SlideShare a Scribd company logo
Developing a Continuous Monitoring Action PlanAn InformationWeek Government Webcast  Sponsored by
Webcast Logistics
Welcome!John FoleyEditor InformationWeek Government
Today’s PresentersJohn StreufertDeputy Chief Information Officer Information AssuranceUnited States Department of StateSteve Johnston CISSP, ITIL Lead Federal Systems EngineerTripwire, Inc.
What Is Continuous Monitoring?       “Information security continuous monitoring is defined as maintaining ongoing awareness of information security, vulnerabilities, and threats to support organizational risk management decisions.”      >>NIST SP 800-137
Building It Into The IT Budget       “What makes us more secure is real-time security monitoring--continuous monitoring--and acting on data. That's why agencies are directed as part of the FY 2012 budgeting process to make sure that their budget reflects presidential priority in terms of investing in tools, not in paperwork reports.”    >>Federal CIO Vivek Kundra, June 2010
Continuous Monitoring Domains (NIST)
CIA Invests In RedSeal Systems      "Continuous monitoring technologies will enable the U.S. intelligence community to effectively operate the complex, dynamic network defenses that protect critical information and systems.”>>William Strecker, CTO, In-Q-Tel
FISMA 2.0: A Continuous MonitoringCase StudyJohn Streufert  ( DOSCISO@state.gov )Deputy Chief Information Officer for Information Security US Department of StateFebruary 14,  2011
Nature of Attacks 80% of attacks leverage known vulnerabilities and configuration management setting weaknesses10
Threats Increasing2%5%TypeTickets39%200851%1%2%19%2%9%201084%
Case Study:Scan every 36-72 hoursFind & Fix Top Issues DailyPersonal results graded Hold managers responsible12
How:   1. Narrow Aim13[11 months before Feb 09]
2.Bad things by NumbersChemical DumpingLittering  vs.L.A. Hotel Pays a$200,000 fine because an employee dumps pool chemicals into a drain fumes fill a subway station-- several people become ill March 23, 201014
Cube and Divide by 100
3.  CalculateGrades A+ to F -
4. Focus on Worst First
Results First 12 Months18Personal Computers and Servers
Risk Scoringin 2nd Year
Operation Aurora Attack20Call a Problem 40x Worse
21.when charging 40 points0 - 84% in seven (7) days0 - 93% in 30 days
  13  25  36  60  93133
1/3 of Remaining Risk Removed23[Year 2: PC’s/Servers]
24
25
Lessons LearnedWhen continuous monitoring augments snapshots required by FISMA:Mobilizing to lower risk is feasible & fast (11 mo)Changes in 24 time zones with no direct contactCost:  15 FTE above technical management baseThis approach leverages the wider workforceSecurity culture gains are grounded in fairness, commitment and personal accountability for improvement26
Next Steps
20 Year old commercial said“The quality goes in, before the name goes on”28
29Should we position our best solutions before or after accidents?Cofferdam unit departing Wild West in Port Fourchon on the Chouest 280 workship named Joe Griffin 05 May 2010  -- Photo from BP.com
RISK30
Continuous C&A PilotsPriority sequence: quick wins vs. long term:Inventory of Authorized Assets (CAG 1/2)Configuration and Vulnerability Monitoring               (CAG 3/4/10/12/13)SCAP Content (automated & non-automated testing)Boundary Defense (CAG  5/14)Situational Awareness and Threat AnalysisApplications (CAG 7)Access Controls (CAG 6/8/9/11)Data Loss Protection (CAG 15)31
32
ConclusionsRisk Scoring and Continuous Monitoring is scalable to large complex public and private sector organizationsHigher ROI for continuous monitoring of technical controls as a substitute for paper reportsSummarized risk estimates could be fed to enterprise level reporting33
Continuous Monitoring: Best PracticesSteve Johnston, CISSP, ITIL, Lead Federal Systems EngineerTripwire, Inc.
Provides continuous input to the C&A processMoves the focus back to securityEnables dynamic security to respond to evolving threatsProvides details of your information systemsMake risk based decisions
Take control and remain in control of your infrastructureSpirit of Continuous Monitoring
1Categorize Assets2Determine Risk Threshold3Establish Monitoring Frequency4Provide Detailed Reporting36
Categorize logically and  by criticalityIs it a critical asset?Is it a medical systemHigh, moderate or low severity?What kind of missions and programs do they support?Benefits to CategorizationEasier to make risk based decisionsHomepage and Reporting viewsRisks are easier to determine knowing the mission the asset supports37Categorize Assets
Intelligent information to make risk-based decisionsConfiguration data, log data – correlated togetherSet appropriate thresholds to policies and weights to control checksExample of Policy Thresholds
<50% Do Not Operational
<75% System should go through preplanning
<90% Operational
Test  and control weights need to be set
Weights affect the Risk scoring
Example:
HIGH - Administrator set blank password
LOW – Users are part of a remote desktop groupDetermine Risk Threshold38
39Determine frequency by function and risk associated with each system and security controlSystem level frequencySecurity Control level frequencyApplication level frequencyDetermine Monitoring Frequency

