RMF POA&M Creation and Management (Hands-On Approach)

Поділитися
Вставка
  • Опубліковано 27 гру 2024

КОМЕНТАРІ • 96

  • @stephenbrown2985
    @stephenbrown2985 2 роки тому +32

    Kamil you and your household will forever be blessed for what you do even with your busy schedule.

    • @KamilSec
      @KamilSec  2 роки тому +6

      Thank you so much bro. I appreciate all the prayers and kind words!!!

  • @ALLISONFolks
    @ALLISONFolks Рік тому +6

    I am watching this video for the second time, and I have gained so much knowledge again. I thank you so much, maybe God continue to bless you, sir.

    • @KamilSec
      @KamilSec  Рік тому

      You are so welcome, Ameen!

  • @wilfrednkondock4918
    @wilfrednkondock4918 Рік тому +4

    can't see the previous video about the Nessus vulnerability scan result analysis

    • @KamilSec
      @KamilSec  Рік тому

      See the link below for the Nessus Vulnerability Scan Analysis Video:
      ua-cam.com/video/lNH_4o5XSlE/v-deo.htmlsi=okbFctPiKRgOX1_t

  • @Oladitikomolafe
    @Oladitikomolafe Рік тому +3

    Kamil, God bless you!!!

  • @akoudousse4722
    @akoudousse4722 Рік тому +4

    Great video , Thank you

  • @absolute3112
    @absolute3112 Рік тому +4

    Thank you brother... this was excellent

  • @steveayodele5387
    @steveayodele5387 9 місяців тому +4

    Great hands on tutoria, keep it up. Please will it be possible to get the excel template of the POA&M?

    • @KamilSec
      @KamilSec  9 місяців тому

      You can get access to the spreadsheet from my Patreon page

  • @SuperWinning111
    @SuperWinning111 2 роки тому +7

    Another excellent video on POA&M. Can't get anything more precise and well articulated. Thank you for the work you do.

    • @SuperWinning111
      @SuperWinning111 2 роки тому

      I have a question. Where can I pick the control code like you did?

    • @KamilSec
      @KamilSec  2 роки тому

      My pleasure bro!

    • @KamilSec
      @KamilSec  2 роки тому +1

      All the controls codes will be in appendix D of SP 800 53

  • @mcbelescony8642
    @mcbelescony8642 2 роки тому +4

    Excellent post

    • @KamilSec
      @KamilSec  2 роки тому +1

      Thanks for watching, I hope you will help share the videos to promote the channel!

  • @florenceakintunde9752
    @florenceakintunde9752 2 роки тому +8

    Thank you for this excellent video, so detailed and well explained. More grease to your elbow.

    • @KamilSec
      @KamilSec  2 роки тому

      You are so welcome!

  • @samueltoler3240
    @samueltoler3240 2 роки тому +4

    Excellent presentation.

  • @lonjay
    @lonjay 2 роки тому +6

    Great video, hopefully when I get a job, I could place your video side by side because they are very detailed. This is really hands on the job training.

  • @opeolutola1532
    @opeolutola1532 2 роки тому +4

    God bless you for this great job

  • @cu9747
    @cu9747 Рік тому +4

    which roles would do these kind of tasks? such as creating POAMs, SSPs, etc?

    • @KamilSec
      @KamilSec  Рік тому +1

      IT Security Analyst, ISSO, POA&M Manager, Alternate ISSO....

  • @toluomoba4223
    @toluomoba4223 2 роки тому +4

    Good video 👍🏿

  • @lawrenceaikins9845
    @lawrenceaikins9845 2 роки тому +5

    Thank you Kamil

    • @KamilSec
      @KamilSec  2 роки тому

      You’re very welcome Lawrence!

  • @mohamedsesay9865
    @mohamedsesay9865 2 роки тому +4

    I have been learning from your videos. You have great content!

    • @KamilSec
      @KamilSec  2 роки тому

      I appreciate that, thanks!

  • @medianetwork777
    @medianetwork777 2 роки тому +4

    Thanks Kamil… great post as usual 👍

    • @KamilSec
      @KamilSec  2 роки тому

      Glad you enjoyed it!

  • @AllThinsPossible
    @AllThinsPossible 2 роки тому +4

    Great video boss !!

    • @KamilSec
      @KamilSec  2 роки тому

      Thanks!

    • @AllThinsPossible
      @AllThinsPossible 2 роки тому

      Looking for Splunk configuration video hope u do one one day

  • @christianihendu7438
    @christianihendu7438 2 роки тому +4

    Thank you fir the video. It was helpful. Thank you

  • @megatron98
    @megatron98 2 роки тому +4

    Great video, thanks!

