Skip navigation
All Places > Products > RSA Archer Suite > Blog
1 2 3 Previous Next

RSA Archer Suite

452 posts

Each year, you impress us with the innovative, holistic and inspiring ways you successfully manage, promote and drive engagement for your risk management programs.

 

This year, we are again excited to hear your stories and to celebrate the most innovative among us. It’s my pleasure to announce that nominations for RSA Archer Summit 2020 Awards are now open, and will be until Friday, September 4, 2020.

 

Many of you deploy and utilize RSA Archer in remarkable ways to help your company or customers thrive in a world of new risk challenges.

 

We invite you to nominate your company for an RSA Archer Summit 2020 Award in one of the following categories:

  • Innovation Award: Recognizing an organization for using RSA Archer in innovative ways to build applications and integrations that support process automation, collaboration and other digital initiatives.
  • Return on Investment Award: Highlighting an organization whose investment in digital transformation and digital risk management can be measured not only in cost savings but also in efficiencies, headcount and other metrics.
  • Community Advocate Award: Acknowledging the efforts of an individual who evangelizes digital risk management, promotes RSA Link Community best practices, builds positive community relationships, and offers guidance and expertise.
  • Excellence Award: Singling out organizations that are setting the bar for implementing best-in-class integrated risk management programs.

 

The award winners will be announced at the RSA Archer Summit 2020 virtual event on October 6, 2020. Winners will receive the following:

  • A crystal trophy awarded virtually by an RSA executive, along with special VIP recognition
  • A published video case study on RSA.com and interviewed for a future RSA blog post
  • Invitations to speak at our webinar panels as well as press opportunities, as they arise

 

Thank you  RSA Archer customers and partners for participating in this annual event.  Remember: mark your calendars, your nominations are due by September 4, 2020.  And, if you haven’t done so as yet, be sure to register for the RSA Archer Summit 2020 – A Virtual Experience registration is free. Check out the Agenda at a Glance too; RSA Archer Summit 2020 information is updated often!

 

We can’t wait to review your applications- and to ‘virtually see’ you on October 6!

RSA knows risk management is a team sport, which is why we’ve made it our mission to “Inspire Everyone to Own Risk.” And these days, “everyone” includes the vendors that provide services and goods that help to support and fuel your business. To effectively to manage your third-party risk, it’s essential to foster engagement with your vendors and gain insight into their activities.

 

Launched today, the new Vendor Portal for RSA Archer Third Party Risk Management makes it easier to facilitate collaboration between business stakeholders, risk managers, and external vendors. As a feature enhancement for the Third Party Risk Management use case, Vendor Portal provides an intuitive interface for vendors to easily and securely complete assessments, upload documentation, respond to issues, and attest to performance, while minimizing the management burden for RSA Archer administrators. 

 

RSA Archer users can publish content to Vendor Portal with the click of a button. Automatic provisioning makes it easy for vendors to access the system and invite their peers to collaborate. When their work is complete, assessment or application responses are natively synchronized back into RSA Archer for review.

 

Vendor Portal is a SaaS-based feature that is compatible with RSA Archer on-premises, hosted, and SaaS implementations that are licensed for the RSA Archer Third Party Risk Management use case. Vendor Portal can be utilized for up to 50 vendors at no charge, and larger vendor quantities can also be supported at an additional charge.

 

Key features of Vendor Portal include:

  • An external interface and dashboard for secure collaboration with vendors
  • Native synchronization with RSA Archer to externally publish applications and questionnaires and retrieve responses
  • Self-service provisioning for vendor users

 

Customer benefits of Vendor Portal include:

  • More efficient engagement with vendors
  • Intuitive experience for vendors with nominal training
  • Reduced management burden for RSA Archer administrators

 

 

If you’d like a closer look at Vendor Portal, you can find more information on RSA Link. Customers are invited to join us for the upcoming Free Friday Tech Huddles (pre-registration is required):

  • July 24, 2020 at 11:00am Eastern -- Introducing Vendor Portal for RSA Archer Third Party Risk Management
  • July 31, 2020 at 11:00am Eastern -- Installing and Configuring Vendor Portal Service and Publish Custom Object

The Payment Card Industry Data Security Standard (PCI DSS) was developed to encourage and enhance cardholder data security and facilitate the broad adoption of consistent data security measures globally. PCI DSS provides a baseline of technical and operational requirements designed to protect account data. PCI DSS applies to all entities involved in payment card processing—including merchants, processors, acquirers, issuers, and service providers.

