CAIQ Byline Made Easy

Remove paper and improve digital document management for increased productivity and endless opportunities. Experience a greater way of doing business with airSlate SignNow.

Award-winning eSignature solution

Send my document for signature

Get your document eSigned by multiple recipients.
Send my document for signature

Sign my own document

Add your eSignature
to a document in a few clicks.
Sign my own document

Do more on the web with a globally-trusted eSignature platform

Outstanding signing experience

You can make eSigning workflows intuitive, fast, and efficient for your clients and employees. Get your paperwork signed in a matter of minutes

Robust reports and analytics

Real-time access coupled with instant notifications means you’ll never lose a thing. View statistics and document progress via detailed reporting and dashboards.

Mobile eSigning in person and remotely

airSlate SignNow lets you eSign on any device from any place, whether you are working remotely from home or are in person at the office. Every signing experience is flexible and customizable.

Industry regulations and conformity

Your electronic signatures are legally binding. airSlate SignNow ensures the top-level conformity with US and EU eSignature laws and supports industry-specific rules.

Caiq byline, faster than ever

airSlate SignNow delivers a caiq byline function that helps enhance document workflows, get contracts signed quickly, and operate effortlessly with PDFs.

Helpful eSignature extensions

Take advantage of simple-to-install airSlate SignNow add-ons for Google Docs, Chrome browser, Gmail, and more. Access airSlate SignNow’s legally-binding eSignature functionality with a mouse click

See airSlate SignNow eSignatures in action

Create secure and intuitive eSignature workflows on any device, track the status of documents right in your account, build online fillable forms – all within a single solution.

Try airSlate SignNow with a sample document

Complete a sample document online. Experience airSlate SignNow's intuitive interface and easy-to-use tools
in action. Open a sample document to add a signature, date, text, upload attachments, and test other useful functionality.

sample
Checkboxes and radio buttons
sample
Request an attachment
sample
Set up data validation

airSlate SignNow solutions for better efficiency

Keep contracts protected
Enhance your document security and keep contracts safe from unauthorized access with dual-factor authentication options. Ask your recipients to prove their identity before opening a contract to caiq byline.
Stay mobile while eSigning
Install the airSlate SignNow app on your iOS or Android device and close deals from anywhere, 24/7. Work with forms and contracts even offline and caiq byline later when your internet connection is restored.
Integrate eSignatures into your business apps
Incorporate airSlate SignNow into your business applications to quickly caiq byline without switching between windows and tabs. Benefit from airSlate SignNow integrations to save time and effort while eSigning forms in just a few clicks.
Generate fillable forms with smart fields
Update any document with fillable fields, make them required or optional, or add conditions for them to appear. Make sure signers complete your form correctly by assigning roles to fields.
Close deals and get paid promptly
Collect documents from clients and partners in minutes instead of weeks. Ask your signers to caiq byline and include a charge request field to your sample to automatically collect payments during the contract signing.
Collect signatures
24x
faster
Reduce costs by
$30
per document
Save up to
40h
per employee / month

Our user reviews speak for themselves

illustrations persone
Kodi-Marie Evans
Director of NetSuite Operations at Xerox
airSlate SignNow provides us with the flexibility needed to get the right signatures on the right documents, in the right formats, based on our integration with NetSuite.
illustrations reviews slider
illustrations persone
Samantha Jo
Enterprise Client Partner at Yelp
airSlate SignNow has made life easier for me. It has been huge to have the ability to sign contracts on-the-go! It is now less stressful to get things done efficiently and promptly.
illustrations reviews slider
illustrations persone
Megan Bond
Digital marketing management at Electrolux
This software has added to our business value. I have got rid of the repetitive tasks. I am capable of creating the mobile native web forms. Now I can easily make payment contracts through a fair channel and their management is very easy.
illustrations reviews slider
walmart logo
exonMobil logo
apple logo
comcast logo
facebook logo
FedEx logo
be ready to get more

Why choose airSlate SignNow

  • Free 7-day trial. Choose the plan you need and try it risk-free.
  • Honest pricing for full-featured plans. airSlate SignNow offers subscription plans with no overages or hidden fees at renewal.
  • Enterprise-grade security. airSlate SignNow helps you comply with global security standards.
illustrations signature

Your step-by-step guide — caiq byline

Access helpful tips and quick steps covering a variety of airSlate SignNow’s most popular features.

Adopting airSlate SignNow’s eSignature any organization can enhance signature workflows and sign online in real-time, supplying an improved experience to customers and workers. Use CAIQ byline in a couple of simple actions. Our mobile-first apps make working on the go achievable, even while off the internet! Sign documents from any place in the world and close up deals quicker.

