What has NIST done for me lately?

NJVC Platform as a Service to Include Google Geospatial Services for NCOIC Geospatial Community Cloud Project in Support of Disaster Relief Efforts

By G C Network | July 9, 2013

CHANTILLY, Va., July 9, 2013 — NJVC® was selected by Network Centric Operations Industry Consortium (NCOIC) to provide the platform as a service (PaaS) element of a cloud-computing-based humanitarian assistance…

Fathers of Clouds – A Tribute

By G C Network | June 14, 2013

(A guest post from Mr. Ray Holloman, NJVC Digital Communications Manager ) For more than half a century, cloud computing has changed names more often than a Hollywood starlet. Utility…

CNBC Closing Bell: Bob Gourley on NSA Leaker

By G C Network | June 13, 2013

This is clearly off topic, but I couldn’t help myself!  Please take a moment to view this CNBC video where my good friend Bob Gourley addresses this important event. Good…

Guest Blog: Sequestration and the Cloud

By G C Network | May 30, 2013

(This post was provided by Praveen Asthana, Chief Marketing Office of Gravitant, a cloud service brokerage and management company) Sequestration burst out of obscurity and entered our household vocabulary in…

Join Me at the Gartner IT Infrastructure & Operations Management Summit

By G C Network | May 22, 2013

Please  join me at the Gartner IT Infrastructure & Operations Management Summit in Orlando, Florida, June 18-20, 2013, where my session topic will be “Cloud Service Integration: Increasing Business Value…

Five Years of Cloud Musings!!

By G C Network | May 14, 2013

https://kevinljackson.blogspot.com/2008/05/hello-world-april-18-2008.html  “Sunday, April 18, 2008 Hello World ! – April 18, 2008 I’ve been toying with the idea of doing a blog for about six months now. Initially I didn’t…

Global Interoperability Consortium’s Cloud Computing Project Detailed at NATO Conference

By G C Network | April 30, 2013

PRESS RELEASEApril 30, 2013, 2:30 p.m. ET Eric Vollmecke of the Network Centric Operations Industry Consortium reports  the proliferation of geospatial information will pose problems for disaster  responders and describes…

IBM Debate Series – What’s Next in IT?

By G C Network | April 25, 2013

Next week I will be participating in the inaugural session of What’s Next in IT Debate Series, a  new program of authentic debates and conversations on key technology topics. Sponsored…

Lisbon Bound: NATO Network Enabled Capability Conference 2013

By G C Network | April 21, 2013

This week I will have the honor of attending the 2013 NNEC Conference  at the Corinthia Hotel in Lisbon, Portugal. The NNEC conference is an annual event which has been sponsored by HQ…

Demystifying PaaS for Federal Government

By G C Network | April 2, 2013

Join us on April 16, 2013 at 1 PM EDT to remove the mystery surrounding Platform-as-a-Service (PaaS) for Federal Government https://attendee.gotowebinar.com/register/8966264786104832512 The PaaS market is plagued with confusion, and agencies…

According to a study, 82 percent of federal IT professional respondents reported that they were using the NIST (National Institute of Standards and Technology) cybersecurity framework to improve their security stance. The survey also demonstrated that the document is being used as a stepping stone to a more secure government. When I first read this, my immediate reaction was a resounding, “So what!” These results tell me that US Federal Government agencies are using US Government guidance to do their US Government job. Isn’t that what you would expect? Making an impression on me would require a study across multiple industry verticals. If other industries were voluntarily using the NIST Framework, that would be saying something!

Wouldn’t you know it, but such an independent study was actually conducted earlier this year. In March of 2015, the National Cybersecurity Institute did a study of Chief Information Security Officers across multiple industries. This survey not only looked into cybersecurity practices of the US government and military, but it also delved into the security practices of other verticals including Energy/Utilities, Consulting, Information Technology and Banking/Finance. When asked about the specific security standards or frameworks their organization used, 53.1 percent of the respondents cited NIST! This response level was higher than those recorded for Information Technology Infrastructure Library (ITIL), ISO/IEC (International Organization for Standardization/International Electrotechnical Commission) HIPPA (Health Insurance Portability and Accountability Act of 1996), COBIT (Control Objectives for Information and Related Technology) and CMM (Capability Maturity Model). Yes, that impressed me.

When Paul Christman, vice president of federal for Dell Software was interviewed by FedScoop, a leading online publication that covers the US Government market, he said the framework is “just good policy”.

“It applies to schools, universities, hospitals, [the Defense Department], [the Intelligence Community], and civilian agencies. The document doesn’t say ‘This is how the government should protect the government,’ ‘This is how a bank should protect a bank.’ NIST was really trying to say ‘This wasn’t a government program or mandate;’ it’s just good practice.” Kent Landfield, director of standards and technology policy at Intel Security, echoed this sentiment saying that his company was able to fit the NIST recommendations nicely into the information technology security evaluation process as a whole.

And as if NIST had planned to stage an encore performance, two new standards – 800-173, Cloud-Adapted Risk Management Framework: Guide for Applying the Risk Management Framework to Cloud-based Federal Information Systems, and 800-174, Security and Privacy Controls for Cloud-based Federal Information Systems – are currently being drafted for released. According to Dr. Michaela Iorga, senior security technical lead for cloud computing at NIST, these new frameworks are designed to overlay and elaborate upon already-existing standards that lay out the basics for cloud architecture and security. Iorga also suggests that federal organizations should also use FedRAMP, CSA’s Security, Trust and Assurance Registry (STAR), and other certification and authorization programs to make decisions about cloud computing.

With all this new knowledge in my head, I really gained a new appreciation for NIST. The agency seems to be really taking a lead on protecting cyberspace across the board. As the economic value of our collective digital economy gains in importance, this relatively small agency has placed itself at the vanguard of cybersecurity and is truly living up to its mission:

To promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life.

Thank you NIST!

(This post was written as part of the Dell Insight Partners program, which provides news and analysis about the evolving world of tech. Dell sponsored this article, but the opinions are my own and don’t necessarily represent Dell’s positions or strategies.)

Cloud Musings

( Thank you. If you enjoyed this article, get free updates by email or RSS – © Copyright Kevin L. Jackson 2016)

This blog has been verified by Rise: Re9cb99744b65eb009b71a970003c015e

This blog has been verified by Rise:  Re9cb99744b65eb009b71a970003c015e

This blog has been verified by Rise: Re9cb99744b65eb009b71a970003c015e
Follow me at https://Twitter.com/Kevin_Jackson
Posted in

G C Network