testing one two testing one two um so hey guys welcome to convo courses my name is bruce and i'm going to be answering a couple questions uh about risk management framework cyber security type stuff information technology anything i can answer and i'm starting off with uh some questions that i received on my channel here from jackie o who says are you are you able to share a complete example would you like would like to know what acceptable what an acceptable deliverable ssp looks like you mentioned you'd share a copy in the section below so um so in order i i think maybe i might have mistakenly not put the link in there but if you go to convo courses i have a breakdown of how to put together an acceptable package what are all the steps that go into creating a system security plan for the nist so but what i can do for you jackie and for anybody else who is wanting to see what a system security plan looks like i can give you an example so the thing is an acceptable deliverable for an ssp that's what you wanted to know would like to know what an acceptable deliverable for ssp looks like okay let's let's put this in context what i want to do is first of all i want to show you what for those of you who might not know you might need some framework here some context to know exactly what we're talking about we're talking about a system security plan a system security plan is a comprehensive document that explains the security posture of an organization so an organization says hey yeah we're secure uh yeah we protect these satellites we protect all the data that's being processed and disseminated and stored uh we you know it's it's tracking all the troop movements and all the stuff and it's secure you know so thing about the federal government is that they don't take your word for it it has to you have to show evidence that it is secure and and how it's secure and so the risk management the nist 853 breaks down all the security controls that they that they uh that that you should see to show that you have a certain level of of assurance on your data that means a certain level of confidence that you are protecting the data right so in order to show that what you present is a security pat a authorization package an authorization package consists of a system security plan a plan of action and milestone it can also include a a a assessment report and then artifacts artifacts is like evidence that you have done your scans the evidence that you have backups that are in place and it basically covers all the security controls now an acceptable deliverable for a system security plan delay it really depends on the eye of the beholder what i mean by that is that every organization is going to have what a different definition of what they deem as acceptable for some organizations to prove that you have a a proper backup in place it might be acceptable just to have a screenshot of your most current full backup of your systems for another organization it might be that they want to see the configuration of your backups that they they want to see that you have an incremental backup and they want to see the configurations of your backup system for some for some organizations it might be good enough to just have a policy that you back up the uh so every so often the policy states that the frequency is we do it every wednesday on in may of every year or whatever it is you know whatever it is so every organization is going to be the determining factor they're the ones who say yeah yes this is good i like this this this is acceptable uh an acceptable evidence so are an acceptable artifact so to answer your questions to answer your question it depends on the organization what is acceptable as a as evidence and for you as an information system security officer as a cyber security expert as a cyber security consultant as a cyber security person it's your job to figure out what the expectations of the organization is so that's that's what you have to do um i know that in in my line of work a lot of times especially in the beginning i would present something that i thought was what the organization wanted to see i would present something that that in my interpretation from my previous jobs i'd say well at my previous job it was good enough just to have a screenshot so i'll just i'll just take the screenshot and we'll we'll upload that or actually i'll give you a real world example previous job company a it was fine just to show the policy actually the policy of say the backups if you had the policy there and you we would upload it or even maybe have a link to that the document that talks about the frequency of the backups for the system that was fine they were they were okay with that uh assessors came they looked at it as a yep here's the document right here your policy says that you guys have this have this backup plan and procedure you have it there you go and then they blessed it and then that was it then i go to another job right i go to company b and and i upload thinking to myself well yeah okay it was good with the other company and this this other organization is a way higher like they have way more important stuff so hey i'm gonna do the same thing i put out a dot the documentation and i put the artifact upload that into uh say emass or whatever it was at the time it wasn't ems but whatever it was and and said okay here's the artifact here it is here's evidence that we our organization is doing the backups and they saw the policy i'm like what is this i'm like it's the policy no we need evidence this isn't evidence this is saying that you did it this this procedure says that you guys have conducted the backups but this is not this isn't what we want and i'm like well okay uh well what you know what do you want like what what kind of evidence very respectfully of course i said well what kind of evidence could you give me examples of what kind of evidence we could bring to the table to show you that we are doing this and they said well maybe a screenshot and give me a screenshot of the ibm backup.exe uh system you know give me that so we that's what we did we we the moral of the story is you have to figure out what the organization wants now let me give you some further context if you're confused about this whole thing that i'm talking about artifacts and all this kind of this and that let me show you what we're talking about here i'm going to show you my screen here what we're talking about is a system security plan now the system security plan it looks different for