Keep to the stepwise guide for using CAIQ byline:

  1. Log in to your airSlate SignNow profile.
  2. Find your document in your folders or import a new one.
  3. Access the record and make edits using the Tools menu.
  4. Drag & drop fillable fields, type text and eSign it.
  5. Include multiple signees by emails and set the signing order.
  6. Specify which individuals will get an completed version.
  7. Use Advanced Options to limit access to the document and set an expiration date.
  8. Tap Save and Close when finished.

In addition, there are more innovative features open for CAIQ byline. List users to your shared workspace, browse teams, and monitor teamwork. Millions of people across the US and Europe agree that a system that brings people together in a single unified work area, is the thing that companies need to keep workflows working easily. The airSlate SignNow REST API enables you to integrate eSignatures into your app, internet site, CRM or cloud storage. Try out airSlate SignNow and get quicker, easier and overall more efficient eSignature workflows!

How it works

Open your document and caiq
Create legally-binding eSignatures
Store and share documents securely

airSlate SignNow features that users love

Speed up your paper-based processes with an easy-to-use eSignature solution.

Edit PDFs
online
Generate templates of your most used documents for signing and completion.
Create a signing link
Share a document via a link without the need to add recipient emails.
Assign roles to signers
Organize complex signing workflows by adding multiple signers and assigning roles.
Create a document template
Create teams to collaborate on documents and templates in real time.
Add Signature fields
Get accurate signatures exactly where you need them using signature fields.
Archive documents in bulk
Save time by archiving multiple documents at once.

See exceptional results CAIQ byline made easy

Get signatures on any document, manage contracts centrally and collaborate with customers, employees, and partners more efficiently.

How to Sign a PDF Online How to Sign a PDF Online

How to complete and eSign a PDF online

Try out the fastest way to CAIQ byline. Avoid paper-based workflows and manage documents right from airSlate SignNow. Complete and share your forms from the office or seamlessly work on-the-go. No installation or additional software required. All features are available online, just go to signnow.com and create your own eSignature flow.

A brief guide on how to CAIQ byline in minutes

  1. Create an airSlate SignNow account (if you haven’t registered yet) or log in using your Google or Facebook.
  2. Click Upload and select one of your documents.
  3. Use the My Signature tool to create your unique signature.
  4. Turn the document into a dynamic PDF with fillable fields.
  5. Fill out your new form and click Done.

Once finished, send an invite to sign to multiple recipients. Get an enforceable contract in minutes using any device. Explore more features for making professional PDFs; add fillable fields CAIQ byline and collaborate in teams. The eSignature solution supplies a safe process and works based on SOC 2 Type II Certification. Make sure that all your information are protected and therefore no one can edit them.

How to Sign a PDF Using Google Chrome How to Sign a PDF Using Google Chrome

How to eSign a PDF template in Google Chrome

Are you looking for a solution to CAIQ byline directly from Chrome? The airSlate SignNow extension for Google is here to help. Find a document and right from your browser easily open it in the editor. Add fillable fields for text and signature. Sign the PDF and share it safely according to GDPR, SOC 2 Type II Certification and more.

Using this brief how-to guide below, expand your eSignature workflow into Google and CAIQ byline:

  1. Go to the Chrome web store and find the airSlate SignNow extension.
  2. Click Add to Chrome.
  3. Log in to your account or register a new one.
  4. Upload a document and click Open in airSlate SignNow.
  5. Modify the document.
  6. Sign the PDF using the My Signature tool.
  7. Click Done to save your edits.
  8. Invite other participants to sign by clicking Invite to Sign and selecting their emails/names.

Create a signature that’s built in to your workflow to CAIQ byline and get PDFs eSigned in minutes. Say goodbye to the piles of papers sitting on your workplace and start saving time and money for extra essential duties. Picking out the airSlate SignNow Google extension is an awesome convenient option with many different benefits.

How to Sign a PDF in Gmail How to Sign a PDF in Gmail How to Sign a PDF in Gmail

How to eSign an attachment in Gmail

If you’re like most, you’re used to downloading the attachments you get, printing them out and then signing them, right? Well, we have good news for you. Signing documents in your inbox just got a lot easier. The airSlate SignNow add-on for Gmail allows you to CAIQ byline without leaving your mailbox. Do everything you need; add fillable fields and send signing requests in clicks.

How to CAIQ byline in Gmail:

  1. Find airSlate SignNow for Gmail in the G Suite Marketplace and click Install.
  2. Log in to your airSlate SignNow account or create a new one.
  3. Open up your email with the PDF you need to sign.
  4. Click Upload to save the document to your airSlate SignNow account.
  5. Click Open document to open the editor.
  6. Sign the PDF using My Signature.
  7. Send a signing request to the other participants with the Send to Sign button.
  8. Enter their email and press OK.

