<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>CDM dashboard &#8211; SteelCloud</title>
	<atom:link href="https://www.steelcloud.com/tag/cdm-dashboard/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.steelcloud.com</link>
	<description></description>
	<lastBuildDate>Mon, 25 Aug 2025 19:40:54 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.steelcloud.com/wp-content/uploads/favicon.png</url>
	<title>CDM dashboard &#8211; SteelCloud</title>
	<link>https://www.steelcloud.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Documenting Continuous Diagnostics and Mitigation Capabilities</title>
		<link>https://www.steelcloud.com/documenting-continuous-diagnostics-and-mitigation-capabilities/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 03 May 2021 20:17:37 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[Automated STIG Compliance]]></category>
		<category><![CDATA[baseline security controls]]></category>
		<category><![CDATA[CDM]]></category>
		<category><![CDATA[CDM dashboard]]></category>
		<category><![CDATA[Continuous Diagnostics and Mitigation]]></category>
		<category><![CDATA[Continuous Diagnostics and Mitigation Capabilities]]></category>
		<category><![CDATA[cyber hardening]]></category>
		<category><![CDATA[DHS]]></category>
		<category><![CDATA[FIPS]]></category>
		<category><![CDATA[FITARA Scorecard]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[NIST SP 800-171]]></category>
		<category><![CDATA[NIST SP 800-53]]></category>
		<category><![CDATA[Risk Management Framework]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=81501</guid>

					<description><![CDATA[Documenting Continuous Diagnostics and Mitigation capabilities activities proves governance over security configurations. As agencies work toward maturing their Continuous Diagnostics and Mitigation (CDM) programs, compliance documentation provides a way to assess and track progress. However, many agencies struggle because they have too many devices, users, and applications. As part of your compliance process, documenting Continuous Diagnostics and Mitigation capabilities ...]]></description>
		
		
		
			</item>
		<item>
		<title>3 Challenges with Continuous Diagnostics and Mitigation</title>
		<link>https://www.steelcloud.com/3-challenges-with-continuous-diagnostics-and-mitigation/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Wed, 21 Apr 2021 17:06:40 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[Automated STIG Compliance]]></category>
		<category><![CDATA[baseline security controls]]></category>
		<category><![CDATA[CDM]]></category>
		<category><![CDATA[CDM dashboard]]></category>
		<category><![CDATA[challenges with continuous diagnostics and mitigation]]></category>
		<category><![CDATA[Continuous Diagnostics and Mitigation]]></category>
		<category><![CDATA[cyber hardening]]></category>
		<category><![CDATA[DHS]]></category>
		<category><![CDATA[FIPS]]></category>
		<category><![CDATA[FITARA Scorecard]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[NIST SP 800-171]]></category>
		<category><![CDATA[NIST SP 800-53]]></category>
		<category><![CDATA[Risk Management Framework]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=81487</guid>

					<description><![CDATA[Phase 2 and 3 processes and practices are more critical than ever when addressing the 3 Challenges with Continuous Diagnostics and Mitigation With the Continuous Diagnostics and Mitigation (CDM) program now in its ninth year, federal agencies now move towards their next iteration of compliance. Looking at CDM as a whole, Phase 2 and 3 processes ...]]></description>
		
		
		
			</item>
		<item>
		<title>What is Continuous Diagnostics and Mitigation</title>
		<link>https://www.steelcloud.com/what-is-continuous-diagnostics-and-mitigation/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Tue, 13 Apr 2021 00:29:51 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[Automated STIG Compliance]]></category>
		<category><![CDATA[baseline security controls]]></category>
		<category><![CDATA[CDM]]></category>
		<category><![CDATA[CDM dashboard]]></category>
		<category><![CDATA[Continuous Diagnostics and Mitigation]]></category>
		<category><![CDATA[cyber hardening]]></category>
		<category><![CDATA[DHS]]></category>
		<category><![CDATA[FIPS]]></category>
		<category><![CDATA[FITARA Scorecard]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[NIST SP 800-171]]></category>
		<category><![CDATA[NIST SP 800-53]]></category>
		<category><![CDATA[Risk Management Framework]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=81455</guid>

					<description><![CDATA[The Continuous Diagnostics and Mitigation (CDM) program takes a dynamic approach to cybersecurity Developed in 2012, the Continuous Diagnostics and Mitigation (CDM) program takes a dynamic approach to cybersecurity with capabilities for asset management, Identity and Access Management (IAM), network security, and data security. Developed to support government-wide and agency-specific efforts, it is a risk-based ...]]></description>
		
		
		
			</item>
	</channel>
</rss>
