Updated most recently in 2014, FISMA defines a framework to defend information, operations, and digital assets against natural disasters and man-made cyber threats.
While the act pertains to government agencies, it can also serve as a solid framework for any business to strengthen its IT security posture.
In 2002, shortly after 9/11, the Federal Information Security Management Act (FISMA) went into effect. The events of that day prompted the U.S. government to realize the importance of IT security to the economic and physical security interests of the United States. The act requires federal agencies to develop, document, and implement measures for protecting their data and information systems.
If you’re looking to bolster your IT security program, a good place to start is the FISMA Metrics document issued in 2019. It outlines the five basic components for which IT needs to allocate people, processes, and technologies in order to establish a strong security posture:
These five components can serve as an outline to guide you in building or augmenting your IT security program. While you can also check out the complete details of FISMA, you will more than likely want to work directly with an IT security consultant to determine the resources you need and the technology investments you need to make.
It’s also helpful to consider other standards and resources that complement FISMA, such as those offered by the National Institute of Standards and Technology (NIST), another federal program and which falls under the U.S. Department of Commerce. NIST offers various programs that can help you comply with FISMA and recommends eight steps that go into a more detail than the five FISMA metrics listed above:
NIST has developed several standards, guidelines, and other publications that federal agencies must follow to implement FISMA and to manage cost‐effective programs that protect digital assets. The guidelines can be leveraged by your business as well. Check out NIST publications like the 800‐series as well as NIST FIPS 199 and FIPS 200. Collectively, they can help build a detailed a risk‐based security framework to assess, select, monitor and document the security controls for all of your IT systems.
One of the critical tools to have in your back pocket for IT security and regulatory compliance is managed file transfer. Since security controls are needed to ensure the secure delivery and storing of sensitive government data, a MFT solution like MOVEit will be essential to compliance. A robust MFT solution will offer the highest level of encryption and also provide automated workflows to ensure business continuity and efficiency. MOVEit is easy to deploy and offers a series of different options depending on your business needs. Progress’ MOVEit offers separate SaaS, cloud, and on-premise solutions.
Greg is a technologist and data geek with over 10 years in tech. He has worked in a variety of industries as an IT manager and software tester. Greg is an avid writer on everything IT related, from cyber security to troubleshooting.
Let our experts teach you how to use Sitefinity's best-in-class features to deliver compelling digital experiences.
Learn MoreSubscribe to get all the news, info and tutorials you need to build better business apps and sites