• Skip to main content
  • Skip to primary sidebar

ConvoCourses

Cyber Security Compliance and IT Jobs

  • Cyber Security Training
  • about me.
  • Information Assurance Jobs

Convocourses Podcast CCI on STIGs to RMF NIST 800 (2020 May)

September 20, 2022 by Bruce Brown Leave a Comment

https://www.podbean.com/media/share/pb-9gf3s-12c90c8

Full video. May 2020 was crazy.

https://www.youtube.com/watch?v=WnB2rdxQpwI&t=3s

 

Imagine cyber security and all our career paths being expanded into space as the space industry begins to expand. Imagine us having more opportunities in that. Industry. That’s what we talk about a little bit on this podcast. We also go into details about CCIS. STIGs which is security, technical implementation guides and how those. 

Interact with risk management framework, 800 and CIS controls. Now, this is an older podcast. Um, that I did in 2020, but a lot of it is still relevant. Hope you enjoy  Test test audio, test audio test. All right. This is gonna be a short one. I think, welcome to convo courses. My name is Bruce, and, um, wanna start off by, um, addressing, you know, what’s going on right now, as far as the coronavirus and stuff. Uh, but we’re gonna dive into, we’re gonna keep it, uh, to combo courses and cybersecurity stuff.

I know there’s a lot of stuff, negative stuff happening right now. As far as the protests and, um, coronavirus, we’re looking at a hundred thousand people, um, reported it as having died from coronavirus. We’re looking at around the world, 6 million people infected millions, uh, million, at least in the us and all this stuff’s going.

And I want to, first of all, I’ll send condolences to, to, uh, the people who have passed away from the coronavirus and people are suffering with it now. And if, and if you happen to be out there protesting or anything like that, I mean, just man, stay safe. Um, and, uh, That’s all I’ll say about that. You know, it’s is a pretty heavy subject and, uh, I don’t normally address that kind of stuff on this channel, but I just want to address it and make sure every everybody’s being mindful, stay safe out there.

You know, this coronavirus, stuff’s still going on, take it serious. Um, at the very least try to protect other people. You know what I mean? Um, the people who are most vulnerable to this, to this. So, and that goes for, uh, our justice system too. Like, let’s try to protect those who are vulnerable to, to the injustices and stuff like that.

Listen, let’s jump right into it. There is positive stuff happening right now. And I wanna, uh, talk about that stuff. That’s that’s occurring right now. Namely, I don’t know if you’ve been watching it, but the recent. Astronauts coming from a commercial aircraft, uh, commercial space vehicle flying all the way up to the international space station and then linking up with it.

And then this right here is, is really awesome because it opens up the private industry to start doing things like going to the moon, uh, or without the government. So that that’s incredible bull. Uh, the reason why it’s incredible for us, for it people, information system security people, especially is because that really expands our industry, the better the techno the technological field, the industries and technology do the, be the more opportunities for people like us, who are it?

People, people who are are nerds, you know, people who are geeks, it people, uh, we get more job opportunities. Um, Um, an increase of salary and, and the whole nine yards. So this is a really positive thing. And just to give you an idea of how positive this is, is that of, of, since I’ve been outta the military and actually in the military, I did some, some stuff for, uh, operations that are, that had to do with space.

But when I got out of the military, most of my jobs had to do with aerospace. Most of my jobs were with aerospace companies. So. It’s a huge industry. And, um, and it needs, especially, it needs, uh, security compliance. Like they have to follow a very strict methodology. Right. And that’s exactly what I do. And, and, and that’s the stuff that I teach mostly, you know, and I, and I’ll branch out to other things like certifications or more technical in the weeds type stuff.

But I just wanted to address, like the reason why this is such a positive. Is that the more commercialized, the more accessible space and aerospace low or, or orbits, or even on the moon or Mars, the, the bigger and larger that industry gets. The more mark my words, don’t take my word for it. Just watch history.

Watch what happens as that, that industry expands and we are on the moon or we’re on Mars, or we are on the wherever low earth or. They’re gonna there more and more of these organizations are gonna crop up and more of them are gonna have to hire people like you and I, it people and security compliance people.

So that’s, it’s a super positive thing. I know my, my daughter had been up all night watching all the news about the, the protests and the riots and how in some cities it’s going pretty bad. Uh, and she says, why are you watching this live feed of NASA? You know,  instead of don’t, you know, what’s going on. I said, Hey, you know,  this might give us a way to get off earth  and she says, yeah, you know, you have a good point about that.

so, I mean, if you, if you wanna be pessimistic about it, then this is, this is an optimist spin. Is that this is a way eventually, well, just leave. Like you don’t like it here. You can just go somewhere else.  so, yeah, I just want to bring that up. It’s it’s um, something positive and, and that’s why I see any kind of.

Of stuff about the, the expansion of us in the space humans and the space is a positive thing, cuz the industry is gonna grow and uh, the more the industry grows, the more opportunities there are for, for us, especially because it’s, it’s private, that’s even more opportunities for us. All right. So somebody asking me a question and I wanna address that.

I don’t wanna make this one too long, but one of the things I wanted to address.  and I’ll get to questions after this. I got somebody who just jumped on Alice. How you doing? She says, uh, hi. Um, can I send you my resume and for you to look at, please, may I have your email? So here’s my email address. Um, let me see if I can find my contact information.

Let’s just, oh, I see what happened. All right. Gimme. There it is right there. There is my email address. That’s the best way to contact me. Let, just move this down a little bit, move it, move it down. Boom. Best way to contact me is right here. If you happen to be, have, uh, purchased one of my courses, then, um, I will definitely help you directly.