 

RSA Archer PCI Management enables organizations to streamline the compliance process, simplify stakeholder participation, and reduce overall compliance effort and cost. It allows organizations to jumpstart a PCI compliance program by conducting continuous assessments and providing visibility to manage and mitigate risk.

 

The PCI Standard Security Council (PCI SSC) released a new content set in the latest PCI DSS version 3.2.1. RSA Archer Release 6.8 includes updates to the RSA Archer PCI Management use case to leverage new content and self-assessment questionnaires (SAQs) available with PCI DSS version 3.2.1.

 

RSA Archer PCI Management guides merchants through the completion of relevant self-assessment questionnaires (SAQs). It also provides packaging and export of compliance program results and attestation articles in a properly formatted PCI Report on Compliance (RoC) for easy submission and review.

 

 

Customers can show compliance to the latest version of PCI DSS 3.2.1 by:          

  • Using the new content for PCI DSS 3.2.1 available in the Authoritative Sources, Control standards, Master Controls, Question library applications.
  • Completing the required, new PCI 3.2.1 Self-Assessment Questionnaire (SAQ). 
  • Performing a full Report on Compliance (RoC) assessment which has been updated to reflect version 3.2.1.
  • Using an update to the PCI Internal Stakeholder dashboard, which includes a new landing page iView and incorporates some of the new charting capabilities that were added in RSA Archer Release 6.7.
  • Leveraging documentation updates.

Financial controls compliance programs are an essential part of any publicly traded company.  The Sarbanes-Oxley Act ("SOX") of 2002 set requirements for all US public companies in order to curb fraud in corporate financial reporting.  This law provides requirements to help ensure that financial information is certified and accurately reported, reducing opportunities for corporate fraud and setting severe penalties for companies that do not meet the requirements.  Many countries around the world have also adopted similar measures that mirror or closely follow SOX requirements.  

 

In RSA Archer 6.8 Release, we introduced the RSA Archer Financial Controls Monitoring use case to help customers manage their financial compliance programs in RSA Archer.  While some of the controls, processes and testing approaches that are part of financial compliance are shared with other programs, there are specific elements that are necessary to meet the guidelines of financial compliance regulations. The Financial Controls Monitoring use case is a refresh of the former RSA Archer Controls Monitoring Program Management use case.   The updates allow companies to perform the program-specific actions for a Financial Compliance program in tandem with other compliance initiatives.  This supports the common set of controls and "test-once/apply-many" approach across multiple compliance programs built on the Controls Assurance Program Management architecture implemented within RSA Archer. 

 

In addition to these architectural changes the RSA Archer Financial Controls Monitoring use case includes new applications/questionnaires and leverages features and functionality of the RSA Archer Platform that were not previously available in the former Controls Monitoring Program Management.  Capabilities of Financial Controls Monitoring have been expanded to allow for a full lifecycle of documenting, testing and updating Process Narratives, tracking the Provided/Prepared By Client ("PBC") requests and improved scoping to manage sending/communicating information with a company's External Auditors.

 

 

RSA Archer Financial Controls Monitoring provides:

  • Management of end-to-end financial compliance program for regulations such as Sarbanes-Oxley (SOX)
  • Management of data requested and provided to external auditors
  • Tracking for changes and approvals of any modifications to key processes, controls and evidence utilized as part of a financial compliance program
  • Streamlining financial compliance obligations alongside other compliance programs

 

Interested in learning more about RSA Archer Financial Controls Monitoring? Join us for a Free Friday Tech Huddle on Friday, June 5, 2020 for a live demo. Free Friday Tech Huddles are only available to RSA Archer customers. If you are not yet a customer but you are interested in learning more, please contact your local representative or authorized reseller - or visit us at www.rsa.com.

With the increased use of IoT devices and constraints of security resources, organizations face issues with prioritization of risk and vulnerabilities. They need to focus on the appropriate security considerations to minimize risks and threats and ensure that the right security controls are in place. When organizations do not properly identify security gaps, they risk investing in unnecessary security measures.

 

Today's complex and changing security landscape makes deciding where to focus security resources a challenge for many organizations. To provide a framework to assess IoT security practices and implementation, the Security Maturity Model (SMM) was developed by the Industrial Internet Consortium (IIC). This framework helps organizations understand where they are as far as security is concerned and identify the gaps from where they would like to be.

Introduced to help you use the SMM framework, the RSA Archer IIC-Aligned IoT Security Maturity Assessment app-pack allows you to complete a security maturity assessment to determine your organization's current security posture and document your desired security outcome. This app-pack allows you to identify security gaps and develop action plans to reach your desired security posture while focusing on standards, guidelines, and practices that work best for your organization or implementation.

