<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
    <channel>
        <title><![CDATA[How is that Assurance Evidence? - Medium]]></title>
        <description><![CDATA[The ramblings of a man who works in the Information Assurance space of the Federal Government. - Medium]]></description>
        <link>https://howisthatassuranceevidence.com?source=rss----a5bede145e67---4</link>
        <image>
            <url>https://cdn-images-1.medium.com/proxy/1*TGH72Nnw24QL3iV9IOm4VA.png</url>
            <title>How is that Assurance Evidence? - Medium</title>
            <link>https://howisthatassuranceevidence.com?source=rss----a5bede145e67---4</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Tue, 07 Apr 2026 20:16:46 GMT</lastBuildDate>
        <atom:link href="https://howisthatassuranceevidence.com/feed" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <xhtml:meta content="noindex" name="robots" xmlns:xhtml="http://www.w3.org/1999/xhtml"/><item>
            <title><![CDATA[AU-6, AU-7 and AU-9 On the Cheap]]></title>
            <link>https://howisthatassuranceevidence.com/au-6-au-7-and-au-9-on-the-cheap-89131a2b9e9f?source=rss----a5bede145e67---4</link>
            <guid isPermaLink="false">https://medium.com/p/89131a2b9e9f</guid>
            <category><![CDATA[audit]]></category>
            <category><![CDATA[compliance]]></category>
            <category><![CDATA[logging]]></category>
            <category><![CDATA[nist]]></category>
            <dc:creator><![CDATA[Chris Burton]]></dc:creator>
            <pubDate>Mon, 13 Nov 2017 21:33:30 GMT</pubDate>
            <atom:updated>2017-11-13T21:33:30.551Z</atom:updated>
            <content:encoded><![CDATA[<p>SIEM or SEIM or Log Correlation tools are generally considered expensive. I won’t get into the particulars of what is or is not expensive for you or your customer. It also depends on system size and what your enterprise may or may not already have in place. So do check into those things before continuing.</p><p>I was recently having a conversation with a friend who was lamenting that <a href="http://loggly.com">Loggly</a> and <a href="http://logentries.com">LogEntries</a> weren’t authorized and that their Management team had put the kibosh on self-hosting <a href="http://splunk.com">Splunk</a> (let alone a Splunk cloud install). What’s a security dude to do?</p><p>The answer lies in open-source. More specifically, <a href="http://graylog.com">Graylog</a>. And I don’t mean enterprise, I mean loading up Graylog, probably as a Docker container, and start implementing some of the <a href="https://marketplace.graylog.org/">marketplace</a> plug-ins. I would also recommend tying Graylog to LDAP so that there aren’t additional accounts to manage. It was a no brainer to me, but you never know about other people’s politics.</p><p>Now that Graylog is running and accepting log data, you can update your baseline configuration so that only the service account for the forwarding service on your workloads can access the audit logs. System admins and DevOps should only have read access to the logs. Security Admins should only have read access to the logs. And Graylog should have a big ass alert whenever root or the service account clear the logs. Was a ticket submitted for that?</p><p>No matter, whenever someone needs to see the logs — the answer is “Check in Graylog.” Because you tied it to LDAP or AD, it is as simple as logging in and putting to use the training that was given to them on how to use Graylog (*snickering* There’s never time for training! *snickering*)</p><p>I’m not being paid for this but I am getting frustrated with the “we can’t because of cost”. The product cost will not be the end issue either. The real cost is that someone now must watch it. You now need to put bodies in front of screens to create reports and alerts. Otherwise you are not compliant.</p><p>So quit your bitchin’ and start logging your shit.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=89131a2b9e9f" width="1" height="1" alt=""><hr><p><a href="https://howisthatassuranceevidence.com/au-6-au-7-and-au-9-on-the-cheap-89131a2b9e9f">AU-6, AU-7 and AU-9 On the Cheap</a> was originally published in <a href="https://howisthatassuranceevidence.com">How is that Assurance Evidence?</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[This is still a Thing]]></title>
            <link>https://howisthatassuranceevidence.com/this-is-still-a-thing-85c8caea604f?source=rss----a5bede145e67---4</link>
            <guid isPermaLink="false">https://medium.com/p/85c8caea604f</guid>
