FISMA Insecurity Part 1
"Why are agencies forced to pay twice to C&A systems?" said the exasperated and cash-strapped Federal IT exec. "If agency A wants to use a system from agency B - a system that has already been C&A'd - then agency A needs to pay for a completely new C&A. If we're spending more than 20 percent of our cyber security budget on C&A - and the average C&A costs $167,643 - shouldn't we look for efficiencies?" An observation over lunch was quickly validated by other Feds - IT execs battling with the double-headed budget and security dragon. Curious stuff. The FISMA C&A reciprocity riddle set me on a fool's errand to put a dollar figure on the cost of C&A redundancy. That said, it opened a new window on OMB's lack of transparency - quite astonishing in this era of open government. Take a look at OMB's 2009 report to Congress on FISMA implementation - and you should. Here's the run down:
- "Economic prosperity of our nation, blah, CyberScope, blah, training, blah"
- Some nice charts and graphs
- Alarming stats that make the case for cyber security automation. The report states that there are 60,000 cyber security Feds at an average cost of $159,000 per annum - confusing as OPM says that there are 70,000 IT pros in the Federal government; wonder what the other 10,000 do? Back to cyber security - so Uncle Sam's spending $10 billion+ each year on cyber folks. The report tells us that the agency cyber FTE budget is more than 150 percent of the total cyber security budget. Oh, and on top of that, agencies hired more than 30,000 cyber security contractors in 2009... pause to scratch head
- Do Feds have too many people in cyber security - and could automation serve us better?
- Why is OMB talking transparency but hiding actionable information on cyber security performance and RoI?
- What's the cost of C&A redundancy and why is it necessary?
Related Blog Posts
Cybersecurity, Federal Government, State & Local Government August 15, 2022
This is the second post in the Threat-Based Methodology series. The first post introduced Threat-Based Methodology and the analysis conducted by the FedRAMP PMO and NIST. That post concluded with a list of the top seven controls based on their Protection Value. This post will explore CM-6 in greater depth and explain how Devo supports the ability to meet this control.
Cybersecurity, Education, Federal Government, State & Local Government August 9, 2022
This three-part blog series will explore threat-based methodology and how it benefits every company with a network. The series leverages the analysis presented by the Federal Risk and Authorization Management Program (FedRAMP) Program Management Office (PMO) in conjunction with the National Institute of Standards and Technology (NIST).
Cybersecurity, Federal Government, IT Infrastructure, Market Intelligence June 29, 2022
The heightened threat of retaliatory cyberattacks by Russia against critical U.S. IT infrastructure is prompting federal investments in cybersecurity to strengthen its cyber defense posture. The ongoing conflict in the region and the increased targeting of critical infrastructure assets will cause federal agencies to look for ways to strengthen their cybersecurity posture and redefine requirements that address cyber breaches that may occur during the coming months and years as well as drive investments into Zero Trust related tools and threat intelligence.
Cloud Computing, Cybersecurity, Federal Government, IT Perspective June 21, 2022
Over the last few years, the federal government has begun to embrace a zero trust approach as the new cybersecurity standard for agencies. Utilizing the latest solutions and best practices, the hope is to bolster federal cybersecurity and create a robust and resilient IT infrastructure that can protect and secure networks from attacks and breaches.
Cloud Computing, Cybersecurity, IT Perspective, Technology June 20, 2022
Last January, the Office of Management and Budget (OMB) released M-22-09, a memorandum that set forth the federal government strategy on zero trust adoption, in an effort to reinforce the security and protection of government agencies’ critical systems, networks, and IT infrastructures.
Application Lifecycle, Cloud Computing, Cybersecurity, DevSecOps, Market Intelligence June 17, 2022
"We are making progress. This really is not just about technology. This is about changing our processes changing our approach to delivering and operating technology to IT systems and our cyber mechanical warfare systems as we move forward," said Robert Vietmeyer, DoD Director for Cloud and Software Modernization.
