Helping Meet FISMA Compliance With EventTracker

Helping Meet FISMA Compliance With EventTracker The Federal Information Security Management Act of 2002 (FISMA) was passed with the purpose of improving computer and network security at government agencies and government contractors. The Act called for increased security standards and yearly audits of the systems and processes, and tasked the National Institute of Standards and Technology (NIST) to come up with a set of standards and guidelines, in effect a set of documents that provide a framework for risk management, security and compliance. The NIST approach is to have agencies and contractors adopt a risk based approach - to independently assess systems, decide on security controls from NIST supplied guidelines, and then authorize the use of the system, with subsequent periodic reviews and reauthorization.

One criticism of FISMA has been that it is too heavy of the Certification and Accreditation process - i.e. the creation of the audit report and justifying an authorization, and less about actually improving security or being secure in the first place. Whatever the shortcomings, FISMA is a step in the right direction and the Control Frameworks take that one step further. By implementing the NIST Framework or the Frameworks applicable for national security systems (DCID 6/3 and DITSCAP/DIACAP) security is certainly enhanced.

This paper will focus on the NIST Framework and guidance contained in NIST Special Publication 800-53.

One of the areas that the Control Frameworks all universally agree upon is the importance of auditing user activity in your infrastructure as a critical method of improving overall security. User Activity Auditing requires the generation, collection and analysis of audit logs from network devices, systems and applications.

This White Paper introduces EventTracker from Prism Microsystems as a valuable solution to increase security, and as a means to enhance preparedness for FISMA.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.