Federal Information Security Act
FISMA assigns three primary requirements to federal organisations:
(1) identify and prioritise what information systems need protection;
(2) select and implement appropriate controls, which may include a combination of administrative procedures, best practices and cyber security technology; and
(3) audit and report the results on a quarterly basis.
> Government organisations require a network security strategy that not only blocks known threats but also stays ahead of emerging ones.
> Defend against Hackivist DDoS attacks.
> Solutions provide the internal network visibility, actionable intelligence and mitigation capabilities your organisation needs to detect and block DDoS.
> Apache Hadoop Data-at-Rest Encryption.
The Challenge and Requirements
Achilles Heel of Security for Federal Agencies
Many federal networks deploy “defence-in-depth” architectures filled with point products to combat a myriad of potential attacks. Their intentions are good but implementations often lack the ability to correlate sophisticated blended and fragmented attacks, which use multiple entry vectors for propagation.
The “depth” label may be a misnomer. Budget constraints often limit protection of government network boundaries to layer-3 firewall and VPN mechanisms, which are unable to comprehend or stop layer 4 through 7 attacks
When agencies do implement multiple point security products, the point solutions usually do not collaborate against blended attacks or synthesise and use attack data from complementary defences.
Availability, Integrity and Confidentiality in order to provide security.
Applies to governmental agencies, governmental contractors and telecommunications providers who provide services to anything deemed related to US national security.
Solutions, Features & Benefits
Solution capabilities to help agencies to consolidate functionality and drive
down total cost of operations.
Think integrated security solution platforms
FIPS & NIST provides an authoritative description of security controls.
Provide government agencies with best-of-breed “defence-in-depth” capabilities in a single enterprise-level manageable system.
> NIST 800-53
Section / Reference
>
FIPS 199
& 200, DOD8500.2
|
Solution
|
Requirement Level
Required
|
>
FIPS 199
& 200, NIST 800-94
|
IDS / IPS |
Strongly
Recommended
|
>
NIST 800-92
|
Strongly
Recommended
|
|
>
A & B, NIST 800-26
|
Required
|
|
>
NIST 800-40
|
24 Hours for Critical Updates |
|
>
NIST 800-77
|
Required
|
> NIST 800-53
> Contingency Planning > Configuration Management > System and Information Integrity |
> Incident Response > Identification and Authentication > Access Control > Audit and Accountability > System and Communications Protection |
> Protect an agency or organisations most crucial data by fully auditing administrative access to systems and applications in the IT infrastructure.
> Provide the accountability of showing precisely who had access to sensitive data, at what time and for what stated purpose.
> Automated FISMA compliance reports
> Department of Defence JITC-MoonV6 tested IPv6 security
> Jumbo-frames support
> Advanced multi-cast, H323, SIP, OSPF and BGP routing
> Two-factor authentication for Common Access Card.
> Spyware protection
> Mobile user threat protection
|
> Instant-messaging defence
> Bandwidth shaping and extensive high-availability options
> Centralised control, management, security logging, forensic
analysis, data mining, reporting and alerting
> High Availability solutions, Reliability and Performance
> Effectively control security policies and automatically collect,
analyse and present security data used for quarterly FISMA reports to the
Office of Management and Budget
> Enterprise Email Protection
|
Contact us today to discuss your requirements in more detail.
![]()
P: +44(0)7714 209927
S: +44(0)1273 329753
|
![]()
info@securenetconsulting.co.uk
|