NIST updates monitoring authorization process
- By Mark Rockwell
- Jun 06, 2014
The National Institute of Standards and Technology sent out its latest advice for federal agencies moving to continuous cybersecurity monitoring.
In the guidance, NIST's computer security division said the information system security authorization process depends on a robust information system continuous monitoring (ISCM) program.
A Nov. 18, 2013, memo from the Office of Management and Budget provided a framework for federal agencies to use to manage risk and continuously monitor critical IT networks and systems.
In that memo, OMB chose a phased approach and set a 2017 deadline for agencies to deploy ISCM tools that provide dynamic and proactive cybersecurity. OMB's memo specified the use of strategic sourcing to "minimize the costs associated with implementing requirements of the risk management framework."
The OMB memo also included eight steps for instituting ISCM across the government and assigned specific responsibilities to the Department of Homeland Security and NIST, including the establishment of a federal dashboard for ISCM, coordination with the PortfolioStat and CyberStat programs, and ongoing guidance.
NIST's latest guidance said agencies could transition to ongoing authorization after they have implemented an ISCM process and the authorization officer approves the move. NIST defined ISCM as "maintaining an ongoing awareness of information security, vulnerabilities and threats to support organizational risk management decisions."
The guidance also explains information generation/collection requirements, as well as criteria for ongoing authorization and reauthorization.
Mark Rockwell is a staff writer covering acquisition, procurement and homeland security. Contact him at firstname.lastname@example.org or follow him on Twitter at @MRockwell4.