Risk
8/13/2009
12:06 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Report: NIST's Cybersecurity Guidelines Aren't Enough

The Cyber Secure Institute finds that NIST's recently released cybersecurity recommendations may leave some federal systems inadequately protected.

A set of cybersecurity controls recently recommended by the National Institute of Standards and Technology for federal agencies doesn't go far enough, according to a watchdog group.

In a preliminary report, the Cyber Secure Institute, an organization headed by former government officials and IT executives, calls NIST's Recommended Security Controls for Federal Information Systems and Organizations, also known as Special Publication 800-53, "an important step forward," but finds that the publication raises "a number of serious questions."

NIST published a final version of those security controls, which were developed with input from civilian, defense, and intelligence agencies, earlier this month. The 236-page publication provides guidelines for federal agencies to meet under the Federal Information Systems Management Act, or FISMA.

Among the shortcomings identified by the Cyber Secure Institute was NIST's classification system for assigning "impact" to government systems. NIST instructs agencies to determine if systems are low, moderate, or high impact and take certain security measures based on those assessments. The Cyber Secure Institute worries that low- and moderate-impact systems won't be adequately protected against "highly-skilled, highly-motivated and well-resourced" attackers.

"High end threats are now the norm, not the exception," The Cyber Secure Institute notes, pointing to the Russian mob, the Chinese military, organized cyber-criminals, and insiders as examples.

The institute also notes that some systems that might be regarded as high impact by the public, such as a law enforcement system of investigative information or a healthcare IT system, are only of moderate impact, according to NIST guidelines.

"Increasingly the Federal government holds critical information about each of us, and its systems have a regular and systemic impact on our day-to-day lives," the report says. "The Federal IT ramifications for every American are only going to increase given the President's IT initiatives, such as e-Health. Yet, the only individual impacts that can push a system into the high impact category are death, life-threatening and serious financial harm."

An even bigger gap, according to the Cyber Secure Institute, is a lack of "measurable or certified performance standards and validation processes." NIST doesn't mandate that systems be tested to see if they measure up to its requirements, and there's no third-party validation process. Even high-end systems only need be sufficiently documented for analysis and testing.

"If the NIST wanted to impose a certification regime, to actually ensure the level of security across the unclassified federal IT realm, it could easily have done so by relying on its own partner initiative," the Cyber Secure Institute report said, noting that NIST is part of the National Information Assurance Partnership, which has the ability to test and certify products.


InformationWeek has published an in-depth report on managing risk. Download the report here (registration required).

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-0714
Published: 2015-05-02
Multiple cross-site scripting (XSS) vulnerabilities in Cisco Finesse Server 10.0(1), 10.5(1), 10.6(1), and 11.0(1) allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug ID CSCut53595.

CVE-2014-3598
Published: 2015-05-01
The Jpeg2KImagePlugin plugin in Pillow before 2.5.3 allows remote attackers to cause a denial of service via a crafted image.

CVE-2014-8361
Published: 2015-05-01
The miniigd SOAP service in Realtek SDK allows remote attackers to execute arbitrary code via a crafted NewInternalClient request.

CVE-2015-0237
Published: 2015-05-01
Red Hat Enterprise Virtualization (RHEV) Manager before 3.5.1 ignores the permission to deny snapshot creation during live storage migration between domains, which allows remote authenticated users to cause a denial of service (prevent host start) by creating a long snapshot chain.

CVE-2015-0257
Published: 2015-05-01
Red Hat Enterprise Virtualization (RHEV) Manager before 3.5.1 uses weak permissions on the directories shared by the ovirt-engine-dwhd service and a plugin during service startup, which allows local users to obtain sensitive information by reading files in the directory.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.