{"id":79,"date":"2025-11-13T22:40:59","date_gmt":"2025-11-13T22:40:59","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/?p=79"},"modified":"2025-11-29T19:19:14","modified_gmt":"2025-11-29T19:19:14","slug":"policy-analysis-part-1","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/2025\/11\/13\/policy-analysis-part-1\/","title":{"rendered":"Policy Analysis of FISMA"},"content":{"rendered":"<p style=\"line-height: 200%;margin-bottom: 0.11in\" align=\"center\">\n<p style=\"line-height: 200%;margin-bottom: 0.11in\" align=\"center\"><span style=\"font-family: Times New Roman, serif\">Policy Analysis of FISMA: How the Government Plans to Modernize Our Cybersecurity Defenses<\/span><\/p>\n<p style=\"line-height: 200%;margin-bottom: 0.11in\" align=\"center\"><span style=\"font-family: Times New Roman, serif\">Carter Hendrick<\/span><\/p>\n<p style=\"line-height: 200%;margin-bottom: 0.11in\" align=\"center\"><span style=\"font-family: Times New Roman, serif\">Old Dominion University School of Cybersecurity<\/span><\/p>\n<p style=\"line-height: 200%;margin-bottom: 0.11in\" align=\"center\"><span style=\"font-family: Times New Roman, serif\">CYSE 425W: Cyber Strategy and Policy<\/span><\/p>\n<p style=\"line-height: 200%;margin-bottom: 0.11in\" align=\"center\"><span style=\"font-family: Times New Roman, serif\">Teresa Duvall<\/span><\/p>\n<p style=\"line-height: 200%;margin-bottom: 0.11in\" align=\"center\"><span style=\"font-family: Times New Roman, serif\">9\/15\/2024<\/span><\/p>\n<p style=\"line-height: 116%;margin-bottom: 0.11in\">\n<p style=\"line-height: 200%;margin-bottom: 0.11in\" align=\"center\"><span style=\"font-family: Times New Roman, serif\">Policy Analysis of FISMA: How the Government Plans to Modernize Our Cybersecurity Defenses<\/span><\/p>\n<p style=\"line-height: 200%;margin-bottom: 0.11in\" align=\"center\">\n<p style=\"line-height: 200%;margin-bottom: 0.11in\"><span style=\"font-family: Times New Roman, serif\"><i>In 2002 the American government released the Federal Information Security Management Act, now known as the Federal Information Security Modernization Act (FISMA). This new version of the policy was enacted in 2014 was a response to increased cyber-attacks on America. FISMA (2002) was enacted to bolster the foundations of the cybersecurity and IT industries in America due to how it had been neglected up to that point. This is one of the best ways to now keep America defended. The American military is the strongest in the world and it is only proper our cyber defenses are the same. <\/i><\/span><\/p>\n<p style=\"line-height: 200%;margin-bottom: 0.11in\">\n<p style=\"line-height: 200%;margin-bottom: 0.11in\"><span style=\"font-family: Times New Roman, serif\">FISMA 2002 ver.<\/span><\/p>\n<p style=\"line-height: 200%;margin-bottom: 0.11in\"><span style=\"font-family: Times New Roman, serif\"> FISMA (2002) was made to give responsibilities to certain agencies and offices in the American government that would ensure better defenses from cyber-attacks (CIO*). Specifically, all agency heads would have to create an annual report of their information security programs and send it for review to the Office of management and business (OMB). This was the best way to have multiple eyes always checking and keeping security programs in order. If not checked then it could lead to data leaks that would be especially dangerous and difficult for the government to deal with, especially in 2002 when the policy was first enacted. The actual checklist that held these reports to standard was created by the National Institute of standards and technology (NIST) and is the main reason that information is so well regulated (CMS Information Security &amp; Privacy Group*). <\/span><\/p>\n<p style=\"line-height: 200%;margin-bottom: 0.11in\">\n<p style=\"line-height: 200%;margin-bottom: 0.11in\">\n<p style=\"line-height: 200%;margin-bottom: 0.11in\"><span style=\"font-family: Times New Roman, serif\">FISMA 2014 ver.<\/span><\/p>\n<p style=\"line-height: 200%;margin-bottom: 0.11in;text-indent: 0.5in\"><span style=\"font-family: Times New Roman, serif\">FISMA (2014) is an amended version of the original act, that keeps the necessity of the annual reports to the OMB. It also points out the responsibilities of other agencies like the National Security Council (NSC), and the Department of Homeland Security (DHS) which can pull resources together in case of cybersecurity emergencies (OMB*). The main reason of the amended act is not only to cut down on unnecessary or redundant reports but also to focus on confidentiality, Integrity, and availability (CIO*). This is all to make sure that all information is well secured and kept away from any form of vulnerability. That all information is original and never modifying the primary source and instead using copies to create changes, and keeping this information available for those who need it to do their jobs. <\/span><\/p>\n<p style=\"line-height: 200%;margin-bottom: 0.11in;text-indent: 0.5in\">\n<p style=\"line-height: 200%;margin-bottom: 0.11in;text-indent: 0.5in\"><span style=\"font-family: Times New Roman, serif\">FISMA Compliance<\/span><\/p>\n<p style=\"line-height: 200%;margin-bottom: 0.11in;text-indent: 0.5in\"><span style=\"font-family: Times New Roman, serif\">There are a few different things that must be done for an agency to be FISMA compliant such as, constant surveillance