            <category><![CDATA[nothing]]></category>
            <category><![CDATA[random]]></category>
            <dc:creator><![CDATA[Chris Burton]]></dc:creator>
            <pubDate>Mon, 28 Mar 2016 14:39:00 GMT</pubDate>
            <atom:updated>2017-05-19T19:43:56.308Z</atom:updated>
            <content:encoded><![CDATA[<p>It’s been over 2 years since I’ve last vented about FISMA / FedRAMP. <br><br>I am now committing to doing more posts. I’m thinking biweekly (one every other week). Not just venting and therapy, but actual process and analysis. Look for an example later this week.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=85c8caea604f" width="1" height="1" alt=""><hr><p><a href="https://howisthatassuranceevidence.com/this-is-still-a-thing-85c8caea604f">This is still a Thing</a> was originally published in <a href="https://howisthatassuranceevidence.com">How is that Assurance Evidence?</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Moving]]></title>
            <link>https://howisthatassuranceevidence.com/moving-c2fda374adaa?source=rss----a5bede145e67---4</link>
            <guid isPermaLink="false">https://medium.com/p/c2fda374adaa</guid>
            <category><![CDATA[random]]></category>
            <category><![CDATA[nothing]]></category>
            <dc:creator><![CDATA[Chris Burton]]></dc:creator>
            <pubDate>Sun, 27 Oct 2013 23:49:00 GMT</pubDate>
            <atom:updated>2017-05-19T19:44:18.686Z</atom:updated>
            <content:encoded><![CDATA[<p>I am intending to do more blogging. However, I am packing and moving with twins. The move is short, but a huge event nonetheless.</p><p>So that’s it.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=c2fda374adaa" width="1" height="1" alt=""><hr><p><a href="https://howisthatassuranceevidence.com/moving-c2fda374adaa">Moving</a> was originally published in <a href="https://howisthatassuranceevidence.com">How is that Assurance Evidence?</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[More Annoyance]]></title>
            <link>https://howisthatassuranceevidence.com/more-annoyance-e73b8d10dbc3?source=rss----a5bede145e67---4</link>
            <guid isPermaLink="false">https://medium.com/p/e73b8d10dbc3</guid>
            <category><![CDATA[annoyances]]></category>
            <category><![CDATA[random]]></category>
            <category><![CDATA[fisma]]></category>
            <dc:creator><![CDATA[Chris Burton]]></dc:creator>
            <pubDate>Wed, 25 Sep 2013 23:51:00 GMT</pubDate>
            <atom:updated>2017-05-19T19:44:15.599Z</atom:updated>
            <content:encoded><![CDATA[<p>Back again.</p><p>Yesterday, I said that the <a href="http://www.meritalk.com/fisma-fallout.php">recent survey</a> about FISMA failure is horse shit. I stand by that claim and will now add more.</p><p>The only thing this report says is that their process is too focused on compliance and they wish they had more money. When is the last time that you talked to someone where they didn’t wish they had more money for their program? Whatever the program was. “I wish I had more money for building my space station” or “If I had another $2 million dollars, I could get something with red blinking lights instead of blue blinking lights.”</p><p>This survey has had it’s effect, we’re talking about FISMA. The failure does not lie in the law though. I see and hear about the failures every day. Management buy-in is lacking, risks ignored, security bolt-ones at the end of the project, or security isn’t keeping up with technology. I think that just about everyone in this industry could say all the same things. And they don’t have a law to tell them they have to do it. A lot of organizations have no prevailing regulatory requirement to follow and those security folks have to get more done with much less than the government provides to a lot of agencies.</p><p>One of the slides said that nation-states were attacking the government systems all the time. Whatever, everyone is getting attacked by nation-states.</p><p>A different slide said that users were their problem and they didn’t have enough training budget. To this, I refer you back two paragraphs where virtually every CISO/ISSO complains about this.</p><p>I said on the Southern Fried Security podcast FISMA episode that FISMA improved Federal government security. Anyone that can prove other wise please step forward. Because when FISMA was passed many agencies were lucky to have a firewall and anti-virus. Let alone web application firewalls, intrusion detection systems and pen tests. No one was training users on security awareness on a regular basis (not for the places I was working for anyway).