SlideShare uma empresa Scribd logo
1 de 27
1@solarwinds
RMF, DISA STIG, and NIST FISMA
Compliance Using SolarWinds
Government Webinar
November 19, 2020
2@solarwinds
Speaker Introductions
© 2020 SolarWinds Worldwide, LLC. All rights reserved.
Kevin Davalos
Intermediate Sales Engineer
kevin.davalos@solarwinds.com
512.498.6056 (office)
3@solarwinds
Agenda
© 2020 SolarWinds Worldwide, LLC. All rights reserved.
• Compliance and SolarWinds®
solution overviews
• FISMA and STIGs security
controls and compliance review
• Risk Management Framework
and compliance review
• Security and compliance
product reviews
• Questions and answers
• Additional resources
4@solarwinds
Compliance and
SolarWinds
Solution Overviews
© 2020 SolarWinds Worldwide, LLC. All rights reserved.
5@solarwinds
Compliance Overview
Federal Information Security Management Act (FISMA)
(NIST: FISMA Background- http://csrc.nist.gov/groups/SMA/fisma/overview.html)
• Designed to protect the nation’s critical infrastructure
• Standardization for categorizing IT systems by mission impact (FIPS 199)
• Security standards for data and IT systems (FIPS 200)
• Establishes baseline security controls and provides general guidance (SP 800-53)
• Requires protection of sensitive data on contractor information systems (SP 800-171)
Risk Management and Cybersecurity Frameworks
• Risk Management Framework (RMF) supports the implementation of FISMA, is mandatory for
federal agencies, and has been widely adopted by the DOD (SP 800-37)
(RMF background- http://csrc.nist.gov/groups/SMA/fisma/framework.html)
• The Framework for Improving Critical Infrastructure Cybersecurity (aka the Cybersecurity Framework
or NIST CSF) was developed, enhanced, and recently mandated for executive departments and
agencies by Presidential Executive Orders
(CSF background- https://www.nist.gov/cyberframework)
© 2020 SolarWinds Worldwide, LLC. All rights reserved.
6@solarwinds
Compliance Overview (cont’d)
Security Technical Implementation Guides (STIGs)
(STIGs background- http://www.disa.mil/Cybersecurity/Secure-Configuration-Guidance)
• Technical guidelines for infrastructure installation and maintenance developed by DISA
to reduce vulnerability
• Create an inventory of all systems and software to determine which DISA STIGs to apply
• Monitor configurations and produce compliance reports
• Manage configurations to achieve and maintain compliance
Compliance Audits and Certification
• Preparing for an audit requires considerable documentation and reporting
• Audits require detailed knowledge of networked hardware and applications
(including asset inventories, locations, configurations, access privileges, and vulnerabilities)
• Cybersecurity Maturity Model Certification (CMMC) is being phased in for government contractors
over the next several years; self-certification of 800-171 recently required to bid new DOD
opportunities
© 2020 SolarWinds Worldwide, LLC. All rights reserved.
7@solarwinds
Risk Management Framework
© 2020 SolarWinds Worldwide, LLC. All rights reserved.
PROCESS
OVERVIEW
Starting Point
(repeat as necessary)
RISK MANAGEMENT
FRAMEWORK
Step 1
CATEGORIZE
Information Systems
Step 6
MONITOR
Security Controls
Step 5
AUTHORIZE
Information Systems Step 4
ASSESS
Security Controls
Step 3
IMPLEMENT
Security Controls
Step 2
SELECT
Security Controls
Organizational Inputs
Laws, Directives, Policy Guidance
Strategic Goals and Objectives
Priorities and Resource Availability
Supply Chain Considerations
Architecture Description
Architecture Reference Models
Segment and Solution Architecture
Mission and Business Processes
Information Systems Boundaries
Source: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-37r1.pdf
8@solarwinds
Cybersecurity Framework
© 2020 SolarWinds Worldwide, LLC. All rights reserved.
PROCESS OVERVIEW
CYBER SECURITY
FRAMEWORK
Step 1
IDENTIFY
risks to systems, assets,
data, and capabilities
Step 5
RECOVER
capabilities or services
Step 4
RESPOND
with the appropriate
activities
Step 3
DETECT
occurrences of
cybersecurity events
Step 2
PROTECT
with appropriate
safeguards
Source: https://www.nist.gov/sites/default/files/documents/draft-cybersecurity-framework-v1.11.pdf
9@solarwinds© 2020 SolarWinds Worldwide, LLC. All rights reserved.
Security Product Overview
A security and information event
management (SIEM) product designed to
ensure and demonstrate compliance
Security Event Manager
Safely transfer files in a central
management interface
Serv-U® Managed File Transfer
Third-party software updates and inventory
leveraging Microsoft® WSUS or SCCM
Patch Manager
Automated network configuration and change
management software
Network Configuration Manager
Track and compare system and application
changes over time
Server Configuration Monitor
Manage and audit user access rights
across your IT infrastructure
Access Rights Manager
10@solarwinds
SolarWinds Compliance Features
Network Configuration Manager
• Inventory network device configurations, assess configurations for
compliance, and automate change and configuration management
• Implement configuration of security controls and help assure effectiveness
• Produce FISMA and DISA STIGs reports from configuration templates
• Produce audit documentation and reports
Security Event Manager
• Configure correlation rules to help assure effectiveness of security
controls
• Real-time and continuous monitoring of security controls
• Produce FISMA and DISA STIGs compliance reports from templates
• Supports DISA STIGs requirements for configuration auditing, log
analysis, and broader network security
• Tracks and report suspicious activities/attacks to provide auditing support
© 2020 SolarWinds Worldwide, LLC. All rights reserved.
11@solarwinds
SolarWinds Compliance Features
Access Rights Manager
• Built to monitor suspicious account activity, validate IT compliance, and
deliver custom Active Directory reports
• Facilitates fast and safe user account management
• Automate deprovisioning for staff and contractors to help meet security
policies
• NTFS permissions report tool streamlines user access control and
auditing
• Produce audit documentation and reports
Patch Manager
• Automate patching of Microsoft and third-party applications to help
improve compliance
• Schedule patches for minimum downtime
• Inventory software and physical components per server or workstation
© 2020 SolarWinds Worldwide, LLC. All rights reserved.
12@solarwinds
SolarWinds Compliance Features
Server Configuration Monitor
• Policy engine helps monitor for compliance
• Baseline Windows® and Linux® server and application configs and
alert and report on changes
• Detect, alert, and report on changes with hardware inventory, registry
entries, binary and text files, software inventory, IIS configuration files,
and script outputs
• Monitor databases for unauthorized changes
• Track server hardware and software inventory
Network Performance Monitor
• Trend utilization for capacity planning
• Monitor network health and availability
• Identify protocol latency delays
• Produce audit documentation and reports
© 2020 SolarWinds Worldwide, LLC. All rights reserved.
13@solarwinds
FISMA and STIGs
Security Controls and
Compliance Review
14@solarwinds
FISMA Security Controls Where We Can Help
Access controls
• Most of these controls will be implemented at the policy or device level
• Security Event Manager (SEM) can help audit and monitor for potential changes, for
example:
• SEM can assist with AU2(12): “Atypical Usage” by looking for logon activity or patterns that
are outside your environment norms
• SEM can help satisfy AU-2(2): Automated Auditing for creation, modification, enabling,
disabling, and removal
• Network Configuration Manager (NCM) can help you monitor/manage configurations,
real-time changes, or identify violations when it comes to network systems
Audit and accountability
• SEM can help satisfy some controls directly, for example:
• AU-5: Audit Processing Failures - SEM generates events when there are processing failures
• AU-8: Time Stamps - SEM satisfies this control and also uses timestamps provided by log
sources
• NCM tracks who requested the configuration change, or who made the change directly
© 2020 SolarWinds Worldwide, LLC. All rights reserved.
15@solarwinds
FISMA Security Controls Where We Can Help (cont’d)
Configuration management
• NCM can satisfy some controls directly, and includes prebuilt templates for compliance
with configuration policies for network devices
• Patch Manager (Patch) and SEM can also help in a few key areas
Incident response
• SEM provides some help when it comes to incident generation and investigation
• Users can also leverage active response to provide in-the-moment capabilities to deal
with incidents as they occur, such as:
• IR-4: Incident Handling - SEM can support this, including IR-4(4) information correlation, IR-
