CyberWire Daily - Two viewpoints on the National Cybersecurity Strategy. [Special Edition]

Episode Date: January 21, 2024

Earlier this month, the White House released the National Cybersecurity Strategy, the first issued since 2018. The strategy refocuses roles, responsibilities, and resource allocations in the digital e...cosystem, with a five pillar approach. Those pillars are: defending critical infrastructure, disrupting threat actors, shaping market forces to drive security and resilience, investing in a resilient future, and forging international partnerships. We wanted to delve into the strategy and its intended effects further, so Dave Bittner spoke with representatives from industry and inside government. Dave first speaks with Adam Isles, Principal and Head of Cybersecurity Practice at The Chertoff Group, sharing industry's take on the strategy. Following that conversation, Dave had a discussion with Steve Kelly, Special Assistant to the President and Senior Director for Cybersecurity and Emerging Technology at the National Security Council, for a look at the strategy from inside the White House. Links to resources: Point of View: 2023 National Cybersecurity Strategy The Chertoff Group's blog National Cybersecurity Strategy 2023 Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript
Discussion (0)
Starting point is 00:00:00 You're listening to the CyberWire Network, powered by N2K. Calling all sellers. Salesforce is hiring account executives to join us on the cutting edge of technology. Here, innovation isn't a buzzword. It's a way of life. You'll be solving customer challenges faster with agents, winning with purpose, and showing the world what AI was meant to be. Let's create the agent-first
Starting point is 00:00:30 future together. Head to salesforce.com slash careers to learn more. This episode is brought to you by RBC Student Banking. Here's an RBC student offer that turns a feel-good moment into a feel-great moment. Students, get $100 when you open a no-monthly-fee RBC Student Offer that turns a feel-good moment into a feel-great moment. Students, get $100 when you open a no-monthly-fee RBC Advantage banking account
Starting point is 00:00:49 and we'll give another $100 to a charity of your choice. This great perk and more, only at RBC. Visit rbc.com slash get 100, give 100. Conditions apply. Ends January 31st, 2025. Complete offer eligibility criteria by March 31st, 2025. Choose one of five eligible charities. Up to $500,000 in total contributions.
Starting point is 00:01:23 The Biden administration recently released their National Cybersecurity Strategy, which, in their words, aims to secure the full benefits of a safe and secure digital ecosystem for all Americans. In this CyberWire special edition, we speak with two special guests about the National Cybersecurity Strategy. Adam Isles is a principal at the Chertoff Group, the security firm founded by former Secretary of the Department of Homeland Security, Michael Chertoff. Previously, Adam served as the Deputy Chief of Staff at DHS. Our second special guest is Steve Kelly. Mr. Kelly serves as Special Assistant to the President and Senior Director for Cybersecurity and Emerging
Starting point is 00:02:05 Technology with the National Security Council. We begin with the Chertoff Group's Adam Isles. There is very loudly and clearly an emphasis on a fuller use of existing regulatory authorities and maybe the need for some new regulatory authorities to apply a set of kind of minimum expected cybersecurity practices across critical infrastructure sectors. There's a sense that what's historically been largely a voluntary approach isn't generating the outcomes that we need to defend the country and make it cyber resilient. And so what we're seeing here is certainly a focus around we have existing, whether it's safety or security regulatory authorities, let's make sure there's a
Starting point is 00:02:52 cyber component to those. And in fact, right, we saw not even a day after the cybersecurity strategy was released, the Environmental Protection Agency come out with new guidance to state EPAs basically saying, when you're doing inspections of public water systems, here's what you need to be asking about from a cybersecurity perspective. And I expect we'll see that trend kind of percolate across into other regulatory agencies as well.
Starting point is 00:03:24 I mean, TSA has already come out and announced, and they haven't divulged the specifics of it, but an emergency amendment to aircraft and airport regulations to add in additional cybersecurity expectations. I think something that's caught a lot of people's eye is this notion that we're going to see an emphasis on liability for software. Yes. And again, this is not a new thought, but it is the administration saying in a formal way, you know, we stand behind this.
Starting point is 00:03:56 I mean, the Cyberspace Solarium Commission talked about it. You know, you can think about, you know, even, you know, news items over the last days and weeks around, you know, the kind of the dumping of last pass password files or, you know, the zero day, you know, vulnerability and outlook of security technologies, is to be designing their systems to be secure by design. And to incentivize them to do that by having them own more of the liability, if for whatever reason they are. The interesting thing in this space is there are lots of compliance frameworks that are out there and best practice frameworks. And we think in the context of federal agencies around things like NIST special publication 800-53, when we're thinking about compliance frameworks that are well-known in the private sector, we think about ISO 27001, SOC 2. Those frameworks don't really necessarily get to the level of detail on what good software lifecycle security practices look like.
