Visit GSA’s “Great Government Through Technology” blog by Assistant Commissioner for the Office of Information Technology Category (ITC) Laura Stanton.
The Continuous Monitoring: Keeping Your System Up to Date and Prepared for Cyberattacks blog complements the previous post on obtaining Authorization to Operate for Federal IT Systems. This blog outlines roles and responsibilities for continuous monitoring activities, including security control assessments, risk determination, and ongoing remediation. It also explains how agencies can procure these cybersecurity services through the Highly Adaptive Cybersecurity Services (HACS) Special Item Number (SIN).
Views: 186