SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
CONTINUOUS MONITORING
Introduction & Considerations – Part 1 of 3
ABSTRACT
This white paper is Part 1 in a three-part series of white papers on the sometimes
daunting subject of continuous monitoring (CM) and how to successfully manage
your own CM program. Intended for security professionals who are new to CM,
this first document discusses common misconceptions and provides definitions, an
introduction and brief history of CM.
Part 2 in this series will address monitoring strategy including the frequency and
method of assessments, and Part 3 will cover strategies for managing assessment
costs.
May 2014
RSA WHITE PAPER
Copyright © 2014 EMC Corporation. All Rights Reserved.
EMC believes the information in this publication is accurate as of its publication date. The information is subject to change
without notice.
The information in this publication is provided “as is.” EMC Corporation makes no representations or warranties of any kind with
respect to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a
particular purpose.
Use, copying, and distribution of any EMC software described in this publication requires an applicable software license.
For the most up-to-date listing of EMC product names, see EMC Corporation Trademarks on EMC.com.
VMware is a registered trademark of VMware, Inc. in the United States and/or other jurisdictions. All other trademarks used
herein are the property of their respective owners.
Part Number H13120
TABLE OF CONTENTS
INTRODUCTION 4
What is Continuous Monitoring? 4
Is Continuous Monitoring Mandatory? 4
CURRENT BODY OF CM GUIDANCE & LITERATURE 4
iPost 4
CAESARS / CAESARS (FE) 4
The NISTIRs 5
NIST SP 800-37 & 137 5
MISCONCEPTIONS & CLARIFICATIONS 5
SUMMARY 6
INTRODUCTION
What is Continuous Monitoring?
Continuous monitoring (CM) is referenced by several names with nuances in definition. CM is also known as continuous controls
monitoring (CCM) for compliance activities such as the Certification and Accreditation (C&A) / Assessment and Authorization
(A&A) process. In this context, CCM is referenced interchangeably with the term Continuous reauthorization which utilizes CM to
maintain Authorization/Authority to Operate (ATO) as part of the A&A/C&A process.
In addition to using the term “continuous monitoring,” the Department of Homeland Security (DHS) coined the term Continuous
Diagnostics and Mitigation (CDM), which it is more likely to use. The National Institute of Standards and Technology (NIST) uses
indirect terms like “ongoing assessment/ongoing remediation” and Information Security Continuous Monitoring (ISCM).
The term “continuous monitoring” will be referenced throughout this three-part series of papers as the de facto term.
DHS and NIST are thought leaders in the field of CM, defining what CM should be, what it should do and how it should look.
These two agencies have slightly different takes on what CM is, but provide a vast majority of the guidance, direction,
momentum and thought leadership on this topic. DHS tends to place greater emphasis on operational security in regard to CM
philosophy, while NIST focuses slightly more on tying CM to compliance C&A/A&A activities.
CM provides a way to bridge the gap between operational security and compliance. As a mechanism to provide assurance in an
information system’s current level of risk, CM is intended to enhance or replace the C&A process of the past, using a more
frequent and iterative approach to assessing security compliance.
NIST provides the following definition for CM: “…maintaining ongoing awareness of information security, vulnerabilities, and
threats to support organizational risk management decisions.”
Is Continuous Monitoring Mandatory?
To date, legislative attempts to make CM mandatory for federal information systems have failed. However, this is primarily due
to the inclusion of unrelated items in the legislation, rather than the government’s inability to recognize that CM is important.
The mandate will come, but the timing is unknown.
Most federal departments and agencies recognize the importance of implementing a CM program and are taking preparatory
steps, while others are waiting for final federal criteria and guidance. Only a handful of the most forward-thinking agencies have
tried to implement CM in earnest. These agencies are often more focused on a narrow band of controls, like vulnerability and
configuration scanning, which are easily automated and / or seemingly more critical than other controls. Process-oriented
controls like policy-writing and personnel security have not received as much attention in the CM world. Some controls are less
important, but none are unimportant. There is no consensus on the frequency and methodology that should be used for an
effective and comprehensive continuous control monitoring strategy.
THE CURRENT BODY OF CM GUIDANCE & LITERATURE
iPost
The U.S. State Department created its own model for CM called iPost. iPost is primarily based on monitoring the security status
of Microsoft Windows machines using very select automated processes. This model was documented in iPost: Implementing
Continuous Risk Monitoring at the Department of State, which provides tangible ways and formulas to monitor devices and score
them according to basic variables like how many vulnerabilities or misconfigurations are present, how many patches are missing
and how old the antivirus definitions are.
While it was written specifically for State Department infrastructure and policies, this model was admired by other federal
agencies. iPost was then altered to be more generally applied, and then rebranded as Portable Risk Score Manager (PRSM) and
made available to the public.
CAESARS / CAESARS (FE)
Following the creation of iPost, the Continuous Asset Evaluation, Situational Awareness, and Risk Scoring (CAESARS) model was
developed and documented by DHS with input from the State Department, the IRS and the Department of Justice. The defining
document, which was last updated in 2010, incorporates many of the same concepts as State’s iPost model, as well as input
4
from other agencies. It is more mature and extensible than iPost, but DHS recognized that it fell short in the following regard, as
noted in original CAESARS document dated September 2010:
“CAESARS is not, in itself, a full risk management system. CAESARS cannot, for instance, evaluate security controls in the NIST
SP 800-53 Planning or Management families, such as those for capital planning or risk assessment. It cannot create, evaluate, or
manage security policies.”
The original CAESARS was effective at monitoring automatable controls and using automated scoring, yet less so for policy or
