LTS Secure SOC BOX: FISMA Cyber Security Compliance Management
The Federal Information Security Management Act of 2002 ("FISMA", 44 U.S.C. §
3541, et seq.) is a United States federal law enacted in 2002 as Title III of the E‐
Government Act of 2002 (Pub. L. 107‐347, 116 Stat. 2899). The Act is meant to
bolster computer and network security within the Federal Government and
affiliated parties (such as government contractors) by mandating information
security controls and periodic audits.
Every federal agency, including their providers, contractors & those who do business with them of any kind are required to develop, document & implement an agency wide information security program in order to be complaint with Federal Information Security Modernization Act (FISMA).
FISMA aims to enhance the government’s information security systems, while minimizing the information technology risk to an agreeable level. However, due to its broad requirements and far-reaching scope, complying with FISMA can be a daunting task.
Some of the main FISMA requirements in context of InfoSec Policies include:
- Maintain an inventory of information systems
- Categorize information and information systems according to risk level
- Maintain a system security plan
- Implement security controls (NIST 800-53)
- Conduct risk assessments
- Certification and accreditation
- Conduct continuous monitoring
NIST SP 800‐37 and FISMA
As part of its FISMA responsibility to develop standards and guidance for federal agencies, NIST created
Special Publication (SP) 800‐37 “Guide for the Security Certification and Accreditation of Federal
Information Systems.” This guide is an integral part of the NIST Risk Management Framework for FISMA
and is used by agencies to understand requirements and implement tasks pertaining to the certification,
accreditation and continuous monitoring of information systems.
The NIST SP 800‐37 certification and accreditation process consists of four distinct phases as shown in
• Ensure that the authorizing official and senior agency
information security officer are in agreement with the
contents of the system security plan.
Initiation Phase
• Determine the extent to which the security controls in
the information system are implemented correctly,
operating as intended, and producing the desired
outcome.
Certification
Phase
• Determine if the remaining known vulnerabilities in
the information system pose an acceptable level of
risk to agency operations, agency assets, or
individuals.
Security Accreditation
Phase
• Provide oversight and monitoring of security
controls in the information system on an ongoing
basis and to inform the authorizing official when
changes occur.
Continuous Monitoring
Phase
Figure 3 NIST SP 800‐37
LTS Secure SOC BOX delivers multiple essential security capabilities, streamlining and expediting your path to FISMA compliance.
- Asset Discovery & Management
- Vulnerability Assessment & Management
- Event Correlation
- Intrusion Detection (IDS)
- Behavioral Monitoring
- Integrated Threat Intelligence
- Automated log collection and storage
- FISMA Reporting
The solution helps your IT Security teams perform tasks like:-
- Classify the devices, applications & data on your network.
- Set up diverse set of security controls to monitor policy compliance.
- Constantly monitor security controls, detect and respond to malicious/suspicious activities.
NIST 800-37 Task |
Description |
LTS Secure Solution |
TASK 1 : Preparation |
||
Task:1.3 Threat Identification |
Confirm potential threats that could exploit information system flaws or weaknesses have been identified and documented in the system security plan, risk assessment, or an equivalent document. |
LTS Secure’s SIEM inbuilt IDS/IPS |
Task:1.4 Vulnerability Identification
|
Confirm that flaws or |
Per NIST’s recommendation, |
Task:1.6 Initial Risk |
Confirm that the risk to agency |
LTS Secure can identify |
Task 4: Security Control Assessment |
||
Task 4.1 Documentation and |
Assemble any documentation |
The VA report |
Task 4.2 Methods and |
Select, or develop when needed, |
LTS Secure’s application security |
Task 4.3 Security Assessment |
Assess the management, |
LTS Secure’s automated |
Task 4.4 Security Assessment |
Prepare the final security |
LTS Secure’s application security |
Task 5: Security Certification Documentation |
||
Task 5.1: Findings and |
Provide the information system |
LTS Secure’s application security |
Task 5.3: Plan of Action and |
Prepare the plan of action and |
LTS Secure provides agencies with |
Task 8: Configuration Management and Control |
||
Task 8.2: Security Impact |
Analyze the proposed or actual |
LTS Secure enables applications to |
Task 9: Security Control Monitoring |
||
Task 9.2: Selected Security |
Assess an agreed‐upon set of |
Using LTS Secure’s application |
NIST 800‐37 Task |
Description |
LTS Secure Solution |
determine the extent to which |
vulnerabilities to determine if |
|
Task 10: Status Reporting and Do10cumentation |
||
Task 10.2: Plan of Action and |
Update the plan of action and |
LTS Secure provides agencies with |