<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Help, I need your opinion in Governance, Risk, Compliance</title>
    <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Help-I-need-your-opinion/m-p/43381#M306</link>
    <description>&lt;P&gt;It's definitely something to raise a concern (which many already commented). Not knowing the full detail, I'd just ask you to consider this: How is this different from an external auditor (such as EY or PwC) came in and conduct security assessment of your system? What are your process when handling this kind of scenario/data? (someone already gave great example)&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You said you are willing and offered to spend time with them to&lt;SPAN&gt;&amp;nbsp;review security practices and results of other security assessments done before. But whoever saw that they can take notes, and then upload their notes to the repository. How is it different from you uploading the document to repository yourself?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I believe&amp;nbsp;as CISO you are responsible for identifying and explaining the risk. But if management understand the risk and chose to accept it, you should document it and proceed. You can take further&amp;nbsp;action to minimize the accepted risk. For example, encrypt or restrict access to&amp;nbsp;the document uploaded with document management system. Or Improve security posture after the security assessment. As someone already commented, security assessment&amp;nbsp;is a snapshot of how vulnerable you are at that point in time.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 17 Feb 2021 14:58:53 GMT</pubDate>
    <dc:creator>sergeling</dc:creator>
    <dc:date>2021-02-17T14:58:53Z</dc:date>
    <item>
      <title>Help, I need your opinion</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Help-I-need-your-opinion/m-p/43341#M294</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My name is Paul.&amp;nbsp; This is my first post here.&amp;nbsp; I have come because I am the CISO for a county government and big wigs at the state are pressuring me hard to do something I think is a terrible idea from a security standpoint and right now, I have no one else in my corner.&amp;nbsp; I just wanted to see if other security professionals see the same problems I do, or if I am just overreacting.&amp;nbsp; So here is the scenario... the state is moving towards a new system for the 911 call centers.&amp;nbsp; They have contracted a private company to do security assessments of all of the networks hosting 911 call centers... which I understand.&amp;nbsp; My problem is that the result of this will be the aggregation of the network architecture and vulnerabilities of all of the 911 call centers in the state in the same place.&amp;nbsp; I have offered to spend days with anyone they send reviewing our security practices.&amp;nbsp; I have offered the results of other security assessments we have done as long as they are not uploaded to the repository.&amp;nbsp; But they will not budge and they are now starting to make threats that may end up costing me my job.&amp;nbsp; Before I surrender to protect my job or stick to my guns to do what I believe is the right thing, I would like some alternate viewpoints from other CISSPs out there.&amp;nbsp; Thank you for your time and your thoughts.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Paul&lt;/P&gt;</description>
      <pubDate>Tue, 16 Feb 2021 18:16:50 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Help-I-need-your-opinion/m-p/43341#M294</guid>
      <dc:creator>Picasso</dc:creator>
      <dc:date>2021-02-16T18:16:50Z</dc:date>
    </item>
    <item>
      <title>Re: Help, I need your opinion</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Help-I-need-your-opinion/m-p/43343#M295</link>
      <description>&lt;P&gt;I wouldn't call this an overreaction but rather into the &lt;STRONG&gt;due diligence&lt;/STRONG&gt; category to protect the County. I'd only be comfortable doing this if I could see the &lt;STRONG&gt;risk analysis&lt;/STRONG&gt; or &lt;STRONG&gt;third-party risk assessment&lt;/STRONG&gt; the State conducted on the Private Company. I'm assuming they have to meet certain security standards to be a vendor for the State because in mine they do.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Feb 2021 18:36:41 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Help-I-need-your-opinion/m-p/43343#M295</guid>
      <dc:creator>tmekelburg1</dc:creator>
      <dc:date>2021-02-16T18:36:41Z</dc:date>
    </item>
    <item>
      <title>Re: Help, I need your opinion</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Help-I-need-your-opinion/m-p/43344#M296</link>
