Fandom

The IT Law Wiki

Information Security: State Has Taken Steps to Implement a Continuous Monitoring Application, but Key Challenges Remain

32,181pages on
this wiki
Add New Page
Talk0 Share

Ad blocker interference detected!


Wikia is a free-to-use site that makes money from advertising. We have a modified experience for viewers using ad blockers

Wikia is not accessible if you’ve made further modifications. Remove the custom ad blocker rule(s) and the page will load as expected.

Citation Edit

Government Accountability Office, Information Security: State Has Taken Steps to Implement a Continuous Monitoring Application, but Key Challenges Remain (GAO-11-149) (July 2011) (full-text).

Overview Edit

The Department of State has implemented a custom application called iPost and a risk scoring program that is intended to provide continuous monitoring capabilities of information security risk to elements of its information technology (IT) infrastructure. Continuous monitoring can facilitate nearer real-time risk management and represents a significant change in the way information security activities have been conducted in the past.

The GAO was asked to determine (1) the extent to which the State Department has identified and prioritized risk to the department in its risk scoring program; (2) how agency officials use iPost information to implement security improvements; (3) the controls for ensuring the timeliness, accuracy, and completeness of iPost information; and (4) the benefits and challenges associated with implementing iPost.

Also on Fandom

Random Wiki