 

With the RSA Archer IIC-Aligned IoT Security Maturity Assessment app-pack, you can:

  • Create an IoT Security Risk Profile to capture security maturity assessment and results
  • Identify the scope of the maturity assessment
  • Determine current and target security maturity levels
  • Develop remediation plans to address gaps in security posture and maturity

 

The RSA Archer IIC-Aligned IoT Security Maturity Assessment app-pack includes several useful benefits, including:

  • Understanding the security posture for IoT implementations
  • Minimizing impacts to your organization through proper mitigation of security risks
  • Prioritizing security resources for IoT implementations
  • Compliance with standards and regulations through implementing appropriate security measures

 

Interested in learning more about the RSA Archer IIC-Aligned IoT Security Maturity Assessment app-pack?

Register and join us for a Free Friday Tech Huddle on Friday, May 29 for a live demo. Free Friday Tech Huddles are only available to RSA Archer customers. If you are not yet a customer but you are interested in learning more, please contact your local representative or authorized reseller — or visit us at www.rsa.com.

 

IoT Security Assessor Dashboard

RSA Archer IIC-Aligned IoT Security Maturity Assessment

IoT Security Assessor Dashboard

With today's launch of RSA Exchange Release R12, we are excited to share new and updated offerings to help you assess, prioritize and track your risks. The new Archer Scripts Timesheet app-pack enables RSA Archer users to enter time in a weekly view and store hours by the day for projects stored in any application within RSA Archer. Release R12 also includes the Crowe Pandemic Response app-pack that centralizes the data executives need to identify emerging risks, adapt business initiatives and care for their employees; the NTT ISMS Risk Assessment app-pack that helps you roll out and operate your ISMS and automatically define, prioritize and track risks; and the RSA Archer IIC-Aligned IoT Security Maturity Assessment app-pack that follows the Security Maturity Model framework to help you complete a security maturity assessment upon your IoT implementations to determine your current security posture and desired security outcome.

 

The release also includes two new integrations. The new AWS Security Hub integration allows you to view data from AWS Security Hub in RSA Archer to capture and prioritize security findings and generate findings from AWS accounts and services in a centralized location, perform configuration and compliance checks, and monitor AWS accounts for potential malicious activities and vulnerabilities. The Wolters Kluwer™ Insource® integration allows organizations in the insurance industry to automatically import the content directly into RSA Archer to monitor regulatory material and assess compliance impact.

This release is packed with many new partner offerings and updates to existing offerings.

 

Here is a full list of the new and updated offerings available in Release R12:

 

  • App-Packs – pre-built applications addressing adjacent or supporting Integrated Risk Management processes (e.g. niche, industry, geo-specific)
    • Archer Scripts Timesheet enables users to quickly enter time on a weekly view and integrates with records in existing RSA Archer applications.
    • ComplyTec NERC Compliance Management has been updated to improve the user experience and to add advanced workflow to the Events application, introduced the Reliability Standard Audit Worksheet mail merge template, added calculated functionality for review Frequency and Next Review Data, and a NERC Procedure Assessment and NERC Evidence Assessment questionnaires.
    • Crowe Pandemic Response aggregates external data, including government mandates, closures, virus cases and more, and correlates it with an organization’s internal data, such as employees, vendors, customers, products and facilities. This tool centralizes the data executives need to identify emerging risks, adapt business initiatives and, most importantly, care for their employees.
    • NTT ISMS Risk Assessment extends the NTT ISMS Control Assessment app-pack and helps automatically define, prioritize and track risks.
    • RSA Archer IIC-Aligned IoT Security Maturity Assessment documents security maturity assessments and action plans to address security gaps in IoT implementations.

 

  • Integrations - pre-built data exchange configurations bringing data into and pushing data out of the RSA Archer Platform
    • AWS Security Hub integration with RSA Archer IT Controls Assurance use case creates a centralized view for security and compliance posture across multiple AWS services or partner offerings.
    • Qualys Vulnerability Management integration with the RSA Archer IT Security Vulnerabilities Program use case has been updated to leverage the Application Managed Output Writer for JavaScript Transporter.
    • RiskRecon Own Enterprise Monitoring integration with RSA Archer IT Security and Vulnerabilities Program has been updated to support changes with JavaScript code and ingestion of RiskRecon Network Filtering issues.
    • RiskRecon Third Party Security Risk Monitoring integration has been updated to support changes in the JavaScript code and data feed and integrates with the following use cases:
      • RSA Archer Third Party Catalog
      • RSA Archer Third Party Engagement
      • RSA Archer Issues Management
    • SecurityScorecard integration with the RSA Archer Third Party Catalog use case has been updated to include enhanced data structures, automated data feeds, event log module, and triggered assessments and notifications.
    • Supply Wisdom integration with the RSA Archer Third Party Catalog use case has been updated to reduce the number of required on-demand applications, full integration with Supply Wisdom's API for automatic content updates, email notifications, and alert triage and tracking status. 
    • Thomson Reuters integration with the RSA Archer Corporate Obligations Management use case includes a number of updates.
    • Wolters Kluwer NILS™ Insource ® integration with the RSA Archer Corporate Obligations Management use case imports regulatory content for the insurance industry directly into RSA Archer. 

