Feds face mandatory security controls

Federal officials will soon be required to become experts in triage as they try to make their agencies comply with the Federal Information Security Management Act.

"We don't have unlimited funds to throw at this security problem," said Ron Ross, project leader for the FISMA Implementation Project at the National Institute of Standards and Technology. To be successful, he said, agencies should concentrate resources on protecting systems whose loss would cause serious or catastrophic consequences.

Beginning in January 2006, agencies must set up 17 minimum security controls on all major applications and general support systems, Ross said, speaking earlier this month at an information security training workshop in Washington,D.C., sponsored by the nonprofit Potomac Forum.

"It's not going to be easy to put in all these controls and get them working," Ross said. But making the effort is too important to ignore. "We're trying to establish a federal level of due diligence for all these systems," he added.

Security controls are measures to protect the confidentiality, integrity and availability of information. The more important an application or system is to an agency's mission, the stronger the controls must be, Ross said.

The security controls are described in NIST's "Special Publication 800-53: Recommended Security Controls for Federal Information Systems."

An example of a security control would be the use of a scanning tool to detect exploitable vulnerabilities in a system.

Ultimately, a senior official must take responsibility for whatever security vulnerabilities remain in an agency's systems after all reasonable protections have been applied.

Most systems are too complex to be completely secure, Ross said. Most security analysts like NIST's risk-management approach for creating the standard.

"This is going to be a very important standard because it hits all of the critical elements necessary to create an effective security program," said Paul Proctor, Gartner's vice president of the risk and privacy practice.

"The thing that comes closest to it is a British standard — BS 17799-2," Proctor said. But he said he likes the NIST standard better. "Put it down to personal preference," he added.

The Fed 100

Save the date for 28th annual Federal 100 Awards Gala.

Featured

  • Social network, census

    5 predictions for federal IT in 2017

    As the Trump team takes control, here's what the tech community can expect.

  • Rep. Gerald Connolly

    Connolly warns on workforce changes

    The ranking member of the House Oversight Committee's Government Operations panel warns that Congress will look to legislate changes to the federal workforce.

  • President Donald J. Trump delivers his inaugural address

    How will Trump lead on tech?

    The businessman turned reality star turned U.S. president clearly has mastered Twitter, but what will his administration mean for broader technology issues?

  • Login.gov moving ahead

    The bid to establish a single login for accessing government services is moving again on the last full day of the Obama presidency.

  • Shutterstock image (by Jirsak): customer care, relationship management, and leadership concept.

    Obama wraps up security clearance reforms

    In a last-minute executive order, President Obama institutes structural reforms to the security clearance process designed to create a more unified system across government agencies.

  • Shutterstock image: breached lock.

    What cyber can learn from counterterrorism

    The U.S. has to look at its experience in developing post-9/11 counterterrorism policies to inform efforts to formalize cybersecurity policies, says a senior official.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group