We closely monitor our systems for suspicious activity and frequently test for vulnerabilities. Our staff are routinely trained on how to appropriately handle suspicious email and other threats to prevent unauthorized access or tampering.
More specifically, we have programs, policies, and plans in place to address and mitigate security breaches. We work with partners such as: the Department of Homeland Security (DHS), the Cybersecurity and Infrastructure Security Agency (CISA), the Elections Infrastructure Information Sharing and Analysis Center (EI-ISAC), the National Association of Secretaries of State (NASS), and the National Association of State Election Directors (NASED) to ensure best practices are used to protect our elections and their supporting systems.
We practice
Defense in Depth with administrative, technical, and managerial security controls. Layers of security controls provide several ways of monitoring and responding to malicious access attempts to our systems. Any successful access to our system has been reviewed by multiple security checks and verifications.
We routinely perform threat analysis and risk assessments. Assessments are conducted by internal staff as well as contracted third parties. As a result, we continue to improve security processes and protections to maintain secure, private, and accurate election infrastructure.
Preventative, Detection, and Response Measures
We use preventative, detection, and response measures including:
Risk and vulnerability management
Network and endpoint security
Continuous monitoring of systems
Incident management and response planning
Routine security training