Clouds of CAG Confusion
Posted February 26th, 2009 by DanPhilpottDid you know that the US Department of Defense published the Consensus Audit Guidelines? Yes, it’s true! At least according to a ZDNet UK article title, “US Dept of Defense lists top 20 security controls“.
There is a haze of confusion settling around the Consensus Audit Guidelines origins. The text of the CAG press release (pdf) is clear that it is developed by a consortium of federal agencies and private organizations. It further states CAG is part of the Center for Strategic and International Studies work on CSIS Commission report on Cybersecurity for the 44th Presidency. The title of the CAG press release is also equally clear that it is from a “Consortium of US Federal Cybersecurity Experts” which is substantively different than a consortium of federal agencies and private organizations.
The press release relates that CAG was initiated when a team discovered similarities between massive data losses by the US defense industrial base (DIB) and attacks on Federal agencies. The project then grew as more agencies agreed to become involved. Following the current public review of CAG the next steps for development are listed as pilot implementations at government agencies, a CIO Council review and an IG review. The clear inference of this origin story and ennumeration of steps is that the project has official Federal backing.
Let’s test that inference. Click here for a Google search of the entire *.gov hierarchy for “Consensus Audit Guidelines”. As I write this there is exactly one entry. From oregon.gov. A search using usa.gov (which uses live.com) has the same results. Looking around the various organizations listed as contributors doesn’t yield any official announcements.
So why the confusion in the press? Why does it appear from the news articles that this is an Federal project? I wouldn’t speculate.
On a slightly different topic, I’ve been reading through the Consensus Audit Guidelines themselves and enjoying the guidance it provides. I’ll write up a more complete analysis of it once I have finished my read through. My initial impression is that CAG controls provide worthwhile recommendations but the framework for implementation needs development.
All Aboard the Astroturfmobile photo by andydr. Perhaps an explanation is in order….
Similar Posts:
Posted in Technical, What Doesn't Work | 7 Comments »
Tags: cag • fisma • government • infosec • itsatrap • pwnage • risk • security