That’s one of the perks of Purchas purchasing it directly from combo courses.com is that I will help.  um, I don’t have any kind of consulting or side things going on right now. I’m pretty new to this thing. So I, I haven’t gotten into paid consulting or anything like that. So you have the benefit of catching me early when I’m doing it a lot, some stuff for free.

So yeah, you can send me your, your resume, particularly if you’ve bought one of my, uh, courses, uh, on combo courses.com. If you’ve done that, please send me your resume. I will check it. I sometimes I’ll even rearrange it for you. I’ll just make suggestions on the resume to say, here’s what you should do. You know, here’s some key words you should consider and things like that.

But if you’re interested here, let me, let me just show you guys something real quick. I think this is a really good course, um, that I’m, that I made a while ago and I was super excited about it, cuz this concept is something that’s really helped me out over the years. Here’s my here’s combo courses right here and I’ve, I’ve got many D.

stuff like how to get in from scratch from cybersecurity, um, and how to do risk management framework. I’ve got free stuff here. Uh, but the one that, that Alice is asking me about is this one right here, resume marketing. This one I’m excited about because this, the techniques that I use here is exactly what has made me, uh, be able to constantly.

Position, uh, positions and constantly get opportunities. And I still, even during the pandemic, even during an economic downturn, such as the one we’re in now, and even in 2008, I was still continuously getting opportunities because of this, these techniques that I use here. So if you’re considering getting into this and you want me to directly look at your resume, go ahead and check out the resume marketing for cyber security.

And it, I don’t just talk about cyber security. And it can also apply to you if you’re in, in different industry, really, it can apply to anyone cuz the techniques absolutely work. And if you want an idea of what I’m talking about, it’s building a profile it’s researching, it’s finding key, creating the resume.

I walk you through all this stuff. And then I walk you through how, what tools I use online from career jet monster. And I also have something on interviewing and also. Uh, I will be adding more stuff to there that just like with all my courses, I add continuously add as, uh, as I find new things out or something comes up and I, and this is a, it is a really good thing for the course.

I’ll add it to, to that course or, or, or any relevant course that I’m talking about. So go ahead and check that out. And, uh, let’s get into control correlation identifier. Somebody’s been asking me about. , this is the reason I have not talked about it because this is kind of, uh, this one is a bit of a, this one’s very specific to D department of defense and dissa.

So, um, that’s why it’s kind of it’s it’s, it’s it’s out there. So, I mean, it’s very specific, but what is it? Let’s just talk about what this is real quick. Let me just get rid of this information here.  give me a second and now we’ll be addressing questions after this, by the way. So just keep the questions coming in the, in the, um, chat and I will I’ll get, get to that.

All right. So a CCI or a control correlation identifier provides a standard identifier and description for each of the singular actionable statements. That comprise and information assurance, IA control or IA practice. IA is just another word for security control. That’s what the department of defense calls it.

CCI or control. Correlation identifier bridges the gap between high level policy expression and low level technical implementation. All right. I can explain this and there’s, there’s a lot more here that it talks about here, but I can explain it in clear terms of what it means, what the CCI does is a code that identifies specific tasks that you have to do on Lennox systems on windows systems on servers, on database.

Very specific things you do on each one of these operating systems and it links these specific actions that you have to do to a risk management framework control, uh, to a security control. So I’ll give you a specific, I’m gonna show you first off. Let me tell you what it is. And then I’m gonna show you, uh, in greater detail what it is.

And, uh, I don’t know how deep we’ll go, but it’ll, it should be very. What a CCI is when we’re done. All right. So first off a specific example would be audit controls, like let’s say on you’re on a windows 2010 workstation, and you have been tasked to turn, turn on auditing on that system. Meaning event logs.

It’s gonna collect event logs for whenever somebody MIS authenticates, they, they type in their password wrong and it pops up as a Nope. This is not your. It will send an event, it’ll record an event on the system and that’s the control that we have to turn on. Right? Well, CCI would be assigned a specific number, like say CCI 0, 0 6 dash 5 53 or whatever that specific tag.

Uh, we’ll be identifying a, a re a specific action, which is turning on audit logs and that specific action ties to AU control one and AU control dash two. So now that might not make any sense if you’ve never done this before, but I’m going to show you, uh, a more specific example, couple examples.  um, let me, let me see if I can bring something up here.

Got a couple of examples that I was just looking at. So bear with me. So this is stuff I downloaded from the site. If you wanna learn more, I just, I am on cyber dot mill slash STIGs slash CCI. That’s where I’m at right here. So if you wanna just Google it, you can just Google. CCI STS. And you’ll, you’ll find this, right?

So this is I’m on the dis is one of diss sites. That’s why I’m I am. And I downloaded some of the stuff from here, which is, is not very helpful, to be honest with you. It’s not very helpful. Um, uh, right now I’m looking for some examples that I actually had prepped. So just bear with me, give me a second and I will show you what I am talking about.

Okay. Here’s one of them. So this is, this is.  um, this is

a system that, uh, had a STIG viewer ran on it. And what I wanna show you here, the relevant portion is this right here. This is a CCI. This right here. Can you, can you guys see that? Let me make sure you can see that. Okay. Yeah, you can see it. I made it bigger. CCI 0 0 1 8 1 2. And what is that? Right? What’s the re the reference tells us here, it’s referring to a specific event that the STIG viewer and okay.

Context, a STIG is a security, technical implementation guide. What it does is it walks you through all the individual things that you have to do to secure a system. The department of defense, along with some other departments within the federal government and even some state organizations, they have this breakdown of everything that you need for best practice to secure a system, whether it’s turn on audit logs, making sure you have multifactor authentication, making sure it’s in a secure area and physical has certain physical security making sure it has a policy making sure, uh, you have GPOs turned on and you.

