current federal IT security best practices, FedRAMP leverages the Cloud Security Alliance s (CSA s) Cloud Controls Matrix (CCM) to improve independent accountability of governmentdeveloped systems used by multiple agencies. For parties that have an interest in cloud computing within government, this whitepaper will further describe several additional benefits that FedRAMP will bring to federal agencies as follows: 1. Increased security through focused risk management 2. Reduced duplication of effort 3. Ensured security oversight 4. Improved independent accountability 5. Integration with current government-wide security efforts 6. Rapid acquisition cycle 7. Heightened assessment transparency 8. Reduced resource hurdles What is FedRAMP? The Federal Risk and Authorization Management Program, or FedRAMP, has been established to provide a standard approach to Assessing and Authorizing (A&A) cloud computing services and products. FedRAMP allows for joint authorizations and continuous security monitoring services of government and commercial cloud computing systems intended for multi-agency use. Joint authorization of cloud providers results in a common security risk model that can be leveraged across the federal government. The use of this common security risk model provides a consistent baseline for cloud-based services. This common baseline ensures that the benefits of cloud-based services are effectively integrated across the various cloud computing solutions currently proposed within the government. The risk model will also enable the government to approve once, and use often by ensuring multiple agencies gain the benefit and insight of FedRAMP s authorization and access to service provider s authorized packages. i
3 Increased Security through Focused Risk Management FedRAMP uses a risk management approach to harden security postures in federal IT enterprises. Risk management is a fundamental challenge and must be addressed appropriately for an agency to successfully complete its mission. FedRAMP is designed to streamline agencies efforts expended on all phases of risk management. When an agency develops a risk management policy, a collection of tasks and procedures must be compiled. There are programs that can assist in the proper development of risk management procedures and templates to help guide the managers as they formulate the policy for their particular requirements. The first important step of risk management is the identification of all known risks. You cannot mitigate the risk if you are unaware of it. This step must be performed accurately and thoroughly so all possible known risks can be addressed by the policy. The second step in the process is determining the impact and probability of each identified risk. The impact of each risk is different for every agency exposed to it. With these two factors known, the prioritization of the known risks can take place. The final step is to define the reason and objectives for the policy, based on the risk assessments. The policy should be implemented to mitigate and lessen the impact of all the indentified risks as much as possible. Only when all steps are complete can the magnitude and the importance of risk management policy be fully understood (and realized). The importance of a risk management policy is clear, and that is why every agency has one. The better the risks are managed, the less of a compliance burden and impact they will cause the agency to bare. Developing a Policy Identify Risks Determine Risk Impact Define Policy Reasons/Objectives Policy Implementation Reduced Duplication of Effort Grouping baseline security controls within FedRAMP allows agencies to better focus on agency-specific requirements and reduce certification and accreditation costs. Grouping baseline security controls within FedRAMP allow agencies to better focus on agency-specific requirements and reduce certification and accreditation costs. FedRAMP was created to provide transparent standards and processes that benefit the government and its constituency. Several government agencies were already working on initiatives for collecting and sharing information and services. The standards and processes established within FedRAMP leverage this work and facilitate the dissemination of shareable information through documented best practices. One of the FedRAMP s goals is to shift some of the procurement workload from the Certification and Accreditation (C&A) function to the Assessment and Authorization (A&A) function. One of the highest costs for government IT shops that this model addresses is the cost of C&A. Current C&A recertifications are required every 3-years, and the process is unwieldy at best. Given the rigidity of the
4 process, IT is sometimes seen as a roadblock to meeting mission objectives. FedRAMP provides a consistent and coherent Cloud Risk Authorization Management (CRAM) model that spans across multiple levels of government. FedRAMP also promises a significant impact on A&A overheads by reducing redundancy and duplication of effort. From an end-user viewpoint: FedRAMP ultimately facilitates secured work anywhere access to required information and services. FedRAMP will also provide a more consistent government experience by reducing the level of knowledge of government processes constituents, particularly non-federal entities, must possess in order to interact with the government. From an agency s (particularly its Programs Office) point of view: the creation and implementation of an interoperability model will enable them to add value to their existing information and services by bundling similar acquisitions. There will be opportunities to reduce duplication of effort and to reuse intellectual property to deliver better returns on investment and better services to constituents. FedRAMP streamlines the successful execution of programs, allowing agencies to fulfill their mission s requirements. Ensured Security Oversight of Outsourced Systems Cloud service acquisition through FedRAMP is a form of outsourcing. Agencies can use FedRAMP to outsource a portion of the security controls authorization process. What is Outsourcing? In its most basic form, outsourcing is simply the hiring out of services to a third party. With regards to information technology, it can include anything from outsourcing all IT management to a third party like IBM or HP, all the way to outsourcing a very small and easily defined service, such as disaster recovery or data storage, and everything in between. The classic make/buy decision revolves around doing things in-house versus outsourcing. Agencies already use outsourcing as a strategic initiative to improve customer service, quality, and reduce costs. The cloud is a new delivery method for outsourced information technology services owned and operated by a third party. In the context of FedRAMP, the third party (outsourcer) is a Cloud Service Provider (CSP).
5 Advantages and Disadvantages of Outsourcing Advantages Cost savings - There can be significant cost savings when a business function is outsourced. Shifts focus to core business - Outsourcing to a CSP allows agencies to focus on their expertise and core business. Improved quality - Improved quality can be achieved by using CSPs with more expertise and more specialized processes. Improved customer service - Contract binds CSP to certain levels of service and quality. Operational efficiency - Specialization provides more efficiency that allows for a quicker turnaround time and higher levels of quality. Disadvantages Quality risk - Even if there is an SLA, outsourcing can expose an agency to potential risks and compliance exposure. Quality service - Unless a contract specifically identifies a measurable process for quality service reporting, there could be a poor service quality experience. Language barriers - Agencies have unique cultures and vocabularies. Employee morale - There can be negative perceptions with outsourcing services. Organizational knowledge - A Cloud Service Provider (CSP) may not have the same understanding and passion for an agency s mission as the agency s resources.. Compliance and security -Services that are outsourced need to be managed to ensure there is diligence with compliance and system security. An example of a potential risk with outsourcing is a data breach - where access to confidential customer data is used for unauthorized purposes. Compliance and Security Issues with Outsourcing Services Unauthorized disclosure threatens vast amounts of sensitive and/or Personally Identifiable Information (PII). In addition, poor controls over access to data and inadequate disaster recovery plans diminish the reliability of the large quantities of electronically maintained information essential for delivering federal services, assessing the success of federal programs, and monitoring agency performance. An underlying cause is that agencies have not implemented information security programs that establish appropriate policies and controls and routinely monitor their effectiveness. Each agency can improve its oversight effectiveness by taking advantage of insights into information security that is becoming routinely available from agency compliance audits required under FedRAMP. Although these audits pertain primarily to cloud systems, they are independent assessments of information security that will be available to most major agencies on a continuous basis. Agencies can use this audit information, in conjunction with the results of agency self assessments, to evaluate the scope and adequacy of information security reviews by individual agencies. Lastly, audit data and self-assessments are key determinants to monitor progress in mitigating identified problems. Further, aside from NIST s FedRAMP enforcement, the recently established Chief Information Officers (CIO) Council, can also serve as a mechanism for strategically addressing cloud security on a government-wide basis. However, it is important that agencies continually monitor the threat landscape. It must develop and improve staff expertise for proactively and systematically overseeing the overall design and effectiveness of agency information security programs that are migrated to the cloud ii.
6 Improved Independent Accountability As a logical extension of current federal IT security best practices, FedRAMP leverages the Cloud Security Alliance s (CSA s) Cloud Controls Matrix (CCM) to improve independent accountability of government-developed systems used by multiple agencies. FedRAMP is designed to foster inter-agency trust. One objective of FedRAMP is to establish a common security risk model that serves as a consistent risk baseline deployable across multiple agencies. The commonality enables an approve once, use often authorization process, based upon inter-agency trust relationships. Ultimately, the FedRAMP will save costs, time, and staff required by reducing redundant security assessments performed on an agency-by-agency basis. FedRAMP Security Requirements FedRAMP serves as the primary program for federal acquisition of cloud services. Since the scope of FedRAMP is government-wide, agencies need to verify the program as a credible authority. Therefore, it is imperative that the program formally establishes inter-agency trust relationships built upon rigid security measures. To proactively address concerns, stringent security requirements are an integral part of the program s model. It is important to note that government IT enterprises have built a vast knowledgebase of security related measures. Due to their tried and true nature, personnel feel a certain level of comfort with the measures. In fact, many consider their current measures to be best practice(s). FedRAMP recognizes this valuable level of trust built over the last three decades of IT operations. Its security requirements leverage government IT best practices and robustly extends them for cloud services. For a detailed clarification on how FedRAMP leverages the Cloud Security Alliance s (CSA s) Cloud Controls Matrix (CCM) to foster accountability, refer to Appendix A. Integration with Government-wide Security Efforts For a detailed clarification on how FedRAMP leverages the Cloud Security Alliance s (CSA s) Cloud Controls Matrix (CCM) to foster accountability, refer to Appendix A. Integrated Security Architectures There are several benefits of integrated security: 1. Increased security posture 2. Operational efficiency of security functions 3. Minimized impact of attacks on workloads 4. Features of integrated security
7 Increased Security Posture Minimized Impact of Attacks on Business Operational Efficiency of Security Functions Features of Integrated Security Increased Security Posture Security technologies that are integrated will interoperate, providing an enhanced security posture over their standalone counterparts. Intrusion detection technology could identify a potential threat and encourage a higher firewall posture, or the firewall technology could initiate a virus scan of a suspicious transmission. FedRAMP aims to harden security postures. This reduces the risk of a technology becoming the weakest link in the security chain, and increases the potential for capture and containment of blended threats. Operational Efficiency of Security Functions Integrated security reduces the need to purchase, install, update, and manage multiple security products or address interoperability issues between various products at each cloud or network tier. Such a solution maximizes the productivity of the often overburdened IT department, while improving overall security manageability. Minimized Impact of Attacks on Workloads Since an integrated security solution can be implemented at each cloud layer (or network tiers), it offers greater protection of proprietary assets. Integrated security better allows for uninterrupted program operations, promotes employee productivity, and minimizes the possibility of noncompliance. Features of Integrated Security The threat landscape in the cloud is rapidly evolving. As a result, security is only as effective as the most recent update of a virus definition, firewall rule, intrusion signature, or other content updates. By applying a uniform approach to systems and devices that contain business-critical and sensitive information assets, agencies can ensure the integrated and timely updates of their security content and other critical aspects of a security system. Technology alone does not address security issues. An integrated security solution works best when built upon strong policies and procedures and supplemented by appropriate personnel and physical security measures. Solid security policy and standards define what needs to be protected, who is granted access, and the reason access is required. Executive-level support in the organization for the security policy, as well as employee awareness, helps ensure successful policy adoption.
