NIST gets busy with security draft

Share this article:

U.S. Commerce Department’s National Institute of Standards and Technology (NIST) has finalized a draft version of federal government computer security.

The draft standard includes requirements for access control, incident response and risk assessment.

In order to comply with the standards, federal agencies will have to limit information system access to authorised users, track, document and report all security incidences and periodically assess system risk.

"We have attempted to create a security standard that establishes a level of security due diligence for federal agencies in protecting their information and information systems," said NIST.

The standard will now undergo a period of public consultation until September this year, its introduction is a response to the Federal Information Security Management Act (FISMA) that passed in 2002. Once in place federal agencies will have a single year until auditors wade into the offices.

The news arrives after a turbulent few weeks in U.S. information security. In July SC reported the Department of Homeland Security Secretary had unveiled a reorganization plan for his agency that includes a new assistant secretary for cybersecurity and telecommunications. Michael Chertoff said the new position will be responsible for identifying and assessing the vulnerability of the critical telecommunications infrastructure, providing timely threat data and leading national response to cyber and telecommunications attacks.

The NIST public draft

Share this article:
close

Next Article in News

Sign up to our newsletters

More in News

Report: SQL injection a pervasive threat, behavioral analysis needed

Report: SQL injection a pervasive threat, behavioral analysis ...

Long lag times between detection and resolution and reliance on traditional methods impair an organization's ability to combat SQL injection attacks.

WhatsApp bug allows for interception of shared locations

Researchers identified a vulnerability in WhatsApp that could enable an attacker to intercept shared locations using a man-in-the-middle attack, or a rogue access point.

Google tweaks its terms of service for clarity on Gmail scanning

The company is currently dealing with a lawsuit that challenges its email scanning practices.