nCircle Solutions for Automating the Consensus Audit Guidelines Critical Security Controls
Click here to download now
Overview: Securing our federal infrastructure has become one of our nationís top cyber security priorities. The Consensus Audit Guidelines (CAG) were created to begin the process of establishing a prioritized baseline of information security measures and controls for the Federal Government. Fifteen of the twenty security controls outlined in CAG can be monitored, at least in part, automatically and continuously.
The rapid rate of change present in an environment constantly under attack makes it impossible to secure our cyber infrastructure without automated tools and processes. Every Federal agency must automate as much as possible to make the best use of their human resources and be in a position to evolve their processes as the cyber attacks continue to create new challenges.