ODNI tests Justice security control application

The Office of the Director of National Intelligence is testing a Justice Department application that automates many of the tasks of certifying and accrediting information systems, said Dennis Heretick, Justice’s chief information security officer.

The test joins two efforts that aim to help agencies improve their information technology security by revitalizing the certification and accreditation (C&A) process to comply with the Federal Information Security Management Act. The efforts are part of a move toward a unified federal approach to certification and accreditation.

ODNI and the Defense Department are working to converge common security standards for C&A across the national security community, an initiative that Dale Meyerrose, ODNI’s chief information officer, and DOD CIO John Grimes initiated last year, said Sharon Ehlers, ODNI’s lead for the C&A effort. At the same time, Ron Ross, a senior computer scientist at the National Institute of Standards and Technology, has produced a common framework for risk management.

“Once national security agrees on standards later this year, we will work with Ron Ross to converge them as one group of federal standards under NIST,” Ehlers said Oct. 23 at the Federal Information Assurance Conference in College Park, Md. Ehlers said she anticipates the national security standards convergence to be completed by the end of fiscal 2008.

The goal of federal security standards is not only to simplify reporting for FISMA compliance but to encourage information sharing, Heretick said. Justice is a shared service center under the Information Systems Security Line of Business consolidation initiative with 15 departments and agencies planning to migrate to its FISMA services.

ODNI is testing Justice’s control authoring tool that lets agencies conduct risk management and assess security controls electronically instead of checking against a static paper checklist, said Ken Gandola, a Northrop Grumman contractor who provides IT security support. Other agencies use this application, but the intelligence community is only testing it. The control application makes use of data stored in Justice’s Cyber Security Assessment and Management database of security requirements, controls, systems inventory and security categories.

About the Author

Mary Mosquera is a reporter for Federal Computer Week.

Featured

  • Contracting
    8 prototypes of the border walls as tweeted by CBP San Diego

    DHS contractors face protests – on the streets

    Tech companies are facing protests internally from workers and externally from activists about doing for government amid controversial policies like "zero tolerance" for illegal immigration.

  • Workforce
    By Mark Van Scyoc Royalty-free stock photo ID: 285175268

    At OPM, Weichert pushes direct hire, pay agent changes

    Margaret Weichert, now acting director of the Office of Personnel Management, is clearing agencies to make direct hires in IT, cyber and other tech fields and is changing pay for specialized occupations.

  • Cloud
    Shutterstock ID ID: 222190471 By wk1003mike

    IBM protests JEDI cloud deal

    As the deadline to submit bids on the Pentagon's $10 billion, 10-year warfighter cloud deal draws near, IBM announced a legal protest.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.