process-oriented controls which required manual review. It was well received in the federal community and embraced as the
basis for a set of new interagency reports written by NIST, with input from National Security Administration (NSA) and DHS. The
goal was to make the CAESARS model viable for all federal agencies.
This NIST-adapted version of CAESARS is called CAESARS Framework Extension (FE). It is designed to make the initial DHS
CAESARS model even more extensible and scalable to the very largest organizations, with greater emphasis on the many non-
automatable controls. Because the model was developed entirely by federal civilian agencies, it took some adaption to make it
suitable for military and intelligence agencies as well as state and local governments. CAESARS FE is defined by several NIST
interagency reports (NISTIR), including NISTIRs 7756, 7799 and 7800. These reports are significant and relevant; however, they
are still in draft.
The NISTIRs
As the introductory document for CAESARS FE, NISTIR 7756 defines the components of a mature CM implementation and the
roles of those components. The six components or subsystems are: Presentation/Reporting, Content, Collection, Data
Aggregation, Analysis/Scoring and Task Manager. While most of the data collection discussed in NISTR 7756 supports automated
monitoring, the report indicates that a CM model should also allow for non-automated controls which “require some human data
collection effort.”
Building upon NISTR 7756, NISTR 7799 describes ways the six subsystems can act in very complex use cases. The report is
devoted to describing possible work flows between the six subsystems. It defines all possible inputs and outputs from one
subsystem to another, as well as describes how the subsystems feed each other, and how data integrity and synchronization is
maintained.
NISTIR 7800 defines how to implement this model for three specific CM domains: vulnerability, configuration and asset
management. Given that NISTR 7800 covers just three CM domains while NISTIR 7756 indicates there are “at least 11,” one can
infer future draft NISTIRs will cover remaining domains such as event, incident and malware.
NIST SP 800-37 and 137
The NISTIRs 7756, 7799 and 7800 are NIST’s way of moderating DHS CAESARS model to make it accessible for everyone.
However, in addition to iPost and CAESARS, NIST has also written its own documents on the subject of CM.
The first, NIST SP 800-37, describes NIST’s Risk Management Framework (RMF), which is the current way to reference
C&A/A&A. There are some points of divergence between NIST and iPost and CAESARS. NIST defined how to implement RMF and
made an effort to integrate CM with FISMA compliance and RMF. NIST also described details of the model and how it integrates
with NIST RMF, FISMA compliance and risk management overall. Alternatively, iPost and CAESARS focused less on compliance
and more on results in providing the greatest reduction of host risk in the least amount of time.
Dedicated to CM, NIST SP 800-137 describes steps to develop and implement a CM program. SP 800-137 spends the most time
on the subject of manual control assessment as part of the CM scheme and includes factors influencing the frequency of
assessments in CM, which will be covered in Part 2 of this series.
MISCONCEPTIONS & CLARIFICATIONS
Continuous vs. Constant
One large obstacle in the discussion of CM is the semantic differences and confusion with the terms continuous, constant and
automated. Continuous is in many ways a relative term, in that OMB (Office of Management & Budget) A-130 defined a three-
year cycle for assessing controls; therefore, any increment less than that may seem “continuous” by comparison. However,
“continuous” does not mean “constant.” NIST 800-137 states that controls should be “assessed and analyzed at a frequency
5
sufficient to support risk-based security decisions to adequately protect organization information. Data collection, no matter how
frequent, is performed at discrete intervals.”
Continuous ≠ Automated
Another layer of confusion ensues when equating “continuous” with “automated.” If control monitoring is supposed to happen
constantly/continuously, how could a person do it? It would have to be automated, right? While all Information System controls
should be continuously monitored whether or not there are automated means, some controls simply must be assessed manually
and these manual assessments will not happen as frequently. This dispels a common misconception that continuous monitoring
means all controls must be automated and must be assessed constantly, which is neither true nor possible.
Continuous Monitoring ≠ Network Security Monitoring
Some people understandably equate the term continuous monitoring with tools like IDS, IPS and SIEM because they are security
tools that monitor the network continuously. Security vendors tend to exacerbate this problem by skewing the definition of CM to
rebrand their offerings as CM tools. Network security monitoring (NSM) is a reactive process, while CM is a proactive process.
NSM monitors traffic, while CM monitors controls and security posture.
Automating the Protection ≠ Automating the Assessment of Protection
Another pitfall occurs with phrases like “automate the control.” It is one thing to say that a control can be automated, which
means that a control can be provided by an automated means. However, this is not the same as saying a control can be
assessed or tested by automated means. For example, an Active Directory or LDAP server can authenticate a user automatically
if the correct username and password are provided; a person is not required to review and confirm the correct password was
provided. If we want to assess the corresponding access controls, not all of them can be assessed automatically. This difference
is more evident in Part 2 of this series which will discuss automation domains and “automatable” controls.
SUMMARY
CM is a way of assessing the implementation and effectiveness of controls in a way that is more frequent than previous methods.
The goal of CM is to provide a higher level of assurance to the relevant stakeholders that their information systems are 1) as
secure as the day they were authorized to be put into production, 2) adhering to the protection plans designed for them, 3)
operating at an acceptable level of risk, and 4) stay current with the latest threats, patches, etc. It is important to remember
that “continuous” in the context of CM does not mean constant or automated and that different controls can be assessed at
different frequencies. How to determine the frequency of these assessments is the primary topic of Part 2 in this series.
6

