FIPS 200 Compliance Solutions
NIST FIPS 200 Compliance Solutions and Cyber Security Audit Controls
FISMA cyber security guidelines are specified in the Federal Information Processing Standards (FIPS 200) and the National Institute of Standards and Technology (NIST 800-53) special publications. Avatier identity management software (AIMS) gives government agencies flexibility in deploying security controls while meeting business requirements and complying with information security federal regulations.
FIPS 200 Access Control (AC)
Organizations must limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems) and to the types of transactions and functions that authorized users are permitted to exercise. Avatier identity and access management software, Identity Enforcer, automates user account provisioning of systems, applications, SaaS and cloud computing services, physical network access and even facility access.
FIPS 200 Audit & Accountability (AU)
Organizations must: (i) create, protect, and retain information system audit records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful, unauthorized, or inappropriate information system activity; and (ii) ensure that the actions of individual information system users can be uniquely traced to those users. Avatier access governance software, Compliance Auditor, automates security and access certification.
FIPS 200 Security Assessment & Authorization (CA)
Organizations must: (i) assess information systems security controls to determine effectiveness; (ii) implement actions designed to correct deficiencies and reduce or eliminate system vulnerabilities; (iii) authorize the operation of information systems and associated systems; (iv) monitor information system security controls. Avatier Identity Analyzer gives you enterprise risk management audit controls, reporting, performance tracking, trends and alerts.
FIPS 200 Identification & Authentication (IA)
Organizations must identify information system users, processes acting on behalf of users, or devices and authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems. Avatier identity management software automates IT operations. Avatier Password Management provides self-service password reset capabilities. Avatier Identity Enforcer automates access management and user provisioning.
FIPS 200 Risk Assessment (RA)
Organizations must assess operational risks (including mission, functions, image, or reputation), organizational assets, and individuals, resulting from the operation of information systems, storage, or transmission of organizational information in accordance with Special Publication 800-53. Whether applying cost controls, operational measures, or when making forecasts, Avatier Balanced Scorecard software gives you the capability to mitigate risks, take action and chart success.