More Related Content

PDF
SuprTEK Continuous Monitoring
PDF
Information Security Continuous Monitoring within a Risk Management Framework
PPTX
Continuous Monitoring: Getting Past Complexity & Reducing Risk
PPTX
Achieving Continuous Monitoring with Security Automation
PDF
Guide for Applying The Risk Management Framework to Federal Information Systems
PPTX
INFOSECFORCE Risk Management Framework Transition Plan
PPTX
"Backoff" Malware: How to Know If You're Infected
PPTX
RMF Roles and Responsibilities (Part 1)
SuprTEK Continuous Monitoring
Information Security Continuous Monitoring within a Risk Management Framework
Continuous Monitoring: Getting Past Complexity & Reducing Risk
Achieving Continuous Monitoring with Security Automation
Guide for Applying The Risk Management Framework to Federal Information Systems
INFOSECFORCE Risk Management Framework Transition Plan
"Backoff" Malware: How to Know If You're Infected
RMF Roles and Responsibilities (Part 1)

What's hot (20)

PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...
PPTX
It security controls, plans, and procedures
 
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Con...
PPTX
Continual Monitoring
PPT
Securitymetrics
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 3: Roles
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam
PPTX
Introduction to NIST’s Risk Management Framework (RMF)
PPT
It Audit Expectations High Detail
PPTX
Prioritizing an audit program using the 20 critical controls
PPTX
Logging, monitoring and auditing
PDF
NIST SP 800 30 Flow Chart
PPTX
Automating for NERC CIP-007-5-R1
PPTX
Solving the CIO’s Cybersecurity Dilemma
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...
It security controls, plans, and procedures
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Con...
Continual Monitoring
Securitymetrics
Understanding the Risk Management Framework & (ISC)2 CAP Module 3: Roles
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam
Introduction to NIST’s Risk Management Framework (RMF)
It Audit Expectations High Detail
Prioritizing an audit program using the 20 critical controls
Logging, monitoring and auditing
NIST SP 800 30 Flow Chart
Automating for NERC CIP-007-5-R1
Solving the CIO’s Cybersecurity Dilemma
Ad

Viewers also liked (9)

PPTX
Continuous Monitoring Deck
PPTX
Security Intelligence for Energy Control Systems
PDF
DevOps Toolchain v1.0
PDF
Continuous Monitoring and Real Time Risk Scoring
PPT
Continuous Monitoring
PPTX
Continuous Delivery + DevOps = Awesome
PDF
Continuous Monitoring: Monitoring Strategy – Part 2 of 3
 
PPTX
DevOps and Continuous Delivery Reference Architectures (including Nexus and o...
PPT
How to Build a DevOps Toolchain
Continuous Monitoring Deck
Security Intelligence for Energy Control Systems
DevOps Toolchain v1.0
Continuous Monitoring and Real Time Risk Scoring
Continuous Monitoring
Continuous Delivery + DevOps = Awesome
Continuous Monitoring: Monitoring Strategy – Part 2 of 3
 
DevOps and Continuous Delivery Reference Architectures (including Nexus and o...
How to Build a DevOps Toolchain
Ad

Similar to Developing a Continuous Monitoring Action Plan (20)