You have control over your shared files, networking file protocols, making sure you have certain encryption turned on and or updated though. Each one of those things and there’s that mil, thousands and thousands of others, maybe millions of others that are individual tasks on windows, on red hat, on every operating system.

You can think. It has security controls. Right? And so what this department of defense does is they create these STIGs security, technical implementation guides that breaks down all the task and they made it so that it’s, they made it easier for you to make like a, you can make a script that automatically goes through and fixes all that stuff for you.

And they actually have some scripts that you can use to actually fix that stuff automatically. But this is a you’re looking. Some stuff from an actual STIG. And it’s the rule title. The thing that it’s trying to fix is on a windows, 10 guy, uh, system, and it’s for a windows installer will always install with elevated privileges.

This must be disabled. So by default, a window system will automatically elevate privilege.  to, uh, to, they’re trying to make it easier, more user friendly whenever you, uh, install something. So it just automatically gives elevated privileges. But the problem is that’s an that’s something that can be exploited.

So the rule that the stick came up with best practice is to turn this off. So when you turn, when you turn the system on you installing it, it, you gotta go in there and turn it off. Okay. So discussion standard user accounts must not be granted elevated privileges. Because, and the reason for that is you want least privilege that what that means is, um, AC I’m not gonna remember C five.

I think it is it’s either AC five or C six. And I don’t, I don’t remember which one it is, but it’s the standard of least privilege. Meaning you, you only give users. Standard users, privileged users, operational users. You only give users what they need to do their job. You don’t give them anymore. So windows by default and even Lennox does this will give extra privileges that you don’t necessarily need for this specific environment.

Now, there may be instances where you, you can give more privileges. It just depends on the environment, but let’s dive back into this. It says the standard user. Must not be granted elevated privileges, enable windows installer to elevate privileges. When installing applications can allow malicious persons or threat actors and applications to gain full control of the system.

So if this thing is turned on, somebody with mal with malicious intent might exploit it by, by granting, elevating their own privilege. Right. So we have to disable this thing. That’s what they’re telling us. And then they tell us specifically how to do it, where to go in the actual system to disable, always install elevated privileges.

And it’s telling us to go to computer configuration, administrative F uh, template, windows, component, windows, installer, and then disable, always install with elevated privileges. And I hope that makes sense this right here, what everything I just read is a CCI. All right now, let’s talk about how CCIS this specific task on a specific system links to N um, N uh, 800, uh, security compliance controls.

All right, here it is right here. This reference explains it. So at first of all, it has a, it’s a, has a, a unique identifier. Every single CCI has a unique identifier. In this case, a CCI 0 0 1 8 1. And what is it telling like in one sentences explains what it is. The information system, prohibits user installation of software without explicit privileges, uh, privileged status.

That’s what it does. And it links to, and the references, it tells you it links to this nest 853 rev four is going to rev five soon, cm, 11.  so cm is, is dealing with configuration management. Configuration management is dealing with, does our organization control? Does the security posture of our, of our or environment in layman’s terms, in layman’s terms?

What I’m saying is a cm control is having a inventory of everything that’s on your network. Like for example, in your own.  you know, you already know you got three computers, right? Your kid has a computer. Everybody has a cell phone and you have a router down in the basement. That’s it? Right. If you suddenly were doing a scan on your network and you saw 15 other systems on your network, that would give you grounds to freak the hell out.

Right.  cause that you don’t know what’s going on. So in the same way, an organization needs to know everything that’s going on on their environment. They need to know what networking devices are on their network, all the nodes, what their IPS are, what systems they have, what vulnerabilities they have. They need to know all the software that’s in their environment.

Right. They need to know if there’s wireless, if there’s other connections coming into their. They need to know everything that’s going on with their network. And that’s where a cm control comes in. So cm is controlling your environment. That’s all it is configuration management, managing my configuration of my organization’s systems because we have very important stuff going on.

That’s that’s cm. And so they’re saying that this CCI links to this cm 11. So if we go down the. Let me see if there’s anything I else I can show. Okay. Here’s here’s what I’m gonna do. I’m gonna actually bring up a STIG. This is a STIG viewer right here. This is an application you can download for free. Go to DISA a DISA dot mail, uh, or just Google a St.

Viewer. And this is a automated it, it’s basically a little app that will grab all of the security, uh, CCI. Everything you’re supposed to do on a window system or on a Linnux system or a red hat, whatever system and says, okay, have you done these things? Right? So that’s what we’re looking at here. So I’ve already taken Liberty to downloading a windows 10, uh, security St.

And one of these days I’m gonna make a whole course outta how to, how to do this. This is something I’ve been doing a long time, so I know, I definitely know how to do it. So here we. Um, and I can explain, break all this stuff down. It’s it’s pretty involved, um, special if you’re going through all these. So this right here, what you’re looking at is windows.

Um, okay. This is not showing me, us everything. So I’m gonna make this a little smaller so you can see everything going on here. There you go. Hopefully that’s clear to you. That’s okay. There we go. Right there. So right here, we’re looking at window. The last one I showed to you was an, was a screenshot. This is an actual STIG that I pulled down.

Um, not from a client of mine or anything like that.  would not show that. So here’s, so we’re clear. This is just a random STIG that I downloaded from this dot mail. And then that’s what we’re looking at. This is generic. So, uh, what I wanna show you is. This first CCI, this is CCI 0 0 0. Here’s where I’m getting the number from right here.