Weitere ähnliche Inhalte

Was ist angesagt?

Are NIST standards clouding the implementation of HIPAA security risk assessm...
Are NIST standards clouding the implementation of HIPAA security risk assessm...Are NIST standards clouding the implementation of HIPAA security risk assessm...
Are NIST standards clouding the implementation of HIPAA security risk assessm...David Sweigert
 
Cyber Risk Quantification | Safe Security
Cyber Risk Quantification | Safe SecurityCyber Risk Quantification | Safe Security
Cyber Risk Quantification | Safe SecurityRahul Tyagi
 
10 Tips to Improve Your Security Incident Readiness and Reponse
10 Tips to Improve Your Security Incident Readiness and Reponse10 Tips to Improve Your Security Incident Readiness and Reponse
10 Tips to Improve Your Security Incident Readiness and ReponseEMC
 
HSN Risk Assessment Report
HSN Risk Assessment ReportHSN Risk Assessment Report
HSN Risk Assessment ReportBelinda Edwards
 
Csec 610 Inspiring Innovation--tutorialrank.com
Csec 610 Inspiring Innovation--tutorialrank.comCsec 610 Inspiring Innovation--tutorialrank.com
Csec 610 Inspiring Innovation--tutorialrank.comPrescottLunt384
 
How close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityHow close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityRahul Tyagi
 
CST 610 RANK Achievement Education--cst610rank.com
CST 610 RANK Achievement Education--cst610rank.comCST 610 RANK Achievement Education--cst610rank.com
CST 610 RANK Achievement Education--cst610rank.comkopiko146
 
CSEC 610 Effective Communication - snaptutorial.com
CSEC 610 Effective Communication - snaptutorial.comCSEC 610 Effective Communication - snaptutorial.com
CSEC 610 Effective Communication - snaptutorial.comdonaldzs7
 
CST 610 RANK Become Exceptional--cst610rank.com
CST 610 RANK Become Exceptional--cst610rank.comCST 610 RANK Become Exceptional--cst610rank.com
CST 610 RANK Become Exceptional--cst610rank.comagathachristie112
 
CST 610 RANK Inspiring Innovation--cst610rank.com
CST 610 RANK Inspiring Innovation--cst610rank.comCST 610 RANK Inspiring Innovation--cst610rank.com
CST 610 RANK Inspiring Innovation--cst610rank.comKeatonJennings104
 
CST 610 RANK Educational Specialist--cst610rank.com
CST 610 RANK Educational Specialist--cst610rank.comCST 610 RANK Educational Specialist--cst610rank.com
CST 610 RANK Educational Specialist--cst610rank.comVSNaipaul15
 
CST 610 RANK Remember Education--cst610rank.com
CST 610 RANK Remember Education--cst610rank.comCST 610 RANK Remember Education--cst610rank.com
CST 610 RANK Remember Education--cst610rank.comchrysanthemu49
 
CST 610 RANK Introduction Education--cst610rank.com
CST 610 RANK Introduction Education--cst610rank.comCST 610 RANK Introduction Education--cst610rank.com
CST 610 RANK Introduction Education--cst610rank.comagathachristie265
 
Assessing and Managing IT Security Risks
Assessing and Managing IT Security RisksAssessing and Managing IT Security Risks
Assessing and Managing IT Security RisksChris Ross
 
Csec 610 Education Organization-snaptutorial.com
Csec 610 Education Organization-snaptutorial.comCsec 610 Education Organization-snaptutorial.com
Csec 610 Education Organization-snaptutorial.comrobertlesew5
 
CST 610 Effective Communication - snaptutorial.com
CST 610 Effective Communication - snaptutorial.comCST 610 Effective Communication - snaptutorial.com
CST 610 Effective Communication - snaptutorial.comdonaldzs7
 

Was ist angesagt? (17)

Are NIST standards clouding the implementation of HIPAA security risk assessm...
Are NIST standards clouding the implementation of HIPAA security risk assessm...Are NIST standards clouding the implementation of HIPAA security risk assessm...
Are NIST standards clouding the implementation of HIPAA security risk assessm...
 
Cyber Risk Quantification | Safe Security
Cyber Risk Quantification | Safe SecurityCyber Risk Quantification | Safe Security
Cyber Risk Quantification | Safe Security
 
10 Tips to Improve Your Security Incident Readiness and Reponse
10 Tips to Improve Your Security Incident Readiness and Reponse10 Tips to Improve Your Security Incident Readiness and Reponse
10 Tips to Improve Your Security Incident Readiness and Reponse
 
HSN Risk Assessment Report
HSN Risk Assessment ReportHSN Risk Assessment Report
HSN Risk Assessment Report
 
Csec 610 Inspiring Innovation--tutorialrank.com
Csec 610 Inspiring Innovation--tutorialrank.comCsec 610 Inspiring Innovation--tutorialrank.com
Csec 610 Inspiring Innovation--tutorialrank.com
 
How close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityHow close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe Security
 
CST 610 RANK Achievement Education--cst610rank.com
CST 610 RANK Achievement Education--cst610rank.comCST 610 RANK Achievement Education--cst610rank.com
CST 610 RANK Achievement Education--cst610rank.com
 
CSEC 610 Effective Communication - snaptutorial.com
CSEC 610 Effective Communication - snaptutorial.comCSEC 610 Effective Communication - snaptutorial.com
CSEC 610 Effective Communication - snaptutorial.com
 
CST 610 RANK Become Exceptional--cst610rank.com
CST 610 RANK Become Exceptional--cst610rank.comCST 610 RANK Become Exceptional--cst610rank.com
CST 610 RANK Become Exceptional--cst610rank.com
 