 

 

To learn more about each of these new and updated offerings, start by reviewing the Product Advisory. Also, please join me on Friday, May 29 for a Free Friday Tech Huddle for an overview of the RSA Exchange Release R12 offerings (available to customers only).

And last, but not least, there is a wealth of documentation, downloads, and more on the RSA Exchange on RSA Link.  I recommend that you bookmark the listing of all RSA Exchange offerings. And if you have new ideas for the RSA Exchange, please submit them on RSA Ideas!

In uncertain times, integrated risk management plays an even more significant role in organizations’ growth strategies. Likewise, responsibility and roles in risk management continue to extend well beyond those traditionally relegated to risk managers. Digital transformation has accelerated this transition, with a greater need for executives to have real-time visibility to risk information that helps drive critical business decisions.

 

In keeping with our vision to “Inspire Everyone to Own Risk,” RSA Archer Release 6.8 continues the evolution of the RSA Archer user experience. This release delivers new features and enhancements designed to streamline access to key data and provide a cohesive, actionable view of risk and compliance at all levels of an organization.

 

User experience enhancements in Release 6.8 include several updates to record and report headers, for greater consistency and easier access to key functions. Updated navigation options provide more usable space on-screen and enable users to easily view and edit recent records. Release 6.8 also includes a number of enhancements to improve search and reporting functions. Users can set a numerical limit or percentage for returned search records for regular, non-statistical searches, and date-based filters can be created without the need to navigate away from the page.

 

Administration enhancements in Release 6.8 include a new user interface for Data Gateway that supports the configuration of connectors to external systems and provides real-time visibility into external data sets. We’ve also introduced native SAML 2.0 support for single sign-on (SSO). This new SSO mode allows RSA Archer to natively process responses from any identity provider that supports SAML 2.0, as well as create and authenticate RSA Archer users directly based on their SAML identity. In addition, new Job Monitor capabilities in this release for RSA Archer SaaS and on-premises environments allow authorized users and administrators to view, sort, group, and filter information about data feed jobs.

 

We’ve also introduced the RSA Archer Financial Controls Monitoring use case, which replaces the Controls Monitoring Program Management use case. The Financial Controls Monitoring use case includes new applications, questionnaires, roles, and dashboards to assess and report on the performance of financial controls across all enterprise asset levels. These and other enhancements enable management of multiple financial compliance projects as required by the Sarbanes-Oxley Act (SOX) or similar financial regulations, as well as associated functions such as Provided By Client (PBC) lists, process narratives, and operating tests.

 

These are just some of the highlights of RSA Archer Release 6.8. You can get more information on the Release 6.8 subspace on RSA Link, and we invite customers to join us for upcoming Free Friday Tech Huddles for demonstrations and details of these and other features.

Mobile technology has become a business staple. Today’s workforce expects ubiquitous services, productivity and speed. RSA continues to work to provide customers mobile technology to quickly and efficiently complete risk management tasks anytime and anywhere.

 

Today, we are pleased to announce availability of the new RSA Archer Mobile app for iOS and Android. This new app is the next step in our mission to bring the power of RSA Archer and its data to users, where they are and in the form they want. With RSA Archer Mobile, business users can view and complete Advanced Workflow tasks assigned to them, easily edit a record, and provide additional information or comments.

 

The RSA Archer Mobile app is available to all RSA Archer customers running RSA Archer Release 6.7 or above. The app supports iOS versions 11, 12 and 13 and Android versions 7, 8, 9, and 10. To enable business users to use the app, RSA Archer admins will need to configure Advanced Workflow-enabled apps for mobile use.

 

iOS Task ListAndroid field optionsiOS Record Page

 

We are very excited to release this initial version of our native app as an addition to our other iOS apps, RSA Archer Assessments Mobile and RSA Archer Business Continuity & Disaster Recovery. But this is just the beginning of our mobility strategy to make users future ready and even more productive, anytime and anywhere. Stay tuned!

