Implementing Critical Controls for Federal Information Security

Apr 28, 2010

Download The release of the 2009 Consensus Audit Guidelines (CAG) outlines the need for federal cyber-security controls that are tacitly proactive and can �inform defense� of actual attacks that have compromised systems, or those that could transpire to do so.

This white paper explores specific directives of the CAG, and highlights a commercial software application that arms government agencies and their private-sector partners with the tools to perform ongoing penetration testing of web applications, network systems, endpoints and email users, and to simulate both external and internal attacks, including the ability to carry out testing over wireless networks.


Core Security Technologies