Government entities need to remain at the forefront of IT security in order to protect highly sensitive data against increasingly sophisticated advanced persistent threats. However, key challenges persist in government IT security environments:
- Compliance: The Federal Information Security Management Act (FISMA) and National Institute of Standards and Technology (NIST) provide critical guidance, and recent revisions on security controls and risk assessment acknowledge the evolving threat environment.
- Disparate organizations: Agencies siloed by mission or function can spur “not my issue” attitudes and obscure an overall risk picture.
- Mobility and transparency: Mobile employees, demands for new services, and government focus on transparency in daily operations have inadvertently opened doors for sophisticated advanced persistent threats.
- Reactive approaches: Reactive security architecture that simply monitors and defends isn’t enough. This approach tends to provide volumes of data with little real security insight to enable preemptive action against threats.
Continuous Monitoring with Attack Intelligence
The Core Security Attack Intelligence Platform enables government agencies to meet and exceed many of NIST’s recommendations for Information Security Continuous Monitoring. Core Security customers conduct regular, safe, and controlled assessments across a wide range of threats vectors and gain insight regarding operational security posture. With SCAP (1.0, Rev 2) reporting, agencies can provide proof to auditors, Cyber Scope and others of their adherence to the letter and spirit of NIST guidance.
- NIST SP 800-137: Information Security Continuous Monitoring for Federal Information Systems and Organizations
- NIST SP 800-39: Guide for Applying the Risk Management Framework to Federal Information Systems
- NIST SP 800-53: Recommended Security Controls for Federal Information Systems and Organizations