The cybersecurity landscape is undergoing a dramatic shift. With advanced persistent threats, more trained offensive personnel, and rapidly changing information systems, the rate of change for IT and security risk has drastically increased.
As a federal IT pro, how can you solidify your agency’s security within budget? The answer is to follow the updated Federal Information Security Management Act (FISMA), Risk Management Framework (RMF), and Security Technical Implementation Guides (STIGs).
This white paper provides details on each, and goes so far as to provide the six steps necessary to implement RMF.
By downloading this whitepaper, you will learn:
Categorize information systems, including mobile devices, IoT, and shadow IT
Select security controls, including how to set up the security controls structure
Implement security controls, including how and where to find the most commonly used DISA STIGs
Assess security controls, including how often and what to assess
Authorize information systems, including what to put into your remediation plan once authorization has been granted
Monitor security controls, including how to implement today’s best practices for continuous monitoring