An official website of the United States government
Here's how you know
Official websites use .gov A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS A lock () or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.
Search | CMS Information Security and Privacy Program
The steps taken at CMS in response to a suspected breach of personally identifiable information (PII)Protecting sensitive information at CMS CMS systems contain the personal …
Design practices that facilitate secure software development through organization and collaborationWhat is Threat Modeling? Threat modeling is a method of …
This chapter (RMH Chapter 8) identifies the policies and standards for the Incident Response family of controlsIntroduction RMH Chapter 8 Incident Response documents the controls that …
Testing that mimics real-world attacks on a system to assess its security posture and identify gaps in protectionWhat is Penetration Testing? Penetration Testing, also known as PenTesting …
The CCIC uses data to address incidents through risk management and monitoring activities across CMSWhat is the CCIC? The CMS Cybersecurity Integration Center (CCIC …
Programs and tools that ensure the security of CMS data through incident response, change management, and continuous risk assessmentSecurity Operations at CMS is focused on identifying and responding …
Least-privilege is critical to securely managing privileged access to data. CMS ADOs should manage privileged access (PAM) for humans and non-humans.What is Privileged Access Management (PAM)? Privileged Access Management (PAM …
Learn how best practices of the ZT Identity pillar hold the key to working securely with AI agents, and what steps your team can take to be prepared.AI agents and the identity challenge The digital landscape is …
Procedures for the Breach Analysis Team (BAT) to follow when a team is convened to address a breach of PII at CMSIntroduction Whenever there is an incident that has potentially compromised …