Welcome!

Agile Computing Authors: Carmen Gonzalez, Zakia Bouachraoui, Pat Romanski, Elizabeth White, William Schmarzo

Related Topics: @CloudExpo, Agile Computing, Cloud Security

@CloudExpo: Blog Post

Keys to Success for Continuous Monitoring in Government | @CloudExpo [#Cloud]

Though it’s become a popular concept, continuous monitoring wasn’t always in vogue

Three Keys to Success for Continuous Monitoring in Government

In recent years, the US government has become a leading advocate for continuous monitoring of security threats and vulnerabilities. But how effectively are departments and agencies in implementing these programs? And how do we measure success?

Moving Towards Continuous Monitoring
Though it's become a popular concept, continuous monitoring wasn't always in vogue. When the Federal Information Security Management Act (FISMA) was enacted in 2002, the law required agencies to document security practices, including taking inventory of information systems and writing security plans. External firms would audit the plans and grade departments and agencies based on their efforts.

This approach earned two main critiques. First, though agencies may have had well documented security programs, they weren't necessarily implementing those programs effectively. In fact, during the mid-2000s, security experts showed that agencies could achieve good grades in these audits but still be the victims of significant data breaches. Second, the focus on documentation usually meant that agencies were spending more time writing their policies than implementing the actual security controls.

In recent years, Congress expressed bipartisan, bicameral disapproval of the way that government was approaching cybersecurity. In 2009, Senator Tom Carper of Delaware said, "Too often we have agencies who manage what we call paper compliance rather than really addressing the security of their networks. We want to go beyond paper compliance." Congressmen Darrell Issa and Elijah Cummings echoed this sentiment, stating, "A check-the-box mentality will never be a match for the creativity of a hacker attempting to fly under the radar and access that agency's secrets."

In 2014, after years of oversight and investigation, a new FISMA law was enacted. This law shifts the focus of agencies away from policy-based reporting to reporting of specific threat, incident, and compliance information. The new law also seeks to eliminate inefficient or wasteful reporting requirements that would allow federal agencies to allocate more resources for protection, rather than paperwork.

Last month, the Office of Management and Budget (OMB) issued an annual report to Congress describing agency efforts in implementing FISMA. The report reveals that continuous monitoring systems are being widely adopted throughout the government: 19 agencies now have programs in place. This is a big step in the right direction; however, there are three key areas for improvement.

Keys to Future Success
First, to truly evaluate continuous monitoring programs, the OMB must move towards automated reporting of agency data. For instance, the OMB asked departments about the percentage of email systems with anti-spoofing technologies when sending and receiving messages. Several departments, as shown in the figure below from the OMB's annual report on FISMA, stated that they are implementing anti-spoofing technologies on 100% of inbound and outbound traffic during FY 2014:

Percentage of Email Systems Implementing Anti-Spoofing Technologies

Second, quantifiable metrics are needed to measure the effectiveness of continuous monitoring programs. The OMB reported that on average, 92% of government assets are under continuous monitoring programs. While this is an impressive number, it doesn't tell us much about the effectiveness of continuous monitoring in reducing threats and vulnerabilities to government networks.

For starters, measuring the average amount of time taken to resolve security incidents would provide valuable insight into these programs. In February, the Obama administration listed breach detection and incident response time as one of its five priorities for cybersecurity. Future OMB reports should incorporate these and other "timeliness" metrics in order to truly evaluate the effectiveness of a continuous monitoring program. In order to report these metrics, departments and agencies need to adopt continuous performance monitoring that will allow them to measure and benchmark their effectiveness in key areas.

Last, the current definition of "continuous monitoring" in FISMA is limited to departments and agencies and does not include third parties. As we learned in the cyber attack against Target, third-party vendors can pose significant risk to organizational security. The government's continuous monitoring metrics for FISMA include "automated asset, configuration, and vulnerability management... of the assets connected to the organization." But tens of thousands of third parties hold sensitive data or perform services on behalf of the government. Establishing continuous assessment of critical vendors is an important initiative for the government to get a better handle on its own data risk.

Thanks to tremendous leadership from the executive and legislative branches, FISMA has progressed significantly from a "check-the-box" exercise. While more work is left to fully implement continuous monitoring solutions, the eventual outcome will be a more secure, resilient federal cyber ecosystem.

More Stories By Jacob Olcott

Jacob Olcott is Vice President of Business Development at BitSight Technologies. He previously managed the cybersecurity consulting practice at Good Harbor Security Risk Management. Prior to Good Harbor, he served as legal advisor to the Senate Commerce Committee, and also served as counsel to the House of Representatives Homeland Security Committee.

He completed his education at the University of Texas at Austin and the University of Virginia School of Law.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


IoT & Smart Cities Stories
Every organization is facing their own Digital Transformation as they attempt to stay ahead of the competition, or worse, just keep up. Each new opportunity, whether embracing machine learning, IoT, or a cloud migration, seems to bring new development, deployment, and management models. The results are more diverse and federated computing models than any time in our history.
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
Dion Hinchcliffe is an internationally recognized digital expert, bestselling book author, frequent keynote speaker, analyst, futurist, and transformation expert based in Washington, DC. He is currently Chief Strategy Officer at the industry-leading digital strategy and online community solutions firm, 7Summits.
Digital Transformation is much more than a buzzword. The radical shift to digital mechanisms for almost every process is evident across all industries and verticals. This is often especially true in financial services, where the legacy environment is many times unable to keep up with the rapidly shifting demands of the consumer. The constant pressure to provide complete, omnichannel delivery of customer-facing solutions to meet both regulatory and customer demands is putting enormous pressure on...
IoT is rapidly becoming mainstream as more and more investments are made into the platforms and technology. As this movement continues to expand and gain momentum it creates a massive wall of noise that can be difficult to sift through. Unfortunately, this inevitably makes IoT less approachable for people to get started with and can hamper efforts to integrate this key technology into your own portfolio. There are so many connected products already in place today with many hundreds more on the h...
The standardization of container runtimes and images has sparked the creation of an almost overwhelming number of new open source projects that build on and otherwise work with these specifications. Of course, there's Kubernetes, which orchestrates and manages collections of containers. It was one of the first and best-known examples of projects that make containers truly useful for production use. However, more recently, the container ecosystem has truly exploded. A service mesh like Istio addr...
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Charles Araujo is an industry analyst, internationally recognized authority on the Digital Enterprise and author of The Quantum Age of IT: Why Everything You Know About IT is About to Change. As Principal Analyst with Intellyx, he writes, speaks and advises organizations on how to navigate through this time of disruption. He is also the founder of The Institute for Digital Transformation and a sought after keynote speaker. He has been a regular contributor to both InformationWeek and CIO Insight...
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereal. Andrew's role at ConsenSys Enterprise is a mul...