Starting point is 00:05:11 And so we're talking about a potential liability shift coupled with, well, let's think about what a modern software security lifecycle framework looks like. And let's try and get people to conform to that. And so you see, coupled with this idea of liability shift, also the focus around using procurement authorities to try and drive, for instance, the software providers that are selling to the federal government to kind of attest to conformance with a framework like the SSDF. I found it interesting, perhaps in the spirit of not letting the perfect be the enemy of the good, that there's talk of having some kind of a safe harbor provision in here. Can you unpack that for us?
Starting point is 00:06:00 Yeah, I think, look, I mean, it's a great question, right? Because the safe harbor provision is almost conditioned on, well, there will be an incident, right? I mean, there is no such thing as risk elimination. When you've got criminal minds, right, the day we end cyber threat actors is the day we end crime. And so the question is kind of, you know, what's reasonable? What's good enough? You know, this, again, I think is where you may see the flip side of something like, you know, how the SSDF, that is the NIST Secure Software Development Framework, could be used not only to set a kind of a minimum expectation, but also to say, if you've aligned to this, and particularly if you've had someone validate that you've aligned to this, will, you
Starting point is 00:06:47 know, will that be a kind of a safe harbor? I mean, we've seen that in a privacy context, you know, with HIPAA and the anonymization of PII for research purposes. We've certainly seen, you know, kind of a safe harbor equivalent in the form of the Safety Act, you know, that's been in place at DHS for 20 years, you know, to provide some level of liability protection for people that provide anti-terrorism capabilities. You know, it'll be interesting to see how this all plays out. To what degree does the Biden administration have the ability to execute on these plans themselves, you know, through the existing regulatory agencies? And to what degree will they have to go and ask for cooperation from Congress?
Starting point is 00:07:32 Yeah, so on the one hand, look, to have, I mean, the Safety Act, DHS, took an act of Congress to put in place. On the other hand, the administration has a pretty, I mean, any administration has a pretty fulsome set of enforcement authorities, you know, particularly vis-a-vis, you know, for example, people are selling goods to federal agencies. And so I think what you may see is the use of existing authorities to say, you know, if you don't do this, you know, this is going to be, you know be evidence of a failure to align to minimum practices. And we'll be thinking about it in the context of things like the Department of Justice's cyber civil fraud initiative, where they're going after federal vendors with substandard security practices. And so you may also see it, to your question on the safe harbor around, And so you may also see it, to your question on the safe harbor, around if you have conformed to this software security framework, particularly if you've had it validated, that will be kind of prima facie evidence that would militate against an enforcement action.
Starting point is 00:08:46 So you've got both, if you will, the stick and the carrot at play through the use of existing authorities and a statement around forbearance as well. So what are your recommendations for organizations? Now that we have this statement of intent from the Biden administration, how should they be preparing themselves for what's to come? So I think we've got a bucket of organizations into three categories. Category one would be the providers of software. Category two would be critical infrastructure operators. And category three would kind of be everyone else. So for the first category, for providers, if they're not already, they need to be understanding the NIST secure software development framework
Starting point is 00:09:20 and conducting readiness assessments on do they actually conform to it. They need to be also thinking about the software-built materials concept and a responsible disclosure of vulnerabilities, which are related concepts and how they might eventually implement those. If you're a critical infrastructure operator, you need to be thinking about, okay, well, what regulatory expectations do I have to meet now in kind of a physical security or food safety context that I may be staring down a future set of cyber questions? I mentioned earlier the example of public water systems and airlines and airports. I think you're going to see that more broadly across the critical manufacturing sector.
Starting point is 00:10:03 airlines, and airports. I think you're going to see that more broadly across the critical manufacturing sector. So the strategy refers to something called the cyber performance goals that were released by the U.S. Cybersecurity Infrastructure Security Agency in December of last year. If I were one of those companies, I'd be familiarizing myself with the CPGs because when EPA put out its guidance, it basically copied SIS's cyber performance goals almost whole hog into the guidance that went out to state EPAs. For everyone else, I'd be looking at these new kind of expectations from the point of view of what does it mean for me. And so if, for instance, I'm a retailer, I'd be looking at what's happening in the software space from the perspective of being a purchaser of software. So how can I take advantage of the NIST Secure Software 11 framework
Starting point is 00:10:52 to improve my own third-party risk management program? Or how can I look at the cyber performance goals as maybe instruction on what emerging best practice for defending my own environment against cyber attacks may look like, even though I'm not regulated itself. So that's what I'd be doing. As you look at this, I'm curious on your personal take on it. I mean, was there anything in here that surprised you, either in its inclusion or it being left out?
Starting point is 00:11:22 How do you feel about it? Well, so in terms of surprises, there was this reference to an executive order that President Trump signed literally on his last full day in office that imposed know-your-customer expectations on cloud infrastructure providers. And so not only did the strategy reference it, it kind of embraced it and basically warned, you know, other internet infrastructure providers, you know, domain registrars, you know, hosting providers, email providers, that they may be staring down, you know, a set of KYC requirements
Starting point is 00:11:54 in the future themselves. And I think that's interesting, right? Because you've got, you know, threat actors historically, you know, using, you know, domain registration, domain registration algorithms, other forms of internet infrastructure to kind of cover their tracks. And so I think this is an attempt on the administration's part to try and shed some transparency on that. I think the other thing that will be interesting is for everything we're talking about here, what is our diplomatic strategy on all of this stuff? So it's great that we're doing these things here, but to what extent are we talking to our allies, Canada, the UK, Australia,
Starting point is 00:12:31 about aligning to similar standards, taking similar actions? Do you think in some ways we're lagging behind? I mean, we often get dinged for not having privacy legislation in place a la GDPR. Yeah, look, I think we're leaders in understanding the problem. I don't know that we're all leaders in doing something about it. The European Union, right, has had the NIS directive in place for some period of time. You know, their GDPR has been in place since 2018, and we still don't have, you know, a kind of a national set of, you know, baseline privacy practices that are codified in law. So I think it's, you know, in part, right, there are larger issues in terms of, you know,
Starting point is 00:13:19 realistically what can be accomplished in Congress. You know, thus, you know, earlier conversation around what you can do with existing authorities. So I think, but I also really think we should be, you know, apologetic about looking to best practice in terms of what other countries have done. And I think that, you know, the work, for instance, that the UK has done, the guidance that comes out of the National Cybersecurity Center there has done, the guidance that comes out of the National Cybersecurity Center there is very much something we should embrace. I think that the testing requirements, the threat-based testing requirements that Britain's Prudential Regulatory Authority requires, I think are things Transat presents a couple trying to beat the winter blues. We could try hot yoga.
Starting point is 00:14:14 Too sweaty. We could go skating. Too icy. We could book a vacation. Like somewhere hot. Yeah, with pools. And a spa. And endless snacks.
Starting point is 00:14:23 Yes! Yes! Yes! Yes! With savings of up to 40% on Transat South packages, it's easy to say so long to winter. Visit Transat.com or contact your Marlin travel professional for details. Conditions apply. Air Transat. Travel moves
Starting point is 00:14:38 us. Cyber threats are evolving every second, and staying ahead is more than just a challenge. It's a necessity. That's why we're thrilled to partner with ThreatLocker, a cybersecurity solution trusted by businesses worldwide. ThreatLocker is a full suite of solutions designed to give you total control, stopping unauthorized applications, securing sensitive data, and ensuring your organization runs smoothly and securely. Visit ThreatLocker.com today to see how a default
Starting point is 00:15:12 deny approach can keep your company safe and compliant. Our second special guest is Steve Kelly. Steve Kelly serves as special assistant to the president and senior director for cybersecurity and emerging technology with the National Security Council. What we've experienced in the past is that building a complex software product like an operating system, for instance, is incredibly cumbersome. It involves an incredible volume of code that's being written and assembled. Creating secure software is no easy feat.
Starting point is 00:15:58 We recognize that. This administration, under the executive order that was signed early on, 14028, doubled down on making sure that we have secure software development practices being used in creating software that the government is buying for its own uses. And that includes things like some foundational work done by NIST on creating secure software development practices and standards around that. And then also making sure that we've got transparency into what components are in software. Because a software maker doesn't just write brand new code. Oftentimes there are components that are borrowed and adapted from other places, including open source software projects.
Starting point is 00:16:42 And so it's important to make sure that you understand what's under the hood in a software product and that all the pieces that are in there are being updated and security flaws are being addressed over time. And so one thing that has been problematic in the past, especially for small users and small businesses, is that when you purchase a software product, you click through an end-user licensing agreement, which in many cases, waives your ability to seek redress if there's a flaw in the product and it causes a harm.