  • @fahen4484
    @fahen4484 14 днів тому

    Great one.

  • @kafagodwill9185
    @kafagodwill9185 2 роки тому +5

    THANKS VERY MUCH. PLEASE DO YOU HAVE A VIDEO ON POA&M WITH SECURITY CONTROL SINCE THIS WAS WITH THE NESSUS SCAN VULNERABILITY

  • @shivendumenon878
    @shivendumenon878 Рік тому +3

    Would a format for POAM ID 220001 be used (22 being the year and 0001 being it ID), So any new vulnerability needed can be added based on the year. And would 9999 POAM ID be sufficient units to be in the POA&M per year?

    • @KamilSec
      @KamilSec  Рік тому

      yes, that works. However way the organization decides on is fine.

    • @shivendumenon878
      @shivendumenon878 Рік тому

      @@KamilSec Understood! Thank you, Been following your content for a few weeks and I must say it brilliant the way you explain. Brings more interest to learn.

  • @bradonchenue4801
    @bradonchenue4801 Рік тому +2

    Who does the scan analysis?

    • @KamilSec
      @KamilSec  Рік тому

      IT Security Analyst or the ISSO

  • @Techdeeni
    @Techdeeni Рік тому +4

    Thanks for taking the time to explain this often tedious process. I do have a question. What if the plug-ins are updated for the next scan, will the old plug-ins still show up when you do a search if it hasnt been remediated yet?

    • @KamilSec
      @KamilSec  Рік тому +1

      The plugins will be the same for a vulnerability, never changes except the vulnerability is fix and it wont show up in the next scan.

    • @Techdeeni
      @Techdeeni Рік тому

      @KamilSec Thank you Sir!

  • @jleaven2707
    @jleaven2707 2 роки тому +4

    Hi. At my workplace one big change we have to doing the poam is the mitigation column in which we have to explain what we have currently in our environment thats in place currently while we work on a remediation of the vulnerability. The mitigation has to be specific to the vulnerability

    • @KamilSec
      @KamilSec  2 роки тому +2

      Cool, I guess this is as a results the nature of your system. It could be that your system is public/internet facing or not behind any firewall or bastion host.

  • @Lanre-j2z
    @Lanre-j2z 10 днів тому

    Hey Kamil, do you do one on one training?

  • @opoku-agyemangisaac336
    @opoku-agyemangisaac336 2 роки тому +4

    Zakari!! you too much

  • @zbeauty9975
    @zbeauty9975 2 роки тому +4

    Great video! Can you do a video about CSAM?

    • @KamilSec
      @KamilSec  2 роки тому +3

      ZBeauty, unfortunately I cannot do a video in CSAM, there is no community version of the tool, and hence I cannot use the one for the government for UA-cam tutorial.

  • @bradonchenue4801
    @bradonchenue4801 2 роки тому +4

    Good morning sir

    • @KamilSec
      @KamilSec  2 роки тому

      Good morning Bradon

  • @jleaven2707
    @jleaven2707 2 роки тому +3

    Also our security manager instructed us that our last milestone date match the scheduled completion date. Does that vary by workplace?

    • @KamilSec
      @KamilSec  2 роки тому +1

      Yes, that varies from workplace to workplace. However having the last milestone completion date same as the POA&M schedule completion date can be a bit risking an overdue POA&M. This is because, if evidence of completion of the last milestone need to be reviewed and approved before the POA&M gets submitted for closure, that can be a stretch for the same date.

  • @oliviangwa3473
    @oliviangwa3473 Рік тому +4

    I am a new ISSO and will like to understand the contain of the Authorization Package and how these contains are made. In the POA&M, under Planned Milestone column, Where does the ISSO get all remediations to point them out under the planned milestone column?? Thank You 🙏🏽

    • @KamilSec
      @KamilSec  Рік тому

      Contents of the Authorization Package are SSP, SAR and POA&M and ATO Memo. Watch this video for more ua-cam.com/video/adxnNStDskA/v-deo.html
      The Remediation milestones for the technical controls are mostly from the system admins.

  • @Zanein1
    @Zanein1 2 роки тому +3

    I’m a new ISSO, so for the planned milestones how would I know what to put or is there some type of reference I can go off of?

    • @KamilSec
      @KamilSec  2 роки тому +1

      Prate, for the planned milestones, you really have to coordinate with the people who are actually going to do the remediations (Admins) to get the timeframe they think they can complete the remediation.

    • @Zanein1
      @Zanein1 2 роки тому

      @@KamilSec thank you 🙏🏾

  • @oliviangwa3473
    @oliviangwa3473 Рік тому +4

    Thank You Sir, this is so helpful. Quick question 🙋‍♀️, what if you read the description of the Vulnerability and can’t determine the exact control? Is the another way to determine the exact control???