As a result, the other participants will receive notifications telling them to sign the document. No need to download the PDF file over and over again, just CAIQ byline in clicks. This add-one is suitable for those who choose working on more valuable goals instead of burning up time for nothing. Increase your day-to-day routine with the award-winning eSignature platform.

How to Sign a PDF on a Mobile Device How to Sign a PDF on a Mobile Device How to Sign a PDF on a Mobile Device

How to sign a PDF template on the go without an mobile app

For many products, getting deals done on the go means installing an app on your phone. We’re happy to say at airSlate SignNow we’ve made singing on the go faster and easier by eliminating the need for a mobile app. To eSign, open your browser (any mobile browser) and get direct access to airSlate SignNow and all its powerful eSignature tools. Edit docs, CAIQ byline and more. No installation or additional software required. Close your deal from anywhere.

Take a look at our step-by-step instructions that teach you how to CAIQ byline.

  1. Open your browser and go to signnow.com.
  2. Log in or register a new account.
  3. Upload or open the document you want to edit.
  4. Add fillable fields for text, signature and date.
  5. Draw, type or upload your signature.
  6. Click Save and Close.
  7. Click Invite to Sign and enter a recipient’s email if you need others to sign the PDF.

Working on mobile is no different than on a desktop: create a reusable template, CAIQ byline and manage the flow as you would normally. In a couple of clicks, get an enforceable contract that you can download to your device and send to others. Yet, if you really want an application, download the airSlate SignNow app. It’s secure, quick and has a great design. Experience effortless eSignature workflows from the workplace, in a taxi or on a plane.

How to Sign a PDF on iPhone How to Sign a PDF on iPhone

How to sign a PDF having an iPhone

iOS is a very popular operating system packed with native tools. It allows you to sign and edit PDFs using Preview without any additional software. However, as great as Apple’s solution is, it doesn't provide any automation. Enhance your iPhone’s capabilities by taking advantage of the airSlate SignNow app. Utilize your iPhone or iPad to CAIQ byline and more. Introduce eSignature automation to your mobile workflow.

Signing on an iPhone has never been easier:

  1. Find the airSlate SignNow app in the AppStore and install it.
  2. Create a new account or log in with your Facebook or Google.
  3. Click Plus and upload the PDF file you want to sign.
  4. Tap on the document where you want to insert your signature.
  5. Explore other features: add fillable fields or CAIQ byline.
  6. Use the Save button to apply the changes.
  7. Share your documents via email or a singing link.

Make a professional PDFs right from your airSlate SignNow app. Get the most out of your time and work from anywhere; at home, in the office, on a bus or plane, and even at the beach. Manage an entire record workflow seamlessly: build reusable templates, CAIQ byline and work on documents with business partners. Turn your device right into a effective business for closing contracts.

How to Sign a PDF on Android How to Sign a PDF on Android

How to eSign a PDF taking advantage of an Android

For Android users to manage documents from their phone, they have to install additional software. The Play Market is vast and plump with options, so finding a good application isn’t too hard if you have time to browse through hundreds of apps. To save time and prevent frustration, we suggest airSlate SignNow for Android. Store and edit documents, create signing roles, and even CAIQ byline.

The 9 simple steps to optimizing your mobile workflow:

  1. Open the app.
  2. Log in using your Facebook or Google accounts or register if you haven’t authorized already.
  3. Click on + to add a new document using your camera, internal or cloud storages.
  4. Tap anywhere on your PDF and insert your eSignature.
  5. Click OK to confirm and sign.
  6. Try more editing features; add images, CAIQ byline, create a reusable template, etc.
  7. Click Save to apply changes once you finish.
  8. Download the PDF or share it via email.
  9. Use the Invite to sign function if you want to set & send a signing order to recipients.

Turn the mundane and routine into easy and smooth with the airSlate SignNow app for Android. Sign and send documents for signature from any place you’re connected to the internet. Create good-looking PDFs and CAIQ byline with just a few clicks. Put together a flawless eSignature process using only your smartphone and improve your general productiveness.

be ready to get more

Get legally-binding signatures now!

FAQs

Here is a list of the most common customer questions. If you can’t find an answer to your question, please don’t hesitate to reach out to us.

Need help? Contact support

What active users are saying — caiq byline

Get access to airSlate SignNow’s reviews, our customers’ advice, and their stories. Hear from real users and what they say about features for generating and signing docs.

I couldn't conduct my business without contracts and...
5
Dani P

I couldn't conduct my business without contracts and this makes the hassle of downloading, printing, scanning, and reuploading docs virtually seamless. I don't have to worry about whether or not my clients have printers or scanners and I don't have to pay the ridiculous drop box fees. Sign now is amazing!!

