Security

Secure websites and a secure online presence foster trust between the public and government.

To protect sensitive information while maintaining access for authorized users, prioritize the implementation of security and management controls. The responsibility, however, to ensure website safety extends beyond technology. Publicly share your security protocols and establish a clear channel for users to report any suspicious activity. By making security a collaborative effort, you’ll build trust, protect sensitive information, and ensure that your website functions securely.

Federal Information Security Modernization Act of 2014 (FISMA) (Public Law 113-283) (PDF, 265 KB, 16 Pages)

Federal Information Security Modernization Act of 2014 (FISMA) (Public Law 113-283) (PDF, 265 KB, 16 Pages)

Resources on Security

  • An introduction to domain management

    A .gov domain instantly conveys credibility and trustworthiness, and proper domain management practices ensure that your website is secure and accessible.

  • M-19-17 Enabling Mission Delivery through Improved Identity, Credential, and Access Management

    This 2019 memorandum sets forth the federal government’s Identity, Credential, and Access Management (ICAM) policy.

  • Social media cyber-vandalism toolkit

    Cyber-vandalism presents a serious challenge to online-based communication tools. This resource provides information for agency practitioners to prepare for, recover from, and respond to cyber-vandalism.

  • An introduction to web security

    Guidance on meeting security requirements for federal websites.

  • An introduction to ATOs

    What is an Authorization to Operate? Before you use software in government, you need to make sure it is allowed. You should know what an ATO is, and when you need one.

  • An introduction to security and privacy controls

    What do the control families of NIST 800-53 mean? Here’s an overview of the control families that create the foundation of federal security compliance.

  • Privacy-Preserving Collaboration Using Cryptography

    In conjunction with her May 2020 presentation, Dr. Emily Shen outlines her work on Secure multi-party computation (MPC), a type of cryptography that allows parties to jointly analyze their data without disclosing it.

  • OMB M-15-13, Policy to require secure connections across federal websites and web services (PDF, 258 KB, 5 pages, June 2015)

    This memo requires that all publicly accessible federal websites and web services only provide service through a secure connection.  The strongest privacy and integrity protection currently available for public web connections is Hypertext Transfer Protocol Secure (HTTPS). The memo also provides guidance to agencies for making the transition to HTTPS and a deadline by which agencies must be in compliance.

  • Overview of the Privacy Act of 1974 (2020 Edition)

    This overview, prepared by the Department of Justice’s Office of Privacy and Civil Liberties (OPCL), covers various provisions of the Privacy Act, as addressed by court decisions in cases involving the Act’s disclosure prohibition, its access and amendment provisions, and its agency record-keeping requirements.

  • Cloud Smart: Federal Cloud Computing Strategy

    Founded on three key pillars of successful cloud adoption—security, procurement, and workforce—the Cloud Smart strategy includes 11 action items from the Chief Information Officers (CIO) Council.

  • Guidelines on securing public web servers

    The World Wide Web (WWW) is a system for exchanging information over the Internet. At the most basic level, the web can be divided into two principal components: web servers, which are applications that make information available over the Internet (in essence, publish information), and web browsers (clients), which are used to access and display the information stored on the web servers. This document focuses on the security issues of web servers.

  • OMB Circular A-130

    Managing Information as a Strategic Resource

Join a Community of Practice

Security events

This summit brings together the federal community to share success stories and best practices for utilizing federal source code and open source software, and examine the implementation of the Federal Source Code policy.
2020

Security news

FedRAMP governance

The Federal Risk and Authorization Management Program (FedRAMP) has recently updated its governance structure to better serve its customers. Learn about their recently-formed FedRAMP Board, composed of federal executives; the FedRAMP Technical Advisory Group (TAG), composed of technology experts; and updates made to the Federal Security Cloud Advisory Committee (FSCAC). These groups collectively aim to strengthen and expand FedRAMP’s cloud service capabilities. — via FedRAMP

FedRAMP logo
Jun 4, 2024

Overview of the Privacy Act of 1974 (2020 Edition)

This overview, prepared by the Department of Justice’s Office of Privacy and Civil Liberties (OPCL), covers various provisions of the Privacy Act, as addressed by court decisions in cases involving the Act’s disclosure prohibition, its access and amendment provisions, and its agency record-keeping requirements. — via Department of Justice

Department of Justice logo
Feb 2, 2024

Resources on Security

  • An introduction to domain management

    A .gov domain instantly conveys credibility and trustworthiness, and proper domain management practices ensure that your website is secure and accessible.

