<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: US Cybersecurity Risk report in Industry News</title>
    <link>https://community.isc2.org/t5/Industry-News/US-Cybersecurity-Risk-report/m-p/11080#M1036</link>
    <description>&lt;P&gt;+RMF tag to conversation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm contracted to DoD for RMF.&amp;nbsp; The project I'm assessing had no security engineered into it during it's whole development process.&amp;nbsp; Now regulations dictate that the system has to be scrutinized for security under RMF.&amp;nbsp; It's not going well.&lt;BR /&gt;&lt;BR /&gt;I understand the need for the RMF process.&amp;nbsp; It is definitely one critical component (domain!) in security. I wonder if systems formerly assessed under DIACAP should be rolled up into RMF as is and have RMF be part of any new system being proposed versus trying to apply a policy and process on a system that is on the backstretch of the race.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Not only was CISSP required but so was (ICS)2 CAP.&amp;nbsp; The CAP cert. should be a must if you are working RMF.&lt;/P&gt;</description>
    <pubDate>Fri, 01 Jun 2018 14:01:45 GMT</pubDate>
    <dc:creator>Flyslinger2</dc:creator>
    <dc:date>2018-06-01T14:01:45Z</dc:date>
    <item>
      <title>US Cybersecurity Risk report</title>
      <link>https://community.isc2.org/t5/Industry-News/US-Cybersecurity-Risk-report/m-p/10955#M1020</link>
      <description>&lt;P&gt;Every incoming US president seems to set up a committee to look into, and make recommendations for, computer/information/cyber- security.&lt;BR /&gt;&lt;BR /&gt;In due course these committees issue their reports.&amp;nbsp; A standard feature has been the recommendation that there be more exchange of information.&amp;nbsp; Business usually welcomes this until they realize that "exchange of information" means business tells the government everything, and government tells the rest of the world nothing.&lt;BR /&gt;&lt;BR /&gt;Since &lt;A href="https://www.whitehouse.gov/wp-content/uploads/2018/05/Cybersecurity-Risk-Determination-Report-FINAL_May-2018-Release.pdf" target="_blank"&gt;the report this time comes from the Office of Management and Budget&lt;/A&gt;, it only addresses government agencies, and, I am delighted to say, doesn't mention "exchange of information."&lt;BR /&gt;&lt;BR /&gt;This report is a mere 22 pages long, which must be some kind of record for brevity.&amp;nbsp; Of course, being only 22 pages long, it can only mention four points.&amp;nbsp; They are:&lt;BR /&gt;&lt;BR /&gt;1) (US Federal) Agencies don't understand security, and don't have the capability to address it.&amp;nbsp; The action OMB suggests to fix this, is to get everyone to use the Cyber Threat Framework, which is &lt;A href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-37r1.pdf" target="_blank"&gt;NIST publication 800-37, the Risk Management Framework to Federal Information Systems&lt;/A&gt;.&amp;nbsp; Like all NIST publications it is a comprehensive piece of work, and completely unsurprising to anyone who has ever applied a development lifecycle to security.&lt;BR /&gt;&lt;BR /&gt;2) Agencies haven't standardized security.&amp;nbsp; Agencies should standardize security.&lt;BR /&gt;&lt;BR /&gt;3) Agencies don't know what it happening on their networks.&amp;nbsp; Agencies should a) consolidate to a Security Operations Center (SOC), or b) migrate to SOC-as-a-Service.&lt;BR /&gt;&lt;BR /&gt;4) Security isn't standardized (see point 2).&amp;nbsp; So agencies should do risk assessments and report on a quarterly basis?&amp;nbsp; Are they ever going to do any other work?&amp;nbsp; And, given the concern with standardization elsewhere in the report, it is odd that there is no mention in this section of a standard for risk assessment, risk assessment reporting, or metrics to be reported.&lt;BR /&gt;&lt;BR /&gt;If anyone has any illusions about the utility of government security reports, this will be disappointing.&amp;nbsp; As it is, it's merely useless.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 08:47:48 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/US-Cybersecurity-Risk-report/m-p/10955#M1020</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2023-10-09T08:47:48Z</dc:date>
    </item>
    <item>
      <title>Re: US Cybersecurity Risk report</title>
      <link>https://community.isc2.org/t5/Industry-News/US-Cybersecurity-Risk-report/m-p/11080#M1036</link>
      <description>&lt;P&gt;+RMF tag to conversation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm contracted to DoD for RMF.&amp;nbsp; The project I'm assessing had no security engineered into it during it's whole development process.&amp;nbsp; Now regulations dictate that the system has to be scrutinized for security under RMF.&amp;nbsp; It's not going well.&lt;BR /&gt;&lt;BR /&gt;I understand the need for the RMF process.&amp;nbsp; It is definitely one critical component (domain!) in security. I wonder if systems formerly assessed under DIACAP should be rolled up into RMF as is and have RMF be part of any new system being proposed versus trying to apply a policy and process on a system that is on the backstretch of the race.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Not only was CISSP required but so was (ICS)2 CAP.&amp;nbsp; The CAP cert. should be a must if you are working RMF.&lt;/P&gt;</description>
      <pubDate>Fri, 01 Jun 2018 14:01:45 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/US-Cybersecurity-Risk-report/m-p/11080#M1036</guid>
      <dc:creator>Flyslinger2</dc:creator>
      <dc:date>2018-06-01T14:01:45Z</dc:date>
    </item>
  </channel>
</rss>