CST 610 RANK Inspiring Innovation--cst610rank.com
CST 610 RANK Inspiring Innovation--cst610rank.comCST 610 RANK Inspiring Innovation--cst610rank.com
CST 610 RANK Inspiring Innovation--cst610rank.com
 
CST 610 RANK Educational Specialist--cst610rank.com
CST 610 RANK Educational Specialist--cst610rank.comCST 610 RANK Educational Specialist--cst610rank.com
CST 610 RANK Educational Specialist--cst610rank.com
 
CST 610 RANK Remember Education--cst610rank.com
CST 610 RANK Remember Education--cst610rank.comCST 610 RANK Remember Education--cst610rank.com
CST 610 RANK Remember Education--cst610rank.com
 
CST 610 RANK Introduction Education--cst610rank.com
CST 610 RANK Introduction Education--cst610rank.comCST 610 RANK Introduction Education--cst610rank.com
CST 610 RANK Introduction Education--cst610rank.com
 
Assessing and Managing IT Security Risks
Assessing and Managing IT Security RisksAssessing and Managing IT Security Risks
Assessing and Managing IT Security Risks
 
Csec 610 Education Organization-snaptutorial.com
Csec 610 Education Organization-snaptutorial.comCsec 610 Education Organization-snaptutorial.com
Csec 610 Education Organization-snaptutorial.com
 
CST 610 Effective Communication - snaptutorial.com
CST 610 Effective Communication - snaptutorial.comCST 610 Effective Communication - snaptutorial.com
CST 610 Effective Communication - snaptutorial.com
 
Websense
WebsenseWebsense
Websense
 

Andere mochten auch

Monografía EXPOSICION EN EVALUACION
Monografía EXPOSICION EN EVALUACION Monografía EXPOSICION EN EVALUACION
Monografía EXPOSICION EN EVALUACION Banesa Ruiz
 
Daily Newsletter: 12th January, 2011
Daily Newsletter: 12th January, 2011Daily Newsletter: 12th January, 2011
Daily Newsletter: 12th January, 2011Fullerton Securities
 
Basic guitar anatomy
Basic guitar anatomyBasic guitar anatomy
Basic guitar anatomytyrannis14
 
HAPPYWEEK 197 - 2016.12.05. happyweek 197
HAPPYWEEK 197 - 2016.12.05. happyweek 197HAPPYWEEK 197 - 2016.12.05. happyweek 197
HAPPYWEEK 197 - 2016.12.05. happyweek 197Jiří Černák
 
Presentación de socializacion aamtic
Presentación de socializacion aamticPresentación de socializacion aamtic
Presentación de socializacion aamticPolo Apolo
 
Winds of change: The shifting face of leadership in business
Winds of change: The shifting face of leadership in businessWinds of change: The shifting face of leadership in business
Winds of change: The shifting face of leadership in businessThe Economist Media Businesses
 
Peter Ward: The True Power of SharePoint Designer Workflows
Peter Ward: The True Power of SharePoint Designer WorkflowsPeter Ward: The True Power of SharePoint Designer Workflows
Peter Ward: The True Power of SharePoint Designer WorkflowsSharePoint Saturday NY
 
SharePoint Authentication and Authorization presented by Liam Cleary
SharePoint Authentication and Authorization presented by Liam ClearySharePoint Authentication and Authorization presented by Liam Cleary
SharePoint Authentication and Authorization presented by Liam ClearyEuropean SharePoint Conference
 
Mindfulness - What. How
Mindfulness - What. HowMindfulness - What. How
Mindfulness - What. HowOH TEIK BIN
 
Is that a scientific report or just some cool pictures from the lab? Reproduc...
Is that a scientific report or just some cool pictures from the lab? Reproduc...Is that a scientific report or just some cool pictures from the lab? Reproduc...
Is that a scientific report or just some cool pictures from the lab? Reproduc...Greg Landrum
 
Universidad nacional chimborazo
Universidad nacional chimborazoUniversidad nacional chimborazo
Universidad nacional chimborazoFernando Cáceres
 
Joel Oleson: SharePoint 2010 Upgrade Drill Down
Joel Oleson: SharePoint 2010 Upgrade Drill DownJoel Oleson: SharePoint 2010 Upgrade Drill Down
Joel Oleson: SharePoint 2010 Upgrade Drill DownSharePoint Saturday NY
 
ELECTRONICS - ESSENTIALS OF THE HOUSE
ELECTRONICS - ESSENTIALS OF THE HOUSEELECTRONICS - ESSENTIALS OF THE HOUSE
ELECTRONICS - ESSENTIALS OF THE HOUSEVouchers R US
 
Notice flexible retractable retraflex
Notice flexible retractable retraflexNotice flexible retractable retraflex
Notice flexible retractable retraflexHomexity
 
SharePoint Branding Guidance @ SharePoint Saturday Redmond
SharePoint Branding Guidance @ SharePoint Saturday RedmondSharePoint Branding Guidance @ SharePoint Saturday Redmond
SharePoint Branding Guidance @ SharePoint Saturday RedmondKanwal Khipple
 
How Unbreakable Is Batman's Armor?
How Unbreakable Is Batman's Armor?How Unbreakable Is Batman's Armor?
How Unbreakable Is Batman's Armor?Mashable
 

Andere mochten auch (20)

Monografía EXPOSICION EN EVALUACION
Monografía EXPOSICION EN EVALUACION Monografía EXPOSICION EN EVALUACION
Monografía EXPOSICION EN EVALUACION
 