Application Lifecycle, Big Data & Analytics, Cloud Computing, Cybersecurity, DevSecOps, IT Infrastructure May 13, 2022
For the second year in a row, Gartner named IBM a Leader in Gartner Magic Quadrant for 2021 Cloud Database Management Systems based on its Ability to Execute and Completeness of Vision. With emergence of a single cloud DBMS market, We believe our portfolio of feature-rich, enterprise-tested offerings, bold acquisitions, and partnerships enable our clients to address the unique needs of their business, respond to the growing volume, velocity and variety of today’s data and drive more accurate data driven decisions.
Application Lifecycle, Big Data & Analytics, Cloud Computing, Cybersecurity, DevSecOps, IT Infrastructure May 13, 2022
This week's roundup of the latest news and insights gathered from IBM's Government Research Institute thought leaders:
Michael J. Keegan
Cloud, Cloud Computing, Cybersecurity, Federal Government, Technology May 11, 2022
As organizations adapt to hybrid work and more and more cloud services are deployed, new service entities that collaborate and exchange data without human interaction, such as virtual machines and containers, are proliferating. The growth of these service accounts and identities and their increasing volumes of permissions, privileges, and entitlements expose organizations to new attack vectors.
Cybersecurity May 2, 2022
Threat Intelligence Report Shows Massive Uptick in DDoS Attacks NETSCOUT recently released its semi-annual Threat Intelligence Report with deep insights into the notably distributed denial-of-service (DDoS) and cyber activity during the second half of 2021. The report contains troves of valuable information about the ongoing threat posed to organizations across the public and private sectors, including government agencies and other public sector organizations.
Cloud Computing, Cybersecurity, Federal Government April 22, 2022
The Department of Defense (DoD) is taking major steps to boost cloud performance, with the promise of a tangible, positive impact on military missions throughout the world. Specifically, the Joint Warfighter Cloud Capability (JWCC) contract is replacing the Joint Enterprise Defense Infrastructure (JEDI) initiative, which was intended to establish enterprise-class cloud capabilities for the military community.
Application Lifecycle, Cybersecurity, DevSecOps, Federal Government, IT Perspective, Technology April 22, 2022
On the Tech Transforms podcast, sponsored by Dynatrace, we have talked to some of the most prominent influencers shaping critical government technology decisions. From supply chain to machine learning, this podcast explores the way technology advancement intersects with human needs. In March 2022, we sat down with these government technology visionaries:
Cybersecurity, Federal Government, State & Local Government, Tips and How-Tos April 22, 2022
The Ukraine-Russia conflict began when the Russian military invaded Ukraine on February 24. Yet the cybersecurity and cyber warfare elements of this conflict began before initial combat action. Ukraine was hit with numerous cyberattacks against its government and banking systems in the lead-up to the conflict, with experts blaming Russia for the cyberattacks. And within the first 48 hours, multiple U.S. agencies noted that cyberattacks from suspected hackers in Russia increased by over 800%.
Cloud Computing, Cybersecurity, DevSecOps, Market Intelligence April 4, 2022
"Zero Trust is a cybersecurity strategy and framework that embeds IT security mechanisms throughout an architecture that generate metadata used to secure, manage, and monitor every device user, application, and network transaction at the perimeter and within every network enclave." From the Department of Defense (DoD) Zero Trust Reference Architecture v1.0
Cloud Computing, Cybersecurity, Federal Government March 23, 2022
There has been an increased focus among U.S. government agencies on adapting to modern IT environments and enhancing cybersecurity solutions. This increased focus on security government networks, data, and critical infrastructure is a result of ongoing digital transformation initiatives that are resulting in more mission-critical connected systems and more data for agencies to secure. It’s also a result of the increased number of cyberattacks and more sophisticated cyber-criminals that are targeting our nation’s networks.
Cloud Computing, Cybersecurity, Market Intelligence, State & Local Government March 23, 2022
If you have been looking for the right time to sell your technology product or service to the state, local and education (SLED) market, now is the time to act. With thirty-six states beginning their fiscal year on July 1st, now is the time to position yourself to take advantage of a confluence of once-in-a-lifetime conditions that have left the SLED market booming with opportunity. Here are some of the factors driving that opportunity: New Leadership
Cybersecurity, Federal Government, News March 14, 2022
Federal Pain Points and IT Requirements The latest Federal Information Technology Acquisition Reform Act (FITARA) Scorecard, released in December 2021, highlights how federal agencies are faring across several areas related to IT modernization. The full breakdown from the scorecard is available here. These scorecards are useful to identify where government agencies are struggling and where they are doing well. Consequently, technology vendors and channel partners can use them as a guide for identifying what solutions their customers need.