Read full review
airSlate SignNow
5
Jennifer

My overall experience with this software has been a tremendous help with important documents and even simple task so that I don't have leave the house and waste time and gas to have to go sign the documents in person. I think it is a great software and very convenient.

airSlate SignNow has been a awesome software for electric signatures. This has been a useful tool and has been great and definitely helps time management for important documents. I've used this software for important documents for my college courses for billing documents and even to sign for credit cards or other simple task such as documents for my daughters schooling.

Read full review
Easy to use
5
Anonymous

Overall, I would say my experience with airSlate SignNow has been positive and I will continue to use this software.

What I like most about airSlate SignNow is how easy it is to use to sign documents. I do not have to print my documents, sign them, and then rescan them in.

Read full review
video background

Caiq countersign

if you'd like to talk about anything from this presentation with an AWS staff member please come and find us at the AWS booth next up we are honored to have hugh barrett vp technical solution CISSP CSS LP tell us to share with us a case study on performing a security assessment of the cloud using the risk management framework everyone hear me okay all right like Alexa said I'm Hugh Barrett VP of technical solutions I work for Telus Corporation we're a partner with Amazon and I'm here to talk about performing security assessments of the cloud using tools best practices and the risk management framework so before I jump in you know my presentation is gonna be really revolve around the risk management framework and the MIS 853 set of controls but as I'm doing this keep in mind that you can substitute these controls with your own controls so what I'm gonna try and go through and I'll try and get through this within the 35 minutes that was allotted to me it set the stage when a chat about the risk management framework quick overview talk about air grant air gap regions assessment of the cloud some common control provider themes assessment of your workload and they want to talk about the exact the 360 tool which is a tool that Telos offers to kind of help automate this cybersecurity process now how many of you in here actually are in a cybersecurity discipline all right this will be of interest to you it's it's a boring topic but it's a necessary topic right so the risk management framework how I say this back in the States and I'm quite sure you all known from the States based on my accent but back in the States we have a couple of air gap regions the c2s region and the SC twist region those regions are owned and run by our government and these regions are not connected to the public Internet these regions were built by Amazon they're run by the government and we had to assess these regions meaning you know you always say Amazon talked about that their their regions are very secure from a government perspective that's great trust but verify we wanted to go out there and make sure that they were secured the way we wanted them to be secure and when I say we I'm talking on behalf of the government and on tell us so we're the you know we use the risk management framework to help us get through this and and I'm gonna I'm gonna run through the risk management framework and I'm going to talk about how we actually did this assessment to make sure that the region was secure and then talk about how we secure those things that are gonna go into the region itself so the risk management framework is anyone familiar with NIST and a risk management framework the risk management framework is a six step process it's a it's a it's a very good process you know it came out back in the early 2000s this needed to have a standard that could be used by the entire government right and the model was one government one standard and this opened the door up to reciprocity meaning that if one agency had a system in another agency wanted to use that system that agency should not have to go back and reassess that system right all done with the same standard everyone can accept everyone's results so the first step of the the RMF or the risk management framework was categorize your system and it's a very important step right this is where we ask the system owner to tell us everything about your system document the system gather information about the system tell us what mission that system supports things of that nature step two was tailoring your controls and applying your overlays and applying your inheritance right so in step 2 of the RMF you would determine what controls you're gonna use by determining what type of data your system processes step 3 how did your system in your application implement each control so they start step two you would pick let's throw out a number 855 controls as a system owner you had to go through and document how your system implements each one of these controls right we need to have that documentation so we have a way to validate whether or not you're meeting these controls step 4 assess the security controls at that point we have a group of individuals we call them Assessors they go out there and they look at how you documented how you implemented the controls and they go out and test it to make sure that your system actually does what it says it was gonna do right no difference then when you go through your typical application development life cycle step 5 was the risk risk management step right so the Assessor assesses your control finds out that something failed the risk executive would go out there and determine whether or not that failure was anything significant right and that person had the ability to say we're gonna accept this risk or you have to go back and fix this before we can deploy your system into the cloud or into your data center at that matter step 6 was continuously monitoring so after step 5 and you did your risk assessment they gave you the thumbs up you got your what we call your authorization to operate or ATO we would then continually monitor that system to make sure that it's meeting the same set of controls that it was meeting when we did the assessment right and we call that continuous monitoring so we use this process to assess and certify that the Amazon air gap regions that we have deployed for our government and the the section of the our government that was using these air gap regions was our intelligence community right we had to make sure that this thing met the controls and was secure enough for them to start putting their mission critical workloads into these into this cloud so just some more of the risk management framework and these are key some key words I'm not gonna really talk on this too much I want to get into the meat of the presentation but the risk management framework is made up of three simple words right or three simple key words confidentiality integrity and availability right so for every system in the government we ask you to tell us how how sensitive this day is this data right you had to pick three choices low sensitivity moderate sensitivity or high sensitive your confidentiality we also want to know what is the impact to the system if this particular piece of information got out to the public right so that's how you determine your confidentiality of the system the next thing we have to determine is in the integrity of the system right and the integrity again it's three simple values low moderate or high and integrity talks about how accurate is this data if somebody was to change this data would it adversely affect your mission or could affect your your health care or anything right and then we had availability again three simple values how available should this system be low meaning that if the system goes down the operation will still run not a big deal high availability mean if the system went down it was it was critical to the mission the mission could not continue and that's that's how you judge these three values right everything in the everything in the risk management framework is based on confidentiality integrity and availability so how does this work before I get into that there's a couple of slides I had I wanted to make