</p><p>In the end, FISMA leaves the implementation of policy to the agencies. That policy should be based on 800–53. If you need help, I am here for you.</p><p>That is all.</p><figure><img alt="Posted with Blogsy" src="https://cdn-images-1.medium.com/proxy/0*hYvjENlSQt3zJ5-f.png" /></figure><p><a href="http://blogsyapp.com">Posted with Blogsy</a></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=e73b8d10dbc3" width="1" height="1" alt=""><hr><p><a href="https://howisthatassuranceevidence.com/more-annoyance-e73b8d10dbc3">More Annoyance</a> was originally published in <a href="https://howisthatassuranceevidence.com">How is that Assurance Evidence?</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Annoyed]]></title>
            <link>https://howisthatassuranceevidence.com/annoyed-e8b5889d9441?source=rss----a5bede145e67---4</link>
            <guid isPermaLink="false">https://medium.com/p/e8b5889d9441</guid>
            <dc:creator><![CDATA[Chris Burton]]></dc:creator>
            <pubDate>Mon, 23 Sep 2013 18:52:00 GMT</pubDate>
            <atom:updated>2017-05-19T19:44:09.024Z</atom:updated>
            <content:encoded><![CDATA[<p>I find myself being annoyed yet again by an article. It’s <a href="http://ubm.io/1aiFqyC">here</a> if you want to read it.</p><p>The essence of it being that FISMA is a failure (still) and government doesn’t know how to secure a rowboat let alone the vast number of systems in existence. Also that</p><p>No information security program is perfect, and based on this article many think that they are going to improve their programs simply because of continuous monitoring. Wrong.</p><p>The continuous monitoring needs to effective. Not lip service. Many agencies are hindered by congressional budget wrangling in the form of sequestration and other stupidity. They are further hindered by grand standing and empire building. The thing that seems to be lost is that they probably could do better if someone wasn’t telling them they only need</p><p>The title of the article states that they can do better. But most of the time, it’s the basics that are failing agencies.</p><p>What you need:</p><ul><li>Get a decent policy document together based on 800–53 Rev 4 (this includes tailoring and filling out all the little spots you are supposed to);</li><li>Assess your risks and not just your policy violations or exceptions;</li><li>Centralize what you can (if you’re a big agency or department, why not use the economics of scale? i.e. IR, Media Management, Asset Management, other less sexy things);</li><li>Plan, Plan, Plan;</li><li>Train, Train, Train;</li><li>Scan, Scan, Scan;</li><li>Patch, Patch, Patch;</li><li>Watch your logs; and finally</li><li>Accept your failures and learn from them.</li></ul><p>The article alluded to some of this. But if you have a decent program then your compliance will happen.</p><p>That is all.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=e8b5889d9441" width="1" height="1" alt=""><hr><p><a href="https://howisthatassuranceevidence.com/annoyed-e8b5889d9441">Annoyed</a> was originally published in <a href="https://howisthatassuranceevidence.com">How is that Assurance Evidence?</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Not Quite Dead Yet]]></title>
            <link>https://howisthatassuranceevidence.com/not-quite-dead-yet-6620df59f703?source=rss----a5bede145e67---4</link>
            <guid isPermaLink="false">https://medium.com/p/6620df59f703</guid>
            <dc:creator><![CDATA[Chris Burton]]></dc:creator>
            <pubDate>Mon, 23 Jan 2012 17:31:00 GMT</pubDate>
            <atom:updated>2017-05-19T19:44:20.584Z</atom:updated>
            <content:encoded><![CDATA[<p>Things are still extremely busy with day jobs, side projects and foster kids. However, I will be at <a href="http://www.shmoocon.org/">ShmooCon 2012</a>! So hit me up on twitter if you want to have some beers.</p><p>See you there!</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=6620df59f703" width="1" height="1" alt=""><hr><p><a href="https://howisthatassuranceevidence.com/not-quite-dead-yet-6620df59f703">Not Quite Dead Yet</a> was originally published in <a href="https://howisthatassuranceevidence.com">How is that Assurance Evidence?</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Just So You Know I’m Not Dead]]></title>
