Federal agencies are required by law to comply with the Federal Information Security
Management Act (FISMA). The NIST SP 800-53 Revision 5 provides the next generation of
security and privacy controls to support a proactive and systematic approach to cybersecurity.
CyberArk solutions support the NIST SP 800-53 Revision 5 requirements. This whitepaper will explain:
•How federal agencies can manage risks for privileged and administrative identities
•The key benefits for implementing security controls
•How CyberArk solutions can be applied to the control families
Learn more about how you can implement CyberArk solutions to support the NIST SP 800-53 Revision 5
framework.
Recommended for You

The U.S. Department of Defense (DoD) is going all in on Zero Trust. In late 2022, the Pentagon released its long-anticipated Zero Trust strategy and roadmap for migrating “trusted” perimeter-based...

With its new and improved Network and Information Security Directive, NIS2, the European Union joins a growing list of governments around the world that are enacting stronger cybersecurity...

On November 28, 2022, NIS2 officially replaced the European Union’s Network and Information Security (NIS) Directive, heralding significant compliance changes for many EU businesses. This...

The No. 1 cybersecurity challenge across U.S. critical infrastructure is that many organizations haven’t adopted fundamental security controls. Not entirely unsurprising, the finding comes from...

In a big, highly anticipated move, last week the White House introduced new cybersecurity guidance to harden federal networks and advance key priorities outlined in President Biden’s May 2021...

If staggering staffing shortages, razor-thin budgets, safety issues and politically driven controversies weren’t enough to contend with, U.S. schools are facing another major crisis: skyrocketing...

Just over a year ago, a cyber criminal syndicate carried out a massive ransomware attack against a large U.S. oil distribution network, disrupting fuel supplies and triggering panic buying and...
Cybersecurity in a Digitalised World: Where Threats are Coming From and Methods of Effective Defence
Learn how a global and leading government provider mitigates privileged access challenges using CyberArk.
Learn how CyberArk can help address Australia’s cybersecurity Essential Eight risk management model with the CyberArk Identity Security Platform for the government sector.

82 gallons: that’s how much water the average American uses each day. While we should all attempt to minimize our consumption, it’s easy to take the availability of clean, safe water for granted —...

As mobile workforces and cloud service usage continue to surge, organizations are struggling to provide secure, authorized access to their most sensitive information while keeping it out of the...
There are many reasons why security teams have a hard time protecting endpoints from being attacked by ransomware, but modular defenses, such as, privileged access management, can help in the fight.
A technical review of how federal agencies can leverage CyberArk Identity Security Solutions to align to the DoD’s Zero Trust Reference Architecture.

U.S.-based education institutions continue to grapple with major challenges brought by the pandemic: the largest enrollment decline seen in a decade, swirling controversy over reopening physical...

While the federal government cannot command private industry, it can provide direction and drive urgency. To this end, the Biden Administration recently issued a new National Security Memorandum...
Learn how CyberArk can help meet the Kingdom of Saudi Arabia's NSA Essential Cybersecurity Controls
Federal agencies must modernize their cybersecurity stance with privileged access management and adopt the DOD Zero Trust Reference Architecture that now includes privileged account security.
The CyberArk Blueprint provides a prescriptive framework for state and local governments to secure the new identity perimeter.

IT modernization in the federal government sector is more than just plugging in new technology. It’s about changing the way government workers operate to be more efficient, effective, and...