    • @KamilSec
      @KamilSec  Рік тому

      Unfortunately, that comes with experience working with these controls.

  • @joycefynn8496
    @joycefynn8496 2 роки тому +5

    Thank you so much you are awesome! I have a question! I have an interview scheduled for next week! What type of technical questions do you think will come up? I already had the first interview and it was the RMF process and they have scheduled a second one for technical! Am so nervous!

    • @KamilSec
      @KamilSec  2 роки тому +2

      Thats a tough call, however based on the JD you can deduce where their minds are. Nonetheless, you can make sure you know your OSI Model and TCP/IP Model, Security protocols and common ports, vulnerability management and so on...Good luck!

    • @joycefynn8496
      @joycefynn8496 2 роки тому

      @@KamilSec Thank you so much !

  • @jvicksdailypay300
    @jvicksdailypay300 2 роки тому +2

    WHAT do you do when you are not sure about the name of the control to be remediated?

    • @KamilSec
      @KamilSec  2 роки тому +2

      Good question, you can also refer to some old POA&Ms with the same or similar findings to get an idea.

  • @christianihendu7438
    @christianihendu7438 2 роки тому +4

    I thought it is highly recommended we remediate
    critical vulnerability 15days,
    High Vulnerability 30days,
    Moderate Vulnerability 60 days,
    Low Vulnerability 90days.
    If the above is true and the information system overall water mark is Moderate.
    1) What scheduled completion date will be assigned to a critical Vulnerability even if the POC said it will take 3months to remediate?
    2) Are we going to base our time frame on POC suggested time frame?
    3) Do we put into consideration overall water mark of the information system during our POAM creation and remediation process?
    4) What is the best approach in creating our scheduled completion date?
    I really appreciate your time and clarification.
    Thank you.

    • @KamilSec
      @KamilSec  2 роки тому +6

      Good questions Christian, So first of all if the system teams have the resources to remediate within (15 days or 30 days), they would have done that and we will not worry creating the POA&M. But there are instances even if the agency is asking the team to fix a critical vulnerability with days, the system team simply cannot do that, for instance if the issue is related to a vendor releasing a patch that are not yet available. In that case a POA&M is created to track the remediation efforts until the vendor release the patch. Hope that makes sense.

  • @jackieo7113
    @jackieo7113 2 роки тому +3

    Hi - are you able to provide a link to the videos you advise we review prior to this? I'll also send an email request for the template to practice against - are you able to add that in the more section also?

    • @KamilSec
      @KamilSec  2 роки тому

      ua-cam.com/video/lNH_4o5XSlE/v-deo.html
      So, the excel files are bit large and uploading them on AWS S3 bucket and sharing the link here for easy download will incur some significant monthly bill, hence the need for people to request via e-mail.

    • @huyilanalana8393
      @huyilanalana8393 2 роки тому

      @@KamilSec can i get a copy of the excel for practice. Thank you

  • @timmckinnon6089
    @timmckinnon6089 3 місяці тому

    Is there a way to automate this from data in ServiceNOW?

    • @KamilSec
      @KamilSec  Місяць тому

      Partially, but human input would still be needed.

  • @sylviaboateng1411
    @sylviaboateng1411 2 роки тому +2

    Hello, how can I reach out please?

    • @KamilSec
      @KamilSec  2 роки тому +2

      kaamilzak@gmail.com

  • @Teesamp86
    @Teesamp86 Рік тому +4

    I was expecting the control to be RA-5 SI-2

    • @KamilSec
      @KamilSec  Рік тому +1

      Yes generally you can refer to RA-5 (Vulnerability Scan) or SI-2 (Flaw Remediation) however, if the control involves say configuration or Cryptographic findings you can refer to CM-6 or SC-13 controls respectively.

  • @fahen4484
    @fahen4484 14 днів тому

    Like Like Like

  • @joseskobena6250
    @joseskobena6250 Рік тому +3

    Chaii!. excellent video bro, God bless you and increase your knowledge. if you don't mind how can i contact you, i need you to be my mentor in this field. thank you

    • @KamilSec
      @KamilSec  Рік тому +1

      kaamilzak@gmail.com

    • @joseskobena6250
      @joseskobena6250 Рік тому

      @@KamilSec Thank you for your response bro.

    • @joseskobena6250
      @joseskobena6250 Рік тому

      Hello Bro, I have contacted several times but no response, Pls try and make some time for me, lol, thank you.

  • @fatiadams4184
    @fatiadams4184 2 роки тому +2

    Thank you Kamil

    • @KamilSec
      @KamilSec  2 роки тому

      You're welcome Fati, Trust you are doing well?