4(5) automatic disabling of information system, and IR-4(9) dynamic response capability
• IR-5: Incident Monitoring - SEM can generate incidents from correlated activities, and this
information can be tracked and stored
• NCM utilizes real-time configuration checking to auto-download/notify when there have
been changes to device configurations
© 2020 SolarWinds Worldwide, LLC. All rights reserved.
16@solarwinds
FISMA Security Controls Where We Can Help (cont’d)
System maintenance
• SEM can help alert when logs don't seem to be according to expected maintenance
policies
• When it comes to network devices, NCM helps with controlling and managing
configuration approvals, and keeping a history of past configurations, noting when the
change occurred
Media protection
• SEM's USB Defender® feature can help with automated controls of removable devices
Security planning
• SEM can be used to centrally manage auditing and monitoring, and supports defense-
in-depth techniques
• NCM Approval allows an approval authority before making changes affecting the
network
© 2020 SolarWinds Worldwide, LLC. All rights reserved.
17@solarwinds
FISMA Security Controls Where We Can Help (cont’d)
Personnel security
• A lot of this control area is external and policy-related, but SEM can be used to ensure
what should happen actually did (i.e., trust, but verify)
Risk assessment
• SEM and Patch both help with vulnerability scanning
• Patch can notify or auto-update missing patches on affected systems
System and communication protection
• Many of our solutions help detect Denial of Service attacks
• We also offer tools to support boundary protection and VoIP
System and information integrity
• SEM helps with this control by providing system, software, firmware, and file integrity
monitoring
• There are also a couple of other smaller areas of note
© 2020 SolarWinds Worldwide, LLC. All rights reserved.
18@solarwinds
DISA STIGs Compliance Where We Can Help
DISA STIGs and NIST FISMA reports ship with NCM to help IT pros improve
compliance
SEM has a range of features to support DISA STIGs compliance
• Supports DISA STIGs compliance via our real-time monitoring of related
events across systems, network devices, applications, and security tools
• Supports configuration auditing, including logs of relevant STIGs best
practices, configuration changes, installation of unapproved software,
and more
• Many of SEM’s out-of-the-box rules can be used to address STIGSs
• SEM also includes DISA STIGs and FISMA compliance reports
© 2020 SolarWinds Worldwide, LLC. All rights reserved.
19@solarwinds
Risk Management
Framework and
Compliance Review
© 2020 SolarWinds Worldwide, LLC. All rights reserved.
20@solarwinds© 2020 SolarWinds Worldwide, LLC. All rights reserved.
RMF Step SolarWinds Products Features
Step 1 – CATEGORIZE Information Systems Network Performance Monitor
Server & Application Monitor
Network Configuration Manager
Web Help Desk
Hardware/Software Discovery
Asset Inventory
Software Inventory
Step 2 – SELECT Security Controls Network Configuration Manager
Server Configuration Monitor
Security Event Manager
User Device Tracker
Vulnerability Scanning
Configuration Compliance
Continuous Monitoring
Rogue Device Detection
Step 3 – IMPLEMENT Security Controls Network Configuration Manager
Server Configuration Monitor
Patch Manager
Patch Updates
STIG Compliance
Step 4 – ASSESS Security Controls Access Rights Manager
Security Event Manager
Patch Manager
Access Rights Management
Monitoring Event Logs
Patch Updates
Step 5 – AUTHORIZE Information Systems Network Configuration Manager
Server Configuration Monitor
Security Event Manager
Patch Manager
Reports
Step 6 – MONITOR Security Controls Security Event Manager
Network Performance Monitor
Network Configuration Manager
Server & Application Monitor
Log Monitoring
Network Monitoring
Configuration Monitoring
Application Monitoring
21@solarwinds
DEMO
© 2020 SolarWinds Worldwide, LLC. All rights reserved.
22@solarwinds
Q&A
© 2020 SolarWinds Worldwide, LLC. All rights reserved.
Call government sales:
877.946.3751
Contact federal sales:
federalsales@solarwinds.com
Contact state and local
government sales:
governmentsales@solarwinds.com
Contact education sales:
educationsales@solarwinds.com
23@solarwinds
Resources to Help Reduce Vulnerabilities
Review a blog on FISMA requirements:
https://www.solarwinds.com/federal-government/solution/fisma-compliance-requirements
Review a blog on how SolarWinds software can help with CIS controls:
https://thwack.solarwinds.com/community/solarwinds-community/product-blog/blog/2017/08/18/solarwinds-and-cis-critical-
security-controls
Review a blog on how SolarWinds software can help with NIST FISMA/RMF compliance:
https://thwack.solarwinds.com/community/solarwinds-community/product-blog/blog/2015/08/01/fisma-nist-800-53-
compliance-with-solarwinds-products
Review a blog on how SolarWinds software can help with DISA STIGS compliance:
https://thwack.solarwinds.com/community/solarwinds-community/product-blog/blog/2011/09/07/disa-stig-compliance-with-
log-event-manager
Watch a federal security compliance video:
http://www.solarwinds.com/resources/videos/solarwinds-federal-security-compliance.html
Download a compliance white paper:
https://try.solarwinds.com/gov/whitepapers/ultimate-guide-federal-it-compliance
Download a continuous monitoring white paper:
https://try.solarwinds.com/gov/whitepapers/daily-federal-compliance-and-continuous-cybersecurity-monitoring
© 2020 SolarWinds Worldwide, LLC. All rights reserved.
24@solarwinds
THANK
YOU
© 2020 SolarWinds Worldwide, LLC. All rights reserved.
25@solarwinds
Contact Us
• Call government sales: 877.946.3751
• Email SolarWinds federal government sales: federalsales@solarwinds.com
• Email SolarWinds state and local government sales:
governmentsales@solarwinds.com
• Email SolarWinds education sales: educationsales@solarwinds.com
• Visit our THWACK® government group: http://thwack.com/government
• Watch a short demo video: http://demo.solarwinds.com/sedemo/
• Download a free trial: http://www.solarwinds.com/downloads/
• Visit our government website: http://www.solarwinds.com/government
• Follow us on LinkedIn®: https://www.linkedin.com/company/solarwinds-
government
Let us know how we can help you
© 2020 SolarWinds Worldwide, LLC. All rights reserved.
26@solarwinds
Who We Are
© 2020 SolarWinds Worldwide, LLC. All rights reserved.
#1
in Network
Management1
320,000+
customers in 190
countries3
55+
IT management
products
22,000+ MSPs serving
450,000+
organizations
Every branch of the DoD, and
nearly every civilian and
intelligence agency
150,000+ registered members of THWACK®, our global IT community
Founded in 1999
More than 3,200
employees globally
Austin, TX headquarters
Reston, VA government office
30+ offices globally
Leader
in Remote Monitoring
and Management
#3
in ITOM Performance
Analysis2
Growing
Security
Portfolio
499 of
Fortune 500®
1. IDC-defined Network Management Software functional market, IDC’s Worldwide Semiannual Software Tracker, October 15, 2020.
2. Gartner, Market Share Analysis: ITOM Performance Analysis Software, Worldwide, 2019. June 17, 2020. (AIOps/ITIM/Other Monitoring Tools Software Market). SolarWinds term, Systems Management, refers to the AIOps/ITIM/Other Monitoring Tools
Software Market Taxonomy referenced in the Gartner report. All statements in this report attributable to Gartner represent SolarWinds interpretation of data, research opinion, or viewpoints published as part of a syndicated subscription service by
Gartner, Inc., and have not been reviewed by Gartner. Each Gartner publication speaks as of its original publication date (and not as of the date of this presentation). The opinions expressed in Gartner publications are not representations of fact and
are subject to change without notice.
3. Customers are defined as individuals or entities that have an active subscription for our subscription products or that have purchased one or more of our perpetual license products since our inception under a unique customer identification number.
We may have multiple purchasers of our products within a single organization, each of which may be assigned a unique customer identification number and deemed a separate customer.
27@solarwinds
The SolarWinds, SolarWinds & Design, Orion, and THWACK
trademarks are the exclusive property of SolarWinds Worldwide,
LLC or its affiliates, are registered with the U.S. Patent and
Trademark Office, and may be registered or pending registration
in other countries. All other SolarWinds trademarks, service
marks, and logos may be common law marks or are registered or
pending registration. All other trademarks mentioned herein are
used for identification purposes only and are trademarks of (and
may be registered trademarks) of their respective companies.
© 2020 SolarWinds Worldwide, LLC. All rights reserved.

Mais conteúdo relacionado

Mais procurados

Webinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWindsWebinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWindsSolarWinds
 
Government and Education Webinar: Cyber Technology to Enable Operator Effecti...
Government and Education Webinar: Cyber Technology to Enable Operator Effecti...Government and Education Webinar: Cyber Technology to Enable Operator Effecti...
Government and Education Webinar: Cyber Technology to Enable Operator Effecti...SolarWinds
 
The Seismic Impact of the SolarWinds Hack
The Seismic Impact of the SolarWinds HackThe Seismic Impact of the SolarWinds Hack
The Seismic Impact of the SolarWinds HackNicole Fucile-Borsian
 
Government and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid WorkforceGovernment and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid WorkforceSolarWinds
 
Government and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT OperationsGovernment and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT OperationsSolarWinds
 
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...SolarWinds
 
Monitoring and Securing Active Directory Government Webinar for the US Army
Monitoring and Securing Active Directory Government Webinar for the US ArmyMonitoring and Securing Active Directory Government Webinar for the US Army
Monitoring and Securing Active Directory Government Webinar for the US ArmySolarWinds
 
Government Webinar: Five Essential IT Tools You Need Today
Government Webinar: Five Essential IT Tools You Need TodayGovernment Webinar: Five Essential IT Tools You Need Today
Government Webinar: Five Essential IT Tools You Need TodaySolarWinds
 
Government and Education Webinar: Improving Application Performance
Government and Education Webinar: Improving Application PerformanceGovernment and Education Webinar: Improving Application Performance
Government and Education Webinar: Improving Application PerformanceSolarWinds
 
Government Webinar: Preparing for CMMC Compliance Roundtable
Government Webinar: Preparing for CMMC Compliance Roundtable Government Webinar: Preparing for CMMC Compliance Roundtable
Government Webinar: Preparing for CMMC Compliance Roundtable SolarWinds
 
Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...
Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...
Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...SolarWinds
 
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...SolarWinds
 
Infographic: SDN, BYOD and Cloud! Oh my!
Infographic: SDN, BYOD and Cloud! Oh my!Infographic: SDN, BYOD and Cloud! Oh my!
Infographic: SDN, BYOD and Cloud! Oh my!SolarWinds
 
Government Webinar: Improving Security Compliance with IT Monitoring Tools
Government Webinar: Improving Security Compliance with IT Monitoring Tools Government Webinar: Improving Security Compliance with IT Monitoring Tools
Government Webinar: Improving Security Compliance with IT Monitoring Tools SolarWinds
 