every organization all right here's there's a there's a bit of leeway that the risk management framework uh nist 800 series gives you okay so some organizations are still on this what you see here on the screen here is a just a word document this is where i'm at here right here is if you want to follow along is this is uh combocourses.com and you know what i'm going to do is i'm going to find wherever the downloadable is i'm going to make the downloadable free so if you basically if you go on to convo courses logging in is free you'll see this as a free download if you go to if you're looking for nist uh iso nist 800 foundations you'll see is free the downloadables will be this downloadable will be free if i can find it okay so anyway the system security plan looks different at each organization so what you're seeing here on the screen is a word document version of a system security plan and um let me see where i'm at here yeah okay so this is a video that i've done about this particular okay here we go here we go let's let me just kind of show you a couple things here um so yeah this right here is what's going to be in that system security plan pretty cumbersome because you're you're essentially documenting you're supposed to document anyway every single system security control and so if you're doing this in a word document it just gets very very you're gonna have a a phone book worth of data and it just gets extremely hard to manage because things also change on a regular basis and that's why some people use something like this xacta exacta is an example one example out of many of a database a searchable database that can hold all the system security controls so there's exacta there's uh emass there's uh and sometimes they'll have like a homegrown one where it's just basically uh oracle database or sql database that they put together and um and they just made a searchable database it's much easier to deal with if you have some kind of a database or a relational database like in xacta what are the archer i think does it rsa archer what other there's so many other ones out there but this is just one example basically you would put your system security plan and document all the controls in this database rather than doing it on a word document another place that people do it i've seen done is on a um a spreadsheet it's so ridiculously hard to manage a spreadsheet with this much data on it let me let me see if i can find an example of a spreadsheet example of a spread yeah here is one right here this is what we're looking at here on the screen is a is a spreadsheet that's been uh a excel spreadsheet that's been made into a a system security plan it's just it starts off good it's very easy to to understand it and you fill it out and it's like a template and stuff like that but what happens again is that you have so many security controls and they're being and those security controls change from time to time you got to manage those security controls and on a spreadsheet sometimes it can be it's first of all it's very limited you can't upload files on a spreadsheet you can't you know you can't do very comprehensive searches on a spreadsheet you can do some cool stuff with a spreadsheet but it just has some some severe limits so you can do it on whatever the whatever the organization determines um how they determine how they're going to document all of the security features of the system security uh syste the systems that are managing that are disseminating that are uh processing that are storing that important data you have to document all that stuff so the organization says okay everybody will use this word document here's the template here's it's got our letterhead on it it's got our symbol of our company and all that kinds of logo and all that kind of stuff on it right or they can say nope we're going to use spreadsheets that's what we've been using it's just easier for us and here's the tabs on the spreadsheet or they can use some kind of a relational database that allows everyone to access it is online and maybe have different role-based uh people who can log in and see different things and manipulate different things and everybody's collaborated collaborating on say archer or exacto or whatever so that is what a system security plan might look like uh and it's coming from this document right here which is an 818 nist 818 developing plans for federal systems and if you look at this right here this document this document right here shows you what it's going what a system security plan should have on it and so here here that part is that part right here um it says a sample information system security plan template all right and uh yeah it's going to have a categorization of the system the name of the system um and the roles and responsibility and at some point it goes deep dives into all the system security controls themselves and that's where it just gets super deep and just so much data is being dumped in in that spreadsheet or in that in that uh document that you have and that's why a relational database is really the a better way to go about it so here's that document that i that i told you i want to make downloadable i'll have to come back to this right now because we're on this live i could probably do this in the background while i'm talking here but um i just wanted to show you a couple more things here's another downloadable this is a template that's in a word document and so that's that's pretty much it um as far as giving examples a specific example of an artifact that might be in a system security plan that might be acceptable again it really depends on the organization of what is acceptable um but let me see if i can find anything um i might have something what i'm doing is i'm on my actual um training right here to see if i have given out any specific example i believe i have i'm just trying to find it tailor controls documented controls approval um yeah so here let me see if i can all right maybe this will maybe this is one that i could show you so what i'm doing right now is downloading the stakeholders list this is something that goes in the system security plan and it's just a template that i i don't think i've filled this one out i think i just gave a template just in case somebody wanted to use it for their own organization just one of the things that i have in combo courses if you're taking the risk management framework it's of course okay so here's an example of an artifact you might you might see in a system security plan and