a point here so in the nest meant in the risk management framework we have controls and some people call them requirements we call them controls when we started you had a control that's let's say c1 for instance and there were 10 things you had to do to test to make sure you meet that control right can you imagine if one of these tests failed do you meet or don't meet the control right that was the problem we were having so we decided to take that then this regulation we broke it down a little further so we got rid of the AC one control and we broke it down into four different controls right how many of you ever had to read any regulations and they said well make sure that your system does this and does this and does does this right that was - that was too vague right we needed to something I said make sure your system does a and the next one said make sure your system does B and we have test procedures on how to validate that so now it was easier for us to say if you fail a c1a1 you're good you passed on the other three AC 181 was not very critical you can still pass that control right so we took it to a different level of granularity just so we can get that type of detail in our risk assessment so this matrix represents how the how the RMF was was used and how it works and how these confidentiality integrity and availability allow you to pick your control so every single control and again you can replace these miss controls with your own controls right every single control has a value as to confidentiality integrity and availability right so if you see X anywhere you see X anytime your confidentiality your integrity or availability has that particular value this control was applicable to your system right everyone following that so it's it's a mechanism or a formula for you for us to pick controls the next thing we did in the RMF is you didn't have to identify all the different data types such as system processes right does your system process you know first name last name address does it process personal identifying information does it process financial information you know does it process you know counterintelligence data right and you have to determine how important that particular data is based on confidentiality integrity and availability again right so you see those three words show up a lot so if my system was processing financial data the confidential confidentiality of that data was moderate the integrity of that data was low what's excuse me was high but the availability was low which means if the if the financial data wasn't around business could continue as usual right if the financial data was altered in any way it could have an adverse effect against my business so that's how that was laid out and that's how we were determined how we determine the pick controls with the risk management framework now I know you all in your government probably don't use the 853 but you could take your set of security controls and apply them to the same formula and be able to identify which controls you should deal with depending on the confidentiality integrity of your system right there's another thing in the risk management framework is called an overlay and overlays are very important so I spoke about reciprocity right so if you are your if it's your Department of Defense along with your intelligence community along with your health and human services divisions all of you using that the RMF framework to do your assessments but the defense folks there's a set of controls that are different for them so they would have a defense overlay which they can apply to the controls which will alter the controls based on Defense Health and Human Services may have to apply the privacy overlay right because you don't want your healthcare data being leaked out to the public so there's another set of overlays that I'll show you how to better protect that data but it's all based on the baseline of the C ima values right so we have those as well and then we have the common control providers right now this is usually associated with enterprise systems and you're gonna see how we use that to actually accredit the Amazon air gap regions that we use back in the States but a common control provider allows you to quickly do assessment so you always like to use the example of a DNS server that you can use to help authenticate and find hosts and so on and so forth if your system is utilizing a DNS server and the DNS server was already assessed then there's no need for you to reassess that inherit those controls and get the get the benefit of what that group did and then you know you just move on so karmic control providers we reduce the amount of work associated with your assessment it's a huge time saver right so the whole idea is if if you go through these steps that I just mentioned as you're going through the RMF and RMF risk management framework at the end of the day you'll have a list of controls that you need to assess your system against this time to be the screen from our product that shows you all your applicable controls and shows you what overlays are available for you so now let's let's touch an isolated region like I said before there were two isolated regions that we had in the states right one was our seat to us and one was the SC to us top-secret region secret region we got called in by our government to help them assess the SC twist right they wanted to start up another air-gap region Amazon set up the data center or set up the cloud and they don't have to assess it right like I said before trust but verify Amazon said their regions are very secure the government says yeah but I need to check it anyway so they call us in and they said we need help doing this assessment and the reason they call us in was the first time they assessed the one that had the checkmark air-gap cloud one it took them almost two years to get through that assessment right now they're starting up a new air gap region and they did not want it to take two years matter of fact they only had four months to get it done and they know they couldn't do it manually because the manual way was to take those charts and those matrices that I showed you and put them into a spreadsheet and use spreadsheets in a Word document to try to get this this assessment done so they call us in and you know before I go so is everyone here familiar with an air gap region is does anyone not familiar with what an air gap region is okay I should have asked a negative question so an air-gap region is everybody's familiar with Amazon Cloud right okay just check it so the the Amazon Cloud that you're used to use it is not an air gap cloud right you can get into your browser log on to the hotel Internet you can access your ec2 instance up in the cloud right in an air-gap region you can never do that that region is not connected to the Internet physically disconnected isolated region and it's done for a reason right the the owner of that region or I should say the the person who leases that region because Amazon owns that region they have complete control over who has access to it right complete control over what workloads go into that region they have the ability to enforce a process for vetting any workload that's going into that region and they have the ability to take advantage of all the AWS cloud off what the AWS cloud has to offer and I can tell you I don't know about the Singapore government but the US government if I wanted to stand up an application and it required me to get to servers that could take six months right just to get the two servers and then it could take another six months to get them to approve my application you know with the cloud I fibrin ec2 instance I load up my application I put it through the assessment process and I'm up and running that's one of the beauties of the cloud and the fact that it's air-gap and it's owned by an agency they have a lot more control they can they have a lot more freedom into allowing you to start up and shut down these regions this excuse me these instances so in doing the assessment we realize like I told you before the first cloud took a couple of years the next cloud could not take that long so we have to use some automation so that like I said they came to us they said hey we need your help we have a tool exactly 360 and another tool