0% found this document useful (0 votes)
127 views

Continuous Diagnostics and Mitigation Program: How CDM Works

The Continuous Diagnostics and Mitigation (CDM) program is a DHS initiative to help federal agencies better protect their networks through automated cybersecurity risk management. The CDM program enables agencies to expand their use of network sensors to continuously monitor for cyber threats and vulnerabilities. Sensor data is analyzed to produce prioritized alerts and reports on the most severe risks. This approach allows agencies to efficiently address issues most urgently and track progress over time. DHS oversees the CDM program to ensure consistent implementation across agencies and leverages strategic sourcing to minimize costs.

Uploaded by

David Briggs
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
127 views

Continuous Diagnostics and Mitigation Program: How CDM Works

The Continuous Diagnostics and Mitigation (CDM) program is a DHS initiative to help federal agencies better protect their networks through automated cybersecurity risk management. The CDM program enables agencies to expand their use of network sensors to continuously monitor for cyber threats and vulnerabilities. Sensor data is analyzed to produce prioritized alerts and reports on the most severe risks. This approach allows agencies to efficiently address issues most urgently and track progress over time. DHS oversees the CDM program to ensure consistent implementation across agencies and leverages strategic sourcing to minimize costs.

Uploaded by

David Briggs
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

CONTINUOUS DIAGNOSTICS AND MITIGATION PROGRAM

The growing numbers of cyber attacks on Federal


Government networks are more sophisticated, aggressive,
HOW CDM WORKS
and dynamic. The CDM Program enables Federal Government departments
and agencies to expand their continuous diagnostic
Government computer networks and systems contain capabilities by increasing their network sensor capacity,
information on national security, law enforcement, and automating sensor collections, and prioritizing risk alerts.
other sensitive data. It is paramount that the government CDM offers commercial off-the-shelf (COTS) tools, with
protects this information from theft and protects networks robust terms for technical modernization as threats change.
and systems from attacks while continually providing First, agency-installed sensors perform an automated search
essential services to the public and protecting individual for known cyber flaws. Results feed into a local dashboard
privacy, civil rights, and civil liberties. The CDM program that produces customized reports, alerting network managers
is a dynamic approach to implementing automated, risk- to their worst and most critical cyber risks, based on
based cybersecurity that will better assure the security of standardized and weighted risk scores. Prioritized alerts enable
sensitive data and the provision of essential functions while agencies to efficiently allocate resources based on the severity
protecting sensitive information. of the risk. Progress reports track results, which can be shared
among sister networks. Summary information can feed into
an enterprise-level dashboard to inform and prioritize cyber
HELPING TRANSFORM risk assessments.
RISK-BASED CYBERSECURITY
In support of government-wide and agency-specific efforts
to provide adequate, risk-based, and cost-effective
cybersecurity, the Department of Homeland Security
(DHS) established the Continuous Diagnostics and
Mitigation (CDM) Program, an implementation approach
consistent with guidance from the Office of Management
and Budget and the National Institute of Standards and
Technology. CDM is a suite of capabilities and tools that:
 Enables network administrators to know the state of
their respective networks at any given time;
 Informs on the relative risks of threats; and
 Makes it possible for system personnel to identify and
mitigate flaws at near-network speed.

DHS, in partnership with the General Services


Administration (GSA), established a government-wide
acquisition vehicle (Blanket Purchase Agreement, or BPA)
for continuous diagnostic capabilities. The purpose of the
CDM BPA, which is available to Federal, state, local, and
tribal government entities, is to:
 Provide a consistent, government-wide set of
continuous diagnostic solutions to enhance the
Government’s ability to identify and mitigate the
impact of emerging cyber threats; and
 Capitalize on strategic sourcing to minimize costs of Continuous Diagnostics and Mitigation Process Diagram
continuous diagnostic implementation.
IMPLEMENTATION OF CDM  Prioritizes the worst problems within minutes,
versus quarterly or yearly;
DHS and GSA are structuring acquisition vehicles on behalf of  Enables defenders to identify and mitigate flaws at
CDM participants. network speed; and
 Lowers operational risk and exploitation of IT systems
The CDM BPA is open to any government entity,
and .gov networks.
including the Federal Civilian Executive Branch (.gov), as well
as state, local, tribal, and territorial departments and agencies,
and defense organizations. CDM BPA participants achieve cost HOW DHS IS MANAGING CDM
savings through tiered-price and task order discounts, enabling DHS ensures that the program is consistently
more efficient use of scarce resources to be spread further. This implemented, meets critical requirements for
strategy results in an enterprise approach to continuous effectiveness, and leverages centralized acquisitions to
diagnostics, including consistent application of best practices. improve the speed of procurement and achieve strategic
sourcing discounts.
For Federal Civilian Executive Branch departments and
agencies, DHS: The CDM Program Management Office (PMO) supports
 Optimizes CDM acquisitions; participating agencies through web-based toolkits,
 Organizes Task Order participants; customer representative meetings, and agency-dedicated
 Buys sensors and services with DHS-appropriated funds CDM advocates. The CDM PMO is housed in DHS’s
for .gov departments and agencies; Federal Network Resilience Division within the Office of
 Provides services to implement sensors and agency Cybersecurity and Communications.
dashboards for .gov departments and agencies; and
 Provides federal dashboard-related infrastructure. For more information about CDM visit:
www.gsa.gov/cdm (ordering information)
State, local, regional, and tribal governments may use the www.dhs.gov/cdm (public website)
Direct Order/Direct Bill option to procure products and/or
services from the CDM Tools/CMaaS BPA via the delegated The CDM PMO offers a secure, community of interest for
procurement authority, GSA Federal Systems Integration and CDM participants, hosted on the Homeland Security
Management Center (FEDSIM). For specific ordering options, Information Network (HSIN). To request membership,
please see GSA’s CDM/CMaaS Ordering Guide, 2013, via email the CDM PMO at cdm.fnr@hq.dhs.gov.
www.gsa.gov/cdm.
ABOUT DHS CYBER
BENEFITS OF CDM DHS is responsible for safeguarding our Nation’s critical
The CDM Program better protects government infrastructure from physical and cyber threats that can
networks through automated control testing and affect national security, public safety, and economic
progress tracking. This approach: prosperity. DHS actively engages the public and private
 Provides services to implement sensors and dashboards sectors as well as international partners to prepare for,
in .gov departments and agencies; prevent, and respond to catastrophic incidents that could
 Provides near-real time results; degrade or overwhelm these strategic assets. For more
information, please visit www.dhs.gov/cyber.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy