recommended reading

Officials say agency real-time surveillance not likely this year

Many agencies will not be able to submit summaries of network threats based on real-time surveillance by the Nov. 15 deadline for reporting on security management to the White House, according to federal officials.

The Obama administration in April announced that agencies this fall must use automated security monitoring tools for transmitting data on computer inventories, security incidents and other indicators to a secure online inbox called Cyberscope. Continuous reporting is expected to reduce the time and cost of complying with the 2002 Federal Information Security Management Act, a law critics say concentrates too much on paperwork documenting protocols, and not enough on executing them.

But many agencies are not there yet. "My bet is it won't be done in the next year," said James A. Lewis, a senior fellow at the nonpartisan Center for Strategic and International Studies who researches cybersecurity. He said the Office of Management and Budget eventually might have to issue new rules such as, "You can't spend any money on IT until you put this stuff in place," to enforce real-time monitoring.

Of the 24 major agencies, "a few of them are already there; a lot of them are not," Lewis added. He estimated between 20 percent to 25 percent of the major agencies would be online by Nov. 15. "It's a big change and moving people from where they are now to a better place is a great first step," Lewis noted.

If agencies do not have live surveillance systems, then they are supposed to manually record certain metrics, save the information in a digital format and send it to Cyberscope on a spreadsheet template or a Web-compatible file format such as XML, according to OMB policy .

The Homeland Security Department is helping agencies transition to the new digital process. Agencies without automated monitoring tools likely will use an XML model that Cyberscope can ingest, Greg Schaffer, DHS assistant secretary for cybersecurity and communications, said in an interview on Wednesday. "I do think this will give us in the long run much higher fidelity information," he added.

Schaffer said the shift to real-time monitoring will be "a process" and he could not provide a specific timeline.

The schedule will be dictated from the bottom up -- based on how quickly agencies can set up enhancements needed for live surveillance -- not from any top-down DHS or OMB mandates, Homeland Security officials added on Friday.

They said the price of the additional equipment will vary significantly, depending on the number of users at the agency. Lewis said agencies should not put off buying the new technology just because of cost.

"This is actually effective, so whatever they spend now [on FISMA compliance] is just wasted money," he said. "If we can take the same money and spend it on something that's actually useful we'll be better off."

A July policy clarification on FISMA stated that Homeland Security now is in charge of the operational aspects of governmentwide cybersecurity. OMB will retain fiscal oversight of agencies' use of cybersecurity funds and policy issues.

OMB officials on Friday referred questions about the budget and timeline for rolling out real-time monitoring to DHS.

Threatwatch Alert

Accidentally leaked credentials / Software vulnerability

Cloudflare Bug Leaked Passwords, Dating Chats and Other Sensitive Info for Months

See threatwatch report

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • It’s Time for the Federal Government to Embrace Wireless and Mobility

    The United States has turned a corner on the adoption of mobile phones, tablets and other smart devices, outpacing traditional desktop and laptop sales by a wide margin. This issue brief discusses the state of wireless and mobility in federal government and outlines why now is the time to embrace these technologies in government.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

    Download
  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download

When you download a report, your information may be shared with the underwriters of that document.