The Splunk Platform

Splunk, Azure, or Sentinel for FedRAMP/NIST Compliance

| | Compliance
Whenever a business wants to work with the federal government, they are going to have to comply with certain frameworks to guarantee that, as part of the federal supply chain, it is secured to an appropriate level. The specific frameworks and standards vary based on factors such as impact levels ... Read More
Internal but Independent Verification

Chief Audit Executives: Job Description, Responsibilities & More

| | Compliance
Any business or service provider looking to work with the federal government or one of its departments or agencies is going to need to comply with one of the security frameworks as appropriate for their role, usually something like CMMC, FedRAMP, or HITRUST. A key part of these security frameworks ... Read More
3rd Open Security Controls Assessment Language (OSCAL) Workshop - Max Aulakh

What is OSCAL and Why Does It Matter for NIST and FedRAMP?

| | Compliance
What is OSCAL and Why Does It Matter for NIST and FedRAMP? Complying with federal cybersecurity guidelines is a difficult task. Unfortunately, many contractors and cloud service providers take a rather lax view of compliance, and it’s an all-too-common scenario for a company to build up standards and practices for ... Read More
Data Classification

Data Classification Guide and The NIST Classification Levels

| | NIST
Data Classification Guide and The NIST Classification Levels One of the biggest challenges for a business with any sort of information security needs is ensuring proper handling of that information. With hundreds of data breaches, large and small, happening every single year, you don’t want to be a statistic. More ... Read More
Defining Overall Security Posture

ConMon: FedRAMP Continuous Monitoring and How It Works

| | FedRAMP
Obtaining a software approval  with the federal government and its agencies as a contractor and obtaining an Authority to Operate (ATO) is not a one-time process. We’re not just referring to the need to recertify annually and pass occasional audits. We’re talking about an additional part of the process, the ... Read More
What is FIPS

FAQ: What is FIPS 140-2 and “Validated Cryptography”?

| | security
As time marches on and technology develops, there’s a constant push and pull between information security and attempts to breach that security. Obscurity – simply hiding from sight – isn’t enough with automated processes capable of scanning any possible address looking for signs of life, so much of modern computer ... Read More
Modern Data Storage

FAQ: What Are the DoD Requirements for Wiping Data?

| | security
In today’s digital age, destroying data is not as easy as it once was. Before the advent of computers, if you needed to destroy sensitive government information to prevent it from falling into the wrong hands, all you often needed to do was light some papers on fire. With computers, ... Read More
What is FIPS

FIPS 199 & 200 Compliance: Comparing Security Standards

| | Compliance
In the world of government contracting, information security is taken very seriously. There are a dozen different standards for security depending on who you are, what information you handle, and what department you’re working with. We’ve talked about many of them before, such as DFARS, FedRAMP, and CMMC, but there’s ... Read More
International Traffic in Arms Regulation

ITAR Compliance: 8 Essential Facts for Business Regulations

| | CMMC, Compliance
When choosing to take up government contracts, most businesses face one of the common compliance frameworks for security. They need to climb the mountain to achieve compliance with a framework like CMMC, FedRAMP, or maybe something like HIPAA if they’re in the healthcare space. Relatively few need to comply with ... Read More
A Cloud Business

Navigating Authority to Operate: FISMA or FedRAMP?

| | FedRAMP
Navigating Authority to Operate: FISMA or FedRAMP? Decades ago, the government stood on its own. While it would often contract out with individuals and companies for services, there was always a barrier between third-party operations and government operations to prevent intrusion, infiltration, or compromise. Over the years, though, society has ... Read More
Loading...