Cyber Security Assessment and Management (CSAM)
The Department of Justice (DOJ) Cyber Security Assessment and Management (CSAM) application is designed to help federal agencies streamline their compliance and security processes. CSAM empowers you with an end-to-end Assessment and Authorization (A&A) application providing automated inventory, configuration, and vulnerability management. By automating and streamlining critical security processes, you can improve your security posture and reduce the costs associated with cybersecurity compliance.
Features:
Provides robust common control and inheritance capability, combined with business intelligence, to automate baselines defined in National Institute of Standards and Technology (NIST) Special Publication (SP) 800-37, NIST SP 800- 53, and NIST SP 800-60
Automates System Security Plan (SSP) generation and ongoing A&A processes to support evolving Office of Management and Budget (OMB) Circular A-130 and Federal Information Security Modernization Act (FISMA) requirements, and monitor Authorization to Operate status and resource allocations/budgets
Streamlines and standardizes Plan of Action and Milestone (POA&M) processes across the organization to leverage POA&M creation, status workflows, control associations, completion tracking, and notifications
Generates on-demand reporting with powerful filtering capability, supplemented with a data Application Programming Interface (API), to support audit management, Inspector General (IG) requests, data insight, and data import/export functionality
Improves the efficiency of security control assessments through control selection and grouping capability
Delivers onboarding support to transition customers to CSAM and ongoing customer relationship management support to provide guidance, gather feedback, and assist in the maturity of the application/customer, as well as training and user forums to support ongoing CSAM proficiency, adoption, and optimization
Undergoes continuous enhancements and improvements that are implemented to maintain alignment with evolving regulations and policies and enhanced application capabilities
Benefits:
Centralized oversight for a more effective security approach
Enhanced security posture for federal agencies
Improved compliance with federal regulations and policies
Reduced time and effort required for security and compliance management
Streamlined POA&M processes for better resource allocation
Efficient and on-demand reporting for audit and IG requests
Ongoing customer support and training for CSAM proficiency
Continuous application enhancements to ensure alignment with evolving regulations and policies
Agile lifecycle with new releases every 2-3 months
DOJ’s CSAM offers a wide range of features and benefits that cater specifically to the needs of agencies like yours. Contact us to learn more.
Premium add-ons
Security Posture Dashboard Report (SPDR) is an innovative and powerful tool that provides agencies with tailored and actionable outputs, ensuring a comprehensive view of their security landscape.
SPDR is an add-on application to our CSAM platform, which tracks configuration and vulnerability remediation, and associates hardware assets to system FISMA boundaries. By combining this data with Hardware Asset Management, Software Asset Management, Vulnerability Management, and Secure Configuration Management data, the SPDR delivers risk visibility and insight that drives positive change.
The Department of Justice's CSAM advisory services are designed to help federal agencies optimize their security posture and achieve continuous alignment with organizational policies, posture, maturity, and culture. Our CSAM advisory service provides dedicated on-site support to ensure that the CSAM application is effectively utilized and continuously aligned with your organization's unique requirements.
Custom development solution services are also available to support digital transformation for your organization and yield process modernization. These solutions are cost-effective, and user story-focused to ensure your organization’s objectives and goals are fully achieved.
Together, we can strengthen the security of our nation's critical infrastructure and protect against evolving cyber threats.