If you could see my cursor where my curse was pointing, right, right there.  is CCI 0 0 0 360 6. Organization implements the security configuration. And what is it linked to? There’s a few of them cm, six cm, uh, six do one, uh, and, uh, cm, six B what are we doing? What we’re doing is looking at the domain. Joined systems.

Must use windows 10, uh, enterprise edition, 64 version.  and it goes in a deeper discussion on what, what they’re wanting want, what they’re wanting as far as how to meet this particular, uh, STIG control and each one of these, the way they break it down. So, okay. Let’s, let’s do a little bit of a tour here.

There’s a couple of numbers here that, that I think you should know. So let’s look at this one right here. This vulnerability, I. Vulnerability ID identifies each individual potential weakness of a system. It’s saying that specifically the weakness, uh, on this system is this is X, right? And, and the rule name is attached to a w N windows 10 dash.

right. And each, each one of these vulnerability IDs attached to a specific weakness that has been detect that, um, that needs to be addressed. Right. And so you can manually go through each one of these. So one of the things that you can do as an information system, security officer, one great tool you can use better than nothing is to run this stool, this run, this STIG viewer and have your system.

By your side, right? You have your system right here. You have your system here and you’re looking at each individual item manually going through one by one by one to fix everything on your system. Another thing you can do is, is run a, a script that fixes all these things automatically. Right. And, and I believe there’s tools.

I, I wanna say that there’s, there’s something called, um, uh, SCC or. Checker software that, that, uh, you can get from department of defense, that, that has something that will fix it. It’ll scan your system. You, you load it on your, the affected system. Uh, and then you scan it’ll scan and, and see what STS, what individual CCIS, what vulnerability IDs are not being met on your system.

And then you would go through manually and fix every, all those items. Now. There’s a couple of different things here. How does this help you? Um, as an information system, security officer, if you don’t happen to be actually installing these things, how it helps you is that if you have the report from this thing, you’ll be able to know, okay.

When they did a scan, they found, let me just find that whole different CCI here, that we can talk about something that.

So let’s say you’re only doing documentation. You can take something like this, this scan, and you could, uh, this would be like an artifact or a bit of evidence stating that this rule has been met. And how’s the rule been met, you could say, right, right in here. It says, uh, that first of all, it is a windows ink workspace.

Consider. Uh, uh, sorry. Uh, workstation ink works, windows, ink, workspace configured, but disallowed access, uh, above the lock. And it tells us how to secure it. Securing windows ink with, uh, which contains application and features oriented towards, uh, the pin towards pin comput. I, I have no idea what this is.  I have no idea.

I have no idea what this is. This is some oh, pin, like the pin you E enter into the system. Okay. Okay. Okay. I’m just making more sense to me. So this is showing us how the scan, how, where it would be scanned at, like, what value is would you be looking for? So it’s saying that you would go into the registry back into the system and then.

If this was turned on, and if you’re doing a scan, it would check for this item in the registry keys. That’s what it’s saying. That’s how I’m understanding it. And it’s saying the fix action is disable the convenience pin, uh, sign in. So we don’t want you to be able to sign in with a pin because that’s too easy to exploit.

So here’s how we fix that. That’s that’s what they’re saying here. And it breaks it down exactly how you actually fix it. So. If you were doing the documentation for this, there’s a couple things you could do. You could use this to explain what the weakness is. Let’s say your organization didn’t do it. You could use this to break down where we are not meeting specifically how, uh, what’s going on.

Or if you wanted to prove that it, that it’s been fixed, you could go through and do a screenshot of what, of, of this feature, or if you were doing a.  you could run a scan and say, look, here it is right here. The windows 10 CC 0 0 0 3, 8 85 has been met. And that covers, uh, cm seven right there, CCM seven. So, and you could do that on many of these different items here that we have here and.

go from, they run the gamut from going this one, C, C uh, S I 16, you got some AC IA controls, you got different controls. So it’s telling you here in the CC, uh, in this reference where these map to each one of the security controls, and that’s why super helpful you as an information security officer. If you happen to be one you’re looking for, how can I.

These security controls. How can, how does our organization meet this particular security control? So this is just one way. If you happen to have a window system or a Linux or whatever it is, right? Cause they have, they have these for every kind of system. All the main systems are, are, are covered by the STS.

You can use this information to figure out if you guys are meeting this particular control or if you’re not meeting control and how to. So I hope that that makes sense. Um, I kind of, I feel like we, we kind of went overboard with it, but at, at some point, what I would like to do is actually take a system and secure the system, using the STIGs using the SCC tools and everything, but that’ll be a whole course cuz that, that all that stuff takes a bit of time and set up and all that kind of stuff.

I’m actually setting up some stuff on the back end here, but um, it’s gonna take me a while to set all that stuff up.  if there’s any questions we can address those, but while you guys are coming up with questions, I would like to show you something else real quick. Uh, another very useful thing with ma with having a matrix or having these individual vulnerability IDs and CC eyes and all these things, or how they all come together is beautiful because there’s something else where these same control.

Map to, um, a more commercialized version of controls, which is CIS benchmark controls. These controls are used by a lot of private industry stuff, private industries, some banks, and some other industries actually use these controls rather than the nest controls.

Filed Under: podcast

Reader Interactions

Leave a Reply Cancel reply

You must be logged in to post a comment.

Social connect:

Primary Sidebar

search


This book is an overview of how the NIST SP 800-37 risk management framework works from the perspective of an information system security officer (ISSO).

also available on Amazon!

View Book

NIST RMF 800-37 templates
Free 800-37 templates

The NIST 800 Template download contains a .doc file template and xls templates for POAMs, Federal, State, cloud based and a legacy template as well as resources where you can find more on NIST 800-37 documents for your use.