 

For more information on the new RSA Archer Mobile app, we invite you to register and join us for a Free Friday Tech Huddle on April 24 for a live demo. Free Friday Tech Huddles are only available to RSA Archer customers. You can also learn more about RSA Archer mobile apps on RSA Link. If you are not yet a customer but you are interested in learning more, please contact your local representative or authorized reseller — or visit us at www.rsa.com.

Konexus provides a world-class critical event communication, management and collaboration platform. This empowers organizations, governments, and enterprises to alert their citizens or employees of any critical event, and also streamlines crisis response by providing efficient communication and collaboration tools.

 

Please view this recording from March 11th 2020, where we cover the latest features and teach you how to leverage the capabilities of Konexus for your mobile Archer needs.

 

 

On April 8th 2020, we hosted a webinar with the RiskRecon team showing users how to leverage RSA Archer to act on third-party security risks. Please see the attached video file to view the recording.  

 

----------

 

Many companies have been forced to change their processes for assessing third parties’ cyber risks, since these assessments can no longer be performed on site due to travel restrictions and other constraints. Yet the need to properly assess, rate and monitor third-party security risks has never been greater, whether you have dozens of vendors in your ecosystem or thousands.

That’s why leading organizations are leveraging automation to remotely identify and act upon third-party security risks, and during this webinar, we’ll learn from their experiences using RSA Archer Third Party Security Risk Monitoring with integrated functionality from RiskRecon.

You’ll learn how to:

• Perform IT risk and compliance assessments—and continuously verify third-party security control performance—WITHOUT onsite travel.
• Automatically assess your vendors’ internet-facing systems and create risk-prioritized action plans tailored to your risk policy.
• Strengthen your overall governance with continuous third-party security risk monitoring.

We are pleased to announce a new, purpose-built integration for Panaseer with RSA Archer Suite. Panaseer has integrated its Continuous Controls Monitoring (CCM) platform with the RSA Archer platform to provide automated continuous controls and risk monitoring and assurance. This integration is designed to give security teams complete and accurate visibility of assets, controls gaps, and risks, both on premises and in the cloud.

 

Need of the hour

Traditionally, integrated risk management (IRM) practices have relied on manual, human-driven approaches to self-assess and assure that controls are deployed and implemented correctly. To assure complete control coverage and effectiveness across all asset types such as devices, applications, people, accounts and databases, enterprises require very large teams at considerable expense. Alternatively, they are only able to test a sample of controls and assets, on an infrequent basis, with the budget available. The veracity of the results of this process is questionable because humans are prone to error. As the assessment process is manual and costly, it cannot be conducted frequently, leading to out-of-date and inaccurate results.

 

Risk and compliance teams are also seeing an increase in the number and complexity of regulatory requests, as more privacy and security laws go into effect globally. For example, in the banking sector, Singapore’s Notice 655 “Requirements for Cyber Hygiene for Banks” requires banks to ensure that a malware protection solution is installed and functioning on every device all the time. Risk and compliance teams in turn rely on security teams to provide relevant security metrics to inform their security and risk posture assessment for IRM. This places significant load on security teams to do data science, rather than securing the business. In fact, a recent Panaseer commissioned survey found that security teams spend more than 36% of their time on reporting, which includes extracting, moving, cleaning and merging data, as well as making, formatting and presenting calculations.

 

How can CCM + IRM help?

With the new Panaseer integration with RSA Archer, IRM practices that require data to be collected and analyzed can be automated with near real-time insights that are easily scalable. Cost of risk management and the associated data collection and analysis can also be reduced significantly.

 

Panaseer’s CCM Platform integration with RSA Archer enables organizations to:

  • Reduce costs through automation, as large teams doing manual assessments are no longer required
  • Improve accuracy with data as assessments are based on facts versus subjective opinions
  • Perform complete assessments (instead of sampling assessments) as testing of every control instance is available automatically, without the need for a large team
  • View continuous assessments with a consistently up-to-date view of control deployments

 

Panaseer Screenshot Archer Option 1 Color

 

Panaseer Screenshot Archer Option 1

NIST-aligned control assurance metrics automatically calculated in 
Panaseer and exported as Metric Results in RSA Archer

 

How does it work?

CCM sits above existing security tooling, ensuring that all controls are fully operational and all assets are protected. It automatically and continuously consumes data from sources across security, IT and business domains. By unifying disparate data, it can identify previously unknown or unmanaged assets, control coverage gaps, and control compliance failures. It then substantiates that insight through automated reports which can be segmented by market, business process, business unit or service line and mapped to your goals and structure to provide business context for security metrics. Business Risk Perspectives (BRP), an element of Panaseer’s CCM platform, provides a continuous view of the risks associated with the most mission-critical business processes. 