Starting point is 00:17:19 We want to make sure that the software makers are using all of the industry standard best practices for creating secure products. And that as a result of that, that would create kind of a liability safe harbor for them. And so we want to encourage people to use best practices in creating software products from the start. And to do all the right things to make sure that these products are as secure as they can reasonably be at the time of their release, and that over time, that those products are being patched and maintained in an appropriate way. That's the theme behind that section. And frankly, it's a strong message, and it's caused a lot of interest and concern by some. And it's kind of an opening of a conversation on how do
Starting point is 00:18:05 we make sure that our software products are safe and secure by design and that they are maintained over time and that helps to manage. That's one big piece of managing the nation's risk. To what degree do you think the administration considers this to be a collaborative process between themselves and other government organizations and private industry you mentioned that that this could be a you know an opening of a conversation well it clearly is a collaboration i mean that the most of the infrastructure most of the software that's written most of the telecommunications networks are are being uh created and maintained and are owned and operated by the private sector. The government has the ability to influence the marketplace through its own purchasing.
Starting point is 00:18:55 And so you've seen that as a major theme in the first half of the administration, where we're trying to make sure that the products and services that we buy are safely secured by design. And we think that that will actually make products safe for everybody, even those that aren't government purchasers. As well, we have a commitment to making sure that we are working with industry to share information that we have about what the cyber threat actors are doing so that they can better protect themselves. that we have about what the cyber threat actors are doing so that they can better protect themselves. And then also understanding that the space that these product manufacturers are operating in is a global environment. We want to make sure that the work that we're putting on
Starting point is 00:19:38 these products or the ideas that we're trying to get into industry will actually make their products more secure and more marketable globally. So I'll give you an example of that. The White House hosted in October a meeting to talk about an Internet of Things security labeling program so that small devices that are all throughout your homes, like smart speakers and baby monitors and Nest doorbell cameras and toasters and refrigerators. Everything imaginable that now has computer functionality and are connected wirelessly to your home network. These devices are safe and secure.
Starting point is 00:20:18 And that the security posture of that device is transparent to the consumer who's buying the product. So that if you want an online commerce site and you try to choose a product, that it's easy to tell that it is a secure product and it has a label or some sort of marking that indicates that. Kind of like Energy Star for cyber, the Energy Star logo for energy efficiency and home appliances. So that's an example of an opportunity where there's an appetite in industry to make sure that their products are safe and secure, that they're adopting industry best practices in that, and that their products will stand out on a global stage. And so we've had a lot of interest by the private sector in how that might work. And we're working towards finding ways to implement that process.
Starting point is 00:21:13 So more to come on that. But that's an example of where the private sector and the public sector, the government, are on the same page that it's a valuable thing to do to increase the security of the ecosystem and to make sure that quality products coming from the U.S. stand out in the global marketplace. I think it's fair to say that we're in an era right now where it can be challenging, to say the least, to get things through Congress. I'm curious, to what degree does President Biden feel as though he can execute on this strategy through the authority he has through the regulatory agencies? And to what degree is he going to have to go to Congress for some collaboration and cooperation here?
Starting point is 00:21:56 That's a great question. We think that cybersecurity presents a great opportunity for bipartisan collaboration. I think it's one of the few remaining topics that there's an openness to working together on this topic. So there are going to be areas where we need Congress to act. It might just be to remove ambiguity or to give us the necessary authorization to place a new program within an agency.
Starting point is 00:22:26 For instance, like the thing that I described in IMT security labeling, that's the kind of thing that when it was created for energy efficiency and the Energy Star program, Congress passed the bill to make that happen. So that's an example of where we very well may need some help from Congress to assign a responsibility and make sure that there's a clear path, as well as appropriations to make that type of a program happen. You referenced, I believe, the area of critical infrastructure cybersecurity and how do we make sure that our critical infrastructure is safe and secure. These are also areas where there are existing authorities,
Starting point is 00:23:06 and we are leveraging those to the maximum extent possible, but there may also be some areas where there are gaps that we need to work with Congress to close. So let's talk about that a little bit. So we have been taking, this strategy makes a pretty bold statement that the voluntary approach to critical infrastructure cybersecurity has not gotten us to the level of security and resilience that we need to be at. And so as a result of that, we are going in the direction of more minimum requirements for cybersecurity in critical infrastructure and taking a sector by sector approach to that. for cybersecurity in critical infrastructure and taking a sector-by-sector approach to that.