Taming Multi-Cloud, Hybrid Cloud, Docker, and Kubernetes
Taming Multi-Cloud, Hybrid Cloud, Docker, and KubernetesTaming Multi-Cloud, Hybrid Cloud, Docker, and Kubernetes
Taming Multi-Cloud, Hybrid Cloud, Docker, and KubernetesSolarWinds
 
Government and Education Webinar: SQL Server—Indexing for Performance
Government and Education Webinar: SQL Server—Indexing for PerformanceGovernment and Education Webinar: SQL Server—Indexing for Performance
Government and Education Webinar: SQL Server—Indexing for PerformanceSolarWinds
 
SolarWinds Help Desk Essentials Overview
SolarWinds Help Desk Essentials OverviewSolarWinds Help Desk Essentials Overview
SolarWinds Help Desk Essentials OverviewSolarWinds
 
Government and Education Webinar: Optimizing Database Performance
Government and Education Webinar: Optimizing Database PerformanceGovernment and Education Webinar: Optimizing Database Performance
Government and Education Webinar: Optimizing Database PerformanceSolarWinds
 
Troubleshoot Network Problems with Routing Rules
Troubleshoot Network Problems with Routing RulesTroubleshoot Network Problems with Routing Rules
Troubleshoot Network Problems with Routing RulesSolarWinds
 
SolarWinds Federal Webinar - Using Tools to Improve IT Service Management
SolarWinds Federal Webinar - Using Tools to Improve IT Service ManagementSolarWinds Federal Webinar - Using Tools to Improve IT Service Management
SolarWinds Federal Webinar - Using Tools to Improve IT Service ManagementSolarWinds
 

Mais procurados (20)

Webinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWindsWebinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWinds
 
Government and Education Webinar: Cyber Technology to Enable Operator Effecti...
Government and Education Webinar: Cyber Technology to Enable Operator Effecti...Government and Education Webinar: Cyber Technology to Enable Operator Effecti...
Government and Education Webinar: Cyber Technology to Enable Operator Effecti...
 
The Seismic Impact of the SolarWinds Hack
The Seismic Impact of the SolarWinds HackThe Seismic Impact of the SolarWinds Hack
The Seismic Impact of the SolarWinds Hack
 
Government and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid WorkforceGovernment and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid Workforce
 
Government and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT OperationsGovernment and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT Operations
 
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
 
Monitoring and Securing Active Directory Government Webinar for the US Army
Monitoring and Securing Active Directory Government Webinar for the US ArmyMonitoring and Securing Active Directory Government Webinar for the US Army
Monitoring and Securing Active Directory Government Webinar for the US Army
 
Government Webinar: Five Essential IT Tools You Need Today
Government Webinar: Five Essential IT Tools You Need TodayGovernment Webinar: Five Essential IT Tools You Need Today
Government Webinar: Five Essential IT Tools You Need Today
 
Government and Education Webinar: Improving Application Performance
Government and Education Webinar: Improving Application PerformanceGovernment and Education Webinar: Improving Application Performance
Government and Education Webinar: Improving Application Performance
 
Government Webinar: Preparing for CMMC Compliance Roundtable
Government Webinar: Preparing for CMMC Compliance Roundtable Government Webinar: Preparing for CMMC Compliance Roundtable
Government Webinar: Preparing for CMMC Compliance Roundtable
 
Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...
Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...
Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...
 
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
 
Infographic: SDN, BYOD and Cloud! Oh my!
Infographic: SDN, BYOD and Cloud! Oh my!Infographic: SDN, BYOD and Cloud! Oh my!
Infographic: SDN, BYOD and Cloud! Oh my!
 
Government Webinar: Improving Security Compliance with IT Monitoring Tools
Government Webinar: Improving Security Compliance with IT Monitoring Tools Government Webinar: Improving Security Compliance with IT Monitoring Tools
Government Webinar: Improving Security Compliance with IT Monitoring Tools
 
Taming Multi-Cloud, Hybrid Cloud, Docker, and Kubernetes
Taming Multi-Cloud, Hybrid Cloud, Docker, and KubernetesTaming Multi-Cloud, Hybrid Cloud, Docker, and Kubernetes
Taming Multi-Cloud, Hybrid Cloud, Docker, and Kubernetes
 
Government and Education Webinar: SQL Server—Indexing for Performance
Government and Education Webinar: SQL Server—Indexing for PerformanceGovernment and Education Webinar: SQL Server—Indexing for Performance
Government and Education Webinar: SQL Server—Indexing for Performance
 
SolarWinds Help Desk Essentials Overview
SolarWinds Help Desk Essentials OverviewSolarWinds Help Desk Essentials Overview
SolarWinds Help Desk Essentials Overview
 
Government and Education Webinar: Optimizing Database Performance
Government and Education Webinar: Optimizing Database PerformanceGovernment and Education Webinar: Optimizing Database Performance
Government and Education Webinar: Optimizing Database Performance
 
Troubleshoot Network Problems with Routing Rules
Troubleshoot Network Problems with Routing RulesTroubleshoot Network Problems with Routing Rules
Troubleshoot Network Problems with Routing Rules
 
SolarWinds Federal Webinar - Using Tools to Improve IT Service Management
SolarWinds Federal Webinar - Using Tools to Improve IT Service ManagementSolarWinds Federal Webinar - Using Tools to Improve IT Service Management
SolarWinds Federal Webinar - Using Tools to Improve IT Service Management
 

Semelhante a Government Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWinds

DGI Compliance Webinar
DGI Compliance WebinarDGI Compliance Webinar
DGI Compliance WebinarSolarWinds
 
Federal Webinar: RMF, DISA STIGs, and NIST FISMA Compliance using SolarWinds
Federal Webinar: RMF, DISA STIGs, and NIST FISMA Compliance using SolarWindsFederal Webinar: RMF, DISA STIGs, and NIST FISMA Compliance using SolarWinds
Federal Webinar: RMF, DISA STIGs, and NIST FISMA Compliance using SolarWindsSolarWinds
 
Federal Webinar: Security Compliance with SolarWinds Network Management Tools
Federal Webinar: Security Compliance with SolarWinds Network Management ToolsFederal Webinar: Security Compliance with SolarWinds Network Management Tools
Federal Webinar: Security Compliance with SolarWinds Network Management ToolsSolarWinds
 
