How Arlington Helps DoD Contractors Earn Authorization to Operate (ATO) Status with eMASS
In an increasingly digital world, the Department of Defense (DoD) relies on a complex network of systems and technologies to protect our nation's security. To ensure the integrity and security of these systems, DoD contractors operating within cleared industry must obtain Authorization to Operate (ATO) status, demonstrating compliance with stringent information security and cybersecurity regulations.
eMASS, DCSA, RMF, A&A, ATO Services for Classified DoD Systems
In today's digitally driven world, security compliance isn't just a necessity; it's a mission-critical endeavor, especially for organizations entrusted with classified information under the National Industrial Security Program (NISP). Ensuring robust security measures and meeting Authorization and Accreditation (A&A) requirements is no small feat. This is where Arlington steps in as your trusted partner, providing specialized eMASS (Enterprise Mission Assurance Support Service) NISP consulting to help you navigate the complexities of A&A.
DoD Aiming for IPv6 Transition Once Again as NSA Publishes Security Guidance
In what seems to be the third time up for bat, the Department of Defense (DoD) is once again taking a swing at IPv6, with the National Security Agency (NSA) providing guidance on such a transition. Per an NSA announcement on January 18, 2023, “IPv6 Security Guidance” highlights how several security issues can surface in networks that are new to IPv6, or in early phases of the IPv6 transition. Networks new to IPv6 lack maturity in IPv6...and dual-stacked networks, which run on IPv4 and IPv6 simultaneously, have an increased attack surface.”
The DoD Cybersecurity Policy Chart - An Illustration of the Tremendous Breadth of Policies and Regulations for Cybersecurity
Want to know what’s going on in the world of cybersecurity with the Department of Defense (DoD). Just take a look at the massively detailed DoD Cybesecurity Chart at https://dodiac.dtic.mil/dod-cybersecurity-policy-chart/. At first glance there is a lot - I mean a lot of information on almost any imaginable topic on cybersecurity for the DoD. The DoD’s official stance on their multi-colored, well-organized Cyber chart is “...is to capture the tremendous breadth of applicable policies, some of which many cybersecurity professionals may not even be aware, in a helpful organizational scheme. The use of color, fonts and hyperlinks are all designed to provide additional assistance to cybersecurity professionals navigating their way through policy issues in order to defend their networks, systems and data.”
National Security Memorandum-8 Signed by President Biden Shows U.S. is Serious about Cybersecurity
On January 19, 2022, President Biden signed National Security Memorandum-8, Improving Cybersecurity of National Security, DOD, and Intelligence Community Systems. This long awaited NSM requires that, at minimum, National Security Systems employ the same network cybersecurity measures as those required of federal civilian networks in Executive Order 14028. The NSM builds on the Biden Administration’s work to protect the United States from sophisticated malicious cyber activity, from both nation-state actors and cyber criminals.
NISP eMASS DCSA | The Importance of SCAP Tools for Cleared Industry
The Security Content Automation Protocol (SCAP) is a method for using specific standards to enable automated vulnerability management, measurement, and policy compliance evaluation of systems deployed in an organization, including e.g., FISMA (Federal Information Security Management Act, 2002) compliance.
NISP eMASS DCSA | POA&M Requirements for Industry
Per DCSA,
- All Non compliant security controls must be included on the POA&M.
- Items should include specific steps required in support of particular Milestone events.
- Realistic dates should be provided as supported by the underlying and documented steps. (Note: Don’t include items on the POA&M and simply set a date for three years from when it was entered.).
- POA&M items are approved as a part of the IS authorization package. A separate approval is not needed unless the POA&M needs revision.
NISP eMASS DCSA | Continuous Monitoring (ConMon) Requirements
Per DCSA,
- Continuous Monitoring (ConMon) is an important aspect of the overall security because it communicates to DCSA how controls are going to be assessed for continued effectiveness over time.
- ConMon strategies should include details related to steps that “will be” taken by the defined frequency to check on controls.
- Frequencies that differ from the recommended DAAPM Appendix A timeframes should be justified. Don’t expect to be able to make all checks an annual event.
- The ISSP will validate your documented ConMon activities against the verbiage in the SLCM during CMEs and eSVAs. Deviations from documented SLCM activities will likely result in vulnerabilities being documented/cited during the CME/eSVA.
NISP eMASS DCSA | The Importance of STIGs for Cleared Industry
Security Technical Implementation Guides (STIGs) are configuration standards developed by the Defense Information Systems Agency (DISA). They are designed to make device hardware and software as secure as possible, safeguarding the Department of Defense (DoD) IT network and systems.