Implementing Strong Authentication CEG

Authentication is the process of verifying that a user’s identity is genuine. Most systems require a user to be authenticated prior to granting access to the system. The purpose of this guide is to lay out the concept of authentication, recommend related security enhancements, and provide guidance to help plan and implement a strong authentication solution. Strong authentication is one of many pillars of a defense-in-depth cybersecurity strategy, but it is not the only solution to cybersecurity issues. 

Election Infographic Products

The Election Infographic Products is a set of three infographics and two maps designed to combat disinformation by equipping election officials, stakeholders, and voters with information on the mail-in voting, post election, and election results processes (which vary by state and/or jurisdictions), and the security measures that were implemented to safeguard the 2020 election season. The products are:

Cyber QSMO Services

Below is a list of initial service offerings, grouped by the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) category. Browse the list to find a service and get connected with federal shared service providers to acquire a service. Please visit the Cyber QSMO Marketplace again as we continue to onboard and validate additional services.

Last Updated Date: October 22, 2020

CISA Quality Services Management Office Vulnerability Disclosure Platform Contract Awarded

The Cybersecurity and Infrastructure Security Agency (CISA), with the General Services Administration (GSA), awarded a contract to Endyna, Inc. of McLean, Va., on Sept. 25, to provide the Vulnerability Disclosure Platform and associated services to help protect Federal civilian Executive Branch networks.
Last Published Date: October 2, 2020