View Book

Learn to Make 6 Figures in CyberSecurity

Cyber Security How to make up to 6 Figures
6 figures in Cyber Security

This course explains how I have been able to consistently make 6 figures doing cyber security. There is a method that I have used during my development in cyber security. I am presenting that method to you.

View Course

Teleworking - IT Remote Work
Teleworking – IT Remote Work

Teleworking is something I have been doing for the last 5 years. This is how I did it.

Find Teleworking IT Jobs

View Course

RMF ISSO Foundations Training
RMF ISSO Foundations Training

RMF ISSO Foundations

I was an Information System Security Officer (ISSO) doing Risk Management Framework (NIST SP 800-37) for over a decade. I am a Cybersecurity veteran and I can explain (in plain English) what you DO in the Risk Management Framework process as an ISSO.

View Course

NIST SP 800-37 Presentation
NIST SP 800-37 Presentation

View Course

login

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Recent Posts

  • Convovourses Podcast: Certification and Paths
  • cybersecurity is not always fun.
  • starting as a system admin before #grc
  • The ever-green field of security compliance
  • 45 PERCENT OFF BlackFriday2023x Convocourses

Meta

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Recent Comments

http://Www.Finance.I… on SRG/STIG Applicability Guide a…
Elsa7 on ConvoCourses podcast: Cyber Se…
Tony on STIG Update – DISA has r…
horloge on SCAP Compliance Checker SCC)
218 Information assu… on Information Assurance Vulnerab…

