FISMA

FISMA compliance


Federal Information Security Act


FISMA assigns three primary requirements to federal organisations:

(1) identify and prioritise what information systems need protection;

(2) select and implement appropriate controls, which may include a combination of administrative procedures, best practices and cyber security technology; and

(3) audit and report the results on a quarterly basis.


> Government organisations require a network security strategy that not only blocks known threats but also stays ahead of emerging ones.

> Defend against Hackivist DDoS attacks.

> Solutions provide the internal network visibility, actionable intelligence and mitigation capabilities your organisation needs to detect and block DDoS.

> Apache Hadoop Data-at-Rest Encryption.




The Challenge and Requirements

Achilles Heel of Security for Federal Agencies

Many federal networks deploy “defence-in-depth” architectures filled with point products to combat a myriad of potential attacks. Their intentions are good but implementations often lack the ability to correlate sophisticated blended and fragmented attacks, which use multiple entry vectors for propagation.

The “depth” label may be a misnomer. Budget constraints often limit protection of government network boundaries to layer-3 firewall and VPN mechanisms, which are unable to comprehend or stop layer 4 through 7 attacks


When agencies do implement multiple point security products, the point solutions usually do not collaborate against blended attacks or synthesise and use attack data from complementary defences.



Availability, Integrity and Confidentiality in order to provide security.  
Applies to governmental agencies, governmental contractors and telecommunications providers who provide services to anything deemed related to US national security. 



Solutions, Features & Benefits


Solution capabilities to help agencies to consolidate functionality and drive down total cost of operations. 


Think integrated security solution platforms

FIPS & NIST provides an authoritative description of security controls. 

Provide government agencies with best-of-breed “defence-in-depth” capabilities in a single enterprise-level manageable system. 




Section / Reference

> FIPS 199 

& 200, DOD8500.2
Solution


Requirement Level


Required

> FIPS 199 

& 200, NIST 800-94

IDS / IPS


Strongly Recommended

> NIST 800-92


Strongly Recommended

> A & B, NIST 800-26


Required

> NIST 800-40


24 Hours for Critical Updates


> NIST 800-77


Required



> NIST 800-53

> Risk Assessment

> Contingency Planning

> Configuration Management

> System and Information Integrity



> Incident Response

> Identification and Authentication

> Access Control

> Audit and Accountability

> System and Communications Protection



> Protect an agency or organisations most crucial data by fully auditing administrative access to systems and applications in the IT infrastructure.

> Provide the accountability of showing precisely who had access to sensitive data, at what time and for what stated purpose.
 




> Automated FISMA compliance reports

> Department of Defence JITC-MoonV6 tested IPv6 security

> Jumbo-frames support

> Advanced multi-cast, H323, SIP, OSPF and BGP routing

> Two-factor authentication for Common Access Card.

> Spyware protection

> Mobile user threat protection
> Instant-messaging defence

> Bandwidth shaping and extensive high-availability options

> Centralised control, management, security logging, forensic analysis, data mining, reporting and alerting

> High Availability solutions, Reliability and Performance

> Effectively control security policies and automatically collect, analyse and present security data used for quarterly FISMA reports to the Office of Management and Budget

> Enterprise Email Protection



Contact us today to discuss your requirements in more detail.



P: +44(0)7714 209927

S: +44(0)1273 329753

info@securenetconsulting.co.uk