called exactly continuum these tools are designed to take in any one standard international standard domestic standard anything and what run that standard through an assessment process and come out at the end with a risk assessment fully baked so they needed to define a process because it the first time they did it there was no process they needed a way to enforce that process they also need a way to collaborate with Amazon in doing this compliance of that cloud they need to apply risk management they wanted something that would apply the risk management framework and then support multiple standards right believe it or not before before the risk management framework came about from this a lot of the different agencies and the government was using different standards very hard to move systems around when somebody's accession against ISO the other person is assessing against you know diskette somebody else's accession against the RMF so we support the multiple standards we map all those standards together but it was a lot easier when it's when it's just one standard and support multiple standards one more thing I want to say about that in our product we have a way to map standards so if I was to do an assessment using the RMF framework and I had to give you that assessment and you're using the Singapore regulation we can map those regulations one to one and you can take my assessment and it'll get applied to your set of controls and you can just look at how things stack up against your regulation versus the the regulation that's we're using very powerful feature used a lot by several of our agencies just so they can it they can achieve what we call reciprocity right so what do we have to do to assess this new cloud region that was coming online right the air-gap region and everybody remember what air gap means now right so we had to get detailed documentation of the region so we had to go out to amazon and amazon had to tell us everything about the region if you went to Amazon and asked them that question they're probably tell you to drop dead right but you know when you're waiving hundreds of millions of dollars they detailed it they gave us detailed document about the region a categorization of the data that will be processed we sat down and we said okay here's all the data that will be processed in this region you know intelligence data data targeting data XYZ data and we identified every single data and we use what they call the NIST 860 to identify the CI and a values of each of those individual data types that took some while but we got through it then to select the controls and overlays based on that CIA value we were able to select all the controls and they came up to about 855 controls that we had to then assess against needed a detailed description of how the air gap region met each control so we sat with Amazon and Amazon start with their service team and they for every single control how do you handle passwords they documented how to handle passwords how you do handle the encryption they documented how you're handling Chrisman's how you handled kms keys who gets to do that you know all of that was laid out for us something that they would normally not tell you know an average person right because that's their that's that's Amazon proprietary information and we have to treat it as such right so we don't go talking about that but we needed that because we had to verify that what they told us was how things work so for each implementation then we had to independently assess to make sure that what they said it it did it actually really did and then we had the the government leadership had to go through and look at any areas any areas where there were deficiencies if there were any and determine whether or not they wanted to accept the risk or have Amazon fix the problem so that they can get the region to a point of a secure level so you know we went through those steps and like I said we we got through this assessment in roughly about four months of an entire region so with that you know I I can stand up here and tell you that amazon's regions are very secure because we didn't find anything right so the way we did it so you know we looked at the amazon infrastructure and we applied all those controls and we assessed everything about the infrastructure the buildings you know the the the power the air conditioning is there a guard at the front is the guard have a gun is there a guard dog we all that we went through and we came up with about 856 controls that we had to test for that infrastructure layer of amazon right after that we generated what we call a security package and a security package is just documentation about how the region stacks up from a security perspective how it met each of the controls which ones it passed which ones it didn't pass what were the risks so on and so forth after we got the infrastructure layer done the next thing we had to do was identify out of those 856 controls how many of those controls actually could be inherited right so for instance I don't know if any of you ever seen in Amazon data center they're pretty impressive there's a there's a bunch of controls in the NIST framework called physical controls right and these are things like this they're a camera outside the building or the camera is X amount of feet apart you know is there a cooling system is there a backup powers there regardless all the physical controls right anything you would expect from any data center where you're gonna put your workloads so we identified controls similar to that and we would say ok if you're gonna put your workload in the Amazon Cloud you don't have to worry about power cool in space because they take care of that so that's something that's a control you can inherit and use right away right so if your application has to meet the PE controls you're done Amazon did them for you you get him for free after we went through and did all the all the analysis of the encroach controls after we did the assessment of that infrastructure layer of Amazon we came up with about 737 controls that were inheritable right that's great news and you and you'll see why the second part of the assessment we had to now assess all of the different services that we're gonna go into this air gap region right and when I say services I mean things like I am ec2 you know V PC directory services workspaces all those are services right consumer-facing services well not only did we have to assess the infrastructure we had to assess every single one of those services individually against the same 856 controls right because we determined that we wanted to be at this particular security level with the cloud because these are the different data types that we were going to be putting in the cloud so 850 6-7 37 so for each one of the services instead of having to go through and do 856 controls we only had to do 119 controls because the other 737 controls we inherited from the infrastructure right so although it took us let's say it took us two months to assess that infrastructure layer it took us weeks to do each of the services because now we were only responsible for 119 controls right and again in your own environment we place our controls at your controls but the same formula the same technique works and then we had the security packages and that was all the security assessment of the cloud right now all of those security packages made up what we call providers right provider project so now when you want to put your workload in the cloud we identified from each of those services which controls they can share out to workloads so when you do your workload your consumer workload now inherits that right and I hope you know I would hope that every one of you if you're gonna put a workload in cloud you would go through the you go through the drill of determining whether or not that workload is of any security risks right and you should take it through an assessment of its own but anytime there is a control that Amazon is providing for you that Amazon said it's already good is a control that you don't have to do right so then we had to go back and implement the Amazon shared responsibility model and that shared responsibility model says that Amazon will take care of a piece of the security and you have to take care of a piece of the security