Risk
2/13/2013
07:22 AM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

White House Cybersecurity Executive Order: What It Means

The White House late Tuesday issued a long-awaited executive order to bolster the nation's cyber defenses. But that order leaves some questions unanswered.

Who Is Hacking U.S. Banks? 8 Facts
Who Is Hacking U.S. Banks? 8 Facts
(click image for larger view and for slideshow)
The White House, looking to strengthen the nation's cybersecurity posture in the face of rising threats and Congressional inaction, issued a long-awaited executive order Tuesday night that could improve public-private information sharing and spark the adoption of best cybersecurity practices by the nation's critical infrastructure companies.

The executive order and a related presidential policy directive, which establish a broad public-private cyberthreat information sharing regime and voluntary cybersecurity standards for the private sector, has been in the works for months. The documents were released on the heels of reports that China continues to kick up its cyberespionage, and a day before members of Congress plan to reintroduce failed legislation that aims to accomplish some of the same goals as the executive order.

"America must face the rapidly growing threat from cyber-attacks," President Obama said in the State of the Union address Tuesday night while announcing that he had signed the executive order. "We cannot look back years from now and wonder why we did nothing in the face of real threats to our security and our economy."

The executive order directs a number of improvements in information sharing. Within 120 days, the Department of Homeland Security, Office of the Director of National Intelligence and the Department of Justice will issue "instructions" to ensure the "timely" production and dissemination of unclassified cyberthreat reports that can be broadly shared.

Expedited security clearances for critical infrastructure employees are on the table as part of the new order. The executive order would also expand the Enhanced Cybersecurity Services program. Formerly known as the Defense Industrial Base pilot, this initiative shares classified and other cybersecurity threat information by and with defense contractors and others with security clearances. That program will now be open to a wider array of critical infrastructure companies.

In terms of standards setting, the executive order instructs the National Institute of Standards and Technology to work with other agencies and private industry in developing a risk framework and best practices, called the Cybersecurity Framework, during the next several months. A final version of the Cybersecurity Framework is due out within a year. The Department of Homeland Security will oversee voluntary adoption of these standards, but regulatory agencies that oversee critical infrastructure sectors are directed by the executive order to determine whether they can and should develop more forceful carrot and stick mechanisms to ensure adoption.

Following the release of the executive order, tech industry groups and tech companies quickly issued positive statements about the new policy. However, not all reaction has been entirely positive. Earlier drafts of the executive order would have arguably led to a more rigorous set of cybersecurity standards and best practices, leading SANS Institute director of research Alan Paller to worry about the Cybersecurity Framework's lack of teeth.

What The New Executive Order Lacks

Just as important as what is actually in the executive order is what remains undone. For example, the order does not require threat reporting to government, or eliminate possible privacy-related and antitrust liability for sharing information with government and other companies. It also fails to clarify the government's own role in physically protecting critical infrastructure networks.

Furthermore, the executive order doesn't possess the force of law, and so cannot order critical infrastructure agencies to take any steps. While the order instructs regulatory agencies to determine whether to issue more mandatory standards and to review existing regulations, such reviews will take some time.

In his speech Tuesday, Obama called on Congress to help fill in the blanks by passing legislation that would "give our government a greater capacity to secure our networks and deter attacks."

Such legislation has failed multiple times to pass, with Republican legislation in the House last year garnering a veto threat and bipartisan but Democratic-led Senate legislation failing to meet cloture. Members of Congress in both houses either have or plan to reintroduce similar legislation in this Congressional session.

Reps. Dutch Ruppersburger, D-Md., and Mike Rogers, R-Mich., plan to introduce a new version of their Cyber Intelligence Sharing and Information Act (CISPA) Wednesday. The White House in 2012 threatened to veto CISPA due largely to privacy concerns. The House Homeland Security Committee will hold a hearing on the executive order later this month.

Sen. Jay Rockefeller, D-W.Va., meanwhile, said in a statement that he will continue his own efforts to pass legislation. Rockefeller has co-sponsored comprehensive cybersecurity legislation in the Senate that included voluntary cybersecurity standards, but this failed last year to pass the Senate. He reintroduced similar legislation earlier this year.

Wily attackers are using shape-shifting malware to fool your defenses. Are you ready?Also in the new, all-digital Malware's Next Generation issue of Dark Reading: The shift in hacking requires a new defense mindset. (Free with registration.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Greenleaf
50%
50%
Greenleaf,
User Rank: Apprentice
2/13/2013 | 7:17:19 PM
re: White House Cybersecurity Executive Order: What It Means
This may be the beginning of the end for Microsoft!
Deirdre Blake
50%
50%
Deirdre Blake,
User Rank: Apprentice
2/13/2013 | 4:38:03 PM
re: White House Cybersecurity Executive Order: What It Means
Securing networks is one thing, monitoring employees a la CISPA is quite another. While I think the executive order is a step in the right direction and the nation can't ignore the rise of cyber attacks as a credible threat to our security, it remains to be seen whether this effort will culminate in another civil liberties grab like the Patriot Act, so often invoked to prosecute U.S. citizens rather than to protect them.
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This is a secure windows pc.
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.