Analytics & Data Science, Big Data & Analytics, Cloud Computing, Cybersecurity March 7, 2022
The COVID-19 pandemic has spurned greater demand for health information technology (IT) by demonstrating the importance of having robust medical research, health surveillance and healthcare systems capable of rapidly responding to new and developing situations, something which requires strong IT investment in big data, cybersecurity and cloud. In addition, both the pandemic and emerging technologies have led to numerous changes within the healthcare industry, such as telehealth expansion and increased use of wearables, which necessitate robust health IT solutions.
Cybersecurity March 3, 2022
Zero Trust is a concept gaining significant attention across the federal landscape. The idea isn’t new, and yet the notion of "never trust, always verify" is appearing more and more in memos, solicitations and other federal government announcements. For example, the Office of Management and Budget (OMB) released memo M-22-09, "Moving the U.S. Government Toward Zero Trust Cybersecurity Principles," in late January 2022.
Cybersecurity February 28, 2022
In view of current events, the Cybersecurity Infrastructure Security Agency (CISA) has noted the increased likelihood of a cybersecurity breach. Their recommendations, listed below, speak mainly to the basics of cybersecurity: foundational practices and technology that protect every enterprise, in both the public and private sector. Below are the key elements (full details are here Shields Up | CISA):
Cybersecurity February 17, 2022
In a Department of Defense (DoD) Town Hall held on February 10, led by David McKeown, DoD’s Senior Information Security Officer and Deputy CISO, we heard some news about CMMC. Defense contractors holding Controlled Unclassified Information (CUI) will need a third-party assessment to obtain certification.
Cloud Computing, Cybersecurity, Market Intelligence, State & Local Government February 17, 2022
On December 8, 2021, the National Association of State Chief Information Officers (NASCIO) released its 2022 annual top 10 priorities list identifying the most pressing technology and policy issues that state CIOs are prioritizing for the upcoming year.
Cybersecurity, IT Infrastructure, State & Local Government February 2, 2022
Adhering closely to the U.S. federal government’s top legislative priorities for 2022, state chief information officers (CIO’s) have once again ranked cybersecurity as their top priority for 2022, following an already established decade-long trend in this direction.
Business Applications, Cloud Computing, Cybersecurity February 1, 2022
Recent signals by the U.S. federal government suggest that customer experience (CX), primarily citizen-facing services will receive attention and investment from funding sources like the Technology Modernization Fund (TMF). The initial $311 million awarded by the TMF primarily went to projects focused on cybersecurity in keeping with stated priorities and the prevalence of cybersecurity threats. From the beginning, however, TMF has emphasized CX projects that focus on how taxpayers engage with government services in secure digital environments.
Big Data & Analytics, Cybersecurity January 6, 2022
President Joe Biden signed the National Defense Authorization Act (NDAA) for fiscal year 2022 (FY22) into law on December 27, 2021. It authorizes $770 billion in defense spending which is a 5% increase over last year. This marks 61 consecutive years that a bill received bipartisan support from congress (a display of agreement that has become increasingly rare for DC politics).
Big Data & Analytics, Cloud Computing, Cybersecurity November 10, 2021
With another busy year behind us, it’s time to look ahead to fiscal year (FY) 2022. The official information technology (IT) budget request is $97B, a 4% increase over FY21, which would be a new record. Of course, those numbers undercount all the IT spending that goes unreported. Furthermore, remaining provisions in the American Rescue Plan, the Technology Modernization Fund and IT provisions in the Infrastructure Bill will represent additional pockets of opportunity worth billions for channel partners and technology vendors.
Cybersecurity November 2, 2021
There are a variety of excellent reasons to use containers. They're more agile and consume fewer resources than virtual machines. They provide more flexibility and security than running applications directly on the OS. They are easy to orchestrate at massive scale using platforms like Kubernetes.
