By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
The 457-page standards document now includes guidelines on addressing smartphone security vulnerabilities, advanced persistent threats (APTs), social engineering, and foreign manipulation of supply chains, according to US reports.
To improve supply chain integrity and protect critical computer parts, the revised standards recommend withholding the ultimate purpose of a technology from contractors.
The new guidelines recommend that government agencies should offer incentives to suppliers that provide transparency into their processes and security practices, or vet the processes of subcontractors.
On BYOD, recommended restrictions include using cloud techniques to limit processing and storage activities on actual government systems.
NIST advises government agencies consult the Office of the General Counsel regarding legal uncertainties, such as requirements for conducting forensic analyses during incident investigations.
Read more on supply chain security:
- IT manfucturers fight cyber espionage risks in the supply chain
- RSA Europe: Security concerns whole supply chain, says Misha Glenny
- Report highlights supply chain insecurities, downplays mobile threats
- Security Think Tank: Measuring security maturity in the supply chain
- Opinion: Supply chain security should be top goal in 2012, says ISF
The latest research from the Information Security Forum (ISF) shows that there are four main areas where organisations should focus their efforts: governance; users; devices; and apps and data.
Governance should determine the strategy and approach the organisation adopts, such as whether to allow any device to connect or to provide users with a corporate device.
“Based on that decision, the information security approach and controls required should be specified,” said Adrian Davis, principal research analyst at the ISF.
Organisations are increasingly treating the device as untrusted.
“There is an increasing realisation that you cannot secure the device and so efforts must be focused on protecting the data,” he said.
The increasing processing power of devices actually can help security, as the devices can run anti-malware or encryption software such as that used on PC, said Davis.
While mobile device management (MDM) is a tool that can assist in security, he said successful deployments need to be integrated with the governance approach and coupled to user awareness and training.