NIST Site Search
Search NIST.GOV
Custom Search
[Official NIST.GOV TIME]
Product Research

Advertise on this site
OMB Circular A-130
print the content item {PDF=create pdf file of the content item^plugin:content.16}
in Regulatory Compliance > A-130 Compliance

You can view the entire OMB Circular A-130 document on the Whitehouse.gov website.

You can also download the A-130 PDF file.

Here is the stated purpose of OMB Circular A-130:
"This Circular establishes policy for the management of Federal information resources. OMB includes procedural and analytic guidelines for implementing specific aspects of these policies as appendices."

Here's the killer line to look for:
"Apply OMB policies and, for non-national security applications, NIST guidance to achieve adequate security commensurate with the level of risk and magnitude of harm."

And here's the hammer:
"Oversight: The Director of OMB will use information technology planning reviews, fiscal budget reviews, information collection budget reviews, management reviews, and such other measures as the Director deems necessary to evaluate the adequacy and efficiency of each agency's information resources management and compliance with this Circular."

Under FISMA all NIST FIPS documents are now required. The 800 series documents are also going to be used by OMB as "best practices" when conducting their audits. Implementing these NIST standards is going to be quite a lot of work for most agencies.
Translate to: {GOOGLETRANS}
Google Ads




Headlines

»CVE-2000-0368 (ios)
Classic Cisco IOS 9.1 and later allows attackers with access to the login prompt to obtain portions ...
»CVE-2004-0678 (chat_server)
Cross-site scripting (XSS) in one2planet.infolet.InfoServlet in 12Planet Chat Server 2.9 allows remo ...
»CVE-2011-3925 (chrome)
Use-after-free vulnerability in the Safe Browsing feature in Google Chrome before 16.0.912.75 allows ...
»CVE-2011-3927 (chrome)
Skia, as used in Google Chrome before 16.0.912.77, does not perform all required initialization of v ...
»CVE-2012-2520 (groove_server, infopath, lync, office_communicator, office_web_apps, sharepoint_foundation, sharepoint_server, sharepoint_services)
Cross-site scripting (XSS) vulnerability in Microsoft InfoPath 2007 SP2 and SP3 and 2010 SP1, Commun ...
»CVE-2012-2521 (internet_explorer)
Microsoft Internet Explorer 6 through 9 does not properly handle objects in memory, which allows rem ...
»CVE-2012-2522 (internet_explorer)
Microsoft Internet Explorer 6 through 9 does not properly handle objects in memory, which allows rem ...
»CVE-2012-2523 (internet_explorer, jscript, vbscript)
Integer overflow in Microsoft Internet Explorer 8 and 9, JScript 5.8, and VBScript 5.8 on 64-bit pla ...
»CVE-2012-2524 (office)
Microsoft Office 2007 SP2 and SP3 and 2010 SP1 allows remote attackers to execute arbitrary code or ...
»CVE-2012-2526 (windows_xp)
The Remote Desktop Protocol (RDP) implementation in Microsoft Windows XP SP3 does not properly proce ...
»CVE-2012-2527 (windows_7, windows_server_2003, windows_server_2008, windows_vista, windows_xp)
Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 an ...
»CVE-2012-2528 (office_compatibility_pack, office_web_apps, word, word_automation_services, word_viewer)
Use-after-free vulnerability in Microsoft Word 2003 SP3, 2007 SP2 and SP3, and 2010 SP1; Word Viewer ...
»CVE-2012-2529 (windows_7, windows_server_2003, windows_server_2008, windows_vista, windows_xp)
Integer overflow in the kernel in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows ...
»CVE-2012-2530 (windows_7, windows_server_2003, windows_server_2008, windows_vista, windows_xp)
Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 an ...
»CVE-2012-2531 (iis)
Microsoft Internet Information Services (IIS) 7.5 uses weak permissions for the Operational log, whi ...


Date published: 2016-09-26T04:50:10Z
Details

»OpenSSL Releases Security Updates
Original release date: September 23, 2016 OpenSSL has released security updates to address vu ...
»FTC Releases Data Breach Recovery and Prevention Video
Original release date: September 22, 2016 The Federal Trade Commission (FTC) has released a s ...
»Drupal Releases Security Advisory
Original release date: September 21, 2016 Drupal has released an advisory to address vulnerab ...
»Cisco Releases Security Updates
Original release date: September 21, 2016 Cisco has released security updates to address vuln ...
»Mozilla Releases Security Updates
Original release date: September 20, 2016 Mozilla has released security updates to address mu ...
»Apple Releases Security Updates
Original release date: September 20, 2016 Apple has released security updates to address vuln ...
»Cisco Releases Security Updates
Original release date: September 16, 2016 Cisco has released security updates to address a vu ...
»VMWare Releases Security Updates
Original release date: September 16, 2016 VMware has released a security update to address vu ...
»Cisco Releases Security Updates
Original release date: September 15, 2016 Cisco has released security updates to address vuln ...
»Google Releases Security Update for Chrome
Original release date: September 14, 2016 Google has released Chrome version 53.0.2785.113 to ...


