National Institute of Standards and Technology (NIST)

Home / Tags

Recent Inquiries

Assessing the Operational System Risk Imposed by the Infrastructure Deployment Pipeline Workflow

Real-time data monitoring of systems and system forensics is an essential aspect to keeping your data security platform safe when relying on the use of Infrastructure as Code (IaC) and the potential vulnerabilities associated with…

Articles

Automation and Ongoing Authorization Transition/Implementation

The use of manual methods to monitor system controls has essentially become impractical due to the growing number of applicable controls and the increasing frequency at which they are to be evaluated (for the RMF’s…

Webinars

Cybersecurity Maturity Model Certification (CMMC): The Road to Compliance

In response to the repeated attacks on the Department of Defense (DoD) supply chain, the release of the Cybersecurity Maturity Model Certification (CMMC) introduces a verification mechanism that will ensure the necessary security mechanisms are…

Assessing the Operational Risk Imposed by the Infrastructure Deployment Pipeline

Real-time data monitoring of systems and system forensics is an essential aspect to keeping your Data Security Platform safe when relying on the use of Infrastructure as Code (IaC) and the potential vulnerabilities associated with…

Meeting DFARS Controlled CUI Compliance

Defense Federal Acquisition Regulation Supplement (DFARS) established guidelines that required all government contractors to establish a program to protect Controlled Unclassified Information (CUI). All federal contractors were required to meet DFARS minimum security standards by…