and that's what this was all about right the black layer is Amazon taking care of their partner's security and the blue layers you taking care of your part of it right so now when you're assessing your workload to put into the cloud if you notice the steps to assess the workload is is really no different than the steps we went through to assess the cloud itself right should be no difference you're following one standard everybody's marching to the same tune again so now instead of starting with the Amazon infrastructure you're starting with the Amazon consumer services right you're putting a workload infant into the cloud you're gonna utilize ec2 you may utilize I am you may use kms because you're doing some encryption then you have your your workload and these are the services that your workload is utilizing right I am s 3 RDS workspace and so on and so forth these are the actual controls that your your workload is gonna be assessed against and these are the controls at Amazon from a consumer perspective is providing to you right and the number of controls that you inherit varies from from East from service to service like if you had a requirement where your system has to make sure it or it's XYZ cloud trail that's audited for you right so part of the ordinate is done by cloud trail and your system has to do their part of the audit in so those two together you know it identifies a shared responsibility model and then you have your security baseline for your workloads then we go into continuous monitoring right in a way we do continuous monitoring there's a bunch of tools that are out there we had our continuum tool remember I mentioned that earlier that tool allows us to pull in things like your Nessus scans app detective web inspect all that comes in to continuum continuum sends that over to our other exact 360 tool and it starts continually monitoring these controls so you know exactly can go against cloud trail it can go against you the I am laws it can look at your easy tools it can make sure that all of your settings and configurations are the way they should be based on your initial assessment and we just keep monitoring that and if anything changes we'll alert you but more importantly we will update documentation for you right when you're using when you when you when you using our tool documentation is not something you should worry about but when you're doing an assessment your auditor is the first thing they want to see is the documentation right so when you have an automated tool when they say I want to see the documentation that's when you go back and you push the button and it just generates the documentation for you other than that you shouldn't generate that documentation if you want to know which controls are failing you go into your automated tool you run the Phil you know control report and it gives you a report right so I'm gonna take the last six minutes and talk about our product because it's a tool you should use when you're using this right away exactly 360 right everything I just talked about it supports matter of fact it was the tool that we use to do the assessment like I told you before when the government did their assessment of the first cloud they didn't use this tool it took them two years when they did the assessment of the second cloud they use this tool it took them four months right easy math I won't even do it because I probably can out the box exactly supports a lot of international standards ISO NIST cybersecurity framework you name it I mean literally we take controls and we apply controls to assets and we tell you where it where you're failing or not failing controls it's just a couple of walk through some screens so that you can see it right you remember I talked about the information types or your data types where you have to identify what type of data your application is is processing we have a list of them here right and the RMF has a documentation set that lists all of the different data types and what they perceive the CI and a value should be you can change this if you want control sets we allow you to pick which controls you want to use right now for us since this tool is being used for US government purposes we have US government regs in here but if you look at our library of control of regs we have 256 different regs we have ISO cybersecurity framework we have Defense regs intelligence regs HIPPA for health care a lot of different regulations are built into it here you have an inheritance questionnaire can you imagine if you're gonna put a workload in the cloud and you have to just all you have to do is go through and say oh yeah I'm using ec2 I'm using I am and we just automatically say here the controls that Amazon is gonna give to you and here you don't have to worry about them that's what this does for you and then we we have an automated screen that allows you to document how you're implementing these controls and we have a screen for the Assessors the person that's gonna go out there and test and validate each one of these controls they can go into the tool go through each control look at all the information that you put in and then determine whether or not you pass or fail that control very important important piece that has to be done right and we go through a lot of other things if you want to really see how this works and talk more about what we have done we have a booth across the hall in the Expo Center stop by we can chat for those of you who are interested in the RMF and like I said before I know I know a lot of people say hey well you know that's the u.s. standard we don't want to use it remove our controls and put your own in there and that framework actually is so granular it actually gets to the meat of where the the problems are when you're trying to assess a system so these are the documents that that make up the RMF the ones that you know if you if you really want to learn more about what I was talking about read through these documents do the 37 which talks about the framework the 53 which is all the controls and I can tell you I've seen a lot of controls your controls our controls you know the controls in Canada the controls in mechs are say the same thing right passwords ought it pick up you name it so it's a controllers of control and you have the 860 which is the which is the document that is of a lot of interest that talks about how you categorize data that the system is going to process and if you know what data your system is going to process you can better understand what controls and astringent of those controls that you need to apply to that system right you know a lot of people will tell you that this is a a pretty you know drawn-out tedious process it's not the sexiest part of the cybersecurity discipline but it's probably the most necessary right as any of you ever been hacked any of your systems haven't been hacked before I won't ask that question again you know when a system gets hacked the first thing the first thing at least in the States the first thing we do we go to this type of data to find out what controls were levied which ones that it didn't pass which ones were risk accepted which ones had outstanding mitigations that needed to be done because when that happens we we need to go back there to find out where we are and more importantly we need to find out what mission that system was serving right if that system that got hacked was you know if it was our missile targeting system that's something you need to deal with right away if the system got hacked was the system down in the you know Department of Defense Jim where the soldiers work out we can let that one sleep for a little while and we'll get to it whenever we can so it's good to have this type of data right any developers in the room so you know you probably will not do probably wouldn't write code if they didn't give you the extra quirements written down would you the same thing holds true you know you wouldn't want to set assess a system or put a system into your network without understanding all of the details about that system so that was my last slide again I know I went through this very quickly if you have any questions come across the hall where there we can we can chat with you and give you a demo explain the RMF in more detail to you right thanks a lot [Applause]

