preview

Information Security Continuous Monitoring (ISCM)

Decent Essays

The Department of Commerce (DOC) is required to implement an Information Security Continuous Monitoring (ISCM) Program as mandated by the Office of Management and Budget (OMB) Memorandum 14-03. The memorandum requires Federal agencies to manage information security risk on an ongoing basis. This document provides a high-level DOC-wide strategic plan for maintaining ongoing awareness of information security, vulnerabilities, and threats to support organizational risk management decisions. Otherwise known as information security continuous monitoring or ISCM, this strategic plan promotes informed and actionable risk management decisions; empowers leaders and improves organizational accountability; simplifies regulatory compliance through integrated …show more content…

• Identifying the automation and capabilities needed to support ISCM;
• Explaining how to leverage the Department of Homeland Security (DHS) Continuous Diagnostics and Mitigation (CDM) Program and supporting contract acquisition vehicle to implement continuous monitoring capabilities, and;
• Establishing metrics for evaluating the effectiveness of the program 3. BACKGROUND
The Federal government is moving to continuous monitoring to improve the security posture of government agencies by maintaining an ongoing awareness of threats and vulnerabilities to support near-real time risk management decisions. Requirements and guidance for implementing continuous monitoring can be found in the Cross-Agency Priority (CAP) goals, the Office of Management and Budget Memorandum 14-03, NIST SP 800-137, and other publications listed in the Applicable Laws and Guidance section of this document. The following paragraphs provide an overview of these …show more content…

Develop and maintain an ISCM strategy consistent with existing statutes, OMB policy, NIST guidelines and the CONOPS; and establish an ISCM program that provides a clear understanding of organizational risk and helps prioritize and manage risk consistently and addresses how the agency will conduct ongoing authorization of information systems and environments.
2. Establish plans, in coordination with the DHS, to implement the ISCM program.
3. Standardize the ISCM solution to the extent possible and deploy enterprise ISCM products and services, instead of disparate services across DOC.
4. Establish plans to migrate to the General Services Administration (GSA) Blanket Purchase Agreement (BPA) to acquire ISCM products and services.
5. Submit specified security-related information to the Federal ISCM dashboard.
6. Evaluate and upgrade information systems and deploy new products and dashboards to support ISCM and the need to submit security-related information to DHS and

Get Access