  • M-19-17 Enabling Mission Delivery through Improved Identity, Credential, and Access Management

    This 2019 memorandum sets forth the federal government’s Identity, Credential, and Access Management (ICAM) policy.

  • Social media cyber-vandalism toolkit

    Cyber-vandalism presents a serious challenge to online-based communication tools. This resource provides information for agency practitioners to prepare for, recover from, and respond to cyber-vandalism.

  • An introduction to web security

    Guidance on meeting security requirements for federal websites.

  • An introduction to ATOs

    What is an Authorization to Operate? Before you use software in government, you need to make sure it is allowed. You should know what an ATO is, and when you need one.

  • An introduction to security and privacy controls

    What do the control families of NIST 800-53 mean? Here’s an overview of the control families that create the foundation of federal security compliance.

  • Privacy-Preserving Collaboration Using Cryptography

    In conjunction with her May 2020 presentation, Dr. Emily Shen outlines her work on Secure multi-party computation (MPC), a type of cryptography that allows parties to jointly analyze their data without disclosing it.

  • OMB M-15-13, Policy to require secure connections across federal websites and web services (PDF, 258 KB, 5 pages, June 2015)

    This memo requires that all publicly accessible federal websites and web services only provide service through a secure connection.  The strongest privacy and integrity protection currently available for public web connections is Hypertext Transfer Protocol Secure (HTTPS). The memo also provides guidance to agencies for making the transition to HTTPS and a deadline by which agencies must be in compliance.

  • Overview of the Privacy Act of 1974 (2020 Edition)

    This overview, prepared by the Department of Justice’s Office of Privacy and Civil Liberties (OPCL), covers various provisions of the Privacy Act, as addressed by court decisions in cases involving the Act’s disclosure prohibition, its access and amendment provisions, and its agency record-keeping requirements.

  • Cloud Smart: Federal Cloud Computing Strategy

    Founded on three key pillars of successful cloud adoption—security, procurement, and workforce—the Cloud Smart strategy includes 11 action items from the Chief Information Officers (CIO) Council.

  • Guidelines on securing public web servers

    The World Wide Web (WWW) is a system for exchanging information over the Internet. At the most basic level, the web can be divided into two principal components: web servers, which are applications that make information available over the Internet (in essence, publish information), and web browsers (clients), which are used to access and display the information stored on the web servers. This document focuses on the security issues of web servers.

  • OMB Circular A-130

    Managing Information as a Strategic Resource

More News and Events on Security

33 posts

FedRAMP governance

The Federal Risk and Authorization Management Program (FedRAMP) has recently updated its governance structure to better serve its customers. Learn about their recently-formed FedRAMP Board, composed of federal executives; the FedRAMP Technical Advisory Group (TAG), composed of technology experts; and updates made to the Federal Security Cloud Advisory Committee (FSCAC). These groups collectively aim to strengthen and expand FedRAMP’s cloud service capabilities. — via FedRAMP

FedRAMP logo
Jun 4, 2024

The Cybersecurity Battleground: Reflecting on the past, envisioning the future

This month marks the 20th anniversary of Cybersecurity Awareness Month, as well as the beginning of a new government fiscal year. In this Great Government through Technology blog post, Laura Stanton, Assistant Commissioner in the Office of Information Technology Category (ITC) of GSA’s Federal Acquisition Service (FAS), takes the opportunity to delve into some recent notable cybersecurity events, the broader implications for government agencies, and her vision as GSA continues to play a pivotal role in positioning agencies to create a safer and more secure digital future. — via General Services Administration

General Services Administration logo
Oct 18, 2023

Why the American People Deserve a Digital Government

OMB released new policy guidance for government that includes a variety of actions and standards to help federal agencies design, develop, and deliver modern websites and digital services. Memo M-23-22, Delivering a Digital-First Public Experience, will make it seamless for the public to obtain government information and services online, and help agencies fully implement the 21st Century Integrated Digital Experience Act (21st Century IDEA). — via The White House

The White House logo
Sep 22, 2023

FedRAMP Launches OSCAL Developer Data Bites Series

FedRAMP Launches OSCAL Developer Data Bites Series&mndash;FedRAMP is excited to launch an Open Security Controls Assessment Language (OSCAL) Developer Data Bites series! It will cover a variety of technical topics regarding users’ utilization of OSCAL for FedRAMP, FedRAMP automation updates or changes, and open forum conversations with subject matter experts. The first OSCAL Developers Data Bites session will be held on Thursday, September 1, at 12:00 pm, EDT. The series will continue on a bi-weekly basis. — via FedRAMP