Cybersecurity November 2, 2021
This time last year, the CrowdStrike Falcon OverWatch™ reported on mounting cyber threats facing organizations as they raced to adopt work-from-home practices and adapt to constraints imposed by the rapidly escalating COVID-19 crisis. Unfortunately, the 12 months that followed have offered little in the way of reprieve for defenders. The past year has been marked by some of the most significant and widespread cyberattacks the world has seen.
Cybersecurity November 2, 2021
Zero Trust is an approach to network security which assumes that just because something is on your network, doesn’t necessarily mean it is trustworthy. Zero Trust allows organizations to apply security controls to network traffic within the perimeter, not just at the edge.
Cybersecurity September 10, 2021
Current IT modernization initiatives are challenging federal agencies to implement significant changes to their infrastructure at a breakneck pace. As they look to keep pace with an increasingly sophisticated cyber threat environment and accommodate workflows shifting to the cloud, the federal government is looking to zero trust as a solution. Zero trust is a security model that maintains secure access to data and applications based on dynamic security policies reacting to access request specifics, as opposed to the network from where access originates.
Cybersecurity August 16, 2021
The Zero Trust (ZT) architecture is a modern concept shaping cybersecurity in the public and private sectors. The growing use of SaaS applications, migration to cloud-based architecture, a rising number of remote employees, and bring-your-own-device (BYOD) have rendered perimeter-based security obsolete. The concept of a network perimeter where those outside of the enterprise's control are malicious and insiders are trustworthy — is no longer a viable approach to cybersecurity.
Cybersecurity August 5, 2021
Are you next? Will criminals target your organization with ransomware? No one can say for sure, so prepare now. Here are four and a half critical decisions to make – and things to do – before a crisis hits. (What’s half a decision, you ask? What’s half an action, you may wonder. Read to end if you want to find out). 1. Do: Have a plan This sounds so obvious, but I have seen major organizations in business and government scrambling to respond to a ransomware attack. Your plan should include at least these elements?
Cybersecurity, DevSecOps July 26, 2021
Article originally posted to the GovDevSecOpsHub here. When in-person processes became impossible during the pandemic, the extent to which public sector services relied on them became apparent. Town halls, municipal offices, schools, and colleges were forced to close their doors to the public, and the need to provide digital alternatives to citizen services so that constituents could continue to access them became clear.
Cybersecurity June 16, 2021
Zero Trust may seem like a daunting security architecture to implement. But Zero Trust is more a change of mindset towards cybersecurity than it is new tools and solutions. Zero Trust is a concept that can help you simplify and strengthen your defenses by adopting “never trust/always verify” principles. The truth is you probably already have many of the tools you need to get started. In addition to using existing security solutions, new tools and technologies can be added incrementally.
Cybersecurity May 24, 2021
The COVID-19 pandemic has forced a rapid, widespread shift to remote work, necessitating a new approach to security. Many public sector agencies are responding by adopting a Zero Trust model. What is Zero Trust? Why is it important? What’s required to implement it? Let’s explore. What Is Zero Trust?
Cybersecurity May 20, 2021
The Colonial Pipeline hack by DarkSide created Malicious code that resulted in the pipelines shut down, FBI officials have confirmed. According to the company, the Colonial pipeline transports about 45% of the fuel consumed on the East coast. U.S. fuel prices at the pump rose six cents per gallon on the week to $2.967 per gallon for regular unleaded gasoline, the American Automobile Association (AAA) said on Monday, while Wall Street shares in U.S. energy firms were up 1.5%. The U.S. issued emergency legislation on Sunday after a ransomware cyber-attack hit the Colonial Pipeline.
Cybersecurity May 18, 2021
President Biden has recently issued the “Executive Order on Improving the Nation’s Cybersecurity”, which requires government agencies to present plans for implementing a Zero Trust architecture, imposes stringent standards for threat sharing on government contractors and agencies alike, requires software vendors to show a Software Bill of Materials to demonstrate the security of their products, and seeks broad modernization of the Federal government’s cybersecurity posture.
Cybersecurity May 14, 2021
The United States’ pipeline infrastructure, which carries oil, natural gas, and other commodities, is made up of nearly 3 million miles of pipelines. This vital enabler of domestic economic and national security is under constant threat of cyber attack due to its increasing reliance on automation through information technology.