      <description>&lt;P&gt;I appreciate your response... and I understand where you are coming from, but to me, the solarwinds hack changed everything.&amp;nbsp; I am not looking at this from the standpoint of how do I check all of the boxes I need to in order to say I did the right thing.&amp;nbsp; I am looking at this from the standpoint that, no matter how big your are, how much to spend on cyber security, or how good your policy is, safety cannot be guaranteed.&amp;nbsp; Now in most cases, I understand risks have to be accepted.&amp;nbsp; But I think this case is unique because of how dangerous the information could be if it fell into the wrong hands.&amp;nbsp; One 911 call center or 10... maybe not so big a deal.&amp;nbsp; But the vulnerabilities all of the 911 call centers for the whole state in one place?&amp;nbsp; I'm not ok with that.&amp;nbsp; &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Feb 2021 18:43:34 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Help-I-need-your-opinion/m-p/43344#M296</guid>
      <dc:creator>Picasso</dc:creator>
      <dc:date>2021-02-16T18:43:34Z</dc:date>
    </item>
    <item>
      <title>Re: Help, I need your opinion</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Help-I-need-your-opinion/m-p/43345#M297</link>
      <description>I appreciate how much you care and your passion to keep data safe!&lt;BR /&gt;&lt;BR /&gt;I only see this working out if you can talk directly with the State CIO/CISO to voice your concerns. I'd also try and find out what their plans are with the data. How long do you need it? How will it be disposed of? Will we be notified of the disposal?&lt;BR /&gt;&lt;BR /&gt;Hopefully others will weigh in shortly.&lt;BR /&gt;&lt;BR /&gt;Edit: Possibly reaching out to other County CISOs and trying to get them to question this strategy as well before just handing over the data.</description>
      <pubDate>Tue, 16 Feb 2021 19:25:54 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Help-I-need-your-opinion/m-p/43345#M297</guid>
      <dc:creator>tmekelburg1</dc:creator>
      <dc:date>2021-02-16T19:25:54Z</dc:date>
    </item>
    <item>
      <title>Re: Help, I need your opinion</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Help-I-need-your-opinion/m-p/43346#M298</link>
      <description>&lt;P&gt;Although I agree that aggregation and dissemination of vulnerability reports creates a risk, I think the more defensible position would be about securing the repository and perhaps implementing different levels of access (e.g. politicians need summaries and remediation costs for "everything", whereas techies need details and remediation steps for "their" systems).&amp;nbsp; &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also think it important to identify who "owns" the asset to figure out who gets access to its vulnerability data.&amp;nbsp; Fundamentally, it is the system "owner" that gets to make the final decision (although with "expert" advise).&amp;nbsp; If the State provides the system and pays its bills, denying them access to an assessment of their asset seems like a losing battle.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, don't forget about the dollars that assessments bring to remediation budgets.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Feb 2021 19:30:05 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Help-I-need-your-opinion/m-p/43346#M298</guid>
      <dc:creator>denbesten</dc:creator>
      <dc:date>2021-02-16T19:30:05Z</dc:date>
    </item>
    <item>
      <title>Re: Help, I need your opinion</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Help-I-need-your-opinion/m-p/43354#M299</link>
      <description>&lt;P&gt;So my thoughts are these:&lt;/P&gt;&lt;P&gt;1) Vulnerability assessments, pen tests, etc. are a snapshot in time. It is how vulnerable you were at that moment.&lt;/P&gt;&lt;P&gt;2) If your bosses want to do this and you have voiced your opinion about it and they still want to continue, then that is their choice and their prerogative. I would document their risk acceptance of storing the results in one place and then move hard on fixing the vulnerabilities. Remember, as the system owners they have the choice to accept any risk. Your job as the CISO is to inform them and then document that they knew the risks and accepted them.&lt;/P&gt;&lt;P&gt;3) If they refuse to sign any risk acceptance documents, then work hard on the remediation. Do not let them just hand this off to IT to remediate. You need to take charge and hold Plans of Actions and Milestone (POA&amp;amp;M) meetings. Assign tasks to people or teams to remediate it and track completion. Hold progress meetings to ensure it is not being forgotten about.&lt;/P&gt;&lt;P&gt;4) If you are worried about your county's data being intermingled with others then do what you can to make sure your county's vulnerabilities get fixed. Remember, those assessments are just a snapshot in time and if you fix the vulnerabilities then they hold no danger for you (or at least a mitigated degree of danger).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You have voiced your opinion and now is the time to move on. As a CISO myself, I would not risk my career over this. I would give them the data and then make sure it was no longer accurate for the vulnerabilities with my systems.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also consider this. If they see the same problem throughout all counties, then they should be able to get more resources to fix it faster and maybe cheaper than if they do one county at a time. You may not be seeing the big picture and they may have more data than you know but they need it all, to come up with an enterprise or statewide solution.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Feb 2021 20:58:07 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Help-I-need-your-opinion/m-p/43354#M299</guid>
