govloop logo link to homepage

  • Training
  • Resources
  • Academy
  • NextGen
  • Blog
    • Community Posts
    • Career
      • Human Resources
      • Leadership
      • Policy
      • Professional Development
      • Project Management
    • Communications
      • Citizen Engagement
      • Digital Government
      • Social Media
    • Tech
      • Acquisition
      • Analytics
      • Artificial Intelligence
      • Big Data
      • CIO Conversations
      • Cloud
      • Cybersecurity
      • Emerging Tech
      • GIS
      • IT Modernization
      • Mobile
      • Open Data
    • State and Local
  • About Us
  • Register
  • Log In

CDM Learning – Bits & Bytes

Group Admins

  • Profile picture of CDM Learning
  • Profile picture of John LeBrecht
Group logo of CDM Learning - Bits & Bytes
Public Group active 9 months, 4 weeks ago

The CDM Learning Community is designed to enhance cybersecurity risk management by fostering a CDM learning environment that increases Departments and Agencies awareness and knowledge about the CDM program and offer a place to exchange best practices for implementing and maintaining the CDM program.

  • Home
  • Forum
  • Members 29
  • RSS
  • Profile picture of Andrew

    Andrew joined the group Group logo of CDM Learning - Bits & BytesCDM Learning – Bits & Bytes 9 months, 4 weeks ago

  • Profile picture of Shikha

    Shikha joined the group Group logo of CDM Learning - Bits & BytesCDM Learning – Bits & Bytes 1 year, 9 months ago

  • Profile picture of Fidel Quintela

    Fidel Quintela joined the group Group logo of CDM Learning - Bits & BytesCDM Learning – Bits & Bytes 2 years, 1 month ago

  • Profile picture of Angelo Nappi

    Angelo Nappi joined the group Group logo of CDM Learning - Bits & BytesCDM Learning – Bits & Bytes 3 years, 2 months ago

  • Profile picture of CDM Learning

    CDM Learning started the topic Types of CDM Containers in the forum Group logo of CDM Learning - Bits & BytesCDM Learning – Bits & Bytes 3 years, 7 months ago

    What Are the Types of CDM Containers?

      The Continuous Diagnostics and Mitigation (CDM) program uses two types of containers to group an agency’s information system policies and asset attributes. Organizational Unit (OU) Containers group organization-specific policies and attributes. Federal Information Security Modernization Act (FISMA) C…

    [Read more]

  • Profile picture of CDM Learning

    CDM Learning started the topic What Are CDM Containers? in the forum Group logo of CDM Learning - Bits & BytesCDM Learning – Bits & Bytes 3 years, 7 months ago

    What Are CDM Containers?

      In the Department of Homeland Security’s (DHS) Continuous Diagnostics and Mitigation (CDM) program, containers are used to place all of an agency’s information technology assets into organized groupings. The container is one of CDM’s core design concepts.

    For a given agency, CDM is concerned with any information techn…[Read more]

  • Profile picture of Elena Lauren

    Elena Lauren joined the group Group logo of CDM Learning - Bits & BytesCDM Learning – Bits & Bytes 3 years, 7 months ago

  • Profile picture of CDM Learning

    CDM Learning started the topic What Is the CDM Architecture? in the forum Group logo of CDM Learning - Bits & BytesCDM Learning – Bits & Bytes 3 years, 7 months ago

    What Is the CDM Architecture?

      The Continuous Diagnostics and Mitigation (CDM) Architecture provides a comprehensive and consistent baseline architecture for the flow of CDM data and policies among agency networks, the agencies, and the federal level. Agencies can tailor their specific implementations of the Architecture to address specific…

    [Read more]

  • Profile picture of CDM Learning

    CDM Learning started the topic How Do I Defend Against Common Threats to Credentials? in the forum Group logo of CDM Learning - Bits & BytesCDM Learning – Bits & Bytes 3 years, 7 months ago

    How Do I Defend Against Common Threats to Credentials?

      Attackers commonly try to steal usernames and passwords, or the files used to verify them, to penetrate federal systems. Multifactor authentication, especially the use of Personal Identity Verification (PIV) cards, reduces this risk by requiring users to log in with both physical and logical…

    [Read more]

  • Profile picture of Sandra Graham

    Sandra Graham joined the group Group logo of CDM Learning - Bits & BytesCDM Learning – Bits & Bytes 3 years, 7 months ago

  • Profile picture of CDM Learning

    CDM Learning started the topic What is NIST Digital Identity Assurance? in the forum Group logo of CDM Learning - Bits & BytesCDM Learning – Bits & Bytes 3 years, 7 months ago

    What is NIST Digital Identity Assurance?

    The National Institute of Standards and Technology (NIST) Digital Identity Guidelines provide flexible requirements for agencies seeking to assure user identities on their networks. These guidelines describe three components of identity assurance—Identity, Authentication, and Federation—and three lev…[Read more]

  • Profile picture of CDM Learning

    CDM Learning started the topic What is NIST Digital Identity Assurance? in the forum Group logo of CDM Learning - Bits & BytesCDM Learning – Bits & Bytes 3 years, 7 months ago

    The National Institute of Standards and Technology (NIST) Digital Identity Guidelines provide flexible requirements for agencies seeking to assure user identities on their networks. These guidelines describe three components of identity assurance—Identity, Authentication, and Federation—and three levels of sophistication in each component.

