Risk
2/13/2013
07:22 AM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

White House Cybersecurity Executive Order: What It Means

The White House late Tuesday issued a long-awaited executive order to bolster the nation's cyber defenses. But that order leaves some questions unanswered.

Who Is Hacking U.S. Banks? 8 Facts
Who Is Hacking U.S. Banks? 8 Facts
(click image for larger view and for slideshow)
The White House, looking to strengthen the nation's cybersecurity posture in the face of rising threats and Congressional inaction, issued a long-awaited executive order Tuesday night that could improve public-private information sharing and spark the adoption of best cybersecurity practices by the nation's critical infrastructure companies.

The executive order and a related presidential policy directive, which establish a broad public-private cyberthreat information sharing regime and voluntary cybersecurity standards for the private sector, has been in the works for months. The documents were released on the heels of reports that China continues to kick up its cyberespionage, and a day before members of Congress plan to reintroduce failed legislation that aims to accomplish some of the same goals as the executive order.

"America must face the rapidly growing threat from cyber-attacks," President Obama said in the State of the Union address Tuesday night while announcing that he had signed the executive order. "We cannot look back years from now and wonder why we did nothing in the face of real threats to our security and our economy."

The executive order directs a number of improvements in information sharing. Within 120 days, the Department of Homeland Security, Office of the Director of National Intelligence and the Department of Justice will issue "instructions" to ensure the "timely" production and dissemination of unclassified cyberthreat reports that can be broadly shared.

Expedited security clearances for critical infrastructure employees are on the table as part of the new order. The executive order would also expand the Enhanced Cybersecurity Services program. Formerly known as the Defense Industrial Base pilot, this initiative shares classified and other cybersecurity threat information by and with defense contractors and others with security clearances. That program will now be open to a wider array of critical infrastructure companies.

In terms of standards setting, the executive order instructs the National Institute of Standards and Technology to work with other agencies and private industry in developing a risk framework and best practices, called the Cybersecurity Framework, during the next several months. A final version of the Cybersecurity Framework is due out within a year. The Department of Homeland Security will oversee voluntary adoption of these standards, but regulatory agencies that oversee critical infrastructure sectors are directed by the executive order to determine whether they can and should develop more forceful carrot and stick mechanisms to ensure adoption.

Following the release of the executive order, tech industry groups and tech companies quickly issued positive statements about the new policy. However, not all reaction has been entirely positive. Earlier drafts of the executive order would have arguably led to a more rigorous set of cybersecurity standards and best practices, leading SANS Institute director of research Alan Paller to worry about the Cybersecurity Framework's lack of teeth.

What The New Executive Order Lacks

Just as important as what is actually in the executive order is what remains undone. For example, the order does not require threat reporting to government, or eliminate possible privacy-related and antitrust liability for sharing information with government and other companies. It also fails to clarify the government's own role in physically protecting critical infrastructure networks.

Furthermore, the executive order doesn't possess the force of law, and so cannot order critical infrastructure agencies to take any steps. While the order instructs regulatory agencies to determine whether to issue more mandatory standards and to review existing regulations, such reviews will take some time.

In his speech Tuesday, Obama called on Congress to help fill in the blanks by passing legislation that would "give our government a greater capacity to secure our networks and deter attacks."

Such legislation has failed multiple times to pass, with Republican legislation in the House last year garnering a veto threat and bipartisan but Democratic-led Senate legislation failing to meet cloture. Members of Congress in both houses either have or plan to reintroduce similar legislation in this Congressional session.

Reps. Dutch Ruppersburger, D-Md., and Mike Rogers, R-Mich., plan to introduce a new version of their Cyber Intelligence Sharing and Information Act (CISPA) Wednesday. The White House in 2012 threatened to veto CISPA due largely to privacy concerns. The House Homeland Security Committee will hold a hearing on the executive order later this month.

Sen. Jay Rockefeller, D-W.Va., meanwhile, said in a statement that he will continue his own efforts to pass legislation. Rockefeller has co-sponsored comprehensive cybersecurity legislation in the Senate that included voluntary cybersecurity standards, but this failed last year to pass the Senate. He reintroduced similar legislation earlier this year.

Wily attackers are using shape-shifting malware to fool your defenses. Are you ready?Also in the new, all-digital Malware's Next Generation issue of Dark Reading: The shift in hacking requires a new defense mindset. (Free with registration.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Greenleaf
50%
50%
Greenleaf,
User Rank: Apprentice
2/13/2013 | 7:17:19 PM
re: White House Cybersecurity Executive Order: What It Means
This may be the beginning of the end for Microsoft!
Deirdre Blake
50%
50%
Deirdre Blake,
User Rank: Apprentice
2/13/2013 | 4:38:03 PM
re: White House Cybersecurity Executive Order: What It Means
Securing networks is one thing, monitoring employees a la CISPA is quite another. While I think the executive order is a step in the right direction and the nation can't ignore the rise of cyber attacks as a credible threat to our security, it remains to be seen whether this effort will culminate in another civil liberties grab like the Patriot Act, so often invoked to prosecute U.S. citizens rather than to protect them.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8891
Published: 2015-03-06
Unspecified vulnerability in the Java Virtual Machine (JVM) in IBM SDK, Java Technology Edition 5.0 before SR16-FP9, 6 before SR16-FP3, 6R1 before SR8-FP3, 7 before SR8-FP10, and 7R1 before SR2-FP10 allows remote attackers to escape the Java sandbox and execute arbitrary code via unspecified vectors...

CVE-2014-8892
Published: 2015-03-06
Unspecified vulnerability in the Java Virtual Machine (JVM) in IBM SDK, Java Technology Edition 5.0 before SR16-FP9, 6 before SR16-FP3, 6R1 before SR8-FP3, 7 before SR8-FP10, and 7R1 before SR2-FP10 allows remote attackers to bypass intended access permissions and obtain sensitive information via un...

CVE-2015-1170
Published: 2015-03-06
The NVIDIA Display Driver R304 before 309.08, R340 before 341.44, R343 before 345.20, and R346 before 347.52 does not properly validate local client impersonation levels when performing a "kernel administrator check," which allows local users to gain administrator privileges via unspecified API call...

CVE-2015-1637
Published: 2015-03-06
Schannel (aka Secure Channel) in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly restrict TLS state transitions, which makes it easier for r...

CVE-2014-2130
Published: 2015-03-05
Cisco Secure Access Control Server (ACS) provides an unintentional administration web interface based on Apache Tomcat, which allows remote authenticated users to modify application files and configuration files, and consequently execute arbitrary code, by leveraging administrative privileges, aka B...

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.