IBM Guardium

IBM Guardium

Join this online user group to communicate across Security product users and IBM experts by sharing advice and best practices with peers and staying up to date regarding product enhancements.

 View Only

IBM Guardium Data Protection has completed a readiness assessment for FISMA!

By Michaela Simsajova posted Thu March 13, 2025 09:29 AM

  

What is FISMA and what does FISMA readiness mean? 

The Federal Information Security Modernization Act (FISMA) is a U.S. law that mandates strict security standards for federal agencies and organizations handling government data. It applies to federal agencies, contractors, and private companies that work with the Government.  

 

GDP has obtained an IBM-led readiness assessment designed to help clients meet FISMA High requirements. FISMA High includes 360 controls from NIST800-53 and many of these controls are operational in nature and only a subset apply to software products like Guardium Data Protection. This designation reinforces IBM’s commitment to proactively supporting federal agencies and contractors in securing their databases, streamlining compliance, and accelerating
deployments.

What does it mean for you?

If you are a federal agency or a contractor looking to secure your databases, meet compliance requirements, and accelerate deployments, GDP can help with that and more:

  • Assuring that FISMA High can be met using Guardium Data Protection – it can help to jump-start the development of a system security plan  
  • GDP’s FISMA readiness assessment status means it is pre-validated to meet applicable FISMA controls, meaning saving you time, reducing audit complexity, and providing peace of mind 
  • Certify essential NIST SP800-53 controls for FIPS 140-2 encryption (rest and in-motion), multi-factor authentication (MFA), Audit Event Logs, Essential session activity, Error Handling and more  

If you are a non-federal entity but you are among industries such as finance, healthcare, and critical infrastructure— you might still leverage NIST 800-53 controls as a foundation for your security frameworks.

What other benefits can GDP bring you?

-          Helps you with achieving data compliance faster with the help of compliance tagging, prebuilt templates (HIPAA, GDPR, SOX and many more), easy-to-use workflows and long-term data retention

-          Provides centralized visibility and control

-          Enables you to monitor security policies and sensitive data access control, privileged user actions, change control, application user activities and security exceptions for faster remediation

Applicable NIST SP 800-53 Controls Supported by Guardium Data Protection 

Access Control (AC) 

AC-02(03) Disable Accounts 

AC-03 Access Enforcement 

AC-06(02) Non-privileged Access 

AC-06(09) Log Use of Privileged Functions 

AC-06(10) Prohibit Non-privileged Users from Executing Privileged Functions 

AC-07 Unsuccessful Logon Attempts (2) 

AC-10 Concurrent Session Control 

AC-11 Device Lock (2) 

AC-11(01) Pattern-hiding Displays 

AC-12 Session Termination 

AC-17(02) Protection Using Encryption 

Identification & Authentication (IA) 

IA-02 Identification & Authentication 

IA-02(01) MFA for Privileged Accounts 

IA-02(02) MFA for Non-privileged Accounts 

IA-02(08) Access to Accounts — Replay Resistant 

IA-02(12) Acceptance of PIV Credentials 

IA-03 Device Identification & Authentication 

IA-05 Authenticator Management 

IA-05(01) Password-based Authentication (4) 

IA-06 Authentication Feedback 

IA-07 Cryptographic Module Authentication 

Audit & Accountability (AU) 

AU-02 Event Logging (3) 

AU-03 Content of Audit Records (6) 

AU-05 Response to Audit Failures (2) 

AU-07(01) Automatic Processing 

AU-08 Time Stamps (2) 

AU-09 Protection of Audit Information 

AU-09(04) Access by Subset of Privileged Users 

AU-12 Audit Record Generation (3) 

System and Services Acquisition (SA) 

SA-04(10) Use of Approved PIV Products 

SA-10 Developer Configuration Management (6) 

SA-11 Developer Testing & Evaluation (5) 

Assessment, Authorization, and Monitoring (CA) 

CA-09 Internal System Connections (3) 

System & Communications (SC) 

SC-02 Separation of System & User Functionality 

SC-08 Transmission Confidentiality & Integrity 

SC-08(01) Cryptographic Protection 

SC-10 Network Disconnect 

SC-12 Cryptographic Key Management 

SC-13 Cryptographic Protection (2) 

SC-23 Session Authenticity 

SC-28 Protection of Information at Rest 

Configuration Management (CM) 

CM-05(01) Automated Access Enforcement 

 

0 comments
10 views

Permalink