            <link>https://howisthatassuranceevidence.com/just-so-you-know-im-not-dead-9812ee9b249a?source=rss----a5bede145e67---4</link>
            <guid isPermaLink="false">https://medium.com/p/9812ee9b249a</guid>
            <dc:creator><![CDATA[Chris Burton]]></dc:creator>
            <pubDate>Tue, 01 Nov 2011 14:39:00 GMT</pubDate>
            <atom:updated>2017-05-19T19:44:15.645Z</atom:updated>
            <content:encoded><![CDATA[<p>Items I am working on:</p><ul><li>Review of 800–30, Rev 1;</li><li><a href="http://wiki.redspartan.com">RedSpartan</a></li></ul><p>So in the meantime, a guitar god: <a href="http://www.youtube.com/watch?v=hkz7wUg1L1o">http://www.youtube.com/watch?v=hkz7wUg1L1o</a></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=9812ee9b249a" width="1" height="1" alt=""><hr><p><a href="https://howisthatassuranceevidence.com/just-so-you-know-im-not-dead-9812ee9b249a">Just So You Know I’m Not Dead</a> was originally published in <a href="https://howisthatassuranceevidence.com">How is that Assurance Evidence?</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Wim Remes for ISC(2) Board of Directors]]></title>
            <link>https://howisthatassuranceevidence.com/wim-remes-for-isc-2-board-of-directors-c46604f2da?source=rss----a5bede145e67---4</link>
            <guid isPermaLink="false">https://medium.com/p/c46604f2da</guid>
            <dc:creator><![CDATA[Chris Burton]]></dc:creator>
            <pubDate>Wed, 31 Aug 2011 17:13:00 GMT</pubDate>
            <atom:updated>2017-05-19T19:44:02.640Z</atom:updated>
            <content:encoded><![CDATA[<p>I support <a href="http://blog.remes-it.be/petition.html">Wim Remes for ISC(2) Board of Directors</a>. I agree with his vision for the organization and his views on infosec in general. If you do too, follow the directions on his page to have him placed on the ballot for election.</p><p>Do this soon as the deadline for him to submit is September 19th, 2011. In fact, do it by the 18th so that there is no confusion.</p><p>That is all.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=c46604f2da" width="1" height="1" alt=""><hr><p><a href="https://howisthatassuranceevidence.com/wim-remes-for-isc-2-board-of-directors-c46604f2da">Wim Remes for ISC(2) Board of Directors</a> was originally published in <a href="https://howisthatassuranceevidence.com">How is that Assurance Evidence?</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Feds and Amazon Web Services]]></title>
            <link>https://howisthatassuranceevidence.com/feds-and-amazon-web-services-67af33da1686?source=rss----a5bede145e67---4</link>
            <guid isPermaLink="false">https://medium.com/p/67af33da1686</guid>
            <dc:creator><![CDATA[Chris Burton]]></dc:creator>
            <pubDate>Mon, 22 Aug 2011 16:00:00 GMT</pubDate>
            <atom:updated>2017-05-19T19:43:57.603Z</atom:updated>
            <content:encoded><![CDATA[<p>Hi. I’m Chris and I’m an AWS addict. Hi Chris</p><p>That’s right, I am using an EC2 as a development platform for <a href="http://www.redspartan.com">RedSpartan</a> as a code repository, wiki and issue tracker (in the form of a RedMine instance). I am also using a Windows instance to host the development and alpha instances of the tool itself. *gasp*</p><p>I am telling you this because I am totally confident in my ability to encrypt the sensitive information in the database and on the file system. I also feel that I have created an environment for my application to run where (if even Amazon were to fail at protecting my instance) that an attacker would have limited success in capturing any data.</p><p>I use AWS because the VM is mine to manage. I deploy patches. I install software. I configure the firewall. I take images when I want. When I want a restore, I get one. I want a reboot, the box is rebooted.</p><p>The downside: It is mine to screw up. But I do not fear because I have been managing servers for nearly 15 years.</p><p>I don’t want this to end up sounding like a sales pitch for RedSpartan, my professional services or AWS. However, virtual machines, cloud and XaaS is the future of enterprise computing. As a result, I feel that applications need to be built in a robust manner. Does this mean that I spent extra time on reducing my vulnerability count? Yes. Does it mean that I scrapped many, many lines of code because I architected it incorrectly? Yes. Does it mean that I am a paranoid, crazy person? Perhaps.