all it is is a list of of the people who the stakeholders the people who are responsible in some way on a specific system uh let me see if i can make this a little bit bigger and i'll show you another one in a second here so yeah there you go it's just got the title of the person the name the email contact information right there that might be something that you would put into a into a system security plan let me see if i can find another one and there's other things too there's like if you if your organization does scans you might prove that hey we're good we're we don't have any vulnerabilities what you might do is is put the results of a nessa scan like if if your organization is doing scans you might do that let me see if i can pull this one up yeah okay here's another example here's something i've seen on many many different in many different ways uh that are on a in some way shape or form on a system security plan and this one is a hardware software list and this is going to list the host names the ips of course i made all this up now this is real but you you would have location os version the serial numbers the mac addresses and all of these things it of course it's not going to be three items right if you could have thousands of of items on this list but i'm just giving you an example of what might be acceptable as a artifact it's ju basically it's evidence that you have completed a certain task and you meet a certain security control that's that's all it is and then here's the software list and it's of course going to be way more comprehensive than this if you especially software software lists are crazy huge like ridiculously so huge and nobody's gonna really really read it you know what i mean so uh yeah so it's gonna have vendor it's gonna have software it's gonna version things like that maybe you might have where where it's loaded up uh what systems are are uh have this software things like that so those are those are a few examples so i hope that that helps i'm gonna move on to another topic of discussion here while in the background i'll try to change and make this one this portion some of those downloadables try to make those free all right um i had another question um do you do phone consultations you know on very very rare con occasions i'll do phone consultations to people who i've who've been following me for a really long time people i can't uh who uh who have bought the course and i've been we just been talking for many for a long time and so i'll sometimes do a consultation with them but that's normally for like resumes and stuff like helping people get jobs and things like that as far as consultations like for your for your organization we'll have to talk you you need to contact me directly and that's a whole different i had yes i have done it before my time is very limited so i i can't always do it you know what i mean but i might know somebody who can though i know several cyber security experts who do the same thing i do and i could if i can't do it i can pass try to pass the work along to them and they might be able to to do that for a fee of course so yeah contact me what i'll do is i will have my contact information below and uh and if you contact me i can forward you to the right people let me see if i can find my contact information i could give you if you're trying to look for a consultation for your organization i might be able to help in that department let me see here where could it be i'll give you guys that's if i can actually log in maybe i'll just go ahead and type my information in there let's see let's we'll just say if you contact me here i'll put it here it's cyber aware 2020 all one word at gmail.com if you contact me here and if you have consultation for your organization i you know maybe that's something i should put up here on my site um it's just something i don't advertise every now and then somebody will reach out to me and i'll i just so happen to be in a place where i can actually help them i have a free time to actually call you know they'll call me go i'll go through all of any kind of security questions that they want or go through a jpass or whatever they need me to do and then i'll get into their system and then help them out but um i i do work full time so you know i can't always do it so i can pass it off to some other people some other professionals that i know who maybe they have the time to make a little cash on the side or whatever okay so i hope that that helps um let me see i got a question here professor black ops says cyber security for for the people that i have um i have you every use of the grc system to build an ssp um i have you every use of grc system to build an ssp um yeah so the grc systems that i'm familiar with have been like home grown and then uh there's a archer archer that one i'm pretty familiar with my personally familiar with and uh on those systems you can build out an an entire authentication package on there not just the system security plan just to kind of piggyback on what professor black ops is saying you can build not only the the system security plan with all the evidence if it's on a database a relational database with the backup storage and all that kind of stuff cloud-based storage or whatever secures cloud-based storage but you could also put the scans like it could track all the scans throughout the network it can track all the hardware software that's on the network and on the systems uh it could track um any kind of documentation and policies procedures that you have grc systems it means uh governance risk and compliance am i right am i right with that uh professor black ops governance risk and compliance i believe that's what grc stands for and that's what they track they track they can track vulnerabilities they can track governance throughout your organization ip addresses what systems you have what software you have just all kinds of stuff let me see oh have you ever built uh have you ever used any grc systems to build an ssp yeah absolutely yeah absolutely the ones there was one called eidtr that i used way back in the day on the air force systems this it's gone now they don't they don't use that anymore i think they replaced it with emass or something like that the emas i've never actually had hands-on with emass i'm very familiar with what it does because i've had to work with it uh on several occasions where i'm uploading data to it but i personally don't have direct i've never configured a emass system or anything but have put data on