FedRAMP logo
Aug 18, 2022

FedRAMP Launches OSCAL Developer Data Bites Series

FedRAMP Launches OSCAL Developer Data Bites Series&mndash;FedRAMP is excited to launch an Open Security Controls Assessment Language (OSCAL) Developer Data Bites series! It will cover a variety of technical topics regarding users’ utilization of OSCAL for FedRAMP, FedRAMP automation updates or changes, and open forum conversations with subject matter experts. The first OSCAL Developers Data Bites session will be held on Thursday, September 1, at 12:00 pm, EDT. The series will continue on a bi-weekly basis. — via FedRAMP

FedRAMP logo
Aug 18, 2022

Modernize Your Identity Management Process Through ILM

Modernize Your Identity Management Process Through ILM—GSA’s Office of Government-wide Policy is pleased to announce the Identity Lifecycle Management (ILM) Playbook, designed for identity program managers, and enterprise and application architects interested in modernizing their identity management process for federal employees. This practical guide helps federal agencies understand how to shift their focus from managing employee access based on credentials to managing the lifecycle of identities as outlined in section III of OMB Memo 19-17. This will help agencies achieve an enterprise Identity, Credential, and Access Management (ICAM) system that is agile enough to support technology modernization and aligns with the Federal Identity, Credential, and Access Management (FICAM) architecture. — via General Services Administration

General Services Administration logo
Aug 12, 2022

FedRAMP Penetration Test Guidance Updates

Penetration Test Guidance Updates—These updates were made to address the ever-changing cybersecurity landscape. Revisions include updated guidance around existing and new threats as well as addressing attack vectors so they’re in alignment with current best practices. Learn about the four initiatives included in the revision process, and download the new June 2022 PDF. — via FedRAMP

FedRAMP logo
Jul 5, 2022

FedRAMP Penetration Test Guidance Updates

Penetration Test Guidance Updates—These updates were made to address the ever-changing cybersecurity landscape. Revisions include updated guidance around existing and new threats as well as addressing attack vectors so they’re in alignment with current best practices. Learn about the four initiatives included in the revision process, and download the new June 2022 PDF. — via FedRAMP

FedRAMP logo
Jul 5, 2022

C-SCRM Acquisition Community of Practice (ACoP) Interact Site

C-SCRM Acquisition Community of Practice (ACoP) Interact Site—Since the launch of the Cybersecurity Supply Chain Risk Management (C-SCRM) Acquisition Community of Practice (ACoP), GSA and the Cybersecurity and Infrastructure Security Agency (CISA) have been co-leading an effort to broaden the level of awareness and develop agency maturity in the areas of acquisitions, supply chain risk management, and cybersecurity across the federal government for information communication technology and services (ICTS). To increase C-SCRM awareness and adoption government-wide, the C-SCRM ACoP launched an online collaborative space for the federal government’s IT community and industry to share best practices, ideas, guidance, tools, and expertise needed to implement C-SCRM requirements. Working together as a community and sharing information will help us improve our cybersecurity posture across all levels of government. — via General Services Administration

General Services Administration logo
Jun 30, 2022

Technology-boosting TMF Investments Deliver Benefits for the American Public

The Technology Modernization Fund (TMF) is working to transform the way the government uses technology to deliver for the American public in an equitable, secure and user-friendly way. It strategically invests in priority IT modernization projects that are aligned with the fast pace of changing technology and agency needs. Here are a few examples of how the TMF has invested in multiple projects that are helping many agencies deliver what people need when they need. — via General Services Administration

General Services Administration logo
May 23, 2022

GSA Highlights Progress on Citizen-Facing Digital Services, Cybersecurity in First Year of American Rescue Plan

GSA Highlights Progress on Citizen-Facing Digital Services, Cybersecurity in First Year of American Rescue Plan—Ahead of the first anniversary of the signing of the American Rescue Plan, legislation which has been the key driver of a strong economic recovery, provided the tools needed to fight the pandemic, and made long-term investments to revitalize the local economy in communities around the country, the U.S. General Services Administration (GSA) highlighted some of the key ways these investments are driving progress on technology modernization and making digital services simpler and more secure across government. — via General Services Administration

General Services Administration logo
Mar 10, 2022