      <dc:creator>CISOScott</dc:creator>
      <dc:date>2021-02-16T20:58:07Z</dc:date>
    </item>
    <item>
      <title>Re: Help, I need your opinion</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Help-I-need-your-opinion/m-p/43359#M300</link>
      <description>&amp;gt; Picasso (Viewer) posted a new topic in Governance, Risk, Compliance on&lt;BR /&gt;&lt;BR /&gt;&amp;gt; &amp;nbsp; My problem is that the result of this will be the aggregation of&lt;BR /&gt;&amp;gt; the network architecture and vulnerabilities of all of the 911 call centers in&lt;BR /&gt;&amp;gt; the state in the same place.&lt;BR /&gt;&lt;BR /&gt;Well, on the one hand, you could see it as a single point of failure.&lt;BR /&gt;&lt;BR /&gt;On the other hand, a lot of people like the position of "put all your eggs in one&lt;BR /&gt;basket--and then guard that basket."&lt;BR /&gt;&lt;BR /&gt;======================&lt;BR /&gt;rslade@gmail.com rmslade@outlook.com rslade@computercrime.org&lt;BR /&gt;"If you do buy a computer, don't turn it on." - Richards' 2nd Law&lt;BR /&gt;"Robert Slade's Guide to Computer Viruses" 0-387-94663-2&lt;BR /&gt;"Viruses Revealed" 0-07-213090-3&lt;BR /&gt;"Software Forensics" 0-07-142804-6&lt;BR /&gt;"Dictionary of Information Security" Syngress 1-59749-115-2&lt;BR /&gt;"Cybersecurity Lessons from CoVID-19" CRC Press 978-0-367-68269-9&lt;BR /&gt;============= for back issues:&lt;BR /&gt;[Base URL] site &lt;A href="http://victoria.tc.ca/techrev/" target="_blank"&gt;http://victoria.tc.ca/techrev/&lt;/A&gt;&lt;BR /&gt;CISSP refs: [Base URL]mnbksccd.htm&lt;BR /&gt;PC Security: [Base URL]mnvrrvsc.htm&lt;BR /&gt;Security Dict.: [Base URL]secgloss.htm&lt;BR /&gt;Security Educ.: [Base URL]comseced.htm&lt;BR /&gt;Book reviews: [Base URL]mnbk.htm&lt;BR /&gt;[Base URL]review.htm&lt;BR /&gt;Partial/recent: &lt;A href="http://groups.yahoo.com/group/techbooks/" target="_blank"&gt;http://groups.yahoo.com/group/techbooks/&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://en.wikipedia.org/wiki/Robert_Slade" target="_blank"&gt;http://en.wikipedia.org/wiki/Robert_Slade&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://is.gd/RotlWB" target="_blank"&gt;https://is.gd/RotlWB&lt;/A&gt; &lt;A href="http://twitter.com/rslade" target="_blank"&gt;http://twitter.com/rslade&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://blogs.securiteam.com/index.php/archives/author/p1/" target="_blank"&gt;http://blogs.securiteam.com/index.php/archives/author/p1/&lt;/A&gt;</description>
      <pubDate>Tue, 16 Feb 2021 22:48:37 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Help-I-need-your-opinion/m-p/43359#M300</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2021-02-16T22:48:37Z</dc:date>
    </item>
    <item>
      <title>Re: Help, I need your opinion</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Help-I-need-your-opinion/m-p/43371#M302</link>
      <description>&lt;P&gt;The problem you're describing could be more of a DR /&amp;nbsp; business continuity issue.&amp;nbsp; It may be worth identifying anyone working in that area at a state level and advising of the continuity risk.&amp;nbsp; Ultimately, as &lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1602421967"&gt;@CISOScott&lt;/a&gt;&amp;nbsp;suggested you may be facing a situation in which the decision has already been made and your warnings begin to be perceived as a blocker to change.&amp;nbsp; Allowing that perception to continue would not be a good thing, so you'd need to follow risk management practice and ask for formal acceptance of the risk, rather than allow yourself to get put in the politically inconvenient category.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Feb 2021 10:20:59 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Help-I-need-your-opinion/m-p/43371#M302</guid>
      <dc:creator>Steve-Wilme</dc:creator>
      <dc:date>2021-02-17T10:20:59Z</dc:date>
    </item>
    <item>
      <title>Re: Help, I need your opinion</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Help-I-need-your-opinion/m-p/43373#M303</link>
      <description>&lt;P&gt;I’d just add that if there’s a worry about the data going walkies, it’s generally affecting all the uploaders,aggregation is a concern, and the provider isn’t meeting requirements you might consider specifying some (perhaps obnoxious) DRM as a required compensating control, with MFA to access the data and positive review of access logs as a requirement. Classification as Diana points out can then be somewhat enforced, with different views for different groups.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Feb 2021 10:53:35 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Help-I-need-your-opinion/m-p/43373#M303</guid>
      <dc:creator>Early_Adopter</dc:creator>
      <dc:date>2021-02-17T10:53:35Z</dc:date>
    </item>
    <item>
      <title>Re: Help, I need your opinion</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Help-I-need-your-opinion/m-p/43378#M304</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/797288093"&gt;@Early_Adopter&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;... the provider isn’t meeting requirements you might consider specifying some (perhaps obnoxious) DRM as a required compensating control, with MFA to access the data and positive review of access logs as a requirement. Classification as Diana points out can then be somewhat enforced, with different views for different groups.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/256857123"&gt;@Picasso&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Another aspect: if any of the networks are managed under contract by external providers, the results of the audit are likely intellectual property of the provider, and cannot be maintained by the country gounverment except under specific legal or contractual requirements. And that information control would definitely have to be part of the "get out of jail" test and intrusion agreements between the audit company and the provider, agreements that the county is not a primary participant in.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Craig&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Feb 2021 13:51:51 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Help-I-need-your-opinion/m-p/43378#M304</guid>
      <dc:creator>CraginS</dc:creator>
      <dc:date>2021-02-17T13:51:51Z</dc:date>
    </item>
    <item>
      <title>Re: Help, I need your opinion</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Help-I-need-your-opinion/m-p/43380#M305</link>
      <description>&lt;P&gt;If you view the 3PP as the weak link, ask how they protect client data.&amp;nbsp; Do they easily welcome an audit to assure compliance with their own data protection mechanisms?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And yes, I would ask another CISO in another jurisdiction that uses this particular 3PP vendor, and hear his concerns.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Feb 2021 14:01:47 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Help-I-need-your-opinion/m-p/43380#M305</guid>
      <dc:creator>ericgeater</dc:creator>
      <dc:date>2021-02-17T14:01:47Z</dc:date>
    </item>
    <item>
      <title>Re: Help, I need your opinion</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Help-I-need-your-opinion/m-p/43381#M306</link>
      <description>&lt;P&gt;It's definitely something to raise a concern (which many already commented). Not knowing the full detail, I'd just ask you to consider this: How is this different from an external auditor (such as EY or PwC) came in and conduct security assessment of your system? What are your process when handling this kind of scenario/data? (someone already gave great example)&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You said you are willing and offered to spend time with them to&lt;SPAN&gt;&amp;nbsp;review security practices and results of other security assessments done before. But whoever saw that they can take notes, and then upload their notes to the repository. How is it different from you uploading the document to repository yourself?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I believe&amp;nbsp;as CISO you are responsible for identifying and explaining the risk. But if management understand the risk and chose to accept it, you should document it and proceed. You can take further&amp;nbsp;action to minimize the accepted risk. For example, encrypt or restrict access to&amp;nbsp;the document uploaded with document management system. Or Improve security posture after the security assessment. As someone already commented, security assessment&amp;nbsp;is a snapshot of how vulnerable you are at that point in time.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Feb 2021 14:58:53 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Help-I-need-your-opinion/m-p/43381#M306</guid>
      <dc:creator>sergeling</dc:creator>
      <dc:date>2021-02-17T14:58:53Z</dc:date>
    </item>
    <item>
      <title>Re: Help, I need your opinion</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Help-I-need-your-opinion/m-p/43396#M311</link>
      <description>&lt;P&gt;Bottom line&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/256857123"&gt;@Picasso&lt;/a&gt;&amp;nbsp;people do not change and government procurement is broken. Vulnerability assessments and pen tests are not worth the paper they are printed on because often "their scope" is not what you actually need tested. To succeed you need to bring real quantitative data to the debate.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You will be the first to go even if the risk acceptance is documented and approved by your management chain. Look of the bright side, this is a sign to move on to bigger and better things!&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Feb 2021 02:24:59 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Help-I-need-your-opinion/m-p/43396#M311</guid>
      <dc:creator>AppDefects</dc:creator>
      <dc:date>2021-02-18T02:24:59Z</dc:date>
    </item>
    <item>
      <title>Re: Help, I need your opinion</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Help-I-need-your-opinion/m-p/43728#M337</link>
      <description>&lt;P&gt;Hi Picasso,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can understand the concern to share security information and the hesitation.&amp;nbsp; I agree with some others who have stated there may need to be a secured repository to shared security documentation and very sensitive vulnerability information.&amp;nbsp; &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I go through security reviews of other security packages that are in the federal cloud services program called FedRAMP.&amp;nbsp; Here major cloud companies provide access to their security authorization packages - the security plan documents, implementation statements, vulnerability scans, AND recent assessment by a third party.&amp;nbsp; Sounds similar to what is being asked of you.&amp;nbsp; However, in order for me to review the package, I have to sign an strict NDA, access is controlled by the cloud provider portal or federal portal for my review, access is time limited, and some add document protections may restrict actions or access (document password that expires).&amp;nbsp; Also, the FedRAMP package information is often detailed enough to answer the control requirement but may not include the sensitive details, some do but most scrub it a bit.&amp;nbsp;Some of the FedRAMP systems I have reviewed are considered HIGH level - meaning the system supports classified level information.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I'm reviewing a "shared service" for multiple government agencies, I am usually doing what you suggest - they set up a time/location for me to come review.&amp;nbsp; With the whole Covid situation, this has gone somewhat virtual - in that we use a web meeting and they share their screen and either they let me have control to view the documents while they monitor OR they scroll through the documents as I request (slow process).&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also work with private DoD contracting businesses who are now getting security documents together that will need to be shared/reviewed by third party auditors and government clients. And the approach for most has been similar to FedRAMP approach.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best of luck!&amp;nbsp; Let me know if you have any further questions,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mel&lt;/P&gt;</description>
      <pubDate>Fri, 05 Mar 2021 01:24:29 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Help-I-need-your-opinion/m-p/43728#M337</guid>
      <dc:creator>Mel-CyberC</dc:creator>
      <dc:date>2021-03-05T01:24:29Z</dc:date>
    </item>
    <item>
      <title>Re: Help, I need your opinion</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Help-I-need-your-opinion/m-p/43976#M338</link>
      <description>&lt;P&gt;Looks like maybe a few things going on. From what I can tell, first and foremost is this is a 3rd party assessment or audit. If you ever been through a financial or IG audit regardless of how your policies are or past assessments (which would be be a good reference to identify improvements) they are looking at a snapshot in time for the current state.&amp;nbsp; They might be using some kind of standard (maybe NIST/etc.) but regardless are asking for "proof" because policies, procedures, and configuration (screenshots, scans) in most cases show a control is in place.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. Using an external company was there any kind of Non Disclosure?&lt;/P&gt;&lt;P&gt;2. Is there any kind of Rules of Engagement?&lt;/P&gt;&lt;P&gt;And more importantly....&lt;/P&gt;&lt;P&gt;3. Did you save any emails about needing more funding for manpower, technology, etc.?&lt;/P&gt;&lt;P&gt;Because bottom line is they will always find something but you at least need to justify/CYA for yourself that everything possible was tried to improve the security posture. Also with the ongoing ransomware and knowing state/municipality politics they are probably less concerned with security and more concerned with having someone to blame it on.$00.02&lt;/P&gt;</description>
      <pubDate>Mon, 15 Mar 2021 13:24:21 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Help-I-need-your-opinion/m-p/43976#M338</guid>
      <dc:creator>RRoach</dc:creator>
      <dc:date>2021-03-15T13:24:21Z</dc:date>
    </item>
  </channel>
</rss>