Show more

Frequently asked questions

Learn everything you need to know to use airSlate SignNow eSignatures like a pro.

See more airSlate SignNow How-Tos

How do I eSign a document before sending it?

airSlate SignNow allows document authors to eSign before sending it and even add signature fields for recipients if needed. Just upload your file, open it and create respective signature fields: My Signature to self sign a document and Signature Field to collect signatures. For self signing, you’ll need to generate your own eSignature. To do so, just apply the My Signature element and follow the instructions and either type, draw, or upload your signature. Once you like what you’ve generated, click Sign. After that, assign signature fields to recipients, add their emails, send it out and wait. Once everyone has signed, airSlate SignNow will automatically send each party an executed PDF copy.

How do I sign a PDF from my email?

airSlate SignNow provides powerful add-ons so that you can conveniently sign documents right from your Gmail inbox. With the help of the Gmail add-on, you can eSign attachments without leaving your inbox. Find the application in the G Suite Marketplace and add it. Once you’ve added it, log in to your airSlate SignNow account and open the message containing an attachment that you need to sign. Click on the airSlate SignNow icon in the right-hand sidebar menu and choose the attachment you want to sign. Quickly apply your eSignature in the editor and save or send the document to recipients.

How do I sign something in a PDF?

Find specialized services to complete this task. Usually, you have to transform your sample into a file in Portable Document Format and then create a signature before applying it. Using airSlate SignNow, it’s a much simpler process. It automatically converts text (DOCX, RTF, TXT), presentations (PPT, PPTX), and images (JPEG, PNG) to PDF so that you eSign anything you need without hassle or delay. Just open the file with airSlate SignNow, select the My Signatures tool and place your unique eSign where you want it.
be ready to get more

Get legally-binding signatures now!