Tags

#rockwellcollins #securitycompliance in 60 seconds IT to Compliance 4th industrial revolution 6 figures 9to9 Software Solutions 20th century fox linux admin 22nd Century Technologies Inc 800-37 800-39 800-53 800-137 2008 2012 3750 StackWise 3850 8140 8500 8500.01 8500.1 8510 8570 31000 @riskmanagement A&A ACAS ACASS access Account Security Manager accreditation acrobat act Active Directory activity Adam Sedgewick Adapter development tool etc ADC Administrative assistant Administrative Job Administrative Job to Cybersecurity and IT job adobe Adobe Acrobat Pro DC Classic advanced persistent threats Advice for a Security Control Assessor SCA AECOM AF afb AFI33-2 AIAP Air Force airforce information assuarance airforce information assurance AISO Akamai Kona Site Defender (KSD) analyst and administering Cisco ASR routers and resolution of Security Incidents andrew yang Android Android.Trojan.Uupay.D trojan and the Peace Corps and the Risk Management Framework (RMF) anti-virus AntiVirus apple appliances application delivery controller apply april 2019 APT ArcSight Arc Sight arizona Army Army and Air Force army information assurance Army National Guard (ARNG) ARNG asking ASP assess assessment Assessment Authorization assessments assessor documents 53a association of risk management assurance technology AT atlanta ATO at risk management ATS authorization authorization package authorize automotive Avamar Awareness Program awareness training backbone bad grammar bcp Become a better ISSO and cybersecurity analyst Q&A BEMS benchmark BIA BIND Blackberry Blackberry BES BlackBerry Enterprise Mobility Server (BEMS) blackberry uem black man in IT BMC border Router/Switches Bored in Compliance Changing Career Paths Boston Area boulder brocade brooklyn bts bug building of ADT buisiness continuity business impact assessment business risk bwi C# c&a california Can a teacher or Nurse get into IT c and a CAP CAP certification career career fair careerjet cary casp categorization cc CCDP ccent cci ccie CCM ccna CCNA-Security CCNE ccnp CCNP Security CCSP CDC Cedar Rapids CEH center Center for Information Technology Center for Internet Security (CIS) centos certi certifcation and accreditation certification Certification & Accreditation Certification and Accreditation Certification for Security Control Assessor Q&A Certified Ethical Hacker Certs and Skills and Make More Money in IT chatanooga CHATTANOOGA checkpoint check point checkpoint firewall chinese chrome CISA Cisco Cisco ASA Cisco ASA VPNs Cisco Nexus products Cisco switches CISM cism certification CISSP CISSP-ISSEP CIT citrix Civil Servant GS Civil Servant GS vs Contracting Civilian in IT CJCSI 6510.01 clearance Clearance Career ClearCase Cleared Jobs cloud cloud computing Cloud Security for IaaS/PaaS/SaaS cloud vs cybersecurity clustering CMaaS CMD cmdb CMRS cnd CNOSS CNSS CO COBITS coldfusion cold site collection college college student colorado colorado springs Columbia Common Criteria Community College compliance comptia computer fix computer network defense computer science configuration configuration manager configuring contingency plan continuity plan Continuous Diagnostics and Mitigation Continuous Monitoring Continuous Monitoring as a Service Continuous Monitoring in the Course continuous monitoring risk scoring Contracting Civilian in IT control families and implementing controls controls convocoures ConvoCourse Community convocourses Convocourses contacts CISSP study Q&A Convocourses ISSO testimonial ConvoCourses podcast convocoursespodcast ConvoCourses podcast: control families and implementing controls ConvoCourses podcast: ConvoCourse Community ConvoCourses podcast: Cyber Security day to day activity ConvoCourses podcast: Cyber Security Therapy Sessions ConvoCourses Podcast: POA&M Risk responses Resumes ConvoCourses podcast: privacy protection overview resume review Convocourses podcast: RMF Course Updates New NIST 53 Convocourses pofcast convocourses update COOP core data center coronavirus corporate risk COTS covid-19 CPE CPEs on ConvoCourses csc CSIH CSO Online CSP CSRA CVE cyber cyber engineer cybersecurity cyber security cybersecurity analysis cybersecurity analyst CYBER SECURITY ANALYST Job Listing at Kelly Services Cybersecurity Analyst vs Engineering Daily Tasks Cybersecurity Analyst vs Engineering Daily Tasks q&a Cybersecurity and IT job Cybersecurity and IT Resume Marketing (Part 1) cybersecurity compliance cyber security day cybersecurity degree cyber security engineer Cybersecurity Engineer IDS/IPS Specialist Cybersecurity engineer job cyber security experience cybersecurity framework cybersecurity interview Cybersecurity Job Cybersecurity Public Cybersecurity Public or Private Sector cybersecurityresume Cybersecurity Resume Cybersecurity Resume Tips for Security jobs (part 3) Cybersecurity Risk Management Cybersecurity Risk Management Best Practice Working Group cybersecurity risk management job cybersecurity salary Cybersecurity specialist Patuxent Cybersecurity Study in 2021 blockchain and threat intel Cybersecurity with little or no Experience Cybersecurity with ZERO experience Cybersecurity workforce Cybersecurity Workforce Framework cyberspace workforce cyber threat Cyber Threat Analyst in NEWARK cyberwork cyber workforce cyberworkforce Dahlgren DameWare DATA DATA/INFORMATION ARCHITECT in COLUMBIA database databse Data Domain Data Loss Prevention and premise-based SMTP relays datapower data protection Data Protection Advisor data security dayton DB2 DC3 DCO DCP dcs-7000 Defense defense information systems agency Defense Languages Institute Defense Logistics Agency (DLA) Delaware denver Denver Colorado denver security Department of Aging & Disability Services Department of the Navy Depend on Stakeholders during Risk Management Framework Design DHCP DHS DIACAP DIACAP compliance engineer DIACAP transition to RMF diacap vs rmf DIARMF DIARMF - Continuous Monitoring diarmf - implement diarmf-select DIARMF A&A DIARMF A&A - Assessment Authorization diarmf assess diarmf assess and authorizaiton diarmf authorization diarmf diacap DIARMF Documentation & Implementation diarmf implentation diarmf news DIARMF Process diarmfs diarmf select disa disaster recovery DISA STIG disa stigs discord ditcap DITSCAP ditscap supersedes diacap DLA DLI DMZ dns dod dod 8140 dod 8530 dod 8570 dod 8570 chart DoD Annex for NIAP Protection Profiles DoD Annex for NIAP Protection Profiles For Mobile Devices dodd 8140 dodd 8140 cyberspace workforce DoDI 8140-01 DoDI 8500 and 8510 DIARMF signed DoDI 8510.01 Risk Management Framework (RMF) for DoD Information Technology (IT) DoDI 8530.01 dod information assurance awareness dod information assurance awareness training DOD RHEL dod risk management DoD RMF for IT dod security clearance Does Cybersecurity Job require a Security Clearance DOI Do I teach Security Control Assessor (SCA) activity? domain name system DoS do you need to do the polygraph test for and sci #securityclearance dr Draft Backbone Transport Services (BTS) DSS DTC during staycation EAL Earn CEUs Earn CEUs & CPEs on ConvoCourses EDB Postgres Advanced Server 9 On Red Hat Enterprise Linux STIG Version Education EEM Elasticsearch el capitan Electrical emass emass training EMC VNX employer Employer Asking for Too Much Experience encryption Endpoint endpoints engineer Engineering