Saturday, December 14, 2019
  • DEF CON 27, Social Engineering Village, ‘Chris Kirsch’s ‘Psychic Cold Reading Techniques’
  • XKCD, Timeline of the Universe
  • Idaptive Release 19.6 is Now Available
  • DEF CON 27, Social Engineering Village, Chris Hadnagy’s ‘SEVillage 10 Year Anniversary: A Look Back’
  • Single Sign-On Solutions for Education

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming
    • On-Demand
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
  • Library

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Governance, Risk & Compliance Security Bloggers Network 

Home » Cybersecurity » Governance, Risk & Compliance » 6 Common Compliance Conundrums to Know About

6 Common Compliance Conundrums to Know About

by Tripwire Guest Authors on May 13, 2019

Cyber security assessment initiatives and frameworks abound in the US government, the most important being the Federal Information Systems Management Act (FISMA), passed in 2002. The law’s broad scope included a mandate to the US National Institute of Standards and Technology (NIST), charging it to create methods and standards to assess and optimize the cybersecurity posture of US government agencies. NIST’s flagship methodology, Risk Management Framework (RMF), or DIARMF in the DoD, is comprehensive and fundamentally sound.

However, years of experience have exposed flaws in the RMF.  Some stem from lack of proper adoption and execution, some from unintended consequences and others arise from the relentless pace of innovation in technology.

Here are some of the problems I have witnessed in my years of running cybersecurity programs for the Federal government.

  1. Conflicts of interest

Government agencies typically pay a systems integrator to assess the security posture of the agency. This arrangement can put a contractor in a difficult position; they must discover and document weaknesses in systems or business processes that might embarrass the agency paying them. As a result, there can be pressure to minimize or ignore security problems.

  1. Plan of Action and Milestone (POA&M) abuse

Security assessor’s document deficiencies in a set of Plans of Action and Milestone, or POA&Ms. A POA&M includes a description of the problem and estimates of the cost and schedule required to remediate the problem. When the deadlines pass, there is typically no action: an administrator simply edits the due date to keep pushing it back, and problems remain without solutions for very long periods. In one case, I insisted on rectifying an issue that had been open for over seven years but took only 24 hours to address.

  1. Excessive emphasis on compliance and burdensome documentation

To (Read more...)

*** This is a Security Bloggers Network syndicated blog from The State of Security authored by Tripwire Guest Authors. Read the original post at: https://www.tripwire.com/state-of-security/regulatory-compliance/6-common-compliance-conundrums/

May 13, 2019May 14, 2019 Tripwire Guest Authors Federal, FISMA, government, NIST, Regulatory Compliance
  • ← Women and Nonbinary People in Information Security: Stacey Holleran
  • Welcoming FIPS 140-3 →
Featured Blog

Enzoic

Automate Password Policy & NIST Password Guidelines

Enzoic

Microsoft Highlights The Risk of Stolen Passwords

Enzoic

Enzoic Customer Profile: IDShield

Enzoic

Old vs. New Methods for Employee Password Hardening

Subscribe to our Newsletters

Get breaking news, free eBooks and upcoming events delivered to your inbox.
  • View Security Boulevard Privacy Policy

Most Read on the Boulevard

Predictions 2020: Data Security Next Year and Beyond
AWS Previews Cloud Security Advances
Predictions 2020: Don’t Forget the Current Threats
Trend Micro Looks to the Cloud for Security
Encryption Wars, Part IV: Barr vs. Big Tech
Year in Review: 18 Cybersecurity Statistics and Research Figures Summarizing 2019
Don’t Fall for the Hype – Marketing Myths in Artificial Intelligence for Cybersecurity
Plundervolt! A new Intel Processor ‘undervolting’ Vulnerability
The Evolution of Threat Hunting
Cybersecurity for Building Automation Systems

Upcoming Webinars

There are no upcoming webinars at this time.

Download Free eBook

The Next Generation of Application Security

Recent Security Boulevard Chats

  • Cloud, DevSecOps and Network Security, All Together?
  • Security-as-Code with Tim Jefferson, Barracuda Networks
  • ASRTM with Rohit Sethi, Security Compass
  • Deception: Art or Science, Ofer Israeli, Illusive Networks
  • Tips to Secure IoT and Connected Systems w/ DigiCert

Industry Spotlight

Cyberattacks: Top 5 Ways You Could Be Hacked in 2020
Cybersecurity Industry Spotlight Security Awareness Security Boulevard (Original) 

Cyberattacks: Top 5 Ways You Could Be Hacked in 2020

December 13, 2019 Michael Bruemmer | 1 day ago 0
Predictions 2020: Don’t Forget the Current Threats
Cybersecurity Industry Spotlight Network Security Security Boulevard (Original) 

Predictions 2020: Don’t Forget the Current Threats

December 12, 2019 Craig DAbreo | 2 days ago 0
Predictions 2020: Data Security Next Year and Beyond
Cybersecurity Data Security Industry Spotlight Security Boulevard (Original) 

Predictions 2020: Data Security Next Year and Beyond

December 10, 2019 Ameesh Divatia | 4 days ago 0

Top Stories

Hacking Ring Security Cameras: Amazon Makes it Easy
Cybersecurity Endpoint Featured Identity & Access IoT & ICS Security News Security Boulevard (Original) Spotlight 

Hacking Ring Security Cameras: Amazon Makes it Easy

December 13, 2019 Richi Jennings | 1 day ago 0
Cyberhaven Applies Behavioral Analytics to Better Secure Data
Cybersecurity Data Security Featured News Security Boulevard (Original) Spotlight 

Cyberhaven Applies Behavioral Analytics to Better Secure Data

December 12, 2019 Michael Vizard | 2 days ago 0
Apple Passive-Aggressive PR Sparks Privacy Fear (Yet Again)
Cybersecurity Endpoint Featured Mobile Security News Security Boulevard (Original) Spotlight Threats & Breaches 

Apple Passive-Aggressive PR Sparks Privacy Fear (Yet Again)

December 6, 2019 Richi Jennings | Dec 06 0

Security Humor

via    the comic delivery system monikered  Randall Munroe  at   XKCD  !

XKCD, Timeline of the Universe

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: info@securityboulevard.com

Useful Links

  • About
  • Media Kit
  • Sponsors Info
  • Copyright
  • TOS
  • Privacy Policy
  • DMCA Compliance Statement

Other Mediaops Sites

  • Container Journal
  • DevOps.com
  • DevOps Connect
  • DevOps Institute
Copyright © 2019 MediaOps Inc. All rights reserved.
Our website uses cookies. By continuing to browse the website you are agreeing to our use of cookies. For more information on how we use cookies and how you can disable them, please read our Privacy Policy.