Former federal CISO Pat Howard offers tips to waterproof your agency's information security continuous monitoring strategy.
By the time you read this, hopefully, you’re confident in your agency’s information security continuous monitoring (ISCM) strategy required for the Feb. 28 deadline from the Office of Management and Budget.
Or are you? While most agencies by now have considered and documented their CDM approach according to National Institute of Standards and Technology Special Publication 800-137, those strategies actually may not hold water in light of the Nov. 18 memo M-14-03, Enhancing the Security of Federal Information and Information Systems from OMB. These new requirements must be reconciled along with the previous ones from NIST, OMB and the concept of operations in less than a month.
It’s easy to grumble about what appears to be another paper-pushing exercise in light of so many others. But let’s keep in mind, the Department of Homeland Security’s CDM program is about far more than compliance: it swings the pendulum toward near real-time, proactive security, doing away with reliance on static infrequent, paper-bound reporting that can provide false notions of security.
A well-considered strategy that includes an objective self-audit will help set the agency’s transition course for which CDM products and services offered through the CDM blanket purchase agreement make the most sense for closing agency gaps and deficiencies. While any self-assessment can be tricky, an incisive and honest evaluation (self-conducted or through a third party assessor), can define the roadmap and the resources the agency should take advantage of — whether all of DHS’ resources, none, or some hybrid approach to effect the best CDM program.
In light of these latest requirements, the following should be considered in solidifying your ISCM strategy:
Finally, agencies must consider how ISCM pertains to its information and the systems owned or operated by contractors. The strategy must explain how third parties will comply with ISCM requirements. This section must describe the process the agency will use to collect compliance data from external service providers on an ongoing basis and how assessments will be conducted of their operations. FedRAMP provides agencies a mechanism for ensuring contractors and third parties employ ISCM to protect agency data.
The OMB memo recognizes that CDM is complicated with many moving parts, hence, the importance of the ISCM strategy, and the emphasis on this milestone. Rather than merely appeasing a requirement that can withstand Inspector General scrutiny, the strategy should truly function as a CDM roadmap and migration path — one that takes into account the agency’s security maturation and existing capabilities, capitalize on what it has and does well, and close the gaps with DHS’ security resources to effect the best return on investment with least amount of disruption.
Patrick Howard is a senior information security consultant for Kratos/SecureInfo, and is the former chief information security officer at the Nuclear Regulatory Commission and the Department of Housing and Urban Development. He can be reached at Patrick.howard@secureinfo.com.
Copyright © 2024 Federal News Network. All rights reserved. This website is not intended for users located within the European Economic Area.