</p><p>The point I am trying to make is that you can put your data and applications anywhere (like AWS) but it still needs to be protected. As part of <a href="http://www.businesswire.com/news/home/20110816006678/en/Amazon-Web-Services-Announces-AWS-GovCloud-AWS">Amazon’s recent announcement</a> that they can comply with FISMA in their new government region, there is still significant work to ensure that data is protected. I don’t know anything about the controls in place at Amazon, but I will say that nowhere is 800–53 mentioned in their press release or the baseline they expect to meet. They also mention SAS 70, which to my knowledge is being sunset in favor of SSAE 16. This tells me that Amazon is not wholly up to date on what is happening in the compliance space. Given that <a href="http://en.wikipedia.org/wiki/International_Traffic_in_Arms_Regulations">ITAR</a> is mentioned 3 times, I think that this is more about ensuring that the government’s data is in Northern Virginia or California (or both).</p><p>A friend of mine said that he recently worked on an authorization package that was not in the GovCloud region but that was hosted with Amazon. His words where something like: Amazon’s crap is wired and their kung fu is strong. I believe him. But I would also not document controls for Amazon, I would mark them as inherited and put them on the hook via their own SSP. I expect by now that Amazon would have a standard SSP with the controls they are providing with all the usual things that go into an SSP. That way they aren’t reinventing the wheel for each new Federal customer.</p><p>So I say: Cloud it up govies. But do it in a way that protects the government, citizens and whoever you are keeping files on.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=67af33da1686" width="1" height="1" alt=""><hr><p><a href="https://howisthatassuranceevidence.com/feds-and-amazon-web-services-67af33da1686">Feds and Amazon Web Services</a> was originally published in <a href="https://howisthatassuranceevidence.com">How is that Assurance Evidence?</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[My Take on 800–128 (Intentional Rhyming Attempt)]]></title>
            <link>https://howisthatassuranceevidence.com/my-take-on-800-128-intentional-rhyming-attempt-313237843223?source=rss----a5bede145e67---4</link>
            <guid isPermaLink="false">https://medium.com/p/313237843223</guid>
            <category><![CDATA[commentary]]></category>
            <category><![CDATA[800-series]]></category>
            <dc:creator><![CDATA[Chris Burton]]></dc:creator>
            <pubDate>Tue, 16 Aug 2011 15:21:00 GMT</pubDate>
            <atom:updated>2017-05-19T19:43:58.661Z</atom:updated>
            <content:encoded><![CDATA[<p>I did not get a chance to read 800–128 during the draft phase, mainly because I was too busy. But also because I wasn’t all that worried. I did however have one of the analyst I work with read it and he had some positive things to say. So if this comes across as not news to you or something akin to a 12 year old girl saying “Duh!”, then please excuse me for just now catching up.</p><p>Pros (in no particular order):</p><ul><li>A consolidated place for information on Configuration Management.</li><li>Control References — in section 2.3 there is a description of the activity to be performed and THEN the control reference.</li><li>The Appendices.</li><li>Very Nearly The Holy Grail of Federal IT Systems Compliance (keep reading).</li></ul><p>Cons (also in no particular order):</p><ul><li>The introduction of Security-Focused Configuration Management (SecCM).</li><li>Tries to make it an organizational problem with limited dealings when it pertains to system.</li><li>Limited to no mention of outsourced systems OR how to handle “cloud” environments.</li></ul><p>This document contains how configuration management should be done in and around the Federal government. This has been needed for a long time, especially since many places do configuration management incorrectly and/or half-assed. Some of which rely on the 800–53 controls as their implementation guide. But the document does mention SDLC in the document with pointers to things like 800–64.</p><p>If you do not know what you are doing, or simply want some place to start, then 800–128 is for you. If you have a decent program or want some tips on how to improve it; I don’t know that you’ll find any of the answers that you seek in 800–128. It will not fix personality problems with co-workers, but there are some explicit recommendations that you could use as a bat to beat them with.