Access "Are FedRAMP security controls enough?"
This article is part of the June 2013 / Volume 15 / No. 5 issue of The rapid evolution of MDM solutions
The U.S. government information technology strategy is out, and it’s clear that cloud-based platforms are now preferred over traditional, on-premise servers. The message is so strong that the strategy is referred to as “Cloud First.” Many businesses are struggling with how to assess and mitigate risks when using cloud service providers—the federal government is no different. It has developed a new methodology to help federal departments in their evaluations of cloud service providers in order to facilitate “a buy once, use many times” strategy. The Federal Risk and Management Accreditation Program (FedRAMP) is being jointly developed in coordination with multiple government entities and the private sector. It is based on a conglomeration of existing security standards including FISMA, NIST-800 and FIPS-199 in order to keep the cost of developing this new assessment tool under control. The goal is to build a catalog of pre-screened cloud service providers from which government agencies can select while reducing the cost of multiple assessments. There is a ... Access >>>
Premium Content for Free.
MDM products: More calls to secure a mobile workforce
by Philip Clarke
As MDM products rapidly evolve to support the growth of BYOD smartphones and tablets, security professionals need to rethink mobility policies.
Are FedRAMP security controls enough?
by Joseph Granneman
Cloud service providers are working with authorized third-party auditors to meet FedRAMP security controls. The 3PAOs tell us how it’s going, so far.
- MDM products: More calls to secure a mobile workforce by Philip Clarke
Big data analytics: New patterns emerge for security
by Kathleen Richards
Will big data analytics make security better? With data scientists in short supply, solution providers rush to provide big data analytics tools.
- Big data analytics: New patterns emerge for security by Kathleen Richards
Diversity at work: MDM solutions keep pace
by Kathleen Richards
Philip Clarke, co-leader of the Wireless and Mobility track at Nemertes Research, reports on what’s ahead for mobile device management solutions.
McGraw: Financial services develop a proactive posture
by Gary McGraw, Contributor
The idea behind proactive security is simple: build security in the first time by following security models like BSIMM and security engineering.
Staff infection: IT security education is contagious
by Doug Jacobson, Julie A. Rursch
If bad attitudes are spreading across the IT staff like germs, better IT security education may just be the cure.
- Diversity at work: MDM solutions keep pace by Kathleen Richards
More Premium Content Accessible For Free
Devising a security strategy for the modern network
The network of today's enterprise is larger and more diverse than ever, which means there's more for hackers to attack. So as enterprises update ...
The big data challenge: What's in store for NoSQL security
In the rush to capitalize on big data, many companies forget that developing an ecosystem of structured and unstructured data means higher risk of ...
A comprehensive guide to securing the Internet of Things
As the number of Internet-connected devices grows, the potential security challenges of the so-called "Internet of Things," or IoT, can no longer be ...