Access your Pro+ Content below.
Are FedRAMP security controls enough?
This article is part of the Information Security magazine issue of June 2013 / Volume 15 / No. 5
The U.S. government information technology strategy is out, and it’s clear that cloud-based platforms are now preferred over traditional, on-premise servers. The message is so strong that the strategy is referred to as “Cloud First.” Many businesses are struggling with how to assess and mitigate risks when using cloud service providers—the federal government is no different. It has developed a new methodology to help federal departments in their evaluations of cloud service providers in order to facilitate “a buy once, use many times” strategy. The Federal Risk and Management Accreditation Program (FedRAMP) is being jointly developed in coordination with multiple government entities and the private sector. It is based on a conglomeration of existing security standards including FISMA, NIST-800 and FIPS-199 in order to keep the cost of developing this new assessment tool under control. The goal is to build a catalog of pre-screened cloud service providers from which government agencies can select while reducing the cost of ...
Access this PRO+ Content for Free!
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Features in this issue
As MDM products rapidly evolve to support the growth of BYOD smartphones and tablets, security professionals need to rethink mobility policies.
Will big data analytics make security better? With data scientists in short supply, solution providers rush to provide big data analytics tools.
Cloud service providers are working with authorized third-party auditors to meet FedRAMP security controls. The 3PAOs tell us how it’s going, so far.
Columns in this issue
Philip Clarke, co-leader of the Wireless and Mobility track at Nemertes Research, reports on what’s ahead for mobile device management solutions.
The idea behind proactive security is simple: build security in the first time by following security models like BSIMM and security engineering.
If bad attitudes are spreading across the IT staff like germs, better IT security education may just be the cure.