Date published: not known
Details

»Throwback Thursday: Following the Breadcrumbs
In 1999, Christine Orshesky described how one large organization de ...
»VB2016 preview: Cryptography mistakes in malware
At VB2016, two talks will discuss mistakes made by malware authors ...
»GPS technology is more at risk from cyber attack than ever before, security expert demonstrates at VB2016
Next month at VB2016, HPE Security's Oleg Petrovsky will speak abou ...
»BSides Denver: Join and Support the Security Community
If you are coming to VB2016 in Denver, why not spend an extra day i ...
»VB2016 'Last-Minute' Papers Announced
We are excited to announce the addition of the "last-minute ...
»VB2016 preview: Debugging and Monitoring Malware Network Activities with Haka
In a VB2016 paper, Stormshield researchers Benoit Ancel and Mehdi T ...
»Paper: Behavioural Detection and Prevention of Malware on OS X
In a new paper published through Virus Bulletin, Vincent Van Mieghe ...
»VB2016 preview: Smart Outlets. Why We Need Responsible Disclosure!
At VB2016, four researcher from Bitdefender will present a paper in ...
»VB2016 preview: Uncovering the Secrets of Malvertising
Malvertising, in which legitimate ad networks are abused to silentl ...


Date published: not known
Details
Main Menu
· Home
Current Security News
 
US-CERT Current Activity

» OpenSSL Releases Security Updates
[23 Sep 2016 01:13pm]

» FTC Releases Data Breach Recovery and Prevention Video
[22 Sep 2016 11:21am]

» Drupal Releases Security Advisory
[21 Sep 2016 06:49pm]

» Cisco Releases Security Updates
[21 Sep 2016 06:36pm]

» Mozilla Releases Security Updates
[20 Sep 2016 03:02pm]

» Apple Releases Security Updates
[20 Sep 2016 01:56pm]

» Cisco Releases Security Updates
[16 Sep 2016 07:31pm]

» VMWare Releases Security Updates
[16 Sep 2016 02:17am]

» Cisco Releases Security Updates
[15 Sep 2016 03:46am]

» Google Releases Security Update for Chrome
[14 Sep 2016 05:14am]

***
US-CERT Alerts

» TA16-250A: The Increasing Threat to Network Infrastructure Devices and Recommended Mitigations
[06 Sep 2016 04:29pm]

» TA16-187A: Symantec and Norton Security Products Contain Critical Vulnerabilities
[05 Jul 2016 08:50am]

» TA16-144A: WPAD Name Collision Vulnerability
[23 May 2016 05:38am]

» TA16-132A: Exploitation of SAP Business Applications
[11 May 2016 05:31am]

» TA16-105A: Apple Ends Support for QuickTime for Windows; New Vulnerabilities Announced
[14 Apr 2016 01:48pm]

» TA16-091A: Ransomware and Recent Variants
[31 Mar 2016 04:00pm]

» TA15-337A: Dorkbot
[03 Dec 2015 04:40pm]

» TA15-314A: Compromised Web Servers and Web Shells - Threat Awareness and Guidance
[10 Nov 2015 06:12pm]

» TA15-286A: Dridex P2P Malware
[13 Oct 2015 05:23am]

» TA15-240A: Controlling Outbound DNS Access
[28 Aug 2015 11:31am]

***
Computerworld Security

» Va. senator wants SEC probe of massive Yahoo breach
[26 Sep 2016 12:25pm]

» Armies of hacked IoT devices launch unprecedented DDoS attacks
[26 Sep 2016 11:25am]

» iOS 10 backups are easier to crack, but Apple promises to fix security flaw
[26 Sep 2016 10:06am]

» Here's how Microsoft is using containerization to protect Edge users
[26 Sep 2016 07:26am]

» Trump hotel chain fined over data breaches
[26 Sep 2016 05:31am]

» The Social Security website is now secure
[25 Sep 2016 03:56pm]

» Companies say IoT matters but vary on how to secure it
[23 Sep 2016 06:34pm]

» What you should know, and do, about the Yahoo breach
[23 Sep 2016 11:26am]

» Privacy groups call for FTC probe of WhatsApp promises
[23 Sep 2016 09:25am]

» Vint Cerf's dream do-over: 2 ways he'd make the internet different
[23 Sep 2016 05:17am]

» How the Yahoo breach affects you
[23 Sep 2016 04:43am]

» Yahoo uncovered breach after probing a black market sale
[23 Sep 2016 04:36am]

» Hackers got a treasure trove of data from the Yahoo breach
[22 Sep 2016 06:33pm]

» Verizon learned of massive Yahoo data breach just two days ago
[22 Sep 2016 03:01pm]

» Massive Yahoo hack is the world's biggest -- for now
[22 Sep 2016 02:36pm]

***
Microsoft Security Advisories

» 3181759 - Vulnerabilities in ASP.NET Core View Components Could Allow Elevation of Privilege - Version: 1.0
[13 Sep 2016 11:00am]