Cybersecurity May 11, 2021
Hackers recently attacked computer systems belonging to the Colonial Pipeline company, forcing them to shut down operations and inhibiting delivery of diesel fuel, gasoline, and jet fuel throughout the East Coast of the United States. The company has responded quickly but cautiously and expects to resume normal operation very soon. In the meantime, a declaration of emergency from the White House allows extended operation of other means of petroleum transport.
Cybersecurity April 27, 2021
Original article published by Signal Magazine here. Many federal government agencies are interested in improving their cybersecurity by moving to a zero trust architecture model. But such a move, while very beneficial to the organization, is a complex and involved process that requires some fundamental changes in how security and operations are approached, says Don Maclean, chief cybersecurity technologist for DLT Solutions.
Cybersecurity March 25, 2021
Earlier this year, a downright chilling cyberattack against our nation’s critical infrastructure was exposed and reported in Oldsmar, Florida, a town of fewer than 14,000 people just outside of Tampa. The attack was targeted against a local water treatment facility and – if successful – could have managed to poison the area’s water supply.
Cybersecurity March 25, 2021
According to the 2020 Verizon DBIR, (Data Breach Investigations Report) there were 3,950 confirmed breaches in 2020. The onset of the COVID pandemic resulted in a drastic increase in exploitable vulnerabilities, phishing attempts, ransomware campaigns, and remote compromise attempts.
Cybersecurity March 24, 2021
Crises and disasters are unavoidable; especially, from the perspective of information security professionals, whose adage is to "assume you've already been hacked." It would be naïve to assume that any network was impervious to adversarial campaigns. The difference between a cybersecurity novice and a leader isn't whether they can infallibly prevent incidents; rather, the distinction lies in how they respond to crises, mitigate impacts, remediate compromises, and incorporate lessons into their risk assessment, policies, and response plans.
Cybersecurity March 24, 2021
An organization's personnel can be the strongest or weakest element of any security strategy. In times of national crisis, such as the COVID-19 pandemic, tensions can run high, and conventionally manageable stresses can accumulate and degrade focus, performance, and mental bandwidth.
Cybersecurity January 6, 2021
Cybersecurity attacks have been a part of the national security conversation since the beginning of the technological age. However, with a significant changes in 2020, we have seen more intrusions in the first half of 2020 than throughout all of 2019 (as reported by NETSCOUT). A new wave of highly sophisticated attacks has evolved with fear tactics and the change of work environments from offices to work from home.
Cybersecurity November 30, 2020
Election day has come, and it has gone, with a few states still counting votes, the projected President-elect is Joseph R. Biden, with Vice President-elect Kamala Harris making history as the first African and Asian American women to be elected to higher office. However, just because the election is over does not mean that the task of securing the U.S. elections infrastructure stops; in fact, the work must continue.
Cybersecurity November 3, 2020
With election day upon us, and with millions already mailing in their ballot or taking advantage of early voting, it is safe to say this election will be like no other. However, this record-breaking turnout does not slow down bad actors from Iran and Russia from interfering in the upcoming election. According to a recent announcement from the FBI, both Iran and Russia have obtained US voter information.
Cybersecurity October 29, 2020
If your business sells products or provides services to the Department of Defense (DoD), then you should know about the Cybersecurity Maturity Model Certification (CMMC) program.
Cybersecurity, Federal Government October 29, 2020
With just days remaining until Election Day, election security and mail-in voting have played a significant role in this presidential race. Currently, eighteen states and D.C. have started to ease and expand access to vote by mail due to the pandemic. This expansion allows concerned voters to avoid being exposed to the virus at polling places and still allows citizens to exercise their democratic rights. However, the question on every election official's mind across the country is how the United States post office will handle the expected influx in mail-in ballots?
Cybersecurity September 29, 2020
“The best virtual experience in cybersecurity” is fast approaching. On October 14-15, the Institute for Critical Infrastructure (ICIT) – the only think tank dedicated exclusively to cybersecurity – hosts its 2020 fall virtual briefing. Co-chaired by DLT, this year’s theme is: “A Secure Roadmap for the Future.”