</p><p>The key point that NIST is driving here is the SecCM concept. SP 800–128 is not “transforming” configuration management but (as the name implies) wants everything relating to configuration management to be security centric. This may conflict with those who believe that configuration management is all about making it easy for IT administrators and developers. Especially if the security and operations staff don’t get along with each other. I think it would be best to continue selling it as a performance and efficiency enhancement, while reaping the rewards of better documentation and system configuration monitoring.</p><p>What you will find is some decent appendices that have templates for a Configuration Management Plan and a Security Impact Analysis. Two things that desperately need consistency between departments and agencies. Some people may find the work-flows in Appendix G somewhat helpful for visual learners. However, Appendix F is the least helpful in that it regurgitates everything we know about securing a system and points you to a number of the other 800-series documents.</p><p>You may remember from above that I mentioned that you may find the Holy Grail of Federal IT Systems Compliance in this document. No it is not, “The Definitive Guide on How to Establish an Authorization Boundary”. Attachment 1 (part of the SIA template — not even in the Table of Contents) at the very end of 800–128 has 10 questions that ask whomever is filling out the SIA template to identify the significance of a change. <strong>I believe that it is a worksheet that concisely identifies whether a change is significant enough to require a re-authorization event.</strong> Which is kind of a big deal. This is in fact my version of trumpeting it from the mountain tops. I think that it will need to be customized to the individual agency or department that is using it. Also, PLEASE let me know if you have seen this gem before and I have just missed it.</p><p>Now for the bad news. The document is almost fanatical about the need for something to come from the organization (Section 3.1.1) as it should be. The problem is that with service purchases, outsourced systems and clouded systems, there really isn’t a super way to have software run on those components for it to report back to the mother ship. This is the part where you say: “Chris, I can just upload my SCAP results at the end of the month”. OK, fine you got me. Have your junior squirrels or security monitoring staff upload some properly formatted XML results every month or setup a scheduled job to do it for you. My experience is that sending that level of granularity to an agency or department leads to information overload OR having to track and approve many, many waivers and exceptions. That isn’t to say that you shouldn’t try. I would say that there may be pieces of what 800–128 puts on the organization that needs to be pushed to the system or that things that are the system’s responsibility need to be addressed by the organization.</p><p>I think that it is also a little naive to expect that the SIA is going to be conducted in the manner described in Section 3.3.3 given the release cycle of some systems (especially those that are behind or late).</p><p>Lastly, it wouldn’t be a NIST document if there weren’t an allusion to the use of software tools to improve efficiency. This one is no exception. SCAP would be nothing without scanning and assessing tools, but tools are not going to fix the problem. Without a clearly defined policy -&gt; procedure -&gt; process -&gt; document trail, then you are trying to row upstream on a quickly moving river. On larger systems, tools definitely need to be used. That doesn’t mean that you need to stand up something separate from what operations is doing to manage the systems.</p><p>As always, 800-series documents are recommendations not requirements. Develop your processes in a way that works for where you are and build in tools and technology around it. But the 800–128 is very good at helping with the bulk of the work that Continuous Monitoring is trying to accomplish.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=313237843223" width="1" height="1" alt=""><hr><p><a href="https://howisthatassuranceevidence.com/my-take-on-800-128-intentional-rhyming-attempt-313237843223">My Take on 800–128 (Intentional Rhyming Attempt)</a> was originally published in <a href="https://howisthatassuranceevidence.com">How is that Assurance Evidence?</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
    </channel>
</rss>