them um archer is a grc system with s uh system security plans on it um that's a really good one what other systems have i worked on some home-grown ones made by different um three-letter agencies that i probably can't talk about um damn i never work with xacta but that one does is i believe that's a grc system um man there's so many different ones so yeah yeah but to answer your question yes i i have worked with and that's in my opinion the best way to work with a system security plan since there's so much data and it's so deep it's it's so many things you have to do with it in my opinion it's not word documents those are the file gets super big to where you can't sometimes you can't send it it gets so huge that you gotta break it into parts uh not so yeah dot dot dot is not good um and that's the same thing with excel excel is even more limiting i mean it allows you to search and things like that and it seems cool but it's really not and because especially if you're uploading artifacts like screenshots or scans and stuff like that and it just it can't handle that stuff the best way in my opinion has been a database relational databases with a with a storage back end that allows you to do everything you need to do and upload files and all that kind of stuff so yes i have worked with grc systems and built system security plans on them and in my opinion those are the best ones to use the ones with a database with a huge storage backend okay let me see here um i am going to look at another question here can you look at my resume finished some months ago looking for a job okay becca um if you happen to see this video please please email me directly and uh and i can help you out and um the best way for me to do this is if i can do it live and what i do with those is i'll change your personal information and then i will do it live that's that's the best way for me to do it the last system security plan i did was 1200 pages yeah yeah i mean they just get it's like a phone book after a while it doesn't after a while doesn't make sense it just does it just doesn't make any sense anymore to put it in a word doc because nobody's gonna nobody in their right mind is gonna read that entire thing i mean it just you see the thing after a while it becomes it's a database essentially right you're putting a database on a dot doc and it just doesn't make sense you you use a system security plan to search for a specific thing like you're searching for a specific thing i mean yeah there's the description of the system and there's the i don't know the mapping or whatever of the system it lists all security controls but when you're talking about uploading actual artifacts like lists of hardware or lists of software i mean that's where it just gets crazy you know and you're you're relying on scores of people throughout the organization to give you more and more information and uh yeah twelve twelve hundreds is is light i mean i there's some there's some that i've worked on that had essentially the main part of it had 1200 pages but the other they had we had to break it into different books because because the say the the hardware list and the software lists are so big that the those two things uh take up so much space and so it really needs to just be a database you know government projects just want their pages for the ato for the authority to operate yeah so true so that's why they get so so big because they want evidence that you basically are you're taking a picture of the posture of the of the system securities posture what is the security posture of this and what that means in layman's terms is what is the status how secure is your system right now right that's what the documentation is meant to do it's supposed to take a it's a picture very detailed picture of what the status of the status of the security is right now right it changes over time like it's constantly actually changing so that document the reason why i say a 1200 page document or more of a of a system security plan is ridiculous because it it's constantly changing like this week you have uh this version of windows and then next week you have another guess what your security package has to change technically it has to change like if you if you have different software operating system on there it technically you have to go through it and you got to change those little things and so all those copies you made and all those trees you burned down to get these to print out this phone book worth of of paper to give now that all has to change so yeah it's better on a database that's just my my humble opinion about it haven't done this for a while um let me see here um i asked a couple more questions and i i have to get out of here i actually want to do a really long session today but i actually have to go somewhere um one love usmc says hey bruce i have a top secret clearance and i have passed the security plus along with taking a risk management class and now i'm looking to be a security uh control assessor so for this you usmc i'm assuming you're in the military in the marine corps if you have a clearance and you've done some of this work before i would highly recommend that you change you you change your resume to reflect your risk management framework experience and any kind of security control implementation that you've done and if you've ever assisted in risk management if you've ever assisted with security control assessing uh you should put that on your resume and what i mean by that a lot of people who are in cyber security or in it don't believe that they have done any risk management framework or any kind of security compliance or any kind of security control assessing before but actually you have if you've done help desk if you've worked if you were the net network engineer guy if you were done firewalls if you've done if you've done any if you touched any of these systems especially in a large to medium environment more than likely you have some sort of risk management experience experience now a security com i should say security compliance experience because there's many different security uh compliance frameworks if you work in the federal government which i'm assuming you have because you if you if you have a ts clearance and you usmc i'm assuming you're a vet you're in the military act duty or whatever um i'm assuming you have federal experience which means you have some risk management framework experience and let me explain what i mean by that so if you have ever written a a procedure