8 FedRAMP facilitates strategic security integration. An integrated security strategy improves the overall security posture of the network in a way not possible via implementation of individual products. Whether security is handled in-house or outsourced, ensuring that all of these capabilities are in place is vital to maintaining a secure critical infrastructure. An Aside on the Future of the Integrated Security Landscape Government can now benefit from integrated security in a variety of ways, including improved efficiency of security functions, minimized business impact of attacks, and an improved overall security posture. In fact, agencies that adopt an integrated security strategy today will be in the best position to take advantage of the next stage of integrated security, whereby all network tiers will be integrated and centrally managed. Through this government-wide integration of security, administrator resources will be optimized, as installation, reporting, and updates will be possible from a single console. This management capability will further improve protection, while reducing the administrative, support, and ownership costs typically associated with cloud (and enterprise) security. Rapid Acquisition Cycle CSPs that attain FedRAMP authorization reduce time-to-production. FedRAMP will reduce duplicative efforts, inconsistencies and cost inefficiencies associated with the current security authorization process. Agencies will be able to save significant time and money by leveraging FedRAMP authorizations, where appropriate. While significant savings can be achieved, agencies will typically need to perform some security risk management and privacy activities related to agency-specific usage of information systems. FedRAMP will help agencies decide whether acquisitions are appropriate for FedRAMP authorizations. Ultimately, the actual number of control objectives that individual agencies must address during their formal authorization process will be significantly reduced. For example, let s examine the General Services Administration s (GSA s) Blanket Purchase Agreement (BPA) for Infrastructure as a Service (IaaS). As a purchasing option, BPAs eliminate such contracting and open market costs as the search for sources, the need to prepare solicitations, and the requirement to synopsize the acquisition iii. In other words, a BPA streamlines the acquisition process by eliminating redundant processes; which in turn leads to reduction in time-to-production. The GSA s BPA for IaaS will be issued to CSPs that have attained FedRAMP authorization. Once FedRAMPapproved, their offerings are authorized as covering most of the security control objectives that are commonplace throughout government. That translates into a decrease in the number of agencyspecific control objectives that need to be addressed during the individual agency s acquisition process. Further, since common control objectives have been addressed proactively, government IT personnel will be more comfortable with the agile implementation. Thus, the BPA will result in shorter acquisition cycles, as well as reduced time-to-production.
9 Heightened Transparency FedRAMP allows one agency to leverage another agency s vetted security requirements and authorization packages. The leveraging of FedRAMP authorizations-to-operate (ATOs) indirectly establishes a digital trust ecosystem. This re-use model adds a level of assessment transparency. So, why do we need transparency? Without transparency, buyers cannot adequately assess their risks. Without objectively understanding their risks, buyers cannot determine what the most cost-effective path to calculate their risk exposure. The elements of transparency empower the cloud consumer with the right information to make the best choices about what processing and data to put in the cloud and which cloud is best suited to satisfy processing needs. This is the nature of digital trust. It reinforces again why such reclaimed transparency is so essential to creating new value within the enterprise. Transparency of certain important elements of information is at the root of digital trust, and thus the source of value capture and payoff. It doesn t mean having to show every detail of the implementation beneath. CSPs might only have to release enough details that people can accurately calculate risks. For example, one doesn t have to know the details of the parts in a disk drive to be able to accept a mean time between failure (MTBF) or annualized failure rate (AFR) from the manufacturer. In essence, transparency does not require that CSPs reveal their trade secrets. Transparency is also addressed in NIST s Risk Management Framework (SP800-37). For a detailed mapping of FedRAMP Security Requirements to NIST SP800-37, please refer to Appendix B. Reduced Resource Hurdles Multi-agency assessment and authorization of shared systems helps agencies address technical requirements in a more timely and cost effective manner. Cloud computing is as much of a paradigm shift for government as it is for the industry. Acquisitions offices within individual agencies might not possess the requisite technical understanding to authorize cloud services in an informed manner. By leveraging multi-agency assessments and authorizations, FedRAMP ensures that agencies authorize cloud services more effectively. Agencies may still choose to sponsor a cloud service to be authorized under FedRAMP. Sponsoring a cloud service shifts the compliance burden from the sponsor agency to FedRAMP but still enables the agency to participate in the final authorization decision. Summary FedRAMP provides numerous benefits that allow the federal government to streamline its secure migration to cloud computing. This paper addressed eight areas where FedRAMP improves government s current authorization practices. FedRAMP leverages and consolidates current security practices. It extends those lessons learned by using industry-standard tools like CSA s CCM. FedRAMP also improves procurement best practices by reducing duplication of effort expended during the A&A process. Ultimately, the benefits reduce overall costs while improving the quality of services provided to constituencies.
10 Appendix A: Clarification on how FedRAMP leverages the Cloud Security Alliance s (CSA s) Cloud Controls Matrix (CCM) to foster Accountability The following FedRAMP excerpt focuses on exploring the selected security control baseline as part of the Cloud Security Alliance s (CSA) Cloud Controls Matrix v1.2 (CCM) in order to: Ensure coverage and applicability within Cloud Computing operating environments and within NIST SP , Rev. 3; Identify and address Cloud-specific security considerations relevant to the objectives of each security control; and List relevant references to support implementation and assessment. The CSA s CCM is specifically designed to provide fundamental security principles to guide cloud vendors and to assist prospective cloud customers in assessing the overall security risk of a cloud provider. The CCM provides a controls framework that gives detailed understanding of security concepts and principles that are aligned to the Cloud Security Alliance guidance in 13 domains. For our discussion, we will focus on the Audit and Accountability Policy and Procedures Domain [aka Audit Domain (AU)]. Below is an abstraction of Control AU-1 - Audit and Accountability Policy and Procedures: Audit and Accountability Policy and Procedures Control Baseline: Low = AU-1, Moderate = AU-1 Control Number: AU-1: Control: The organization develops, disseminates, and reviews/updates at least annually: a. A formal, documented audit and accountability policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and b. Formal, documented procedures to facilitate the implementation of the audit and accountability policy and associated audit and accountability controls Thus, Control AU-1, Sub-section A formalizes the POLICY for Independent Accountability by multiple Agencies. Whereas Sub-section B formalizes the PROCEDURES to assist the implementation of POLICY as well as associated controls. As a side benefit, FedRAMP works with the CSA to create an environment conducive for exchanging and sharing experiences. In turn, the CSA proactively solicits independent contributions in the support the government Community of Practice for independent accountability mechanisms. Discussion topics would include (but not limited to) independent accountability mechanisms (IAMs) in the areas of risk management, compliance, and governance. The CSA compiles (and shares) cloud consumers views on topical issues, and emerging best practices and developments.
11 Appendix B: Detailed mapping of FedRAMP Security Requirements to NIST s Risk Management Framework (SP ) A brief background: The FedRAMP security process is based on NIST s Risk Management Framework (RMF) as described in NIST Special Publication revision 1. The concept of transparency is addressed within the Six Step flow of the RMF, Step 6 Monitor, Task 6-4: TASK 6-4: Update the security plan, security assessment report, and plan of action and milestones based on the results of the continuous monitoring process. When updating key information in security plans, security assessment reports, and plans of action and milestones, organizations ensure that the original information needed for oversight, management, and auditing purposes is not modified or destroyed. Providing an effective method of tracking changes to information over time through strict configuration management and control procedures (including version control) is necessary to: (i) achieve transparency in the information security activities of the organization; (ii) obtain individual accountability for security-related actions; and (iii) better understand emerging trends in the organization s information security program. Disparate Audit and Continuous Monitoring systems within government IT must interoperate. Transparency is the key to interoperability. Subtask (i) formalizes the mandate to meet the transparency requirement. Links and References i Melvin Greer, Why FedRAMP really matters, (Jan 2012). ii INFORMATION SECURITY: Opportunities for Improved OMB Oversight of Agency Practices (GAO/ AIMD , September 1996). iii U.S. General Services Administration. December 29, Blanket Purchase Agreements (BPAs) (Mar 2012).
12 13861 Sunrise Valley Drive, Suite 400 Herndon, VA Copyright DLT Solutions, LLC, All rights reserved.
Cloud Security for Federal Agencies
Experience the commitment ISSUE BRIEF Rev. April 2014 Cloud Security for Federal Agencies This paper helps federal agency executives evaluate security and privacy features when choosing a cloud service
ISSUE BRIEF. Cloud Security for Federal Agencies. Achieving greater efficiency and better security through federally certified cloud services
ISSUE BRIEF Cloud Security for Federal Agencies Achieving greater efficiency and better security through federally certified cloud services This paper is intended to help federal agency executives to better
How To Use Cloud Computing For Federal Agencies
Cloud Computing Briefing Scott Renda Office of Management and Budget www.whitehouse.gov/omb/egov Cloud Computing Basics Style of computing Cloud Computing: What Does it Mean? Close public/private sector
Written Testimony. Mark Kneidinger. Director, Federal Network Resilience. Office of Cybersecurity and Communications
Written Testimony of Mark Kneidinger Director, Federal Network Resilience Office of Cybersecurity and Communications U.S. Department of Homeland Security Before the U.S. House of Representatives Committee
Overview. FedRAMP CONOPS
Concept of Operations (CONOPS) Version 1.0 February 7, 2012 Overview Cloud computing technology allows the Federal Government to address demand from citizens for better, faster services and to save resources,
December 8, 2011. Security Authorization of Information Systems in Cloud Computing Environments
December 8, 2011 MEMORANDUM FOR CHIEF INFORMATION OFFICERS FROM: SUBJECT: Steven VanRoekel Federal Chief Information Officer Security Authorization of Information Systems in Cloud Computing Environments
STATEMENT OF. Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration
STATEMENT OF Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration BEFORE THE HOUSE COMMITTEE ON HOMELAND SECURITY SUBCOMMITTEE
Risk Management Framework (RMF): The Future of DoD Cyber Security is Here
Risk Management Framework (RMF): The Future of DoD Cyber Security is Here Authors: Rebecca Onuskanich William Peterson 3300 N Fairfax Drive, Suite 308 Arlington, VA 22201 Phone: 571-481-9300 Fax: 202-315-3003
ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS
ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS Shirley Radack, Editor Computer Security Division Information
Seeing Though the Clouds
Seeing Though the Clouds A PM Primer on Cloud Computing and Security NIH Project Management Community Meeting Mark L Silverman Are You Smarter Than a 5 Year Old? 1 Cloud First Policy Cloud First When evaluating
Cloud Services The Path Forward. Mr. Stan Kaczmarczyk Acting Director - Strategic Solutions and Security Services FAS/ ITS, GSA
Cloud Services The Path Forward Mr. Stan Kaczmarczyk Acting Director - Strategic Solutions and Security Services FAS/ ITS, GSA November 1, 2012 Agenda Integrated Technology Services (ITS) Cloud Acquisition
Security Control Standard
Department of the Interior Security Control Standard Program Management April 2011 Version: 1.1 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior, Chief Information
Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services
Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services organization providing innovative management and technology-based
Cloud Security Benchmark: Top 10 Cloud Service Providers Appendix A E January 5, 2015
Cloud Security Benchmark: Top 10 Cloud Service Providers Appendix A E January 5, 2015 2015 CloudeAssurance Page 1 Table of Contents Copyright and Disclaimer... 3 Appendix A: Introduction... 4 Appendix
Optimizing the Data Center for Today s Federal Government
WHITE PAPER: OPTIMIZING THE DATA CENTER FOR TODAY S FEDERAL......... GOVERNMENT............................... Optimizing the Data Center for Today s Federal Government Who should read this paper CIOs,
IT-CNP, Inc. Capability Statement
Securing America s Infrastructure Security Compliant IT Operations Hosting Cyber Security Information FISMA Cloud Management Hosting Security Compliant IT Logistics Hosting 1 IT-CNP, Inc. is a Government
GUIDANCE FOR MANAGING THIRD-PARTY RISK
GUIDANCE FOR MANAGING THIRD-PARTY RISK Introduction An institution s board of directors and senior management are ultimately responsible for managing activities conducted through third-party relationships,
The Information Assurance Process: Charting a Path Towards Compliance
The Information Assurance Process: Charting a Path Towards Compliance A white paper on a collaborative approach to the process and activities necessary to attain compliance with information assurance standards.
DISA releases updated DoD Cloud Requirements What are the impacts? James Leach January 2015
DISA releases updated DoD Cloud Requirements What are the impacts? James Leach January 2015 New leadership breeds new policies and different approaches to a more rapid adoption of cloud services for the
Cloud Computing Best Practices. Creating Effective Cloud Computing Contracts for the Federal Government: Best Practices for Acquiring IT as a Service
Cloud Computing Best Practices Cloud Computing Best Practices Creating Effective Cloud Computing Contracts for the Federal Government: Best Practices for Acquiring IT as a Service Overview Cloud Computing
Securing the Microsoft Cloud
Securing the Microsoft Cloud Page 1 Securing the Microsoft Cloud Microsoft recognizes that trust is necessary for organizations and customers to fully embrace and benefit from cloud services. We are committed
Cloud Security. A Sales Guy Talks About DoD s Cautious Journey to the Public Cloud. Sean Curry Sales Executive, Aquilent
Cloud Security A Sales Guy Talks About DoD s Cautious Journey to the Public Cloud Sean Curry Sales Executive, Aquilent The first in a series of audits DoD did not fully execute elements of the July 2012
CLOUD COMPUTING. Agencies Need to Incorporate Key Practices to Ensure Effective Performance
United States Government Accountability Office Report to Congressional Requesters April 2016 CLOUD COMPUTING Agencies Need to Incorporate Key Practices to Ensure Effective Performance GAO-16-325 April
WHITE PAPER: STRATEGIC IMPACT PILLARS FOR EFFICIENT MIGRATION TO CLOUD COMPUTING IN GOVERNMENT
WHITE PAPER: STRATEGIC IMPACT PILLARS FOR EFFICIENT MIGRATION TO CLOUD COMPUTING IN GOVERNMENT IntelliDyne, LLC MARCH 2012 STRATEGIC IMPACT PILLARS FOR EFFICIENT MIGRATION TO CLOUD COMPUTING IN GOVERNMENT
GOVERNMENT USE OF MOBILE TECHNOLOGY
GOVERNMENT USE OF MOBILE TECHNOLOGY Barriers, Opportunities, and Gap Analysis DECEMBER 2012 Product of the Digital Services Advisory Group and Federal Chief Information Officers Council Contents Introduction...
DHS IT Successes. Rationalizing Our IT Infrastructure
TESTIMONY OF Richard A. Spires Chief Information Officer U.S. Department of Homeland Security Before the House Committee on Oversight and Government Reform February 27, 2013 Chairman Issa, Ranking Member
The Council of the Inspectors General on Integrity and Efficiency s Cloud Computing Initiative
The Council of the Inspectors General on Integrity and Efficiency s Cloud Computing Initiative September 2014 Council of the Inspectors General on Integrity and Efficiency Cloud Computing Initiative Executive
GAO INFORMATION TECHNOLOGY REFORM. Progress Made but Future Cloud Computing Efforts Should be Better Planned
GAO July 2012 United States Government Accountability Office Report to the Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security, Committee
Information Security Management System for Microsoft s Cloud Infrastructure
Information Security Management System for Microsoft s Cloud Infrastructure Online Services Security and Compliance Executive summary Contents Executive summary 1 Information Security Management System
Can CA Information Governance help us protect and manage our information throughout its life cycle and reduce our risk exposure?
SOLUTION BRIEF: CA INFORMATION GOVERNANCE Can CA Information Governance help us protect and manage our information throughout its life cycle and reduce our risk exposure? CA Information Governance delivers
Report via OMB s Integrated Data Collection (IDC), https://community.max.gov/x/lhtgjw 10
EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C. 20503 June 2, 2016 M-16-12 MEMORANDUM FOR THE HEADS OF DEPARTMENTS AND AGENCIES FROM: Anne E. Rung United States Chief
Auditor General s Office. Governance and Management of City Computer Software Needs Improvement
Auditor General s Office Governance and Management of City Computer Software Needs Improvement Transmittal Report Audit Report Management s Response Jeffrey Griffiths, C.A., C.F.E Auditor General, City
Security Control Standard
Department of the Interior Security Control Standard Security Assessment and Authorization January 2012 Version: 1.2 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior,
Cloud Computing; the GOOD, the BAD and the BEAUTIFUL
Cloud Computing; the GOOD, the BAD and the BEAUTIFUL The quest for increased cost savings and reduced capital expenditures with comprehensive cloud solutions Executive summary Asking the hard dollar questions.
Identity and Access Management Initiatives in the United States Government
Identity and Access Management Initiatives in the United States Government Executive Office of the President November 2008 Importance of Identity Management within the Federal Government "Trusted Identity"
AUDIT REPORT. The Department of Energy's Management of Cloud Computing Activities
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT The Department of Energy's Management of Cloud Computing Activities DOE/IG-0918 September 2014 Department
Open Certification Framework. Vision Statement
Open Certification Framework Vision Statement Jim Reavis and Daniele Catteddu August 2012 BACKGROUND The Cloud Security Alliance has identified gaps within the IT ecosystem that are inhibiting market adoption
Information Security Guide For Government Executives. Pauline Bowen Elizabeth Chew Joan Hash
Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash Introduction Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need
DEPARTMENT AGENCY STATEMENT OF OBJECTIVES FOR CLOUD MIGRATION SERVICES: INVENTORY, APPLICATION MAPPING, AND MIGRATION PLANNING MONTH YYYY TEMPLATE
DEPARTMENT AGENCY STATEMENT OF OBJECTIVES FOR CLOUD MIGRATION SERVICES: INVENTORY, APPLICATION MAPPING, AND MIGRATION PLANNING MONTH YYYY TEMPLATE 1 Introduction and Instructions This sample Statement
Microsoft s Compliance Framework for Online Services
Microsoft s Compliance Framework for Online Services Online Services Security and Compliance Executive summary Contents Executive summary 1 The changing landscape for online services compliance 4 How Microsoft
Securing the Microsoft Cloud
Securing the Microsoft Cloud Securing the Microsoft Cloud Page 1 Securing the Microsoft Cloud Microsoft recognizes that trust is necessary for organizations and consumers to fully embrace and benefit from
Security Control Standard
Department of the Interior Security Control Standard Risk Assessment January 2012 Version: 1.2 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior, Chief Information
GOVERNANCE AND MANAGEMENT OF CITY COMPUTER SOFTWARE NEEDS IMPROVEMENT. January 7, 2011
APPENDIX 1 GOVERNANCE AND MANAGEMENT OF CITY COMPUTER SOFTWARE NEEDS IMPROVEMENT January 7, 2011 Auditor General s Office Jeffrey Griffiths, C.A., C.F.E. Auditor General City of Toronto TABLE OF CONTENTS
STATEMENT OF. Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration
STATEMENT OF Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration BEFORE THE HOUSE COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM
TOOLS and BEST PRACTICES
TOOLS and BEST PRACTICES Daniele Catteddu Managing Director EMEA, Cloud Security Alliance ABOUT THE CLOUD SECURITY ALLIANCE To promote the use of best practices for providing security assurance within
Building the Business Case for Cloud: Real Ways Private Cloud Can Benefit Your Organization
: Real Ways Private Cloud Can Benefit Your Organization In This Paper Leveraging cloud technology can help drive down costs while enabling service-oriented IT. Private and hybrid cloud approaches improve
_experience the commitment TM. Seek service, not just servers
The complete cloud Creating and preserving cloud savings, security and service quality transition planning and service management ABOUT THIS PAPER Creating and preserving cloud infrastructure savings,
Managing Cloud Computing Risk
Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. [email protected] Learning Objectives Understand how to identify
CLOUD COMPUTING. Additional Opportunities and Savings Need to Be Pursued
United States Government Accountability Office Report to Congressional Requesters September 2014 CLOUD COMPUTING Additional Opportunities and Savings Need to Be Pursued GAO-14-753 September 2014 CLOUD
Enterprise Security Tactical Plan
Enterprise Security Tactical Plan Fiscal Years 2011 2012 (July 1, 2010 to June 30, 2012) Prepared By: State Chief Information Security Officer The Information Security Council State of Minnesota Enterprise
Executive Checklist to Transitioning Processes
Digital Innovation Series Executive Checklist to Transitioning Processes Building a Flexible Model The Digital Innovation Series traces the trends that are driving the digital-innovation imperative that
Status of Cloud Computing Environments within OPM (Report No. 4A-CI-00-14-028)
MEMORANDUM FOR KATHERINE ARCHULETA Director FROM: SUBJECT: PATRICK E. McFARLAND Inspector General Status of Cloud Computing Environments within OPM (Report No. 4A-CI-00-14-028) The purpose of this memorandum
Security Authorization Process Guide
Security Authorization Process Guide Office of the Chief Information Security Officer (CISO) Version 11.1 March 16, 2015 TABLE OF CONTENTS Introduction... 1 1.1 Background... 1 1.2 Purpose... 2 1.3 Scope...
fs viewpoint www.pwc.com/fsi
fs viewpoint www.pwc.com/fsi June 2013 02 11 16 21 24 Point of view Competitive intelligence A framework for response How PwC can help Appendix It takes two to tango: Managing technology risk is now a
MEMORANDUM FOR THE HEADS OF DEPARTMENTS AND AGENCIES
M-XX-XX MEMORANDUM FOR THE HEADS OF DEPARTMENTS AND AGENCIES FROM: Anne E. Rung, United States Chief Acquisition Officer Tony Scott, United States Chief Information Officer SUBJECT: Category Management
Optimizing the Data Center for Today s State & Local Government
WHITE PAPER: OPTIMIZING THE DATA CENTER FOR TODAY S STATE...... &.. LOCAL...... GOVERNMENT.......................... Optimizing the Data Center for Today s State & Local Government Who should read this
MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL
MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL The auditor general shall conduct post audits of financial transactions and accounts of the state and of all
Management of Cloud Computing Contracts and Environment
Management of Cloud Computing Contracts and Environment Audit Report Report Number IT-AR-14-009 September 4, 2014 Cloud computing contracts did not comply with Postal Service standards. Background The
Business resilience: The best defense is a good offense
IBM Business Continuity and Resiliency Services January 2009 Business resilience: The best defense is a good offense Develop a best practices strategy using a tiered approach Page 2 Contents 2 Introduction
The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
U.S. DEPARTMENT OF THE INTERIOR OFFICE OF INSPECTOR GENERAL Verification of Previous Office of Inspector General Recommendations September 2009
U.S. DEPARTMENT OF THE INTERIOR OFFICE OF INSPECTOR GENERAL Verification of Previous Office of Inspector General Recommendations September 2009 ISD-EV-MOA-0002-2009 Contents Acronyms and Other Reference
VENDOR MANAGEMENT. General Overview
VENDOR MANAGEMENT General Overview With many organizations outsourcing services to other third-party entities, the issue of vendor management has become a noted topic in today s business world. Vendor
Data Center Solutions
Data Center Solutions New Data Center Challenges Require New Solutions Data Center Architecture. Inside and Out. Data centers are mission-critical facilities. A silo-based approach to designing, deploying
Cybersecurity Enhancement Account. FY 2017 President s Budget
Cybersecurity Enhancement Account FY 2017 President s Budget February 9, 2016 Table of Contents Section 1 Purpose... 3 1A Mission Statement... 3 1.1 Appropriations Detail Table... 3 1B Vision, Priorities
DEPARTMENT OF VETERANS AFFAIRS VA DIRECTIVE 6517 CLOUD COMPUTING SERVICES
DEPARTMENT OF VETERANS AFFAIRS VA DIRECTIVE 6517 Washington, DC 20420 Transmittal Sheet February 28, 2012 CLOUD COMPUTING SERVICES 1. REASON FOR ISSUE: This Directive establishes the Department of Veterans
Agency for State Technology
Agency for State Technology 2015-2018 Statewide Information Technology Security Plan The Way Forward Rick Scott, Governor Jason M. Allison, State CIO Table of Contents From the Desk of the State Chief
PCI Compliance and the Cloud: What You Can and What You Can t Outsource Presented By:
PCI Compliance and the Cloud: What You Can and What You Can t Outsource Presented By: Peter Spier Managing Director PCI and Risk Assurance Fortrex Technologies Agenda Instructor Biography Background On
Information Systems Security Line of Business (ISS LoB)
Information Systems Security Line of Business (ISS LoB) Information Security and Privacy Advisory Board George Washington University Washington, DC March 22, 2007 Agenda Background Status Next Steps Background
Allison Stanton, Director of E-Discovery U.S. Department of Justice, Civil Division. U.S. Department of Agriculture
Allison Stanton, Director of E-Discovery U.S. Department of Justice, Civil Division Benjamin Young, Assistant General Counsel U.S. Department of Agriculture 1 Disclaimer The views expressed in this presentation
Federal Risk and Authorization Management Program (FedRAMP)
Federal Risk and Authorization Management Program (FedRAMP) NIST June 5, 2013 Matt Goodrich, JD FedRAMP, Program Manager Federal Cloud Computing Initiative OCSIT GSA What is FedRAMP? FedRAMP is a government-wide
5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE
5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE 5 FAH-11 H-510 GENERAL (Office of Origin: IRM/IA) 5 FAH-11 H-511 INTRODUCTION 5 FAH-11 H-511.1 Purpose a. This subchapter implements the policy
CYBER SECURITY GUIDANCE
CYBER SECURITY GUIDANCE With the pervasiveness of information technology (IT) and cyber networks systems in nearly every aspect of society, effectively securing the Nation s critical infrastructure requires
State of Montana Strategic Plan for Information Technology 2014
State of Montana Strategic Plan for Information Technology 2014 This document is prepared under the authority of the Montana Information Technology Act of 2001. It is published biennially unless special
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
STATEMENT OF. Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration
STATEMENT OF Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration BEFORE THE HOUSE SCIENCE, SPACE AND TECHNOLOGY COMMITTEE SUBCOMMITTEE
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
Information Technology Security Training Requirements APPENDIX A. Appendix A Learning Continuum A-1
APPENDIX A Appendix A Learning Continuum A-1 Appendix A Learning Continuum A-2 APPENDIX A LEARNING CONTINUUM E D U C A T I O N Information Technology Security Specialists and Professionals Education and
Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts.
Tufts University Department of Computer Science COMP 116 Introduction to Computer Security Fall 2014 Final Project Investigating Security Issues in Cloud Computing Guocui Gao [email protected] Mentor:
HP Cloud Services Enablement portfolio for communications service providers: Compute Services. Solution brief
SCALEnow. HP Cloud Services Enablement portfolio for communications service providers: Compute Services Solution brief HP Cloud Services Enablement (HP CSE) for infrastructure as a service (IaaS) enables
From Information Management to Information Governance: The New Paradigm
From Information Management to Information Governance: The New Paradigm By: Laurie Fischer Overview The explosive growth of information presents management challenges to every organization today. Retaining
Total Protection for Compliance: Unified IT Policy Auditing
Total Protection for Compliance: Unified IT Policy Auditing McAfee Total Protection for Compliance Regulations and standards are growing in number, and IT audits are increasing in complexity and cost.
SOLUTION BRIEF CA SERVICE MANAGEMENT - SERVICE CATALOG. Can We Manage and Deliver the Services Needed Where, When and How Our Users Need Them?
SOLUTION BRIEF CA SERVICE MANAGEMENT - SERVICE CATALOG Can We Manage and Deliver the Services Needed Where, When and How Our Users Need Them? SOLUTION BRIEF CA DATABASE MANAGEMENT FOR DB2 FOR z/os DRAFT
Strategies for assessing cloud security
IBM Global Technology Services Thought Leadership White Paper November 2010 Strategies for assessing cloud security 2 Securing the cloud: from strategy development to ongoing assessment Executive summary
Cloud Computing Contract Clauses
Cloud Computing Contract Clauses Management Advisory Report Report Number SM-MA-14-005-DR April 30, 2014 Highlights The 13 cloud computing contracts did not address information accessibility and data security
Smart Data Center Solutions
Smart Data Center Solutions New Data Center Challenges Require New Solutions Data Center Architecture. Inside and Out. Data centers are mission-critical facilities. A silo-based approach to designing,
Information Technology Strategic Plan 2013 9/23/2013
Information Technology Strategic Plan 2013 9/23/2013 Unit Mission Statement: Information Technology Shared Services is dedicated to providing unparalleled service and support to the UC Davis College of
GAO INFORMATION SECURITY. Federal Guidance Needed to Address Control Issues with Implementing Cloud Computing. Report to Congressional Requesters
GAO United States Government Accountability Office Report to Congressional Requesters May 2010 INFORMATION SECURITY Federal Guidance Needed to Address Control Issues with Implementing Cloud Computing GAO-10-513
Get Confidence in Mission Security with IV&V Information Assurance
Get Confidence in Mission Security with IV&V Information Assurance September 10, 2014 Threat Landscape Regulatory Framework Life-cycles IV&V Rigor and Independence Threat Landscape Continuously evolving
Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs
IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government
