Protecting the crown jewels of the government through infrastructure resilience and the DHS Continuous Diagnostics and Mitigation programme
Kevin Cox and
Mark Kneidinger
Cyber Security: A Peer-Reviewed Journal, 2017, vol. 1, issue 2, 147-155
Abstract:
For the first time, the US federal government will know the state of its networks at any given time, identify and rank problems for priority resolution, and invest resources in fixing the most significant cyber security problems first. How is this being accomplished? Through the Continuous Diagnostics and Mitigation (CDM) programme established by the Department of Homeland Security (DHS). Through CDM, agencies are provided a risk-based tools framework for cyber security, inclusive of sensors and an associated dashboard to detect vulnerabilities. The approach provides full visibility of the network for timely mitigation and proactive maintenance. This programme is making an impact today across over 97 per cent of the federal government. It has done so by: 1) discovering and protecting endpoints not detected by previous assessments; 2) providing solutions that prevent unauthorised access to the information ‘crown jewels’ of the government; and 3) initiating comprehensive CDM dashboards, both at the agency and federal levels, to provide critical visibility into vulnerabilities across the infrastructure. The CDM programme’s commitment to cyber security matches its commitment to innovation. This paper is premised on discussing the current state of the CDM programme, as well as its future direction.
Keywords: cyber; CDM; DHS; risk management (search for similar items in EconPapers)
JEL-codes: M15 (search for similar items in EconPapers)
Date: 2017
References: Add references at CitEc
Citations:
Downloads: (external link)
https://hstalks.com/article/1114/download/ (application/pdf)
https://hstalks.com/article/1114/ (text/html)
Requires a paid subscription for full access.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:aza:csj000:y:2017:v:1:i:2:p:147-155
Access Statistics for this article
More articles in Cyber Security: A Peer-Reviewed Journal from Henry Stewart Publications
Bibliographic data for series maintained by Henry Stewart Talks ().