Cybersecurity

NIST updates monitoring authorization process

The National Institute of Standards and Technology sent out its latest advice for federal agencies moving to continuous cybersecurity monitoring.

In the guidance, NIST's computer security division said the information system security authorization process depends on a robust information system continuous monitoring (ISCM) program.

A Nov. 18, 2013, memo from the Office of Management and Budget provided a framework for federal agencies to use to manage risk and continuously monitor critical IT networks and systems.

In that memo, OMB chose a phased approach and set a 2017 deadline for agencies to deploy ISCM tools that provide dynamic and proactive cybersecurity. OMB's memo specified the use of strategic sourcing to "minimize the costs associated with implementing requirements of the risk management framework."

The OMB memo also included eight steps for instituting ISCM across the government and assigned specific responsibilities to the Department of Homeland Security and NIST, including the establishment of a federal dashboard for ISCM, coordination with the PortfolioStat and CyberStat programs, and ongoing guidance.

NIST's latest guidance said agencies could transition to ongoing authorization after they have implemented an ISCM process and the authorization officer  approves the move. NIST defined ISCM as "maintaining an ongoing awareness of information security, vulnerabilities and threats to support organizational risk management decisions."

The guidance also explains information generation/collection requirements, as well as criteria for ongoing authorization and reauthorization. 

About the Author

Mark Rockwell is a staff writer covering acquisition, procurement and homeland security. Contact him at mrockwell@fcw.com or follow him on Twitter at @MRockwell4.

The 2014 Federal 100

Get to know the 100 women and men honored this year for going above and beyond in federal IT.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above