    N…[Read more]

  • Profile picture of CDM Learning

    CDM Learning started the topic What is NIST Digital Identity Assurance? in the forum Group logo of CDM Learning - Bits & BytesCDM Learning – Bits & Bytes 3 years, 7 months ago

    The National Institute of Standards and Technology (NIST) Digital Identity Guidelines provide flexible requirements for agencies seeking to assure user identities on their networks. These guidelines describe three components of identity assurance—Identity, Authentication, and Federation—and three levels of sophistication in each component.

    N…[Read more]

  • Profile picture of CDM Learning

    CDM Learning started the topic What is NIST Digital Identity Assurance? in the forum Group logo of CDM Learning - Bits & BytesCDM Learning – Bits & Bytes 3 years, 7 months ago

    The National Institute of Standards and Technology (NIST) Digital Identity Guidelines provide flexible requirements for agencies seeking to assure user identities on their networks. These guidelines describe three components of identity assurance—Identity, Authentication, and Federation—and three levels of sophistication in each component.

    N…[Read more]

  • Profile picture of CDM Learning

    CDM Learning started the topic How Are Credentials Issued to Federal Users? in the forum Group logo of CDM Learning - Bits & BytesCDM Learning – Bits & Bytes 3 years, 8 months ago

    How Are Credentials Issued to Federal Users?


    A Credential Service Provider (CSP) gives a user a credential (e.g., user name) and an authenticator (e.g., password). To access resources, the user provides his or her credential and the authenticator. The CSP is used to validate, store, and maintain credentials and is the key for managing authorized…
    [Read more]

  • Profile picture of CDM Learning

    CDM Learning started the topic How Can You Strengthen Federal Government Security? in the forum Group logo of CDM Learning - Bits & BytesCDM Learning – Bits & Bytes 3 years, 8 months ago

    How Can You Strengthen Federal Government Security?


    The first goal of the Federal Identity, Credential, and Access Management (FICAM) initiative is to strengthen the Federal Government’s information and physical security. To meet it, agencies need to ensure access to resources to only those authorized; manage trusted identities; support c…
    [Read more]

  • Profile picture of CDM Learning

    CDM Learning started the topic How Can You Strengthen Federal Government Security? in the forum Group logo of CDM Learning - Bits & BytesCDM Learning – Bits & Bytes 3 years, 8 months ago

    How Can You Strengthen Federal Government Security?

    The first goal of the Federal Identity, Credential, and Access Management (FICAM) initiative is to strengthen the Federal Government’s information and physical security. To meet it, agencies need to ensure access to resources to only those authorized; manage trusted identities; support c…[Read more]

  • Profile picture of CDM Learning

    CDM Learning started the topic How Can You Strengthen Federal Government Security? in the forum Group logo of CDM Learning - Bits & BytesCDM Learning – Bits & Bytes 3 years, 8 months ago

    How Can You Strengthen Federal Government Security?

    The first goal of the Federal Identity, Credential, and Access Management (FICAM) initiative is to strengthen the Federal Government’s information and physical security. To meet it, agencies need to ensure access to resources to only those authorized; manage trusted identities; support c…[Read more]

  • Profile picture of CDM Learning

    CDM Learning started the topic What is FICAM? in the forum Group logo of CDM Learning - Bits & BytesCDM Learning – Bits & Bytes 3 years, 8 months ago

    What is FICAM?


    The Federal Identity, Credential, and Access Management (FICAM) Program is the Federal Government’s implementation of Identity, Credential, and Access Management (ICAM). FICAM provides a common set of ICAM standards, best practices, and implementation guidance for federal agencies to better manage users and protect federal n…
    [Read more]

  • Profile picture of CDM Learning

    CDM Learning started the topic How Are PDP and PEP Used for Access Control? in the forum Group logo of CDM Learning - Bits & BytesCDM Learning – Bits & Bytes 3 years, 8 months ago

    How Are PDP and PEP Used for Access Control?


    To paraphrase NIST 800-162, access policies must be enforced through an access control mechanism (ACM), the logical component that receives the access request from the subject, makes the access decision, and then enforces it. The ACM often employs both a Policy Decision Point (PDP) and a Policy…
    [Read more]

  • Load More

Featured

  • Career

    2021 NextGen Public Service Award Winners

  • Career

    What Is Your Leadership Style?

  • Leadership

    3 Tips for Incorporating Employee Engagement Into Your Leadership Style

Poll of the Week

Could your inbox use a little more awesome?

Sign up now to get our free Daily Awesome newlsetter featuring gov-focused resources, trainings, blogs and articles to help you do you job better.

Recent Articles on GovLoop

  • Best of USAJobs April 16
  • The Misconception of Austerity Mindset in Local Government
  • 2021 NextGen Public Service Award Winners
  • 5 Key Considerations for Enhancing Employee Engagement
  • DoD Seeks Better Way to Engineer the Enterprise
govloop grey logo link to homepage

GovLoop is the knowledge network for government - the premier social network connecting over 300,000 federal, state, and local government innovators.

A great resource to connect with peers, share best practices, and find career-building opportunities.

  • About Us
  • Academy
  • Sponsorship
  • Testimonials

© 2021 GovLoop

  • Help
  • Privacy Policy
  • Terms of Service
  • Sitemap
  • Do Not Sell My Personal Information
x