Daily Newsletter: 12th January, 2011
Daily Newsletter: 12th January, 2011Daily Newsletter: 12th January, 2011
Daily Newsletter: 12th January, 2011
 
Basic guitar anatomy
Basic guitar anatomyBasic guitar anatomy
Basic guitar anatomy
 
HAPPYWEEK 197 - 2016.12.05. happyweek 197
HAPPYWEEK 197 - 2016.12.05. happyweek 197HAPPYWEEK 197 - 2016.12.05. happyweek 197
HAPPYWEEK 197 - 2016.12.05. happyweek 197
 
Presentación de socializacion aamtic
Presentación de socializacion aamticPresentación de socializacion aamtic
Presentación de socializacion aamtic
 
Winds of change: The shifting face of leadership in business
Winds of change: The shifting face of leadership in businessWinds of change: The shifting face of leadership in business
Winds of change: The shifting face of leadership in business
 
Vilifiti
VilifitiVilifiti
Vilifiti
 
Derecho informatico
Derecho informaticoDerecho informatico
Derecho informatico
 
Peter Ward: The True Power of SharePoint Designer Workflows
Peter Ward: The True Power of SharePoint Designer WorkflowsPeter Ward: The True Power of SharePoint Designer Workflows
Peter Ward: The True Power of SharePoint Designer Workflows
 
SharePoint Authentication and Authorization presented by Liam Cleary
SharePoint Authentication and Authorization presented by Liam ClearySharePoint Authentication and Authorization presented by Liam Cleary
SharePoint Authentication and Authorization presented by Liam Cleary
 
Mindfulness - What. How
Mindfulness - What. HowMindfulness - What. How
Mindfulness - What. How
 
Expresion oral
Expresion oralExpresion oral
Expresion oral
 
Is that a scientific report or just some cool pictures from the lab? Reproduc...
Is that a scientific report or just some cool pictures from the lab? Reproduc...Is that a scientific report or just some cool pictures from the lab? Reproduc...
Is that a scientific report or just some cool pictures from the lab? Reproduc...
 
Universidad nacional chimborazo
Universidad nacional chimborazoUniversidad nacional chimborazo
Universidad nacional chimborazo
 
Joel Oleson: SharePoint 2010 Upgrade Drill Down
Joel Oleson: SharePoint 2010 Upgrade Drill DownJoel Oleson: SharePoint 2010 Upgrade Drill Down
Joel Oleson: SharePoint 2010 Upgrade Drill Down
 
ELECTRONICS - ESSENTIALS OF THE HOUSE
ELECTRONICS - ESSENTIALS OF THE HOUSEELECTRONICS - ESSENTIALS OF THE HOUSE
ELECTRONICS - ESSENTIALS OF THE HOUSE
 
Notice flexible retractable retraflex
Notice flexible retractable retraflexNotice flexible retractable retraflex
Notice flexible retractable retraflex
 
SharePoint Branding Guidance @ SharePoint Saturday Redmond
SharePoint Branding Guidance @ SharePoint Saturday RedmondSharePoint Branding Guidance @ SharePoint Saturday Redmond
SharePoint Branding Guidance @ SharePoint Saturday Redmond
 
How Unbreakable Is Batman's Armor?
How Unbreakable Is Batman's Armor?How Unbreakable Is Batman's Armor?
How Unbreakable Is Batman's Armor?
 
Word debate
Word debateWord debate
Word debate
 

Ähnlich wie Continuous Monitoring: Introduction & Considerations – Part 1 of 3

Continuous Monitoring: Monitoring Strategy – Part 2 of 3
Continuous Monitoring: Monitoring Strategy – Part 2 of 3Continuous Monitoring: Monitoring Strategy – Part 2 of 3
Continuous Monitoring: Monitoring Strategy – Part 2 of 3EMC
 
NIST to CSF to ISO or EC 27002 2022 with NIST
NIST to CSF to ISO or EC 27002 2022 with NISTNIST to CSF to ISO or EC 27002 2022 with NIST
NIST to CSF to ISO or EC 27002 2022 with NISTebonyman0007
 
EXPLORING CRITICAL VULNERABILITIES IN SIEM IMPLEMENTATION AND SOC SERVICE PRO...
EXPLORING CRITICAL VULNERABILITIES IN SIEM IMPLEMENTATION AND SOC SERVICE PRO...EXPLORING CRITICAL VULNERABILITIES IN SIEM IMPLEMENTATION AND SOC SERVICE PRO...
EXPLORING CRITICAL VULNERABILITIES IN SIEM IMPLEMENTATION AND SOC SERVICE PRO...IJNSA Journal
 
Guide to Risk Management Framework (RMF)
Guide to Risk Management Framework (RMF)Guide to Risk Management Framework (RMF)
Guide to Risk Management Framework (RMF)MetroStar
 
CHAPTER 3 Security Policies and Regulations In this chap
CHAPTER 3 Security Policies and Regulations In this chapCHAPTER 3 Security Policies and Regulations In this chap
CHAPTER 3 Security Policies and Regulations In this chapEstelaJeffery653
 
Fdic ffiec cyber_security_assessments
Fdic ffiec cyber_security_assessmentsFdic ffiec cyber_security_assessments
Fdic ffiec cyber_security_assessmentsKen M. Shaurette
 
Implementation of NIST guidelines for the CISO / ISO / Privacy Officer
Implementation of NIST guidelines for the CISO / ISO / Privacy OfficerImplementation of NIST guidelines for the CISO / ISO / Privacy Officer
Implementation of NIST guidelines for the CISO / ISO / Privacy OfficerDavid Sweigert
 
SANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls SurveySANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls SurveyEdgar Alejandro Villegas
 
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...FireEye, Inc.
 
D e c e m b e r 2 0 1 4 J O U R N A L O F I N T E R N E T
D e c e m b e r  2 0 1 4  J O U R N A L  O F  I N T E R N E T D e c e m b e r  2 0 1 4  J O U R N A L  O F  I N T E R N E T
D e c e m b e r 2 0 1 4 J O U R N A L O F I N T E R N E T OllieShoresna
 
The IT Analysis Paralysis
The IT Analysis Paralysis The IT Analysis Paralysis
The IT Analysis Paralysis PYA, P.C.
 
Key elements of security threat
Key elements of security threatKey elements of security threat
Key elements of security threatAraf Karsh Hamid
 
US Government Software Assurance and Security Initiativesi
US Government Software Assurance and Security InitiativesiUS Government Software Assurance and Security Initiativesi
US Government Software Assurance and Security InitiativesiLindsey Landolfi
 
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFLaurie Mosca-Cocca
 
How Do You Define Continuous Monitoring?
How Do You Define Continuous Monitoring?How Do You Define Continuous Monitoring?
How Do You Define Continuous Monitoring?Tieu Luu
 
A Practical Approach to Managing Information System Risk
A Practical Approach to Managing Information System RiskA Practical Approach to Managing Information System Risk
A Practical Approach to Managing Information System Riskamiable_indian
 
Information Systems Security & Strategy
Information Systems Security & StrategyInformation Systems Security & Strategy
Information Systems Security & StrategyTony Hauxwell
 

Ähnlich wie Continuous Monitoring: Introduction & Considerations – Part 1 of 3 (20)

Continuous Monitoring: Monitoring Strategy – Part 2 of 3
Continuous Monitoring: Monitoring Strategy – Part 2 of 3Continuous Monitoring: Monitoring Strategy – Part 2 of 3
Continuous Monitoring: Monitoring Strategy – Part 2 of 3
 
NIST to CSF to ISO or EC 27002 2022 with NIST
NIST to CSF to ISO or EC 27002 2022 with NISTNIST to CSF to ISO or EC 27002 2022 with NIST
NIST to CSF to ISO or EC 27002 2022 with NIST
 
EXPLORING CRITICAL VULNERABILITIES IN SIEM IMPLEMENTATION AND SOC SERVICE PRO...
EXPLORING CRITICAL VULNERABILITIES IN SIEM IMPLEMENTATION AND SOC SERVICE PRO...EXPLORING CRITICAL VULNERABILITIES IN SIEM IMPLEMENTATION AND SOC SERVICE PRO...
EXPLORING CRITICAL VULNERABILITIES IN SIEM IMPLEMENTATION AND SOC SERVICE PRO...
 
crucet1crucet2crucet
crucet1crucet2crucetcrucet1crucet2crucet
crucet1crucet2crucet
 
Guide to Risk Management Framework (RMF)
Guide to Risk Management Framework (RMF)Guide to Risk Management Framework (RMF)
Guide to Risk Management Framework (RMF)
 
CHAPTER 3 Security Policies and Regulations In this chap
CHAPTER 3 Security Policies and Regulations In this chapCHAPTER 3 Security Policies and Regulations In this chap
CHAPTER 3 Security Policies and Regulations In this chap
 
Fdic ffiec cyber_security_assessments
Fdic ffiec cyber_security_assessmentsFdic ffiec cyber_security_assessments
Fdic ffiec cyber_security_assessments
 
Implementation of NIST guidelines for the CISO / ISO / Privacy Officer
Implementation of NIST guidelines for the CISO / ISO / Privacy OfficerImplementation of NIST guidelines for the CISO / ISO / Privacy Officer
Implementation of NIST guidelines for the CISO / ISO / Privacy Officer
 
SANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls SurveySANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls Survey
 
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
 
D e c e m b e r 2 0 1 4 J O U R N A L O F I N T E R N E T
D e c e m b e r  2 0 1 4  J O U R N A L  O F  I N T E R N E T D e c e m b e r  2 0 1 4  J O U R N A L  O F  I N T E R N E T
D e c e m b e r 2 0 1 4 J O U R N A L O F I N T E R N E T
 
The IT Analysis Paralysis
The IT Analysis Paralysis The IT Analysis Paralysis
The IT Analysis Paralysis
 
Key elements of security threat
Key elements of security threatKey elements of security threat
Key elements of security threat
 
HP Fortify!
HP Fortify!HP Fortify!
HP Fortify!
 
US Government Software Assurance and Security Initiativesi
US Government Software Assurance and Security InitiativesiUS Government Software Assurance and Security Initiativesi
US Government Software Assurance and Security Initiativesi
 
800-37.pptx
800-37.pptx800-37.pptx
800-37.pptx
 
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
 
How Do You Define Continuous Monitoring?
How Do You Define Continuous Monitoring?How Do You Define Continuous Monitoring?
How Do You Define Continuous Monitoring?
 
A Practical Approach to Managing Information System Risk
A Practical Approach to Managing Information System RiskA Practical Approach to Managing Information System Risk
A Practical Approach to Managing Information System Risk
 
Information Systems Security & Strategy
Information Systems Security & StrategyInformation Systems Security & Strategy
Information Systems Security & Strategy
 

Mehr von EMC

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDEMC
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote EMC
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOEMC
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremioEMC
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lakeEMC
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereEMC
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History EMC
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewEMC
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeEMC
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic EMC
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityEMC
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeEMC
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015EMC
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesEMC
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsEMC
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookEMC
 

Mehr von EMC (20)

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremio
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis Openstack
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lake
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop Elsewhere
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical Review
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for Security
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education Services
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere Environments
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
 

Kürzlich hochgeladen

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Kürzlich hochgeladen (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

Continuous Monitoring: Introduction & Considerations – Part 1 of 3

  • 1. CONTINUOUS MONITORING Introduction & Considerations – Part 1 of 3 ABSTRACT This white paper is Part 1 in a three-part series of white papers on the sometimes daunting subject of continuous monitoring (CM) and how to successfully manage your own CM program. Intended for security professionals who are new to CM, this first document discusses common misconceptions and provides definitions, an introduction and brief history of CM. Part 2 in this series will address monitoring strategy including the frequency and method of assessments, and Part 3 will cover strategies for managing assessment costs. May 2014 RSA WHITE PAPER
  • 2. Copyright © 2014 EMC Corporation. All Rights Reserved. EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. The information in this publication is provided “as is.” EMC Corporation makes no representations or warranties of any kind with respect to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a particular purpose. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. For the most up-to-date listing of EMC product names, see EMC Corporation Trademarks on EMC.com. VMware is a registered trademark of VMware, Inc. in the United States and/or other jurisdictions. All other trademarks used herein are the property of their respective owners. Part Number H13120
  • 3. TABLE OF CONTENTS INTRODUCTION 4 What is Continuous Monitoring? 4 Is Continuous Monitoring Mandatory? 4 CURRENT BODY OF CM GUIDANCE & LITERATURE 4 iPost 4 CAESARS / CAESARS (FE) 4 The NISTIRs 5 NIST SP 800-37 & 137 5 MISCONCEPTIONS & CLARIFICATIONS 5 SUMMARY 6
  • 4. INTRODUCTION What is Continuous Monitoring? Continuous monitoring (CM) is referenced by several names with nuances in definition. CM is also known as continuous controls monitoring (CCM) for compliance activities such as the Certification and Accreditation (C&A) / Assessment and Authorization (A&A) process. In this context, CCM is referenced interchangeably with the term Continuous reauthorization which utilizes CM to maintain Authorization/Authority to Operate (ATO) as part of the A&A/C&A process. In addition to using the term “continuous monitoring,” the Department of Homeland Security (DHS) coined the term Continuous Diagnostics and Mitigation (CDM), which it is more likely to use. The National Institute of Standards and Technology (NIST) uses indirect terms like “ongoing assessment/ongoing remediation” and Information Security Continuous Monitoring (ISCM). The term “continuous monitoring” will be referenced throughout this three-part series of papers as the de facto term. DHS and NIST are thought leaders in the field of CM, defining what CM should be, what it should do and how it should look. These two agencies have slightly different takes on what CM is, but provide a vast majority of the guidance, direction, momentum and thought leadership on this topic. DHS tends to place greater emphasis on operational security in regard to CM philosophy, while NIST focuses slightly more on tying CM to compliance C&A/A&A activities. CM provides a way to bridge the gap between operational security and compliance. As a mechanism to provide assurance in an information system’s current level of risk, CM is intended to enhance or replace the C&A process of the past, using a more frequent and iterative approach to assessing security compliance. NIST provides the following definition for CM: “…maintaining ongoing awareness of information security, vulnerabilities, and threats to support organizational risk management decisions.” Is Continuous Monitoring Mandatory? To date, legislative attempts to make CM mandatory for federal information systems have failed. However, this is primarily due to the inclusion of unrelated items in the legislation, rather than the government’s inability to recognize that CM is important. The mandate will come, but the timing is unknown. Most federal departments and agencies recognize the importance of implementing a CM program and are taking preparatory steps, while others are waiting for final federal criteria and guidance. Only a handful of the most forward-thinking agencies have tried to implement CM in earnest. These agencies are often more focused on a narrow band of controls, like vulnerability and configuration scanning, which are easily automated and / or seemingly more critical than other controls. Process-oriented controls like policy-writing and personnel security have not received as much attention in the CM world. Some controls are less important, but none are unimportant. There is no consensus on the frequency and methodology that should be used for an effective and comprehensive continuous control monitoring strategy. THE CURRENT BODY OF CM GUIDANCE & LITERATURE iPost The U.S. State Department created its own model for CM called iPost. iPost is primarily based on monitoring the security status of Microsoft Windows machines using very select automated processes. This model was documented in iPost: Implementing Continuous Risk Monitoring at the Department of State, which provides tangible ways and formulas to monitor devices and score them according to basic variables like how many vulnerabilities or misconfigurations are present, how many patches are missing and how old the antivirus definitions are. While it was written specifically for State Department infrastructure and policies, this model was admired by other federal agencies. iPost was then altered to be more generally applied, and then rebranded as Portable Risk Score Manager (PRSM) and made available to the public. CAESARS / CAESARS (FE) Following the creation of iPost, the Continuous Asset Evaluation, Situational Awareness, and Risk Scoring (CAESARS) model was developed and documented by DHS with input from the State Department, the IRS and the Department of Justice. The defining document, which was last updated in 2010, incorporates many of the same concepts as State’s iPost model, as well as input 4
  • 5. from other agencies. It is more mature and extensible than iPost, but DHS recognized that it fell short in the following regard, as noted in original CAESARS document dated September 2010: “CAESARS is not, in itself, a full risk management system. CAESARS cannot, for instance, evaluate security controls in the NIST SP 800-53 Planning or Management families, such as those for capital planning or risk assessment. It cannot create, evaluate, or manage security policies.” The original CAESARS was effective at monitoring automatable controls and using automated scoring, yet less so for policy or process-oriented controls which required manual review. It was well received in the federal community and embraced as the basis for a set of new interagency reports written by NIST, with input from National Security Administration (NSA) and DHS. The goal was to make the CAESARS model viable for all federal agencies. This NIST-adapted version of CAESARS is called CAESARS Framework Extension (FE). It is designed to make the initial DHS CAESARS model even more extensible and scalable to the very largest organizations, with greater emphasis on the many non- automatable controls. Because the model was developed entirely by federal civilian agencies, it took some adaption to make it suitable for military and intelligence agencies as well as state and local governments. CAESARS FE is defined by several NIST interagency reports (NISTIR), including NISTIRs 7756, 7799 and 7800. These reports are significant and relevant; however, they are still in draft. The NISTIRs As the introductory document for CAESARS FE, NISTIR 7756 defines the components of a mature CM implementation and the roles of those components. The six components or subsystems are: Presentation/Reporting, Content, Collection, Data Aggregation, Analysis/Scoring and Task Manager. While most of the data collection discussed in NISTR 7756 supports automated monitoring, the report indicates that a CM model should also allow for non-automated controls which “require some human data collection effort.” Building upon NISTR 7756, NISTR 7799 describes ways the six subsystems can act in very complex use cases. The report is devoted to describing possible work flows between the six subsystems. It defines all possible inputs and outputs from one subsystem to another, as well as describes how the subsystems feed each other, and how data integrity and synchronization is maintained. NISTIR 7800 defines how to implement this model for three specific CM domains: vulnerability, configuration and asset management. Given that NISTR 7800 covers just three CM domains while NISTIR 7756 indicates there are “at least 11,” one can infer future draft NISTIRs will cover remaining domains such as event, incident and malware. NIST SP 800-37 and 137 The NISTIRs 7756, 7799 and 7800 are NIST’s way of moderating DHS CAESARS model to make it accessible for everyone. However, in addition to iPost and CAESARS, NIST has also written its own documents on the subject of CM. The first, NIST SP 800-37, describes NIST’s Risk Management Framework (RMF), which is the current way to reference C&A/A&A. There are some points of divergence between NIST and iPost and CAESARS. NIST defined how to implement RMF and made an effort to integrate CM with FISMA compliance and RMF. NIST also described details of the model and how it integrates with NIST RMF, FISMA compliance and risk management overall. Alternatively, iPost and CAESARS focused less on compliance and more on results in providing the greatest reduction of host risk in the least amount of time. Dedicated to CM, NIST SP 800-137 describes steps to develop and implement a CM program. SP 800-137 spends the most time on the subject of manual control assessment as part of the CM scheme and includes factors influencing the frequency of assessments in CM, which will be covered in Part 2 of this series. MISCONCEPTIONS & CLARIFICATIONS Continuous vs. Constant One large obstacle in the discussion of CM is the semantic differences and confusion with the terms continuous, constant and automated. Continuous is in many ways a relative term, in that OMB (Office of Management & Budget) A-130 defined a three- year cycle for assessing controls; therefore, any increment less than that may seem “continuous” by comparison. However, “continuous” does not mean “constant.” NIST 800-137 states that controls should be “assessed and analyzed at a frequency 5
  • 6. sufficient to support risk-based security decisions to adequately protect organization information. Data collection, no matter how frequent, is performed at discrete intervals.” Continuous ≠ Automated Another layer of confusion ensues when equating “continuous” with “automated.” If control monitoring is supposed to happen constantly/continuously, how could a person do it? It would have to be automated, right? While all Information System controls should be continuously monitored whether or not there are automated means, some controls simply must be assessed manually and these manual assessments will not happen as frequently. This dispels a common misconception that continuous monitoring means all controls must be automated and must be assessed constantly, which is neither true nor possible. Continuous Monitoring ≠ Network Security Monitoring Some people understandably equate the term continuous monitoring with tools like IDS, IPS and SIEM because they are security tools that monitor the network continuously. Security vendors tend to exacerbate this problem by skewing the definition of CM to rebrand their offerings as CM tools. Network security monitoring (NSM) is a reactive process, while CM is a proactive process. NSM monitors traffic, while CM monitors controls and security posture. Automating the Protection ≠ Automating the Assessment of Protection Another pitfall occurs with phrases like “automate the control.” It is one thing to say that a control can be automated, which means that a control can be provided by an automated means. However, this is not the same as saying a control can be assessed or tested by automated means. For example, an Active Directory or LDAP server can authenticate a user automatically if the correct username and password are provided; a person is not required to review and confirm the correct password was provided. If we want to assess the corresponding access controls, not all of them can be assessed automatically. This difference is more evident in Part 2 of this series which will discuss automation domains and “automatable” controls. SUMMARY CM is a way of assessing the implementation and effectiveness of controls in a way that is more frequent than previous methods. The goal of CM is to provide a higher level of assurance to the relevant stakeholders that their information systems are 1) as secure as the day they were authorized to be put into production, 2) adhering to the protection plans designed for them, 3) operating at an acceptable level of risk, and 4) stay current with the latest threats, patches, etc. It is important to remember that “continuous” in the context of CM does not mean constant or automated and that different controls can be assessed at different frequencies. How to determine the frequency of these assessments is the primary topic of Part 2 in this series. 6