Risk
8/13/2009
12:06 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Report: NIST's Cybersecurity Guidelines Aren't Enough

The Cyber Secure Institute finds that NIST's recently released cybersecurity recommendations may leave some federal systems inadequately protected.

A set of cybersecurity controls recently recommended by the National Institute of Standards and Technology for federal agencies doesn't go far enough, according to a watchdog group.

In a preliminary report, the Cyber Secure Institute, an organization headed by former government officials and IT executives, calls NIST's Recommended Security Controls for Federal Information Systems and Organizations, also known as Special Publication 800-53, "an important step forward," but finds that the publication raises "a number of serious questions."

NIST published a final version of those security controls, which were developed with input from civilian, defense, and intelligence agencies, earlier this month. The 236-page publication provides guidelines for federal agencies to meet under the Federal Information Systems Management Act, or FISMA.

Among the shortcomings identified by the Cyber Secure Institute was NIST's classification system for assigning "impact" to government systems. NIST instructs agencies to determine if systems are low, moderate, or high impact and take certain security measures based on those assessments. The Cyber Secure Institute worries that low- and moderate-impact systems won't be adequately protected against "highly-skilled, highly-motivated and well-resourced" attackers.

"High end threats are now the norm, not the exception," The Cyber Secure Institute notes, pointing to the Russian mob, the Chinese military, organized cyber-criminals, and insiders as examples.

The institute also notes that some systems that might be regarded as high impact by the public, such as a law enforcement system of investigative information or a healthcare IT system, are only of moderate impact, according to NIST guidelines.

"Increasingly the Federal government holds critical information about each of us, and its systems have a regular and systemic impact on our day-to-day lives," the report says. "The Federal IT ramifications for every American are only going to increase given the President's IT initiatives, such as e-Health. Yet, the only individual impacts that can push a system into the high impact category are death, life-threatening and serious financial harm."

An even bigger gap, according to the Cyber Secure Institute, is a lack of "measurable or certified performance standards and validation processes." NIST doesn't mandate that systems be tested to see if they measure up to its requirements, and there's no third-party validation process. Even high-end systems only need be sufficiently documented for analysis and testing.

"If the NIST wanted to impose a certification regime, to actually ensure the level of security across the unclassified federal IT realm, it could easily have done so by relying on its own partner initiative," the Cyber Secure Institute report said, noting that NIST is part of the National Information Assurance Partnership, which has the ability to test and certify products.


InformationWeek has published an in-depth report on managing risk. Download the report here (registration required).

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-6651
Published: 2014-07-31
Multiple directory traversal vulnerabilities in the Vitamin plugin before 1.1.0 for WordPress allow remote attackers to access arbitrary files via a .. (dot dot) in the path parameter to (1) add_headers.php or (2) minify.php.

CVE-2014-2970
Published: 2014-07-31
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-5139. Reason: This candidate is a duplicate of CVE-2014-5139, and has also been used to refer to an unrelated topic that is currently outside the scope of CVE. This unrelated topic is a LibreSSL code change adding functionality ...

CVE-2014-3488
Published: 2014-07-31
The SslHandler in Netty before 3.9.2 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted SSLv2Hello message.

CVE-2014-3554
Published: 2014-07-31
Buffer overflow in the ndp_msg_opt_dnssl_domain function in libndp allows remote routers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted DNS Search List (DNSSL) in an IPv6 router advertisement.

CVE-2014-5171
Published: 2014-07-31
SAP HANA Extend Application Services (XS) does not encrypt transmissions for applications that enable form based authentication using SSL, which allows remote attackers to obtain credentials and other sensitive information by sniffing the network.

Best of the Web
Dark Reading Radio