Daily Tasks engineer job ENS Enterprise Mission Assurance Support Service Enterprise Mission Assurance Support Service (eMASS) enterprise risk enterprise risk management (ERM) enterprise security risk manager entry level information assurance jobs EOS/EOL EPA EPMO EPMO Project Analyst epo EPSD ESM Essential Security est ESX ESXi ETS ETS csc cyber engineer NJ evaluate risk evaluation of risk event Excel exchange Executive Summaries Executive Summary experience expo expos f5 facebook failed the ISC2 CAP false negative False positive False positive versus false negative family Interpretation farmington hills FBI FCC federal fedramp fedramp 3pao finding out Finding Out Cybersecurity Salary Finite Element Modeling fips 199 firewall firewall and proxy rules firewalls FISMA fisma 2012 fisma 2014 fisma requirements fix the fan of toshiba Satellite P755 S5380 FMC fmr forescout forescout-counteract format cybersecurity FOSS foster framework Ft. Belvoir ga GaDHS - Information Security GC GC-EAD GCIA GCIH G Data gilead sciences got a job GOTS Governor’s Office of Information Technology GPO GPOs grc Greenwood Village group policy management. Group Policy Objects Group Policy Objects (GPOs) GSEC gslc gslc certification guardium GXP hacker methods Hardware HBSS HBSS (Host Based Security System) help desk helpdesk helpdesk specialist help desk support Help Desk Support I Herndon HHS HIAM HIAR highland ranch HIPAA hippa HIPS HIPSDetection History of C&A honda HOR hot site How do I get a security clearance if I am eligible How long does it take to get to 6 figures how to find a job How to study for IT certifications HQ Hyena IA IA controls IACP ia jobs IAM IAO iase IASO IASO and ISSM IAT IAT Level IA training IAVA IAVM ibm IBS ICS ICS security idam identification of risk Identity and Access Management IDS I Failed the ISC2 CAP certification IISO NIST Immediate Hire Position as Security Analyst in Columbia SC with State of SC implemenation implement implementation Implementation of security controls resources part 1 Implementation of security controls resources part 2 implimentation Industrial Control Systems Industrial Control Systems Security info assurance info assure infoblox informaiton assurance information INFORMATION ARCHITECT information assurance information assurance air force information assurance analyst information assurance army Information Assurance Awareness information assurance awareness certificate information assurance controls information assurance degree information assurance degree online information assurance degree program information assurance engineer information assurance jobs Information Assurance Lead information assurance manager information assurance officer information assurance service information assurance services information assurance technology information assurance training Information Assurance Vulnerability Alert Information Assurance Vulnerability Management information awareness training army information protection information security Information Security Certification and Accreditation (C&A) specialist Information security continuous monitoring Information security officer information security specialist INFORMATION SECURITY SR - LEVEL SR information system information system security architectural information system security engineer information system security officer Information Systems Security Managers (ISSMs) information technology information technology risk management information technology risk management certifications infosec Internet domain records interpret security control Intrusion Prevention ios ios9 ios11 IOS XE IPS I recommend Program Management IRS ISACA isaca risk it framework ISC2 ISC2 CAP ISC2 CAP Recommended Resources ISCM ISCP isdi isds isim ISO ISO 27001 ISO 27002 ISO 31000 2009 Risk Management iss8.5 ISSA ISSE ISSEP ISSM ISSO ISSO and cybersecurity analyst isso jobs ISSO must Support the Team ISSO NIST Security Control Family Interpretation ISSO RMF Foundations course overview ISSOs Cybersecurity Certifications ISSOs Cybersecurity Certifications and DoD 8140 ISSO vs ISSE ISSO vs ISSE Differences Q&A Is there racism for black men in information technology IT IT/ITES IT Admin IT career IT Certifications IT degree IT Experience by Asking and Volunteering ITIL IT Infrastructure Library IT job it jobs itjobs IT jobs for beginners it jobs in the usa it jobs in usa IT market IT Marketing IT Office IT OPERATIONS ENGR - COMPUTE IT program manager resume + executive summary IT programs IT Q and A IT related business risk It resume IT Resume Marketing IT Risk Analyst IT Risk Management it security IT Security Jobs IT Services Organization and Offering ITSG ITSG-33 IT six figures IT study IT volunteering IT work J-messages J2EE java JIE jncia job job fair job in usa job option jobs jobs in america jobs in the usa jobs in usa Joint Information Environment jre JREAP Juniper JVAP JWAC K-messages kelly services knowledge service knox labwork LAN Layer 3/ Application/Micro-Segmentation Firewall Policy/Administration LDAP LDAP (Active Directory) LG Android Link-16 linkedin Linux Linux or VxWorks listing Listing Lab work on Cybersecurity Resume littleton Load Balancer load balancers Load balancing location online Log/Monitoring correlation and/or Data Packet Inspection Loggers logrhythm logs MA MAC Mac/OS MacAfee macintosh mainframe maintenance major dns severe google redhat malware management risk wiki Managing stress in Cybersecurity Marine Corps maryland masters degree Masters Degree in a Cybersecurity Role matrix Maverick Mavericks mcafee McAfee Endpoint Security McAfee ePO MCSE MCTP md Mechanical Message Queues microsoft Microsoft SMS/ SCCM microsoft sql middle class military miller jones Milwaukee Minnesota Department of Health mission system engineer mitigation MN mobile devices mobility modernization monitoring Monterey MPLS ms MS-Windows MS Excel MS Power Point MS SQL MS SQL databases MS Visio My experience going through TS clearance my opinion about masters degree in IT NAS National Initiative for Cybersecurity Education National Initiative for Cyberspace Education national security national security agency Naval Hospital Jacksonville Naval Research Laboratory Navy NC Nederland Need Information Security Admin in Cedar rapids IA nessus Nessus Scan netapp Netapps NETCOM netscreen network Network access control network administration Network Administrator Network Administrator in Oak ridge TN Network Area Storage Network attached storage network engineer Network Engineer II Network Engineer In Monterey CA Network Engineer to Risk Management Framework Networker network job Network Operations and Security Center (INOSC) network security network security engineer Network Security Engineer Woodbridge network technician new hampshire new jersey nexpose Nexus 7000 nh NIAP CCEV NICCS NICE niehs NIH nipernet NIPR NIPRENET niprnet nist nist 800 NIST 800 37 Revision 2 NIST 800 and Privacy nist 800-18 NIST 800-30 NIST 800-37 NIST 800-53 NIST 800-115 NIST80037 NIST Cybersecurity Framework nist risk nist risk management framework nist risk management framework 800-37 nist risk management framework 800-37 rev1 NIST Risk Management Framework 800-39 NIST RMF NIST RMF 800 NIST RMF Security Control Interpretation NIST security awareness training NIST Security Framework NIST SP 800-30 nist sp 