throughout facilities, the before mentioned reports, a document listing all the controls for the security plan, and system risk categorization (CMS Information Security &amp; Privacy Group*). There are more than just these precautions taken by agencies, since information security is now more important than ever these policies are doing a lot in keeping government data secure. <\/span><\/p>\n<p style=\"line-height: 200%;margin-bottom: 0.11in;text-indent: 0.5in\">\n<p style=\"line-height: 200%;margin-bottom: 0.11in;text-indent: 0.5in\">\n<p style=\"line-height: 200%;margin-bottom: 0.11in;text-indent: 0.5in\"><span style=\"font-family: Times New Roman, serif\">Setting up for the Future<\/span><\/p>\n<p style=\"line-height: 200%;margin-bottom: 0.11in;text-indent: 0.5in\"><span style=\"font-family: Times New Roman, serif\">The FISMA policy has been a staple in keeping government data secure since it was enacted in 2002 and has only gotten more important since then. While it is a simple act of monitoring and reporting, it has most likely stopped many data breaches big and small that would have happened without it in place. Keeping up with security equipment, programs, and even people is the only way to prevent many issues, and when a data breach does happen it is easy to look back at the reports and see why. By having what is basically a paper trail of specific security controls, the creation of counter measures against future attacks will always be easier. <\/span><\/p>\n<p style=\"line-height: 200%;margin-bottom: 0.11in\">\n<p style=\"line-height: 200%;margin-bottom: 0.11in\">\n<p style=\"line-height: 200%;margin-bottom: 0.11in\"><span style=\"font-family: Times New Roman, serif\">Works Cited:<\/span><\/p>\n<p style=\"line-height: 200%;margin-bottom: 0.11in\">\n<ol type=\"I\">\n<li>\n<p style=\"margin-top: 0.19in;margin-bottom: 0.19in;line-height: 200%\"><span style=\"font-family: Times New Roman, serif\"><i>*CIO, 2.3 Federal Information Security Modernization Act (2002)<\/i>. CIO.GOV. (n.d.). <span style=\"color: #467886\"><u><a href=\"https:\/\/www.cio.gov\/handbook\/it-laws\/fisma\/\">https:\/\/www.cio.gov\/handbook\/it-laws\/fisma\/<\/a><\/u><\/span> <\/span><\/p>\n<\/li>\n<\/ol>\n<p style=\"margin-top: 0.19in;margin-bottom: 0.19in;line-height: 200%;margin-left: 0.75in\">\n<ol start=\"2\" type=\"I\">\n<li>\n<p style=\"margin-top: 0.19in;margin-bottom: 0.19in;line-height: 200%\"><span style=\"font-family: Times New Roman, serif\">*Office of Management and Budget, Federal Information Security Modernization Act of 2014. (2018, October 31). <span style=\"color: #467886\"><u><a href=\"https:\/\/www.whitehouse.gov\/wp-content\/uploads\/2019\/08\/FISMA-2018-Report-FINAL-to-post.pdf\">https:\/\/www.whitehouse.gov\/wp-content\/uploads\/2019\/08\/FISMA-2018-Report-FINAL-to-post.pdf<\/a><\/u><\/span> <\/span><\/p>\n<\/li>\n<\/ol>\n<p style=\"line-height: 200%;margin-bottom: 0.11in;margin-left: 0.5in\">\n<ol start=\"3\" type=\"I\">\n<li>\n<p style=\"margin-top: 0.19in;margin-bottom: 0.19in;line-height: 200%\"><span style=\"font-family: Times New Roman, serif\"><i>*Federal Information Security Modernization Act (FISMA)<\/i>. CMS Information Security &amp; Privacy Group. (n.d.). <span style=\"color: #467886\"><u><a href=\"https:\/\/security.cms.gov\/learn\/federal-information-security-modernization-act-fisma\">https:\/\/security.cms.gov\/learn\/federal-information-security-modernization-act-fisma<\/a><\/u><\/span> <\/span><\/p>\n<\/li>\n<\/ol>\n<p style=\"margin-top: 0.19in;margin-bottom: 0.19in;line-height: 200%\">\n<p style=\"margin-top: 0.19in;margin-bottom: 0.19in;line-height: 200%;margin-left: 0.25in\">\n<p style=\"margin-top: 0.19in;margin-bottom: 0.19in;line-height: 200%;margin-left: 0.25in\">\n<p style=\"margin-top: 0.19in;margin-bottom: 0.19in;line-height: 200%;margin-left: 0.75in\">\n<p style=\"line-height: 200%;margin-bottom: 0.11in\">\n","protected":false},"excerpt":{"rendered":"<p>Policy Analysis of FISMA: How the Government Plans to Modernize Our Cybersecurity Defenses Carter Hendrick Old Dominion University School of Cybersecurity CYSE 425W: Cyber Strategy and Policy Teresa Duvall 9\/15\/2024 Policy Analysis of FISMA: How the Government Plans to Modernize Our Cybersecurity Defenses In 2002 the American government released the Federal Information Security Management Act, &hellip; <\/p>\n<p><a class=\"more-link btn\" href=\"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/2025\/11\/13\/policy-analysis-part-1\/\">Continue reading<\/a><\/p>\n","protected":false},"author":25850,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":3},"categories":[3],"tags":[4],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-json\/wp\/v2\/posts\/79"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-json\/wp\/v2\/users\/25850"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-json\/wp\/v2\/comments?post=79"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-json\/wp\/v2\/posts\/79\/revisions"}],"predecessor-version":[{"id":170,"href":"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-json\/wp\/v2\/posts\/79\/revisions\/170"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-json\/wp\/v2\/media?parent=79"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-json\/wp\/v2\/categories?post=79"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-json\/wp\/v2\/tags?post=79"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}