» 3174644 - Updated Support for Diffie-Hellman Key Exchange - Version: 1.0
[13 Sep 2016 11:00am]

» 3179528 - Update for Kernel Mode Blacklist - Version: 1.0
[09 Aug 2016 11:00am]

» 2880823 - Deprecation of SHA-1 Hashing Algorithm for Microsoft Root Certificate Program - Version: 2.0
[18 May 2016 11:00am]

» 3155527 - Update to Cipher Suites for FalseStart - Version: 1.0
[10 May 2016 11:00am]

» 3152550 - Update to Improve Wireless Mouse Input Filtering - Version: 1.1
[22 Apr 2016 11:00am]

» 3137909 - Vulnerabilities in ASP.NET Templates Could Allow Tampering - Version: 1.1
[10 Feb 2016 11:00am]

» 2871997 - Update to Improve Credentials Protection and Management - Version: 5.0
[09 Feb 2016 11:00am]

» 3123479 - Deprecation of SHA-1 Hashing Algorithm for Microsoft Root Certificate Program - Version: 1.0
[12 Jan 2016 11:00am]

» 3109853 - Update to Improve TLS Session Resumption Interoperability - Version: 1.0
[12 Jan 2016 11:00am]

» 3118753 - Updates for ActiveX Kill Bits 3118753 - Version: 1.0
[12 Jan 2016 11:00am]

» 2755801 - Update for Vulnerabilities in Adobe Flash Player in Internet Explorer and Microsoft Edge - Version: 53.0
[05 Jan 2016 11:00am]

» 3123040 - Inadvertently Disclosed Digital Certificate Could Allow Spoofing - Version: 1.0
[08 Dec 2015 11:00am]

» 3057154 - Update to Harden Use of DES Encryption - Version: 1.1
[08 Dec 2015 11:00am]

» 3119884 - Inadvertently Disclosed Digital Certificates Could Allow Spoofing - Version: 1.0
[30 Nov 2015 11:00am]

***
WIRED

» Security News This Week: Hackers Take Control of a Moving Tesla’s Brakes
[24 Sep 2016 05:00am]

» Our Favorite Hacker Moments From Mr. Robot Season 2
[22 Sep 2016 12:18pm]

» Hack Brief: Yahoo Breach Hits Half a Billion Users
[22 Sep 2016 10:15am]

» Officials Are Scrambling to Protect the Election From Hackers
[21 Sep 2016 05:00am]

» Cloudflare Launches a Three-Pronged Attack to Encrypt the Entire Web
[20 Sep 2016 07:43am]

» How Police Trace Cellphones in IEDs Like the Ones in NYC
[19 Sep 2016 01:56pm]

» Inside Google’s Internet Justice League and Its AI-Powered War on Trolls
[19 Sep 2016 04:55am]

» Security News This Week: Congress Celebrates the Snowden Movie by Slamming Snowden
[17 Sep 2016 05:00am]

» U.K. Judge OKs Extradition to the U.S. for Hacktivist Lauri Love
[16 Sep 2016 09:07am]

» How the FBI Could Have Hacked the San Bernardino Shooter’s iPhone
[15 Sep 2016 01:51pm]

***
Network World Security

» New Mac Trojan uses the Russian space program as a front
[26 Sep 2016 01:59pm]

» A shout out to Akamai for candor in IoT botnet attack
[26 Sep 2016 11:55am]

» The IoT is uranium
[26 Sep 2016 11:40am]

» Armies of hacked IoT devices launch unprecedented DDoS attacks
[26 Sep 2016 10:20am]

» Open source routers deliver low cost, flexibility
[12 Sep 2016 04:00am]

» Review: 5 open source alternatives for routers/firewalls
[12 Sep 2016 04:00am]

» Review: SentinelOne blocks and dissects threats
[31 Aug 2016 05:40am]

» Review: Top tools for preventing data leaks
[29 Aug 2016 04:00am]

» Top tools for preventing data leaks
[29 Aug 2016 04:00am]

» Review: Promisec goes the extra step to secure PCs
[13 Jul 2016 06:21am]

» 4 tools for managing firewall rules
[07 Jul 2016 11:03am]

» 10 advanced endpoint protection tools
[05 Jul 2016 04:00am]

» How to buy endpoint security products
[05 Jul 2016 04:00am]

» A shout out to Akamai for candor in IoT botnet attack
[26 Sep 2016 11:55am]

» Armies of hacked IoT devices launch unprecedented DDoS attacks
[26 Sep 2016 10:20am]

***


More IT Security
News Feeds
More Sponsors

Advertise on this site
RSS Feeds
Our news can be syndicated by using these rss feeds.
rss1.0
rss2.0
rdf

NIST.org is in no way connected to the U.S. government site NIST.gov

This site is © John Herron, CISSP. All Rights Reserved.

Please visit daily to stay up to date on all your IT Security compliance issues.

http://www.nist.org -
Hosted by BlueHost. We've never had a better hosting company.
{THEMEDISCLAIMER}