Starting point is 00:23:45 I don't think there's going to be a major bill that's passed that creates a new regime for all critical infrastructure cybersecurity. Instead, we're looking at each of the 16 critical infrastructure sectors, and there's many more subsectors below that, and seeing who is the sector risk management agency within the government, who are the regulators that have a within the government? Who are the regulators that have a role in this? What are the authorities that we currently have to regulate? And there's plenty of sectors like the electricity grid, as one example, and nuclear as well, that there's
Starting point is 00:24:15 a pretty robust regulatory mechanisms to require security across a range of areas, including cyber. But then there's other sectors for which it's a voluntary approach. And our viewpoint up to this point, especially given some of the major incidents that we've had, ransomware incidents affecting fuel pipelines, food processing, hospitals, there certainly seems to be a need to increase the baseline, to up our game to make sure that these critical services are secure.
Starting point is 00:24:52 And so we're going through this approach sector by sector looking for what we can do. I'll give you some examples of where we've actually done that. The Transportation Security Administration has issued security directives for pipelines, rail, and aviation. And those started with some basic requirements, like having a cybersecurity plan and having a point of contact for cybersecurity incidents and reporting incidents to the government. And those were built upon. And so that's an area where we acted very quickly. More recently, it was earlier this month, EPA released an interpretive rule memo on cybersecurity for drinking water facilities. We think it's critically
Starting point is 00:25:30 important that as state regulators oversee drinking water facilities in their states, that in addition to things you would expect them to do, like making sure that these facilities have fences around them, and that the chemicals are safe and that they've got quality processes to make sure that what's going into the water is right and that the drinking water coming out of the other end of the treatment plant is clean and safe to drink. More and more industrial control systems and computerized processes are making all of that happen.
Starting point is 00:26:03 So we need to make sure that we build cybersecurity into these approaches. And so this is an area that we're just starting on with the water sector is requiring cybersecurity to be an element of the biannual sanitary survey process. So that's going to be a new process. These facilities will be looking at cybersecurity as just one additional area of security that they would be evaluating through that program.
Starting point is 00:26:30 You know, Director Kelly, our audience is primarily made up of cybersecurity professionals, and a lot of these folks, I think, consider themselves on the front lines of many of the things that you address here in the policy. What would be your message to those people, to those professionals out there who want to play their part in defending the nation and indeed making the world a safer place when it comes to these cyber issues? Well, to the professionals out there
Starting point is 00:26:58 that are creating software products or creating also hardware products, I think that the key is that we've reached a point where the knowledge base for how to create secure products, what are some of the best practices, and how do you evaluate a product or a program to make sure that it's safe and secure by design, that knowledge is now out there. And it's just a matter of adopting that. For new startup companies that are just creating a software offering or a software as a service type of offering,
Starting point is 00:27:31 the only way that they're going to find buyers is to make sure that they can also provide proof that they've adopted cybersecurity best practices. Because increasingly, the way that a bad actor can get into additional victims is through some of these service offerings, where I can get into one particular product or one particular managed service provider. And that's going to give me a venue, an avenue into a whole population of organizations that are dependent upon that product or service. So it's important that security be built into the program because these customers are going to want to make sure that that's safe and secure
Starting point is 00:28:13 and that by contracting with them or by adopting that software product, that they're not introducing new risks to their organization. So each organization at every step in the process needs to be understanding risk and managing risk. One thing that seems uncontroversial now is that when you buy an automobile, it's safe and secure by design. It comes with seatbelts. And seatbelts aren't a premium add-on. You didn't have to pay extra for that. Although clearly the cost of the seat belt was included in the overall cost of the car. That's similar to other safety features, like making sure that in a crash test that the car behaves properly and the airbags go off and the passenger in most ordinary circumstances isn't going to be crushed. Or that if your car
Starting point is 00:29:04 is rear-ended, the fuel tank doesn't explode. I mean, these are not things you pay extra to have a non-exploding fuel tank. These are things you would expect. I think the new expectation is going to be that software and hardware, technology products need to be safe and secure by design. And we need ways to, and there are ways to evaluate that. And increasingly, that's going to be something that buyers are going to be asking for.
Starting point is 00:29:29 Some sort of proof, a security label, an attestation, some sort of an audit. And I think that that's something that is going to be built in and factored into the cost of everything that we do from clean drinking water to the operating system on your computer to the baby camera that's in your home.
Starting point is 00:29:47 Everything is going to need an appropriate level, an appropriate risk posture based on the product itself, and that we can all be much more secure all the way, Steve Kelly. Our thanks to him and to Adam Iles from the Chertoff Group for joining us for this Cyber Wire special edition. I'm Dave Bittner. Thanks for listening.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.