Security Checklist

1. Show that system security is an integral part of the agency's IT architecture.

2. Report the costs of security and show how the security plan is part of the life-cycle of the system. Develop a security plan that includes the security rules for the system and the consequences of violating the rules and a way to identify, limit and control connections to other systems.

3. Identify security risks and how risks will be assessed and minimized. Demonstrate how security controls are commensurate with the risk.

4. Use appropriate security for systems that permit public access. Ensure personal information is consistent with relevant federal policies.

5. Account for departures from National Institute for Standards and Technology guidance.

Featured

  • Defense

    DOD wants prime contractors to be 'help desk' for new cybersecurity model

    The Defense Department is pushing forward with its unified cybersecurity standard for contractors and wants large companies and industry associations to show startups and smaller firms the way.

  • FCW Perspectives
    tech process (pkproject/Shutterstock.com)

    Understanding the obstacles to automation

    As RPA moves from buzzword to practical applications, agency leaders say it’s forcing broader discussions about business operations

Stay Connected

FCW INSIDER

Sign up for our newsletter.

I agree to this site's Privacy Policy.