Security Checklist

1. Show that system security is an integral part of the agency's IT architecture.

2. Report the costs of security and show how the security plan is part of the life-cycle of the system. Develop a security plan that includes the security rules for the system and the consequences of violating the rules and a way to identify, limit and control connections to other systems.

3. Identify security risks and how risks will be assessed and minimized. Demonstrate how security controls are commensurate with the risk.

4. Use appropriate security for systems that permit public access. Ensure personal information is consistent with relevant federal policies.

5. Account for departures from National Institute for Standards and Technology guidance.

Featured

  • Elections
    voting security

    'Unprecedented' challenges to safe, secure 2020 vote

    Our election infrastructure is bending under the stress of multiple crises. Administrators say they are doing all they can to ensure it doesn't break.

  • FCW Perspectives
    zero trust network

    Can government get to zero trust?

    Today's hybrid infrastructures and highly mobile workforces need the protection zero trust security can provide. Too bad there are obstacles at almost every turn.

Stay Connected

FCW INSIDER

Sign up for our newsletter.

I agree to this site's Privacy Policy.