The U.S. Federal Cybersecurity Cross-Agency Priority Goal helps Federal departments and agencies improve cybersecurity performance by focusing efforts on what data and information is entering and exiting their networks, what components are on their information networks and when their security status changes, and who is on their systems. The White House is focusing agency efforts on improving the security of their networks by implementing the Administration's priority cybersecurity capabilities and developing metrics to measure their success. The Administration's priority cybersecurity capabilities are:
- Trusted Internet Connections (TIC): Consolidate external Internet traffic and ensure a set of common security capabilities for situational awareness and enhanced monitoring.
- Continuous Monitoring of Federal Information Systems: Transform the historically static security control assessment and authorization process into an integral part of a dynamic, enterprise-wide risk management process. This change allows departments and agencies to maintain an ongoing near-real-time awareness and assessment of information security risk and rapidly respond to support organizational risk management decisions.
- Strong Authentication: Ensure only authorized employees have access to Federal information systems by requiring a higher level of assurance following the HSPD-12 Personal Identity Verification standard.
- "Cybersecurity: Executive branch departments and agencies will achieve 95% implementation of the Administration's priority cybersecurity capabilities by the end of FY 2014. These capabilities include strong authentication, Trusted Internet Connections (TIC), and Continuous Monitoring (full-text).