Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security

9/9/2020
02:00 PM
Dan Blum
Dan Blum
Commentary
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv
50%
50%

7 Cybersecurity Priorities for Government Agencies & Political Campaigns

As election season ramps up, organizations engaged in the process must strengthen security to prevent chaos and disorder from carrying the day. Here's how.

As we approach November, the digital election infrastructure finds itself in the crosshairs of a new peril. Authoritarian forces and other adversaries have weaponized the fifth domain of warfare — cyberspace — against the very fabric of democracy. As the election process ramps up, organizations engaged in the political process must strengthen cybersecurity to prevent chaos and disorder from carrying the day. In so doing, they face unprecedented challenges.

Related Content:

Is Zero Trust the Best Answer to the COVID-19 Lockdown?

Applying the 80-20 Rule to Cybersecurity

Nation-state attackers and unscrupulous internal forces threaten the integrity of the electrical process, the faith of the voters in the best form of government yet devised by mankind, and even the sense of fraternity or unity among the people themselves. Cybercriminals — having already pivoted to take advantage of confusion and disruption from the pandemic — are now poised to exploit yet more opportunities.

We've had many warning signs in the form of the bots and trolls disseminating fake news in 2016 along with the breach of the Democratic National Committee email system. More recently, we've seen activists using the TikTok service to disrupted a Trump campaign rally, hackers compromise Joe Biden's and other celebrities' Twitter accounts, and phishing attempts against state-level voter registration system personnel.

Campaigns, Government Agencies, and Election Vendors in the Crosshairs
Although we're far from full online voting, many other aspects of the political process are going digital. A bewildering number of organizations are getting information out to voters, campaigning for votes, managing the election process and collecting or counting results. As a result, the two key questions we now have to ask ourselves are: What are we trying to protect in the election process, and what is the "critical infrastructure" for an election? Per Figure 1 (above), here are the players in the digital election infrastructure:

  • National or state-level government agencies that manage registration, voting, and all other election processes
  • Campaign organizations or political action committees through which people and businesses contend for their political agendas
  • Media and social media through which campaign organizations influence voter opinion and citizens gather or share information
  • Companies providing software or services (such as registration databases, call centers, websites, and applications) to such agencies, campaigns, and media organizations

Each of these organization types requires a security program. During COVID-19 lockdowns, reopenings and second waves, all have faced accelerated digital transformation. During crises, IT and security teams tend to cut corners. For example, the so-called Twitter cryptocurrency hack may have been facilitated by a work-from-home program that weakened administrative account recovery controls.

Now that the excitement of the political season begins, it may feel like accountability for security is suspended. But that is a dangerous illusion that could be spectacularly shattered in the next breach, and we cannot afford more serious breaches against democracy itself.

Protecting the Digital Election Infrastructure
Digital election infrastructure organizations aren't one-size-fits-all. They vary in scale from the massive federal Department of Justice, to the merely large California Department of Motor Vehicles, to tiny voting technology startups. Yet all those and similar organizations play important roles. Also, the composition and culture of a government agency is vastly different from that of a software vendor, let alone a campaign run mostly by volunteers and consultants.

But all organizations must ensure one thing: leadership accountability for information risk. Any significant risks incurred should be "calculated risks" with cybersecurity programs and capabilities calibrated to them. Thus, Figure 1 doesn't stop with "basic security hygiene" in the defensive domain of the cybersecurity leadership. It adds a requirement for "rational cybersecurity programs."

Per my new book Rational Cybersecurity for Business, "lack of cybersecurity-business alignment has a corrosive effect on any security project it touches." For example, I know of a company desperate to solve a web visitor conversion rate problem that could easily afflict political campaigns. Oblivious of privacy regulations, a corporate executive sent all the weblogs (with real IP addresses) to a trial account at an analytics company in the cloud. Overnight, the executive became a hero for being able to flag returning users. But the process could have created serious regulatory trouble. Had anyone asked security, test data anonymization could have mitigated the risk of breach.

Don't Cut Corners on Security and Risk Management
Why? Because they set the context for everything else. It is especially important for a fluid organization like a campaign to define security policies, sensitive information handling rules, access controls and incident management. The keys to rational cybersecurity programs adapted to election concerns for both agencies and campaigns include the priorities below. However, although priorities are similar for agencies and campaigns, specific controls or activities can differ considerably with agencies tending to have many older premises-based systems requiring extra-diligent vulnerability and configuration management for basic security hygiene.

Getting Out the (Mail-in) Vote
In the state and local government agency world, cybersecurity leaders must align with all business processes that manage voting and voter registration. This can be done by engaging process planning, operations, and change management personnel. Also, consult business, IT, and security staff with experience in the seven election cybersecurity priorities from Figure 2. For example, most states have undertaken identity management projects and have expertise that could be applied to processing citizen data for an election.

Zero Trust and Partisan Politics
To better counter digital risks, political campaigns should adopt the zero-trust model in every context. This starts with not trusting campaign executives to make security-related decisions without security leadership input. Nor should campaigns blindly trust vendors and cloud services. Instead, they should institute third-party risk management processes to vet the providers. Campaigns should also consider zero-trust strategies for remote access and authentication. Acquiring adaptive or multifactor authentication capabilities will enable campaigns to work more securely with a shifting array of local affiliates, consultants, and volunteers. At the same time, CISOs and other cybersecurity leaders can actively engage with campaign or government agency leaders to realign cybersecurity strategies for the election by doing the following:

  • Stepping up security awareness communications
  • Identifying election risks and opportunities to create a sense of urgency
  • Looking for support from key influencers in the executive ranks
  • Developing and selling a cybersecurity vision and strategy

Dan Blum is an internationally recognized strategist in cybersecurity and risk management. Dan was a Golden Quill award winning vice president and distinguished analyst at Gartner, Inc. He has served as the security leader for several startups and consulting companies and has ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-22168
PUBLISHED: 2021-06-22
PHPGurukul Hospital Management System in PHP v4.0 has a SQL injection vulnerability in \hms\change-emaild.php. Remote unauthenticated users can exploit the vulnerability to obtain database sensitive information.
CVE-2020-22169
PUBLISHED: 2021-06-22
PHPGurukul Hospital Management System in PHP v4.0 has a SQL injection vulnerability in \hms\appointment-history.php. Remote unauthenticated users can exploit the vulnerability to obtain database sensitive information.
CVE-2020-22170
PUBLISHED: 2021-06-22
PHPGurukul Hospital Management System in PHP v4.0 has a SQL injection vulnerability in \hms\get_doctor.php. Remote unauthenticated users can exploit the vulnerability to obtain database sensitive information.
CVE-2020-22171
PUBLISHED: 2021-06-22
PHPGurukul Hospital Management System in PHP v4.0 has a SQL injection vulnerability in \hms\registration.php. Remote unauthenticated users can exploit the vulnerability to obtain database sensitive information.
CVE-2020-22172
PUBLISHED: 2021-06-22
PHPGurukul Hospital Management System in PHP v4.0 has a SQL injection vulnerability in \hms\get_doctor.php. Remote unauthenticated users can exploit the vulnerability to obtain database sensitive information.