 

Complete asset inventories (including devices, applications, people, accounts and databases), control coverage gaps (control deployment and performance insights), and business context for risk prioritization from Panaseer’s CCM platform are all fed into RSA Archer for continuous controls and risk assessment. 

 

Interested in learning more about the Panaseer Continuous Controls Monitoring integration with RSA Archer? 
Register and join us for a Free Friday Tech Huddle on Friday, March 20, for an overview and live demo. Free Friday Tech Huddles are only available to RSA Archer customers. If you are not yet a customer but you are interested in learning more, please contact your local representative or authorized reseller — or visit us at www.rsa.com.

If you have any questions or feedback, please get in touch via Panaseer’s contact page.

About the author(s):

Charaka Goonatilake is CTO at Panaseer where he is responsible for the technology strategy and delivery of the Panaseer Platform. He leads a team of engineers who develop innovative technologies and techniques for deriving data-driven cyber security insights for a range of enterprise stakeholders. Charaka has been immersed in Hadoop and cloud-based big data technologies for the past decade, across roles at BAE Systems Applied Intelligence and Panaseer. He has hands-on experience of architecting large-scale data solutions in the enterprise, for a range of cyber security use cases, including security analytics for threat detection, threat intelligence management and cyber security risk management.

 

Gloria Higley is a Product Manager at RSA focused on providing useful and relevant product offerings for customers and partners with the RSA Exchange for RSA Archer. Offered online through RSA Link, the RSA Exchange provides access to pre-built App-Packs, RSA Ready-certified Integrations, and Tools & Utilities that complement and enhance out-of-the-box capabilities of RSA Archer use cases. 

Proactive security is essentially a big data problem, although at first glance it may not seem like one. On one hand, the vulnerability deluge is inundated with thousands of vulnerabilities and exploits being reported each day. On the other hand, there is an ever-expanding attack surface with public/hybrid clouds, data centers, and containers. These two dimensions effectively make it a big data problem. Traditional vulnerability assessment (VA) solutions and their scanning-over-the-network models are simply not up to solving it.

 

ThreatWatch is a next generation proactive cyber security solution that uses machine-powered, AI-based vulnerability curation, along with a no-scan approach, for impact assessments for assets including cloud instances, containers, servers, source code, and more.

 

Two key aspects of the ThreatWatch integration to note:

  1. ThreatWatch does no scanning over the network.
  2. All assets recorded in ThreatWatch are protected in a continuous and ongoing manner without user intervention.

ThreatWatch integrates with the RSA Archer IT Security Vulnerabilities Program use case to provide a real-time automated picture of the vulnerability landscape and its impacts on organizational assets to customers. The RSA Archer IT Security Vulnerabilities Program use case offers a centralized catalog of IT assets, repository, and taxonomy for vulnerability data that enables customers to quickly understand which assets are vulnerable based on scanner detections.

 

This integration is achieved via two data feeds in RSA Archer:

  • The ThreatWatch Vulnerability Intel data feed pulls the latest vulnerability intelligence from ThreatWatch into RSA Archer's Vulnerability Library application. This helps provide a complete vulnerability landscape to RSA Archer users. It also helps provide prioritization input for newer vulnerabilities like Common Vulnerabilities and Exposures (CVEs), missing analysis in National Vulnerability Database (NVD), and critical information around availability of patches, remediations and exploits. Together, these details help security teams with prioritization.

    ThreatWatch Vulnerability Library Screenshot
  • The ThreatWatch Vulnerability Impact data feed pulls the latest vulnerability impacts from ThreatWatch into RSA Archer's Vulnerability Scan Results application. ThreatWatch's continuous no-scan approach ensures that impacts are recorded in near real-time without the need for intrusive scans on the network. Impacts are auto-prioritized as either “Do Now” (something that needs immediate attention) or “Do Later," providing actionable insights for security teams.

    ThreatWatch Vulnerability Scan Results Screenshot

 

Having vulnerability intelligence and impact details in RSA Archer out-of-the-box applications like Vulnerability Library and Vulnerability Scan Results ensures that existing RSA Archer users do not have an additional learning curve and can leverage existing reports. The ThreatWatch integration with RSA Archer helps provide a complete and accurate risk score picture to RSA Archer users.

