preview

Regulatory Standards Of The Federal Information Systems Management Act

Decent Essays

Within this writing assignment I will discuss the following regulatory requirements comprise of the Federal Information Systems Management Act (FISMA), Sarbanes-Oxley Act (SOX), Gramm-Leach-Bliley Act, Payment Card Industry Standards (PCI DSS), Health Insurance Portability and Accountability Act (HIPAA), and Intellectual Property Law. I will also discuss security methods and controls which should be applied to ensure compliance with the standards and regulatory requirements. I will explain the guidelines established by the Department of Health and Human Services, the National Institute of Standards and Technology (NIST), and other agencies for ensuring compliance with these standards and regulatory requirements.

During daily operations, …show more content…

Title III of the E-Government Act, entitled the Federal Information Security Management Act (FISMA) requires each federal agency to develop, document, and implement an agency-wide program to provide information security for the information and systems that support the operations and assets of the agency, including those provided or managed by another agency, contractor, or other sources (Staff, 2016). FISMA was amended by The Federal Information Security Modernization Act of 2014. The amendment was established to modernize the Federal security practices to focus on security concerns. The results of these changes will strengthen continuous monitoring, continue focusing on agency compliance, and report on issues caused by security incidents. FISMA, Paperwork Reduction Act of 1995 and the Information Technology Management Reform Act of 1996 (Clinger-Cohen Act), clearly highlights the plans for a cost-effective security program. In support of and reinforcing this legislation, the Office of Management and Budget (OMB) through Circular A-130, “Managing Federal Information as a Strategic Resource,”1 requires executive agencies within the federal government to:
• Plan for security
• Ensure that appropriate officials are assigned security responsibility
• Periodically review the security controls in their systems
• Authorize system processing prior to

Get Access