InvestorsHub Logo
icon url

wavedreamer

01/19/12 1:10 PM

#220414 RE: Workingcapital #220413

Workingcapital,

While the NSA is at it do you think "the Trusted Cloud" could use TPM's/SED's and a product like WEM for security monitoring and auditing capabilities (what a project, we just need to live long enough:))))))))


"FedRAMP Security Controls Unveiled


Federal Risk and Authorization Mgt. Program Vets Providers

By Eric Chabrow, January 9, 2012

The federal government has issued some 170 controls for FedRAMP, the program designed to vet cloud computing providers for federal government agencies.

The security controls for the Federal Risk and Authorization Management Program, or FedRAMP, align with the National Institute of Standards and Technology Special Publication 800-53 Revision 3 for low and moderate impact systems. Cloud computing providers must implement these security controls in order for them to receive authorization to provide cloud services to federal agencies.

cut

System Security Plan that clarifies how the requirements of each security control will be met within a cloud computing environment. Within the plan, each control must detail (1) solutions being deployed such as devices, documents and processes; (2) responsibilities of providers and government customer to implement the plan; (3) timing of implementation; and (4) how solution satisfies controls...etc.


http://www.govinfosecurity.com/articles.php?art_id=4391
icon url

Weby

01/19/12 3:47 PM

#220423 RE: Workingcapital #220413

finally, an explanation. we've been stuck on Gilligan's Island for a decade. Leading by example is what we've been talking about for years, and the private sector still is playing the governing is forcing me game. hope we have time to rebuild the barn after it burns down. doma may have a point about fiat money. I,m worried more about greedy incompetence!
icon url

yukonwookie

01/19/12 4:54 PM

#220424 RE: Workingcapital #220413

WC and Weby-- Could this have been behind the Wave/NSA consulting contract?

A 38-member team is drawing up the guidelines, which will be based on a list of 20 cybersecurity controls developed two years ago by an independent panel of government and nongovernment experts.