 

ThreatWatch Example Vulnerability Intelligence Chart

 

Example Vulnerability Intelligence Chart

 

ThreatWatch Example Vulnerability Impacts by Asset Chart

Example Vulnerability Impacts by Asset Chart

 

ThreatWatch Example Vulnerability Impacts by Asset by Priority Chart

Example Vulnerability Impacts by Asset by Priority Chart

 

Interested in learning more about the ThreatWatch integration with RSA Archer?
Register and join us for a Free Friday Tech Huddle on Friday, March 20, for an overview and live demo. Free Friday Tech Huddles are only available to RSA Archer customers. If you are not yet a customer but you are interested in learning more, please contact your local representative or authorized reseller — or visit us at www.rsa.com.


About the author(s):

Ajey Godbole & Paresh Borkar
Ajey Godbole is a Senior Engineer at ThreatWatch. Paresh Borkar is a co-founder and Chief Architect at ThreatWatch.

 

Gloria Higley

Gloria is a Product Manager focused on providing useful and relevant product offerings for customers and partners with the RSA Exchange for RSA Archer. Offered online through RSA Link, theRSA Exchange provides access to pre-built App-Packs, RSA Ready-certified Integrations, Tools & Utilities, and Content that complement and enhance out-of-the-box capabilities of RSA Archer use cases. 

Designing the right processes, organization, and templates during the initial set-up of an Information Security Management System (ISMS) are challenges many organizations face. Rolling out an ISMS in a large organization is a completely different story: aspects like automating frequent manual steps, usability, easy reporting or access permissions to sensitive information become crucial for the ISMS’ success.

 

The NTT ISMS Control Assessment app-pack was introduced as part of the RSA Exchange Release R11 to enable organizations to achieve a streamlined classification and control assessment methodology when implementing and operating their ISMS. This app-pack allows organizations to leverage the first two steps in a flexible three step approach for the implementation and roll-out of an ISMS that has been successful among many of NTT’s clients. The methodology is derived from ISO 27005 and NIST Special Publication 800-30, as well as NTT’s many years of consulting experience assisting clients with their ISMS implementation process.The three steps of the methodology include:

 

  1. Classification
    Use a built-in questionnaire or derive classification from assets, such as business processes or information assets, when master data applications are integrated.

    RSA Archer Classification Step for NTT ISMS Control Assessment App-Pack

  2. Control Assessment
    Results from previous cycles are pre-filled and controls automatically selected based on three filter stages to ensure there are only controls for relevant assets in the assessment. This reduces the effort needed for assessment in the process.


    RSA Archer Control Assessment Step for NTT ISMS Control Assessment App-Pack

  3. Risk Assessment
    Threat events are automatically selected, results from previous cycles are pre-filled, and risks automatically calculated based on the results from the Classification and Control Assessment steps to derive a well-founded prioritization of measures.

    RSA Archer Risk Assessment Step for NTT ISMS Control Assessment App-Pack

 

NTT has developed two app-packs to provide RSA Archer customers with this methodology, including:

  • NTT ISMS Control Assessment app-pack
    • Includes the Classification and Control Assessment steps.
    • Prerequisite for the NTT ISMS Risk Assessment app-pack and currently available on the RSA Exchange.

  • NTT ISMS Risk Assessment app-pack
    • Includes the Risk Assessment step.
    • Currently in development and is a planned offering for a future RSA Exchange release.

 

With the NTT ISMS Control Assessment app-pack, RSA Archer customers can:

  • Evaluate the maximum impact resulting from a breach of a security objective (confidentiality, integrity, availability) based on a questionnaire or by inheriting from one or multiple assets
  • Assess compliance with relevant controls (filtered by asset category, classification and zone)
  • Define and track remediation plans
  • Assess assets with a streamlined process as part of the organization’s ISMS
  • Gain insight into compliance violations of internal or external policies
  • Improve overall compliance and security
  • Track measures using RSA Archer Issues Management

The NTT ISMS Control Assessment app-pack includes several useful features, including:

  • Workflow process graphics
  • Tooltips to efficiently provide all the necessary information to the user
  • Multi-language user interface, including content like controls and threat events
  • Automatically saved inline edit grids

 

Interested in learning more about the NTT ISMS Control Assessment app-pack? 
Register and join us for a Free Friday Tech Huddle on Friday, February 28, for an overview and live demo. Free Friday Tech Huddles are only available to RSA Archer customers. If you are not yet a customer but you are interested in learning more, please contact your local representative or authorized reseller — or visit us at www.rsa.com.

 

About the author(s):


Lars Rudolff
Lead Consultant, GRC Tools - NTT Ltd. 

Lars Rudolff works for NTT Ltd. as lead consultant for GRC Tools. Mr. Rudolff is responsible for the technical and strategic orientation of the GRC Implementation practice. He has experience in the area of GRC tools in general since 2005 and with RSA Archer since 2011. He has led implementation projects for many customers including the introduction of one of the largest RSA Archer environments in Europe at a German car manufacturer.