Supporting Contractors with NIST SP 800-171 Compliance
Supporting Contractors with NIST SP 800-171 ComplianceSupporting Contractors with NIST SP 800-171 Compliance
Supporting Contractors with NIST SP 800-171 ComplianceSolarWinds
 
Cyber security series administrative control breaches
Cyber security series   administrative control breaches Cyber security series   administrative control breaches
Cyber security series administrative control breaches Jim Kaplan CIA CFE
 
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...SolarWinds
 
Effective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to KnowEffective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to KnowPrecisely
 
Cloud monitoring - An essential Platform Service
Cloud monitoring  - An essential Platform ServiceCloud monitoring  - An essential Platform Service
Cloud monitoring - An essential Platform ServiceSoumitra Bhattacharyya
 
Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges SolarWinds
 
7 Habits of Highly Secure Organizations
7 Habits of Highly Secure Organizations7 Habits of Highly Secure Organizations
7 Habits of Highly Secure OrganizationsHelpSystems
 
FedRAMP - Federal Agencies & Cloud Service Providers meet FISMA 2.0
FedRAMP - Federal Agencies & Cloud Service Providers meet FISMA 2.0FedRAMP - Federal Agencies & Cloud Service Providers meet FISMA 2.0
FedRAMP - Federal Agencies & Cloud Service Providers meet FISMA 2.0Valdez Ladd MBA, CISSP, CISA,
 
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...John Gilligan
 
Dealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation StyleDealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation StyleRochester Security Summit
 
More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.Imperva
 
Monitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and SecurityMonitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and SecurityPrecisely
 
Huntsville GovCon Growth Summit 2020 - Summit 7 - Cybersecurity Maturity Mode...
Huntsville GovCon Growth Summit 2020 - Summit 7 - Cybersecurity Maturity Mode...Huntsville GovCon Growth Summit 2020 - Summit 7 - Cybersecurity Maturity Mode...
Huntsville GovCon Growth Summit 2020 - Summit 7 - Cybersecurity Maturity Mode...Unanet
 
AFAC session 2 - September 8, 2014
AFAC session 2 - September 8, 2014AFAC session 2 - September 8, 2014
AFAC session 2 - September 8, 2014KBIZEAU
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM
 
5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of VulnerabilitySkybox Security
 

Semelhante a Government Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWinds (20)

DGI Compliance Webinar
DGI Compliance WebinarDGI Compliance Webinar
DGI Compliance Webinar
 
Federal Webinar: RMF, DISA STIGs, and NIST FISMA Compliance using SolarWinds
Federal Webinar: RMF, DISA STIGs, and NIST FISMA Compliance using SolarWindsFederal Webinar: RMF, DISA STIGs, and NIST FISMA Compliance using SolarWinds
Federal Webinar: RMF, DISA STIGs, and NIST FISMA Compliance using SolarWinds
 
Federal Webinar: Security Compliance with SolarWinds Network Management Tools
Federal Webinar: Security Compliance with SolarWinds Network Management ToolsFederal Webinar: Security Compliance with SolarWinds Network Management Tools
Federal Webinar: Security Compliance with SolarWinds Network Management Tools
 
Supporting Contractors with NIST SP 800-171 Compliance
Supporting Contractors with NIST SP 800-171 ComplianceSupporting Contractors with NIST SP 800-171 Compliance
Supporting Contractors with NIST SP 800-171 Compliance
 
Cyber security series administrative control breaches
Cyber security series   administrative control breaches Cyber security series   administrative control breaches
Cyber security series administrative control breaches
 
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
 
Effective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to KnowEffective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to Know
 
Cloud monitoring - An essential Platform Service
Cloud monitoring  - An essential Platform ServiceCloud monitoring  - An essential Platform Service
Cloud monitoring - An essential Platform Service
 
Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges
 
7 Habits of Highly Secure Organizations
7 Habits of Highly Secure Organizations7 Habits of Highly Secure Organizations
7 Habits of Highly Secure Organizations
 
FedRAMP - Federal Agencies & Cloud Service Providers meet FISMA 2.0
FedRAMP - Federal Agencies & Cloud Service Providers meet FISMA 2.0FedRAMP - Federal Agencies & Cloud Service Providers meet FISMA 2.0
FedRAMP - Federal Agencies & Cloud Service Providers meet FISMA 2.0
 
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
 
Dealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation StyleDealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation Style
 
More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.
 
Monitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and SecurityMonitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and Security
 
CISA Training - Chapter 5 - 2016
CISA Training - Chapter 5 - 2016CISA Training - Chapter 5 - 2016
CISA Training - Chapter 5 - 2016
 
Huntsville GovCon Growth Summit 2020 - Summit 7 - Cybersecurity Maturity Mode...
Huntsville GovCon Growth Summit 2020 - Summit 7 - Cybersecurity Maturity Mode...Huntsville GovCon Growth Summit 2020 - Summit 7 - Cybersecurity Maturity Mode...
Huntsville GovCon Growth Summit 2020 - Summit 7 - Cybersecurity Maturity Mode...
 
AFAC session 2 - September 8, 2014
AFAC session 2 - September 8, 2014AFAC session 2 - September 8, 2014
AFAC session 2 - September 8, 2014
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
 
5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability
 

Mais de SolarWinds

SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...SolarWinds
 
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...SolarWinds
 
Government Webinar: Alerting and Reporting in the Age of Observability
Government Webinar: Alerting and Reporting in the Age of ObservabilityGovernment Webinar: Alerting and Reporting in the Age of Observability
Government Webinar: Alerting and Reporting in the Age of ObservabilitySolarWinds
 
Government and Education Webinar: Full Stack Observability
Government and Education Webinar: Full Stack ObservabilityGovernment and Education Webinar: Full Stack Observability
Government and Education Webinar: Full Stack ObservabilitySolarWinds
 
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...SolarWinds
 
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software VendorsBecoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software VendorsSolarWinds
 
Government and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
Government and Education Webinar: Real-Time Mission, CIO, and Command DashboardsGovernment and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
Government and Education Webinar: Real-Time Mission, CIO, and Command DashboardsSolarWinds
 
Government and Education Webinar: Simplify Your Database Performance Manageme...
Government and Education Webinar: Simplify Your Database Performance Manageme...Government and Education Webinar: Simplify Your Database Performance Manageme...
Government and Education Webinar: Simplify Your Database Performance Manageme...SolarWinds
 
