Thursday, 6 June 2024
Funding a Whole of State Approach for your Community
Tuesday, 4 June 2024
Cisco Defense Orchestrator’s Path to FedRAMP Authorization
Cisco Defense Orchestrator is a cloud-based multi-device manager that enables consistent policy implementation across highly distributed environments. CDO’s centralized management allows rapid deployment of policy changes when minutes matter, and reusing policy objects across all firewall form factors reduces both administrative effort and organizational risk. Security teams that adopt CDO spend less time deploying and maintaining their firewalls and more time optimizing policies and managing threats.
Moving forward on FedRAMP
Cisco has made great progress in moving a variety of our solutions through the FedRAMP process. Created to encourage use of cloud computing, FedRAMP serves to streamline the exchange of information and accelerate services within federal agencies, plus improve their interaction with the public. In 2023, the FedRAMP Authorization Act was passed, codifying the FedRAMP program as the authoritative standardized approach to security assessment and authorization for cloud products and offerings.
With FedRAMP, federal agencies are provided a uniform framework for evaluating, approving, and continually overseeing cloud services. This includes procedures for security assessments, authorizations, and ongoing surveillance of cloud services utilized by federal entities. In addition, you should understand the following:
- The US General Services Administration (GSA) administers FedRAMP in collaboration with the Department of Homeland Security (DHS) and the Department of Defense (DoD).
- The compliance parameters set by FedRAMP are in alignment with the National Institute of Standards and Technology (NIST) Special Publication 800-53, which outlines technical standards for cloud computing.
- FedRAMP also promotes adherence to the Federal Information Security Management Act (FISMA) and the OMB Circular A-130 by federal agencies.
The FedRAMP process and Cisco Defense Orchestrator
FedRAMP Authorization can be pursued with an individual agency sponsor or multi-agency authorization. For CDO, Cisco is working with the United States National Institute of Health (NIH) as the individual agency sponsor.
Preparation Phase
The initial phase with individual agency sponsorship is known as the Preparation Phase. It consists of two key steps if no sponsor agency is available: conducting a Readiness Assessment and engaging in Pre-Authorization activities.
Preparation Step 1: Readiness Assessment
The Readiness Assessment is an optional stage aimed at helping cloud offerings obtain a sponsor. Readiness assessments are performed by certified Third-Party Assessment Organizations (3PAOs), who produce a Readiness Assessment Report (RAR) that shows potential sponsoring agencies that the solution is ready to meet the federal government’s security standards.
- Demonstrated that the CDO for government solution is fully built and functional.
- Completed a CSP Information Form.
- Determined the security categorization of the data that will be placed within the system utilizing the FIPS 199 categorization template along with the appropriate guidance of FIPS 199 and NIST Special Publication 800-60 Volume 2 Revision 1 to correctly categorize the CDO system based on the types of information processed, stored, and transmitted.
Leveraging the Cisco Federal Ops Stack
Pushing forward on CDO FedRAMP compliance
Saturday, 1 June 2024
Managing Firewall complexity and Augmenting Effectiveness with AIOps for Cisco Firewall
What is AIOps for Cisco Firewalls?
Our Approach: The Path to an Autonomous Firewall Future
The Benefits for You
Beyond Management: AIOps for Cisco Firewall
Best Practice Recommendations & Feature Adoption for Stronger Defense
Policy Insights with Policy Analyzer & Optimizer
Traffic & Capacity Insights
Thursday, 30 May 2024
Navigating DORA (Digital Operational Resilience Act) with Secure Workload
1. Understanding Risk
2. Preventing and Mitigating Risk
3. Reporting Risk
- Security Dashboard: Provides a high-level overview of the security posture and hygiene of the environment.
- Vulnerability Dashboard: Displays current CVEs within the environment along with a detailed assessment of their potential impact on confidentiality, integrity, and availability. Additional metrics such as risk score, exploitability, and complexity are also included.
- Reporting Dashboard: Presents a detailed view tailored to specific roles like SecOps and NetOps. An important capability to mention here is how the security summary maps to a modern risk-based approach to detect adversaries MITRE ATT&CK framework. Secure Workload has multiple forensic rules mapped to the MITRE ATT&CK TTPs (Technique, Tactics, and Procedures) allowing one to identify an adversary and follow every single step taken to compromise, exploit, and exfiltrate data.
Key Takeaways
- Strategic Cyber Resilience: Secure Workload can be a strategic enabler for aligning with DORA’s vision. Transitioning from a reactive cybersecurity stance to a proactive, risk-based approach, prepares your organization to anticipate and counteract the evolving cyber threat landscape
- Comprehensive Risk Insights: With granular visibility into application workload communications, dependencies, and vulnerabilities, coupled with the implementation of robust microsegmentation and compensating controls, Secure Workload equips you with the capabilities to not only understand but also to effectively mitigate risks before they materialize into breaches.
Tuesday, 28 May 2024
Demystifying Multicloud Networking with Cisco Multicloud Defense
Why Multicloud Networking?
A Closer Look
Site-to-cloud Networking
Cloud-to-cloud Networking
Hybrid Segmentation
Static object sharing
Saturday, 25 May 2024
Why IT Leaders Are Evolving the Network into a High-Performance Digital Engine
Driving transformation while on empty
Blind spots ahead
The alarms are going off
Speeding ahead with AI
Thursday, 23 May 2024
The Crux of Android 14 Application Migration and Its Impact
Font Scaling
Background Process Limitation
Foreground Service Types
Limitations on Implicit Intent and Pending Intent
Export behavior to be specified for Runtime-registered broadcasts
Non-Dismissable foreground notifications
JobScheduler reinforces callback and network behavior
Changes specific to Android Enterprise
GET_PROVISIONING_MODE intent behavior
wipeDevice – for resetting device
Newly added fields and methods
Deprecated methods
Challenges during Meraki Systems Manager App Migration
- To ensure there was no UI breakage, we had to recheck all the code base of xml files related to all fragments, alert dialog and text size dimensions.
- Few APIs like wipeDevice(), were not mentioned in the Android migration 14. During the testing phase it was found that wipeData() is deprecated in Android 14 and wipeDevice() was supposed to be used for factory resetting the device successfully.
- Profile information which can be fetched along with intent GET_PROVISIONING_MODE was also missed in the migration guide. This was found during the regression testing phase.
- requestSingleUpdate() of location manager always requires mutable pending for location updation. But nowhere in the documentation, it is prescribed about it. Due to this there were few application crashes. Had to figure this out during application testing.