February 6, 2017 By Ian Doyle 2 min read

Continuous monitoring, situational awareness, common operational picture, single pane of glass — these are just a few of the terms with which I’ve become well-acquainted throughout my career. Each one attempts to depict how security operation centers (SOCs) can reach the holy grail of data aggregation.

To prevent, respond to or remediate a security incident, an organization must be able to detect anomalous behavior. Furthermore, an organization can only identify anomalies if it is fully capable of monitoring all assets and activity traversing its network. Unfortunately, realizing the all-encompassing cybersecurity view and building an unobscured line of sight proved much harder than any marksmen cared to admit, especially without the aid of a comprehensive strategy.

Reviewing the Continuous Diagnostics and Mitigation Program

On Nov. 18, 2013, the Executive Office of the President (EOP)’s Office of Management and Budget (OMB) issued a memorandum titled “Enhancing the Security of Federal Information and Information Systems,” which sought to strengthen the nation’s cybersecurity posture through best-of-breed technology, engineering and automation, including monitoring. The Department of Homeland Security (DHS) established the Continuous Diagnostics and Mitigation (CDM) program in conjunction with the memorandum.

The program offered federal, state, local and tribal governments the ability to procure technology to assist in the continuous monitoring of information systems. The goal was to paint a common picture to better understand what resided on government networks, assess relevant risks, learn mitigation techniques and establish line of sight. Ideally, this would lead to more efficient prevention, response and remediation in accordance with maturing federal compliance requirements.

DHS envisioned implementing the CDM strategy in three phases, focusing on endpoints, identities and network traffic. CDM was expected to last five years with a $6 billion ceiling. While we’re entering the fifth year, it’s apparent that the timeline and respective milestones slipped to accommodate the monumental efforts involved along the way.

Enter Phase Three

The third phase of the continuous diagnostics and mitigation program enables enclave boundary protection and event management for managing the security life cycle. It encompasses the following capabilities: Boundary Protection (BOUND); Manage Events; Design and Build in Security; and Operate, Monitor and Improve.

BOUND deals with reducing inappropriate access to networks, systems and data. Managing Events pertains to preparing for security events, gathering threat data, identifying security incidents and assessing vulnerability impact. Design and Build in Security reflects a strategy to reduce the attack surface during acquisition, development and deployment. Finally, operate, Monitor and Improve facilitates security incident investigation, threat source analysis, root cause analysis, mitigation determination, vulnerability impact assessment and mitigation evaluation.

Phase three enables companies to address gaps in their cybersecurity architectures, take advantage of remaining funds and benefit from pre-approved functionalities with advanced planning. Anyone interested in this process should learn more about the upcoming briefing on IBM Watson and CDM.

Learn More About CDM

More from Endpoint

Unified endpoint management for purpose-based devices

4 min read - As purpose-built devices become increasingly common, the challenges associated with their unique management and security needs are becoming clear. What are purpose-built devices? Most fall under the category of rugged IoT devices typically used outside of an office environment and which often run on a different operating system than typical office devices. Examples include ruggedized tablets and smartphones, handheld scanners and kiosks. Many different industries are utilizing purpose-built devices, including travel and transportation, retail, warehouse and distribution, manufacturing (including automotive)…

Virtual credit card fraud: An old scam reinvented

3 min read - In today's rapidly evolving financial landscape, as banks continue to broaden their range of services and embrace innovative technologies, they find themselves at the forefront of a dual-edged sword. While these advancements promise greater convenience and accessibility for customers, they also inadvertently expose the financial industry to an ever-shifting spectrum of emerging fraud trends. This delicate balance between new offerings and security controls is a key part of the modern banking challenges. In this blog, we explore such an example.…

Endpoint security in the cloud: What you need to know

9 min read - Cloud security is a buzzword in the world of technology these days — but not without good reason. Endpoint security is now one of the major concerns for businesses across the world. With ever-increasing incidents of data thefts and security breaches, it has become essential for companies to use efficient endpoint security for all their endpoints to prevent any loss of data. Security breaches can lead to billions of dollars worth of loss, not to mention the negative press in…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today