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...SolarWinds
 
Government and Education Webinar: SQL Server—Advanced Performance Tuning
Government and Education Webinar: SQL Server—Advanced Performance Tuning Government and Education Webinar: SQL Server—Advanced Performance Tuning
Government and Education Webinar: SQL Server—Advanced Performance Tuning SolarWinds
 
Government and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Recovering IP Addresses on Your NetworkGovernment and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Recovering IP Addresses on Your NetworkSolarWinds
 
Government and Education Webinar: Optimize Performance With Advanced Host Mon...
Government and Education Webinar: Optimize Performance With Advanced Host Mon...Government and Education Webinar: Optimize Performance With Advanced Host Mon...
Government and Education Webinar: Optimize Performance With Advanced Host Mon...SolarWinds
 
SolarWinds Public Sector Cybersecurity Survey Report 2020
SolarWinds Public Sector Cybersecurity Survey Report 2020SolarWinds Public Sector Cybersecurity Survey Report 2020
SolarWinds Public Sector Cybersecurity Survey Report 2020SolarWinds
 

Mais de SolarWinds (13)

SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
 
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
 
Government Webinar: Alerting and Reporting in the Age of Observability
Government Webinar: Alerting and Reporting in the Age of ObservabilityGovernment Webinar: Alerting and Reporting in the Age of Observability
Government Webinar: Alerting and Reporting in the Age of Observability
 
Government and Education Webinar: Full Stack Observability
Government and Education Webinar: Full Stack ObservabilityGovernment and Education Webinar: Full Stack Observability
Government and Education Webinar: Full Stack Observability
 
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
 
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software VendorsBecoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
 
Government and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
Government and Education Webinar: Real-Time Mission, CIO, and Command DashboardsGovernment and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
Government and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
 
Government and Education Webinar: Simplify Your Database Performance Manageme...
Government and Education Webinar: Simplify Your Database Performance Manageme...Government and Education Webinar: Simplify Your Database Performance Manageme...
Government and Education Webinar: Simplify Your Database Performance Manageme...
 
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
 
Government and Education Webinar: SQL Server—Advanced Performance Tuning
Government and Education Webinar: SQL Server—Advanced Performance Tuning Government and Education Webinar: SQL Server—Advanced Performance Tuning
Government and Education Webinar: SQL Server—Advanced Performance Tuning
 
Government and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Recovering IP Addresses on Your NetworkGovernment and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Recovering IP Addresses on Your Network
 
Government and Education Webinar: Optimize Performance With Advanced Host Mon...
Government and Education Webinar: Optimize Performance With Advanced Host Mon...Government and Education Webinar: Optimize Performance With Advanced Host Mon...
Government and Education Webinar: Optimize Performance With Advanced Host Mon...
 
SolarWinds Public Sector Cybersecurity Survey Report 2020
SolarWinds Public Sector Cybersecurity Survey Report 2020SolarWinds Public Sector Cybersecurity Survey Report 2020
SolarWinds Public Sector Cybersecurity Survey Report 2020
 

Último

Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 

Último (20)

Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 

Government Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWinds

  • 1. 1@solarwinds RMF, DISA STIG, and NIST FISMA Compliance Using SolarWinds Government Webinar November 19, 2020
  • 2. 2@solarwinds Speaker Introductions © 2020 SolarWinds Worldwide, LLC. All rights reserved. Kevin Davalos Intermediate Sales Engineer kevin.davalos@solarwinds.com 512.498.6056 (office)
  • 3. 3@solarwinds Agenda © 2020 SolarWinds Worldwide, LLC. All rights reserved. • Compliance and SolarWinds® solution overviews • FISMA and STIGs security controls and compliance review • Risk Management Framework and compliance review • Security and compliance product reviews • Questions and answers • Additional resources
  • 4. 4@solarwinds Compliance and SolarWinds Solution Overviews © 2020 SolarWinds Worldwide, LLC. All rights reserved.
  • 5. 5@solarwinds Compliance Overview Federal Information Security Management Act (FISMA) (NIST: FISMA Background- http://csrc.nist.gov/groups/SMA/fisma/overview.html) • Designed to protect the nation’s critical infrastructure • Standardization for categorizing IT systems by mission impact (FIPS 199) • Security standards for data and IT systems (FIPS 200) • Establishes baseline security controls and provides general guidance (SP 800-53) • Requires protection of sensitive data on contractor information systems (SP 800-171) Risk Management and Cybersecurity Frameworks • Risk Management Framework (RMF) supports the implementation of FISMA, is mandatory for federal agencies, and has been widely adopted by the DOD (SP 800-37) (RMF background- http://csrc.nist.gov/groups/SMA/fisma/framework.html) • The Framework for Improving Critical Infrastructure Cybersecurity (aka the Cybersecurity Framework or NIST CSF) was developed, enhanced, and recently mandated for executive departments and agencies by Presidential Executive Orders (CSF background- https://www.nist.gov/cyberframework) © 2020 SolarWinds Worldwide, LLC. All rights reserved.
  • 6. 6@solarwinds Compliance Overview (cont’d) Security Technical Implementation Guides (STIGs) (STIGs background- http://www.disa.mil/Cybersecurity/Secure-Configuration-Guidance) • Technical guidelines for infrastructure installation and maintenance developed by DISA to reduce vulnerability • Create an inventory of all systems and software to determine which DISA STIGs to apply • Monitor configurations and produce compliance reports • Manage configurations to achieve and maintain compliance Compliance Audits and Certification • Preparing for an audit requires considerable documentation and reporting • Audits require detailed knowledge of networked hardware and applications (including asset inventories, locations, configurations, access privileges, and vulnerabilities) • Cybersecurity Maturity Model Certification (CMMC) is being phased in for government contractors over the next several years; self-certification of 800-171 recently required to bid new DOD opportunities © 2020 SolarWinds Worldwide, LLC. All rights reserved.
  • 7. 7@solarwinds Risk Management Framework © 2020 SolarWinds Worldwide, LLC. All rights reserved. PROCESS OVERVIEW Starting Point (repeat as necessary) RISK MANAGEMENT FRAMEWORK Step 1 CATEGORIZE Information Systems Step 6 MONITOR Security Controls Step 5 AUTHORIZE Information Systems Step 4 ASSESS Security Controls Step 3 IMPLEMENT Security Controls Step 2 SELECT Security Controls Organizational Inputs Laws, Directives, Policy Guidance Strategic Goals and Objectives Priorities and Resource Availability Supply Chain Considerations Architecture Description Architecture Reference Models Segment and Solution Architecture Mission and Business Processes Information Systems Boundaries Source: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-37r1.pdf
  • 8. 8@solarwinds Cybersecurity Framework © 2020 SolarWinds Worldwide, LLC. All rights reserved. PROCESS OVERVIEW CYBER SECURITY FRAMEWORK Step 1 IDENTIFY risks to systems, assets, data, and capabilities Step 5 RECOVER capabilities or services Step 4 RESPOND with the appropriate activities Step 3 DETECT occurrences of cybersecurity events Step 2 PROTECT with appropriate safeguards Source: https://www.nist.gov/sites/default/files/documents/draft-cybersecurity-framework-v1.11.pdf
  • 9. 9@solarwinds© 2020 SolarWinds Worldwide, LLC. All rights reserved. Security Product Overview A security and information event management (SIEM) product designed to ensure and demonstrate compliance Security Event Manager Safely transfer files in a central management interface Serv-U® Managed File Transfer Third-party software updates and inventory leveraging Microsoft® WSUS or SCCM Patch Manager Automated network configuration and change management software Network Configuration Manager Track and compare system and application changes over time Server Configuration Monitor Manage and audit user access rights across your IT infrastructure Access Rights Manager
  • 10. 10@solarwinds SolarWinds Compliance Features Network Configuration Manager • Inventory network device configurations, assess configurations for compliance, and automate change and configuration management • Implement configuration of security controls and help assure effectiveness • Produce FISMA and DISA STIGs reports from configuration templates • Produce audit documentation and reports Security Event Manager • Configure correlation rules to help assure effectiveness of security controls • Real-time and continuous monitoring of security controls • Produce FISMA and DISA STIGs compliance reports from templates • Supports DISA STIGs requirements for configuration auditing, log analysis, and broader network security • Tracks and report suspicious activities/attacks to provide auditing support © 2020 SolarWinds Worldwide, LLC. All rights reserved.
  • 11. 11@solarwinds SolarWinds Compliance Features Access Rights Manager • Built to monitor suspicious account activity, validate IT compliance, and deliver custom Active Directory reports • Facilitates fast and safe user account management • Automate deprovisioning for staff and contractors to help meet security policies • NTFS permissions report tool streamlines user access control and auditing • Produce audit documentation and reports Patch Manager • Automate patching of Microsoft and third-party applications to help improve compliance • Schedule patches for minimum downtime • Inventory software and physical components per server or workstation © 2020 SolarWinds Worldwide, LLC. All rights reserved.
  • 12. 12@solarwinds SolarWinds Compliance Features Server Configuration Monitor • Policy engine helps monitor for compliance • Baseline Windows® and Linux® server and application configs and alert and report on changes • Detect, alert, and report on changes with hardware inventory, registry entries, binary and text files, software inventory, IIS configuration files, and script outputs • Monitor databases for unauthorized changes • Track server hardware and software inventory Network Performance Monitor • Trend utilization for capacity planning • Monitor network health and availability • Identify protocol latency delays • Produce audit documentation and reports © 2020 SolarWinds Worldwide, LLC. All rights reserved.
  • 13. 13@solarwinds FISMA and STIGs Security Controls and Compliance Review
  • 14. 14@solarwinds FISMA Security Controls Where We Can Help Access controls • Most of these controls will be implemented at the policy or device level • Security Event Manager (SEM) can help audit and monitor for potential changes, for example: • SEM can assist with AU2(12): “Atypical Usage” by looking for logon activity or patterns that are outside your environment norms • SEM can help satisfy AU-2(2): Automated Auditing for creation, modification, enabling, disabling, and removal • Network Configuration Manager (NCM) can help you monitor/manage configurations, real-time changes, or identify violations when it comes to network systems Audit and accountability • SEM can help satisfy some controls directly, for example: • AU-5: Audit Processing Failures - SEM generates events when there are processing failures • AU-8: Time Stamps - SEM satisfies this control and also uses timestamps provided by log sources • NCM tracks who requested the configuration change, or who made the change directly © 2020 SolarWinds Worldwide, LLC. All rights reserved.
  • 15. 15@solarwinds FISMA Security Controls Where We Can Help (cont’d) Configuration management • NCM can satisfy some controls directly, and includes prebuilt templates for compliance with configuration policies for network devices • Patch Manager (Patch) and SEM can also help in a few key areas Incident response • SEM provides some help when it comes to incident generation and investigation • Users can also leverage active response to provide in-the-moment capabilities to deal with incidents as they occur, such as: • IR-4: Incident Handling - SEM can support this, including IR-4(4) information correlation, IR- 4(5) automatic disabling of information system, and IR-4(9) dynamic response capability • IR-5: Incident Monitoring - SEM can generate incidents from correlated activities, and this information can be tracked and stored • NCM utilizes real-time configuration checking to auto-download/notify when there have been changes to device configurations © 2020 SolarWinds Worldwide, LLC. All rights reserved.
  • 16. 16@solarwinds FISMA Security Controls Where We Can Help (cont’d) System maintenance • SEM can help alert when logs don't seem to be according to expected maintenance policies • When it comes to network devices, NCM helps with controlling and managing configuration approvals, and keeping a history of past configurations, noting when the change occurred Media protection • SEM's USB Defender® feature can help with automated controls of removable devices Security planning • SEM can be used to centrally manage auditing and monitoring, and supports defense- in-depth techniques • NCM Approval allows an approval authority before making changes affecting the network © 2020 SolarWinds Worldwide, LLC. All rights reserved.
  • 17. 17@solarwinds FISMA Security Controls Where We Can Help (cont’d) Personnel security • A lot of this control area is external and policy-related, but SEM can be used to ensure what should happen actually did (i.e., trust, but verify) Risk assessment • SEM and Patch both help with vulnerability scanning • Patch can notify or auto-update missing patches on affected systems System and communication protection • Many of our solutions help detect Denial of Service attacks • We also offer tools to support boundary protection and VoIP System and information integrity • SEM helps with this control by providing system, software, firmware, and file integrity monitoring • There are also a couple of other smaller areas of note © 2020 SolarWinds Worldwide, LLC. All rights reserved.
  • 18. 18@solarwinds DISA STIGs Compliance Where We Can Help DISA STIGs and NIST FISMA reports ship with NCM to help IT pros improve compliance SEM has a range of features to support DISA STIGs compliance • Supports DISA STIGs compliance via our real-time monitoring of related events across systems, network devices, applications, and security tools • Supports configuration auditing, including logs of relevant STIGs best practices, configuration changes, installation of unapproved software, and more • Many of SEM’s out-of-the-box rules can be used to address STIGSs • SEM also includes DISA STIGs and FISMA compliance reports © 2020 SolarWinds Worldwide, LLC. All rights reserved.
  • 19. 19@solarwinds Risk Management Framework and Compliance Review © 2020 SolarWinds Worldwide, LLC. All rights reserved.
  • 20. 20@solarwinds© 2020 SolarWinds Worldwide, LLC. All rights reserved. RMF Step SolarWinds Products Features Step 1 – CATEGORIZE Information Systems Network Performance Monitor Server & Application Monitor Network Configuration Manager Web Help Desk Hardware/Software Discovery Asset Inventory Software Inventory Step 2 – SELECT Security Controls Network Configuration Manager Server Configuration Monitor Security Event Manager User Device Tracker Vulnerability Scanning Configuration Compliance Continuous Monitoring Rogue Device Detection Step 3 – IMPLEMENT Security Controls Network Configuration Manager Server Configuration Monitor Patch Manager Patch Updates STIG Compliance Step 4 – ASSESS Security Controls Access Rights Manager Security Event Manager Patch Manager Access Rights Management Monitoring Event Logs Patch Updates Step 5 – AUTHORIZE Information Systems Network Configuration Manager Server Configuration Monitor Security Event Manager Patch Manager Reports Step 6 – MONITOR Security Controls Security Event Manager Network Performance Monitor Network Configuration Manager Server & Application Monitor Log Monitoring Network Monitoring Configuration Monitoring Application Monitoring
  • 21. 21@solarwinds DEMO © 2020 SolarWinds Worldwide, LLC. All rights reserved.
  • 22. 22@solarwinds Q&A © 2020 SolarWinds Worldwide, LLC. All rights reserved. Call government sales: 877.946.3751 Contact federal sales: federalsales@solarwinds.com Contact state and local government sales: governmentsales@solarwinds.com Contact education sales: educationsales@solarwinds.com
  • 23. 23@solarwinds Resources to Help Reduce Vulnerabilities Review a blog on FISMA requirements: https://www.solarwinds.com/federal-government/solution/fisma-compliance-requirements Review a blog on how SolarWinds software can help with CIS controls: https://thwack.solarwinds.com/community/solarwinds-community/product-blog/blog/2017/08/18/solarwinds-and-cis-critical- security-controls Review a blog on how SolarWinds software can help with NIST FISMA/RMF compliance: https://thwack.solarwinds.com/community/solarwinds-community/product-blog/blog/2015/08/01/fisma-nist-800-53- compliance-with-solarwinds-products Review a blog on how SolarWinds software can help with DISA STIGS compliance: https://thwack.solarwinds.com/community/solarwinds-community/product-blog/blog/2011/09/07/disa-stig-compliance-with- log-event-manager Watch a federal security compliance video: http://www.solarwinds.com/resources/videos/solarwinds-federal-security-compliance.html Download a compliance white paper: https://try.solarwinds.com/gov/whitepapers/ultimate-guide-federal-it-compliance Download a continuous monitoring white paper: https://try.solarwinds.com/gov/whitepapers/daily-federal-compliance-and-continuous-cybersecurity-monitoring © 2020 SolarWinds Worldwide, LLC. All rights reserved.
  • 24. 24@solarwinds THANK YOU © 2020 SolarWinds Worldwide, LLC. All rights reserved.
  • 25. 25@solarwinds Contact Us • Call government sales: 877.946.3751 • Email SolarWinds federal government sales: federalsales@solarwinds.com • Email SolarWinds state and local government sales: governmentsales@solarwinds.com • Email SolarWinds education sales: educationsales@solarwinds.com • Visit our THWACK® government group: http://thwack.com/government • Watch a short demo video: http://demo.solarwinds.com/sedemo/ • Download a free trial: http://www.solarwinds.com/downloads/ • Visit our government website: http://www.solarwinds.com/government • Follow us on LinkedIn®: https://www.linkedin.com/company/solarwinds- government Let us know how we can help you © 2020 SolarWinds Worldwide, LLC. All rights reserved.
  • 26. 26@solarwinds Who We Are © 2020 SolarWinds Worldwide, LLC. All rights reserved. #1 in Network Management1 320,000+ customers in 190 countries3 55+ IT management products 22,000+ MSPs serving 450,000+ organizations Every branch of the DoD, and nearly every civilian and intelligence agency 150,000+ registered members of THWACK®, our global IT community Founded in 1999 More than 3,200 employees globally Austin, TX headquarters Reston, VA government office 30+ offices globally Leader in Remote Monitoring and Management #3 in ITOM Performance Analysis2 Growing Security Portfolio 499 of Fortune 500® 1. IDC-defined Network Management Software functional market, IDC’s Worldwide Semiannual Software Tracker, October 15, 2020. 2. Gartner, Market Share Analysis: ITOM Performance Analysis Software, Worldwide, 2019. June 17, 2020. (AIOps/ITIM/Other Monitoring Tools Software Market). SolarWinds term, Systems Management, refers to the AIOps/ITIM/Other Monitoring Tools Software Market Taxonomy referenced in the Gartner report. All statements in this report attributable to Gartner represent SolarWinds interpretation of data, research opinion, or viewpoints published as part of a syndicated subscription service by Gartner, Inc., and have not been reviewed by Gartner. Each Gartner publication speaks as of its original publication date (and not as of the date of this presentation). The opinions expressed in Gartner publications are not representations of fact and are subject to change without notice. 3. Customers are defined as individuals or entities that have an active subscription for our subscription products or that have purchased one or more of our perpetual license products since our inception under a unique customer identification number. We may have multiple purchasers of our products within a single organization, each of which may be assigned a unique customer identification number and deemed a separate customer.
  • 27. 27@solarwinds The SolarWinds, SolarWinds & Design, Orion, and THWACK trademarks are the exclusive property of SolarWinds Worldwide, LLC or its affiliates, are registered with the U.S. Patent and Trademark Office, and may be registered or pending registration in other countries. All other SolarWinds trademarks, service marks, and logos may be common law marks or are registered or pending registration. All other trademarks mentioned herein are used for identification purposes only and are trademarks of (and may be registered trademarks) of their respective companies. © 2020 SolarWinds Worldwide, LLC. All rights reserved.

Notas do Editor

  1. IDC: Gartner: https://www.gartner.com/document/3986463