800-37 nist sp 800-53 nist sp 800-60 NIST SP 800-115 nist sp 800-137 nist stigs NJ noc north carolina Northrop Grumman NSA NVD NXOS NYC Office of Information Technology oftware-Defined Networking (SDN) ohio OIT oobm operational risk operational security operation risk operation technician Oracle Oracle Linux Oracle Linux 5 Oracle Linux 5 STIG V1R1 orange book Oregon or GCFA or Red Hat Enterprise Linux Server 6 os 8 osi osx Outlook OVPI Pa page Palo-Alto palo alto palo alto network patch PCB PCI PCI DSS personnel security php Physical and Environmental Protection physical risk physical security PKI plan of action and milestone PMI Risk Management Professional PMO pmp POA&M or CAP POA&M Risk POAM POAM dates POAM vs Implementation Statement podcast Politics Politics in the IT Office PowerPoint PowerShell pp princeton privacy Privacy do not put real name and location online privacy protection overview private sector privilege access program management Program Manager Project Manager protection of information in IT protection profile python q&a Qos QRadar ArcSight rainbow series Raleigh Raytheon Software Engineer Tucson AZ RDIT recommend RecoverPoint redhat red hat Regional Transportation District (RTD) relocate Remedy remote remote jobs Remote Jobs without a clearance Remote Work Remote Work Cyber security Architect require Research Triangle Park responsibility resume Resume bad grammar and format cybersecurity resume cyber security Resume Cybersecurity Specialist Review Resume ISSO review resume review Retina review Revision 5 Security Controls for Information Systems and Organizations rims risk risk analyst risk assessment risk assessment methods risk assessment model risk assessment reports risk assessment table risk assessment worksheet Risk certification risk determination risk evaluation risk id risk identification risk impact risk it analyst risk it framework risk management risk management analyst risk management association risk management chart risk management definition Risk Management For DoD IT risk management framework Risk Management Framework (RMF) Risk Management Framework (RMF) for DoD Information Technology (IT) risk management frameworkd Risk Management Framework For DoD IT Risk Management Framework for Information Systems and Organizations A System risk management framework ppt risk management framework steps risk management guide risk management magazine risk management principles risk management register risk management techniques risk management wiki risk management worksheet risk managemnet framework risk managemnt risk manager risk manager job description risk managment risk managment frame risk managment framework risk managment frame work risk mangement risk mangement framework risk mitigation risk operational risk register template risk types rismangement framework riverbed Riverbed SteelHead CX rmf rmf assessment RMF course rmf for dod it rmf implementation RMF ISSO Foundation course RMF ISSO Security Controls Docs Updates rmf job rmf jobs RMF Knowledge Service RMFKS RMF Lesson Learned rmf security controls RMF Training Paths RMF Training Video Presentation roles router RPM YUM RSA NetWitness SA&A Saint Paul Salem SAM samsung samsung 9 San Antonio SANS GSLC sar sarbanes oxley SARMA SC SCA SCAP SCAP Compliance Checker scap compliance tool scap tool scc SCCB SCCM SCCM/SME in Dahlgren VA schriever Scientific Scientists SCOM SDN SEC DOT securdever security Security+ Certification Security Access Management Security Administrator security agency security analysis security analyst Security Analyst Opportunity security and risk analyst security assessment re security assessment report security assessment reports security assurance security authorization package security clearance securityclearance Security Clearance Career Expos securityclearance jobs Security Clearances in IT security compliance security compliance engineer Security control security control assessor Security Control Assessor Documents 53a Security control interpretation security controls security controls resources part security engineer Security Engineer in Montpelier Security Engineer Location Wayne security guidance Security Identity Management security intelligence security job Security Manager Security Manager at Boston Area security operations center security plan security plus security requirement guide security risk security specialist Security Technical Implementation Guide Security Technical Implementation Guidelines Security Technical Implementation Guides SEIM select Senior .Net Developer Senior Advanced Splunk IT Specialist senior network security engineer separation of duties Separation of Duties with one person ISSO sepm server sgr SharePoint Should I get security plus or experience first Q&A SIEM SIM SIPRNET six fig Six Figures SmartConnectors / FlexConnectors smarts/ionix SME SMTP SOC sod Software Defined Networking Software Developers Software Engineer solarwind Solution Integrator and Architect Source code management (SCM) south carolina SOX SPECIALIST specialist review splunk sql sql server srg SRM sr network engineer Sr Systems Administrator ssaa SSCP SSL ssp Stakeholders Star N9500 Starting IT Starting IT in Community College state stealhead STEM sterling STIG stig library stigs STIGS for Security Control Assessments STIG Update STIG Update - Microsoft Windows 10 STIG STIG V1R1 stig viewer St Paul stress in Cybersecurity strivector sunnyvale support SuSe Switching Jobs to IT Symantac Ghost symantec system System admin System Administrator System Analyst 3 system compliance system engineer System Engineer IV systems administrator system security plan systems engineer t&e Tanium Tanium Software tcp/ip tech Technical Guide to Information Security Testing and Assessment telework test engineer testimonial testing expert texas therapysessions the rmf road The Value of Security Clearances in IT Things to read for Risk Management Framework threats Tivoli Directory Integrator Tivoli Directory Server TN tool too much experience torrance Training Transparent triage triangle park TS clearance types of risk ubuntu UEM Unified Endpoint Management unix usaf USCYBERCOM USDA USMS USPS VA VBScript vcenter virginia virtual virusscan visualization engineer VM VMWare VMWare AirWatch Mobile Device VMware ESX voice VPLEX VPN vse vsel vsphere VT vulnerabilities Vulnerability and Incident Duties Vulnerability Management and Security Patching WAN warm site Web Application firewall (WAF) web gateways webinspect WebSEAL websense Web Sphere Application Server We happened to see the building of ADT during staycation wfh What if we cannot meet the POAM dates (Part 1) what is a risk assessment what is IA what is information assurance What is payment card industry PCI data security standard DSS what is risk what is the national security agency What you Get in the RMF ISSO Foundations Course What’s Up Gold Which course teaches Risk Management Framework window 10 windows Windows 7 windows 10 Windows 2003 windows iss Windows Professional windows server 12 Windows Server 2008 R2 windows server 2012 domain name system Windows Server Update Service (WSUS) Windows Services Wireshark without a clearance Word work workforce writing XP XtremIO ystems Security ZERO

Copyright © 2023 · Author Pro on Genesis Framework · Powered by WordPress.com. · Log in