for your organization or some kind of a wiki page like a work instruction page if you've ever assisted with a policy if you've ever written anything about the security posture of a system then the security status of a system and that also includes if you've ever done any kind of scans those are can be worded to show how you've assisted the risk management framework process the risk management framework uh package because you don't know that you're helping but you are you if you're working on the help desk and you had to do us a procedure let me just explain what i mean by that if you've had to write a procedure a work instruction on how to say i don't know upload the gpo files on a system uh because all the other people on helpdesk need to know that information you wrote you helped write it or you wrote it yourself or whatever so how that helps risk management framework and security compliance is that me as an iso as an information system security officer i actually need that document because that document is part of our package we might reference it we might not upload it into our package but we might just reference it and say yeah so one of the ways that we do say access control ac2 for example which is access management i believe uh is that we control it via a gpo and we have a procedure procedure xyz that was probably written by yourself uh it explains how we control access to these endpoint devices and so you would want to put that in your resume like if you've ever written any kind of documentation for work instruction all those things are part of our system security plan and a part of our our total uh posture of our of our environment so you can actually say it depends on how you word it that you've written a document that has assisted in uh the risk management documentation so that might be a bit of a stretch but here's here i can give you a couple another uh another example security control assessor how could you say that you have assisted with security control assessments well if you've ever done a risk if you've ever done a scan using uh nessus or or whatever the flavor of the day scanner is in your environment you can you can say hey you know that you have helped to assess the vulnerabilities on the network because that's exactly what you're doing when you're running a scan one of the tools the main tools that security control assessors use is a scanner that's one of the things that they use so they and by the way security control assessors don't just scan they also have to look at documentation so if you've ever been asked to look at a policy to make sure that it's that is correct like technically correct if you've ever have ever had to look at a procedure and see that it was technically correct that is an assessment you're you're assessing whether or not this is this documentation that addresses a specific security feature on a system is accurate and you are com you are doing a self-assessment you are assisting with a self-assessment within the organization you could sounds like a stretch but i'm just telling you the tools of the trade for a security control assessor are scanning our scanners another thing that they do is they uh they look at documentation and they also conduct interviews and so if you've you're on help desk at what point would you have to conduct an interview let me see um when would you have to conduct help me out here when have you ever had to what do you have to talk to people when you're on the help desk you have to talk to you have to sit down and ask them specific questions about say security features you might have to sit down with a with a customer at the help desk if they bring a thumbnail a thumb drive or something like you have they ever brought a thumb drive to work or something like that or if they've ever have they read their latest um procedure on locking down their system or something like that you might want to put in there that you have had to interview certain certain people on the help desk because uh you specifically bitlocker was was an issue and so you had to go to every single person on the floor and say listen uh i need to know about what's going on with your bit locker have you ever have you done this procedure that you're supposed to do okay cool all right have you uh have you turned your system off we you need to turn it off before you leave because it has to reboot in order to update right you are interviewing this person with security questions you can put something like that on your resume and the reason here's why okay and it sounds crazy but here's why when you're a security control assessor you have to be able to interview people that's one of the things that that's one of the things that they do to to see what the whether an organization is meeting the security compliance right so one of the things they do is scan everybody thinks oh security control assessor they just scan no they don't they they scan that yes that's one of the things they use they that they do they do use those tools like nessus or whatever so you definitely put that on your resume but they also interview people they'll go to an organization one of the biggest things they do actually is interview people they go around they ask questions about the security of the system so you want to put those kinds of skills like yeah i i talk to clients and i i have to talk to clients about the security features of this system to make sure that we are in compliance with our organization's policy boom you can use those exact words on your resume they want to know that you if you have those skills that's a real good thing to to know um another thing that you can can talk about is you implementing security features if you have worked on the help desk you have definitely implemented security features you have for sure implemented security features you've you've um if you've ever put in username password if you've ever put in a multi-factor authentication if you've ever installed multi-factor authentication if you've ever uh i don't know updated sick virus signatures if you've updated a system hot fixes patches version releases if you've ever done any of that all that stuff should be on your resume implementation of security controls is very important because essentially if you're a security assessor especially if you're a technical security assessor and you've never implemented security controls how how in the world are you going to know what to even look for you know so you want to put those things on your resume so what i'm saying to you if you happen to be watching this video ever is that you want to take your current resume i'm assuming you're in federal government because you said usmc and you have a top secret clearance take your current experience and explain that you have helped write write process procedures before i know it sounds like a like who cares like yeah i wrote a procedure a year ago you know like in your mind it's like a small thing but risk management framework that that's you actually helped in you without knowing it you have helped the risk management framework process by creating that document because we need those documents to say hey see what we've got here we've got these procedures we've got these policies we've got this we've got that sometimes we reference those in our actual system security plan so i hope that you will take that as a word of advice something that i wish somebody would have told me many years ago and there you go let me move on to the next thing here um i think that that is about yeah i gotta actually get going here i got a party to go to um okay i'll read a couple more of these um i read i read a system security plan wait let me back up here back up back back back okay sas nino says what would you suggest for a small organization who probably can't afford to rely on a high end database to develop their ssp um yeah that's a great question sauce like i would say if you're a small organization like if you only have say 20 systems you know and you have like basically one program management system like you only have one package to do and it has 20 systems on it yeah that that's probably just a document that's probably just a doc that you can download from my site or somewhere else and then just modify that word doc and then and then you're good so what i was referring to when i say you know it's not a good idea to do i'm talking about a thousand page documents and those are those are normally because they're the organization has so many computers and so many controls you have to meet right and there's servers and these servers have a server client relationship with these end devices and you've got another server that manages all the access control like all of those are one system and and a hundred different people have access to all these systems and just that's why it gets really long if you have a small organization and you have like one computer i've i've actually done system security plans for one computer we're not going to set up a database with a backend for one system and that needs uh a system security plan we're not no so yet to answer your question for that you could just use a word document or an excel spreadsheet then that would be fine and then you could just supplement it with any kind of like oh here's the scan you know attach it to the document yeah that's fine zip it all up and boom you have a package yeah so that that's what i would recommend i've done them for two three system like this this is a very important system but it's a standalone device and it's got five systems on it yeah that's that's a that's a doc or or an excel spreadsheet right there and and that's that might be 30 pages long you know if if it's 50 pages you know you you've put you've stuffed a lot of extra stuff in there so so yeah you you totally could do that for a small system um i read a system security plan of a thousand pages for a company i read a system security plan for of a thousand pages for my for a company the company said i was the first one to fully to fully read it i'm ocd i put page numbers uh for my questions that yeah that's that's good man that's that's really good i what i normally i mean actually as a system security person the only people insane enough to actually go through these is us because we have to we have to go through them that's our job is to go through them but um what i meant from uh only a crazy person will read it is that a system security plan is some it's a document that's not just for cyber security people it's supposed to be for the whole organization right so your your execs your c level people have to at some point they have to touch this document even to approve it you've got privacy people who might have to look at it you've got assessors who might each one of those people only wants a small piece of this thing like the c-level execs and the and the managers those guys they only want to see like the all the main stuff with it like okay what's the overall risk right or what's my residual risk what what's my uh let me see the plan of action the milestone that's giving us problems they only want to see that one part that's causing grief right if everything if if they've got the go-ahead from the team they're probably going to just rubber snap it sign off and then they're done read the executive summary boom go off to the next topic you know and then you're who else reads it um your technical people they're not reading it i can tell you that for sure like if they're the firewall guy they're reading probably no part of that thing you know it's us who has to read it because we have to go through each one of the system security controls and we have to make sure all the um the eyes are dotted and the t's are crossed you know so we have to write it and we have to of course read it so and unfortunately a lot of times we're the only ones who actually read the all the way through and assessors aren't even going to read it they're just looking for prop mistakes which are easy to find um let me see professor black ops confirmed yes we did a spreadsheet um and grind it out yeah it sucks it's for a small company yeah i agree that's exactly um he says sauce nino says currently assisting a company with being nist 171 compliant everything is in word documents in excel spreadsheets yeah if it's a small company i can see that is that that must be for um what's 171 is that um continuous monitoring or am i wrong what is that uh time for me to learn something new 171 compliance hmm oh okay okay holy crap just got a little curious on that one okay um all right so guys i gotta get out of here thanks a lot thank you guys for watching appreciate it it's good to talk to other professionals about this kind of stuff i mean it's not really a lot of people talking about it so just us um all right guys i'm gonna let this go i got to i got a bounce um got a place to be but uh hopefully i can do this next week and oh by the way 171 deals with securing cui thank you sir thank you for that information learn something new every day i'm