PPTX
Federal Webinar: Best Practices and Tools for Reducing Insider Threats
PPTX
L11 Transition And Key Roles and SAT ROB IRP.pptx
PPT
Reorganizing Federal IT to Address Today's Threats
PDF
ThreatAlytics Compliance Monitoring CADSI 23 Nov_rev3
PDF
ESG-Economic-Validation-Fortinet-Automated-SOC-Jul-2023.pdf
PDF
The 7 Steps to Prevent IT-Caused Outages- A Comprehensive Approach
PPT
Risk Based Approach To Recovery And Continuity Management John P Morency
PDF
Cyber security white paper final PMD 12_28_16
PDF
Causes And Consequences Of Data Leakage
PPTX
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
PDF
Qatar Proposal
PPTX
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
PPTX
Security assessment isaca sv presentation jan 2016
PDF
Risk Management
PDF
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
DOCX
Unit III AssessmentQuestion 1 1. Compare and contrast two.docx
DOCX
E’s Data Security Company Strategic Security Plan – 2015.docx
PPTX
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
PPT
Core.co.enterprise.deck.06.16.10
PPT
Convergence innovative integration of security
Federal Webinar: Best Practices and Tools for Reducing Insider Threats
L11 Transition And Key Roles and SAT ROB IRP.pptx
Reorganizing Federal IT to Address Today's Threats
ThreatAlytics Compliance Monitoring CADSI 23 Nov_rev3
ESG-Economic-Validation-Fortinet-Automated-SOC-Jul-2023.pdf
The 7 Steps to Prevent IT-Caused Outages- A Comprehensive Approach
Risk Based Approach To Recovery And Continuity Management John P Morency
Cyber security white paper final PMD 12_28_16
Causes And Consequences Of Data Leakage
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
Qatar Proposal
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
Security assessment isaca sv presentation jan 2016
Risk Management
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
Unit III AssessmentQuestion 1 1. Compare and contrast two.docx
E’s Data Security Company Strategic Security Plan – 2015.docx
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
Core.co.enterprise.deck.06.16.10
Convergence innovative integration of security

More from Tripwire (20)

PDF
Mind the Cybersecurity Gap - Why Compliance Isn't Enough
PDF
Data Privacy Day 2022: Tips to Ensure Data Privacy
PDF
Key Challenges Facing IT/OT: Hear From The Experts
PPTX
Tripwire Energy Working Group: TIV Demo
PPTX
Tripwire Energy Working Group Session w/Dale Peterson
PPTX
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
PPTX
Tripwire Energy Working Group: Customer Session with Chase Cole
PPTX
Tripwire Energy Working Group: Keynote w/Patrick Miller
PDF
World Book Day: Cybersecurity’s Quietest Celebration
PDF
Tripwire Retail Security 2020 Survey: Key Findings
PDF
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
PDF
The Adventures of Captain Tripwire: Coloring Book!
PDF
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
PDF
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
PDF
Tripwire 2019 Skills Gap Survey: Key Findings
PDF
A Look Back at 2018: The Most Memorable Cyber Moments
PPTX
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
PDF
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
PPTX
Defend Your Data Now with the MITRE ATT&CK Framework
PPTX
Defending Critical Infrastructure Against Cyber Attacks
Mind the Cybersecurity Gap - Why Compliance Isn't Enough
Data Privacy Day 2022: Tips to Ensure Data Privacy
Key Challenges Facing IT/OT: Hear From The Experts
Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Keynote w/Patrick Miller
World Book Day: Cybersecurity’s Quietest Celebration
Tripwire Retail Security 2020 Survey: Key Findings
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
The Adventures of Captain Tripwire: Coloring Book!
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
Tripwire 2019 Skills Gap Survey: Key Findings
A Look Back at 2018: The Most Memorable Cyber Moments
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
Defend Your Data Now with the MITRE ATT&CK Framework
Defending Critical Infrastructure Against Cyber Attacks

Recently uploaded (20)

PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Big Data Technologies - Introduction.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Machine learning based COVID-19 study performance prediction
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
KodekX | Application Modernization Development
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPT
Teaching material agriculture food technology
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Approach and Philosophy of On baking technology
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Empathic Computing: Creating Shared Understanding
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Big Data Technologies - Introduction.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
Spectral efficient network and resource selection model in 5G networks
Unlocking AI with Model Context Protocol (MCP)
Digital-Transformation-Roadmap-for-Companies.pptx
CIFDAQ's Market Insight: SEC Turns Pro Crypto
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Machine learning based COVID-19 study performance prediction
Network Security Unit 5.pdf for BCA BBA.
KodekX | Application Modernization Development
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Teaching material agriculture food technology
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Approach and Philosophy of On baking technology
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Empathic Computing: Creating Shared Understanding

Developing a Continuous Monitoring Action Plan

Editor's Notes

  • #38: Is it a critical asset? Medical system?
  • #39: You need intelligent information to make risk-based decisions.
  • #40: You cannot “turn on” continuously monitoring or real-time on everything. So you need to choose the frequency.
  • #42: You need to feed that information to your authorizing official