In addition, Mr. Rudolff accompanies the NTT’s Operations team for RSA Archer, which provides operational services for existing RSA Archer customers. This includes, among other things, 2nd and 3rd level support activities as well as maintenance services such as system upgrades or minor modifications of an existing implementation. He is also responsible for developing monitoring and automation tools for the RSA Archer platform.

 

Gloria Higley

Product Manager - RSA 

Gloria is a Product Manager focused on providing useful and relevant product offerings for customers and partners with the RSA Exchange for RSA Archer. Offered online through RSA Link, the RSA Exchange provides access to pre-built App-Packs, RSA Ready-certified Integrations, and Tools & Utilities that complement and enhance out-of-the-box capabilities of RSA Archer use cases. 

The adoption of Internet of Things (IoT) is transforming the way companies do business. With IoT, organizations can gather an abundance of data for analytics to improve their product offerings. A simple case would be the addition of IoT to automobiles to improve safety for consumers. Not only can businesses use IoT to improve their product offerings, they can use IoT to improve business operations, to gather data from manufacturing machines and equipment in order to identify areas to improve productivity. With increased usage of IoT, data privacy and security are among the top concerns. Once devices are connected to the Internet, they become vulnerable to possible attacks which increase the risk for the organization. 

 

The first step is understanding the impacts of implementing IoT within your organization. 

 

In RSA Exchange Release R11, we've introduced the RSA Archer IoT Project Readiness app-pack. This is our first IoT offering which helps you track IoT projects within your organization and provides visibility into all IoT projects and how they impact your organization. With this app-pack, you can document the IoT project, identify the risks prior to implementation and ensure a plan is in place to address the risks so that your IoT projects are ready to implement. 

  

RSA Archer IoT Project Readiness allows you to:

  • Gain visibility into all IoT projects by documenting and tracking IoT projects within your organization
  • Minimize impacts of IoT projects to your organization by identifying project risks and monitoring project status and remediation plans
  • Proactively address risks by developing mitigation strategies prior to implementation

 

Interested in learning more about the RSA Archer IoT Project Readiness app-pack? Join us for a Free Friday Tech Huddle on Friday, Feb. 28 for a live demo. Free Friday Tech Huddles are only available to RSA Archer customers. If you are not yet a customer but you are interested in learning more, please contact your local representative or authorized reseller — or visit us at www.rsa.com.

 

 

RSA Archer IoT Project Readiness

IoT Project Owner Dashboard

 

 

RSA Archer IoT Project Readiness

IoT Project Approver Dashboard

With today's launch of RSA Exchange Release R11, we're excited to share new offerings to enable you to expand your IT & Security Risk Management processes. It's important to have a complete picture of technology and security-related risks in order to make decisions. What's more, the alignment of security policies and regulatory and business requirements is critical for success.

 

One of our new offerings, the RSA Archer IoT Project Readiness app-pack, enables organizations to prioritize their IoT projects around business goals and needs.  Our partner, NTT, has created the NTT ISMS Controls Assessment app-pack to help with the challenges that organizations face when setting up an Information Security Management System (ISMS).

 

We're excited about our partner integrations like the AWS IAM Access Analyzer which will provide a consolidated view of unauthorized access findings from multiple AWS accounts, prioritize and take action on critical devices, save time analyzing resource policies for public or cross-account accessibility, and continuously monitor and refine permissions. Our new Cysiv Command Integration provides an ongoing management of incidents and security posture using RSA Archer, while allowing Cysiv to provide SOC-as-a-service and SIEM-as-a-service. The Panaseer integration computes metrics that measure control deployment and control performance. Our Rapid7 Nexpose integration enables organizations to catalog network devices discovered on the network. Finally, the ThreatWatch integration enables organization to access near real-time vulnerability intelligence along with continuous impact assessment of organizational assets.

 

We're also introducing a wide range of content that provides best-practice policies, control standards, legal and regulatory requirements, industry standards, and assessments such as the CCPA Regulation that was passed in June 2018 and went into effect on January 2020.

 

To learn more about each of these new and updated offerings, start by reviewing the Product Advisory. Also, please join me on Friday, February 21 for a Free Friday Tech Huddle for an overview of the RSA Exchange Release R11 offerings.

 

And last, but not least, there is a wealth of documentation, downloads, and more on the RSA Exchange on RSA Link.  I recommend that you bookmark the listing of all RSA Exchange offerings. And if you have new ideas for the RSA Exchange, please submit them on RSA Ideas

Filter Blog

By date: By tag: