NIST Site Search
Search NIST.GOV
Custom Search
[Official NIST.GOV TIME]
Product Research

Advertise on this site
OMB Circular A-130
print the content item {PDF=create pdf file of the content item^plugin:content.16}
in Regulatory Compliance > A-130 Compliance

You can view the entire OMB Circular A-130 document on the Whitehouse.gov website.

You can also download the A-130 PDF file.

Here is the stated purpose of OMB Circular A-130:
"This Circular establishes policy for the management of Federal information resources. OMB includes procedural and analytic guidelines for implementing specific aspects of these policies as appendices."

Here's the killer line to look for:
"Apply OMB policies and, for non-national security applications, NIST guidance to achieve adequate security commensurate with the level of risk and magnitude of harm."

And here's the hammer:
"Oversight: The Director of OMB will use information technology planning reviews, fiscal budget reviews, information collection budget reviews, management reviews, and such other measures as the Director deems necessary to evaluate the adequacy and efficiency of each agency's information resources management and compliance with this Circular."

Under FISMA all NIST FIPS documents are now required. The 800 series documents are also going to be used by OMB as "best practices" when conducting their audits. Implementing these NIST standards is going to be quite a lot of work for most agencies.
Translate to: French German Italian Spanish Portuguese GTM_LAN_DUTCH Russian Chinese Arabic Korean English
Google Ads




Headlines

»NCCoE Speaker Series March 2015
»New NIST Tools to Help Boost Wireless Channel Frequencies and Capacity
»NIST Announces Pilot Grants Competition to Improve Security and Privacy of Online Identity Verification Systems
»Vendors Sought to Develop Model System to Monitor Security of Energy Industry Networked Control Systems
»NIST Releases Update of Industrial Control Systems Security Guide for Final Public Review
»Cybersecurity Summit Technical Workshop
»NIST Forensic Science Standards Committees to Hold First Public Meetings in February 2015
»NIST Security Guide Walks Organizations Through the Mobile App Security Vetting Process
»Open-Source Software for Quantum Information
»NIST Requests Round Two Comments on its Cryptographic Standards Process
»Symposium to Focus on Future of Voting Systems
»NIST Meeting: Cybersecurity Is a Key Ingredient In the Manufacturing Mix
»Future of Voting Systems Symposium II
»Global City Teams Challenge Tech Jam
»NIST Announces Initial Members of Forensic Science Digital Evidence Subcommittee


Date published: not known
Details

»Cisco IPv6 Denial of Service Vulnerability
Original release date: February 25, 2015 Cisco has identified a vulnerability that could allo ...
»Samba Remote Code Execution Vulnerability
Original release date: February 24, 2015 Linux and Unix based operating systems employing Sam ...
»Mozilla Releases Security Updates for Firefox, Firefox ESR, and Thunderbird
Original release date: February 24, 2015 The Mozilla Foundation has released security updates ...
»Lenovo Computers Vulnerable to HTTPS Spoofing
Original release date: February 20, 2015 Lenovo consumer personal computers employing the pre ...
»IRS Issues Warning for a Scam Targeting Tax Preparers
Original release date: February 18, 2015 The Internal Revenue Service (IRS) has issued a pres ...
»ISC Releases Security Updates for BIND
Original release date: February 18, 2015 The Internet Systems Consortium (ISC) has released s ...
»Microsoft Releases February 2015 Security Bulletin
Original release date: February 10, 2015 Microsoft has released updates to address vulnerabil ...
»Microsoft Releases Critical Security Update for Internet Explorer
Original release date: February 10, 2015 Microsoft has released a critical security update to ...
»Google Releases Security Update for Chrome OS
Original release date: February 10, 2015 Google has released Chrome OS 40.0.2214.114 for Chro ...
»Microsoft Releases Critical Security Bulletin
Original release date: February 10, 2015 Microsoft has released Security Bulletin MS15-011 to ...


Date published: not known
Details

»VB2014 paper: Caphaw - the advanced persistent pluginer
Micky Pun and Neo Tan analyse the banking trojan that is best known for spreading through Skype. Sin ...
»M3AAWG releases BCP document on dealing with child sexual abuse material
Subject may make many feel uncomfortable, but it is essential that we know how to deal with it. The ...
»Hacker group takes over Lenovo's DNS
As emails were sent to wrong servers, DNSSEC might be worth looking into. Although, after some initi ...
»Coordinated action takes down Ramnit botnet infrastructure
Malware remains present on infected machines; 2012 Virus Bulletin paper worth studying. A coordinate ...
»Almost 50% increase in reported vulnerabilities as non-Windows operating systems lead the table
Each discovered vulnerability is actually a good news story. Last week, security firm GFI published ...
»Vawtrak trojan spread through malicious Office macros
Users easily tricked, but plenty of opportunity for the malware to be blocked. Researchers at Trend ...
»Lenovo laptops pre-installed with software that adds its own root CA certificate
Shared root certificate makes for easy man-in-the-middle attacks. What is Superfish? Superfish is a ...
»Google relaxes disclosure policy following criticism
Grace period added for vulnerabilities that are about to be patched. Last year, Google announced a n ...
»VB2014 video: .NET malware dynamic instrumentation for automated and manual analysis
Hexiang Hu used tool to detect Bladabindi backdoor. The .NET framework is a popular way to write sof ...


Date published: not known
Details

»Hits Keep On Coming For Both SSL & Its Abusers
Hacktivist group Lizard Squad punishes Lenovo with a DNS hijack. Will Comodo be next?
»'Shadow' Cloud Services Rampant In Government Networks
Survey finds public sector employees use unmanaged cloud services just as much as private employees.
»Black Hat Asia 2015: Target: Malware
Hostile software is ever evolving, and Black Hat-associated research is one of the key loci of infor ...
»How to Strengthen Enterprise Defenses against Ransomware
Eight essential ways that companies can enforce their borders.
»How To Reduce Spam & Phishing With DMARC
Providers of more than 3 billion email boxes have taken up a new Internet protocol to help put trust ...
»5 New Vulnerabilities Uncovered In SAP
Onapsis researchers find bugs in SAP BusinessObjects and SAP HANA.
»Millions Of Non-Anthem Customers Also Hit By Anthem Breach
Blue Cross Blue Shield customers -- as many as 8.8 to 18.8 million of them -- might have also had th ...
»Ramnit Botnet Disrupted By International Public-Private Collaboration
Europol leads the effort to bring down the bank credential-stealing botnet that infected 3.2 million ...
»Gemalto: NSA, GCHQ May Have Been Behind Breaches It Suffered In 2010 And 2011
But the 'sophisticated' attacks hit only Gemalto office networks--not 'massive theft' of SIM crypto ...


Date published: Fri, 27 Feb 2015 11:44:02 EST
Details
Main Menu
· Home
Current Security News
 
SANS Internet Storm Center, InfoCON: green

» Infocon: green

» Tails 1.3 released - https://tails.boum.org/news/version_1.3/index.en.html, (Fri, Feb 27th)
[27 Feb 2015 06:30am]

» Tor Browser Version 4.0.4 released - https://blog.torproject.org/blog/tor-browser-404-released, (Fri, Feb 27th)
[27 Feb 2015 06:27am]

» ISC StormCast for Friday, February 27th 2015 http://isc.sans.edu/podcastdetail.html?id=4375, (Fri, Feb 27th)
[26 Feb 2015 06:42pm]

» New Feature: Subnet Report, (Thu, Feb 26th)
[26 Feb 2015 11:17am]

» ISC StormCast for Thursday, February 26th 2015 http://isc.sans.edu/podcastdetail.html?id=4373, (Thu, Feb 26th)
[25 Feb 2015 08:02pm]

» Samba vulnerability - Remote Code Execution - (CVE-2015-0240), (Wed, Feb 25th)
[25 Feb 2015 07:51pm]

» ISC StormCast for Wednesday, February 25th 2015 http://isc.sans.edu/podcastdetail.html?id=4371, (Wed, Feb 25th)
[24 Feb 2015 08:28pm]

» Copy.com Used to Distribute Crypto Ransomware, (Wed, Feb 25th)
[24 Feb 2015 06:04pm]

» 11 Ways To Track Your Moves When Using a Web Browser, (Tue, Feb 24th)
[24 Feb 2015 09:41am]

» ISC StormCast for Tuesday, February 24th 2015 http://isc.sans.edu/podcastdetail.html?id=4369, (Tue, Feb 24th)
[23 Feb 2015 05:20pm]

***
CNET News.com

» Microsoft defends opening Hotmail account of blogger in espionage case
[20 Mar 2014 06:47pm]

» Syria's Internet goes dark for several hours
[20 Mar 2014 04:25pm]

» Symantec fires CEO Steve Bennett
[20 Mar 2014 03:07pm]

» Microsoft sniffed blogger's Hotmail account to trace leak
[20 Mar 2014 01:28pm]

» Microsoft sniffed private Hotmail account to trace trade secret leak
[20 Mar 2014 01:28pm]

» IBM's new services zero in on fraud, financial crime
[20 Mar 2014 07:31am]

» Despite assault on privacy, Page sees value in online openness
[19 Mar 2014 08:00pm]

» Hackers transform EA Web page into Apple ID phishing scheme
[19 Mar 2014 05:21pm]

» NSA top lawyer says tech giants knew about data collection
[19 Mar 2014 02:57pm]

» Microsoft touts study showing the cost of pirated software
[19 Mar 2014 06:55am]

» Microsoft touts study showing cost of malware in pirated software
[19 Mar 2014 06:55am]

» How to spy on your lover, the smartphone way
[18 Mar 2014 01:24pm]

» Mt. Gox update lets users see their Bitcoin balances
[18 Mar 2014 06:38am]

» Fake Malaysia Airlines links spread malware
[17 Mar 2014 05:12pm]

» IBM: No, we did not help NSA spy on customers
[17 Mar 2014 01:15pm]

***

***



***


More IT Security
News Feeds
More Sponsors

Advertise on this site
RSS Feeds
Our news can be syndicated by using these rss feeds.
rss1.0
rss2.0
rdf
Symantec News

NIST.org is in no way connected to the U.S. government site NIST.gov

This site is © John Herron, CISSP. All Rights Reserved.

Please visit daily to stay up to date on all your IT Security compliance issues.

http://www.nist.org -
Hosted by BlueHost. We've never had a better hosting company.
{THEMEDISCLAIMER}