Welcome Login

For current information from GSA about COVID19 please click HERE

You are here

Laura Stanton’s Technology Blog Highlights the Continuous Monitoring Process for IT Systems

Visit GSA’s “Great Government Through Technology” blog by Assistant Commissioner for the Office of Information Technology Category (ITC) Laura Stanton.

The Continuous Monitoring: Keeping Your System Up to Date and Prepared for Cyberattacks blog complements the previous post on obtaining Authorization to Operate for Federal IT Systems. This blog outlines roles and responsibilities for continuous monitoring activities, including security control assessments, risk determination, and ongoing remediation. It also explains how agencies can procure these cybersecurity services through the Highly Adaptive Cybersecurity Services (HACS) Special Item Number (SIN).


Views: 186

The purpose of this community is to provide a place where customers and industry partners can engage and discuss Cybersecurity related topics.... More

Visit the HACS SIN website to find high quality cybersecurity services to meet your needs:

  1. High Value Asset (HVA) Assessments
  2. Risk and Vulnerability Assessment (RVA)
  3. Cyber Hunt
  4. Incident Response
  5. Penetration Testing
  • candice's picture
  • tammy.kreiser@cydaptiv.com's picture
  • vbalani's picture