Nov 01, 2010
Securing our federal infrastructure has become one of our nation�s top cyber security priorities. The Consensus Audit Guidelines (CAG) were created to begin the process of establishing a prioritized baseline of information security measures and controls for the Federal Government. Fifteen of the twenty security controls outlined in CAG can be monitored, at least in part, automatically and continuously.
The rapid rate of change present in an environment constantly under attack makes it impossible to secure our cyber infrastructure without automated tools and processes. Every Federal agency must automate as much as possible to make the best use of their human resources and be in a position to evolve their processes as the cyber attacks continue to create new challenges.