• Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions
Flyy Tech
  • Home
  • Apple
  • Applications
    • Computers
    • Laptop
    • Microsoft
  • Security
  • Smartphone
  • Gaming
  • Entertainment
    • Literature
    • Cooking
    • Fitness
    • lifestyle
    • Music
    • Nature
    • Podcasts
    • Travel
    • Vlogs
  • Camera
  • Audio
No Result
View All Result
  • Home
  • Apple
  • Applications
    • Computers
    • Laptop
    • Microsoft
  • Security
  • Smartphone
  • Gaming
  • Entertainment
    • Literature
    • Cooking
    • Fitness
    • lifestyle
    • Music
    • Nature
    • Podcasts
    • Travel
    • Vlogs
  • Camera
  • Audio
No Result
View All Result
Flyy Tech
No Result
View All Result

CISA releases cybersecurity performance goals to reduce risk and impact of adversarial threats

flyytech by flyytech
November 1, 2022
Home Security
Share on FacebookShare on Twitter


Last week, the US Cybersecurity and Infrastructure Security Agency (CISA) released voluntary cross-sector Cybersecurity Performance Goals (CPGs). CISA was required to produce the CPGs under a national security memo on improving cybersecurity for critical infrastructure control systems issued by President Biden in July 2021. Working in coordination with the National Institute of Standards and Technology (NIST) and the interagency community, CISA developed “baseline cybersecurity performance goals that are consistent across all critical infrastructure sectors.”

CISA says these goals are “a prioritized subset of IT and operational technology (OT) cybersecurity practices that critical infrastructure owners and operators can implement to meaningfully reduce the likelihood and impact of known risks and adversary techniques.” Stressing that the goals are voluntary and not comprehensive, CISA modeled the CPGs on the real-world threats and adversary tactics, techniques, and procedures (TTPs) observed by CISA and its government and industry partners but mostly leaned on NIST’s Cybersecurity Framework (CSF).

Despite wide praise for the CSF, CISA felt compelled to offer a simpler, more bite-sized, and abridged version of NIST’s framework. “It became clear that even with comprehensive guidance from sources like the NIST Cybersecurity Framework, many organizations would benefit from help identifying and prioritizing the most important cybersecurity practices along with support in making a compelling argument to ensure adequate resources for driving down risk,” CISA Director Jen Easterly says in the introduction to the CPGs.

CISA, however, made clear that the NIST Framework is still the real deal. “While the CPGs are mapped to corresponding subcategories in the NIST CSF, CISA still recommends that organizations use NIST CSF to design and mature a comprehensive cybersecurity program,” CISA said.

Each goal comprises the desired outcome, TTP/risk addressed, security practice, scope, recommended action, and CSF reference (the subcategory most closely relates to the security practice.) The goals are spelled out in a “quick start guide,” a short 28-page document. They are clustered around eight succinctly detailed topics, including:

  • Account security
  • Device security
  • Data security
  • Governance and training
  • Vulnerability management
  • Supply chain/third party
  • Response and recovery
  • Other

CISA’s goals are a “good first step”

Reaction to CISA’s release was generally positive. Representatives Bennie G. Thompson (D-MS), chairman of the Committee on Homeland Security, and Yvette D. Clarke (D-NY), chairwoman of the Subcommittee on Cybersecurity, Infrastructure Protection, & Innovation, issued a statement saying the “Cybersecurity Performance Goals for Critical Infrastructure (CPGs) will help simplify security decisions for owners and operators, and set clear expectations about the baseline security controls that should be in place for essential services and functions.”

Patrick Miller, president and CEO of Ampere Industrial Security and one of the industry leaders who advised CISA as it drafted the CPGs, tells CSO he thinks CISA’s document “is a really good first step.” The CPGs will “obviously need to change, not just because they’ll be refined over time,” but CISA will “get more industry feedback as people actually walk through it.”

Tom Bossert, president of Trinity Cyber and former homeland security advisor to the two most recent Republican presidents, reviewed copies of the CPG document before its release, he tells CSO. “I wish all compliance lists were this straightforward and well thought out. In order to get a better likelihood of the target audience adopting these guidelines, you want to make sure they’re clear and understandable. And that’s exactly what they are. These are way more approachable than the NIST Framework, which can be daunting and thick and sometimes the equivalent of giving a student War and Peace.”

Mark Montgomery, senior director of the Center on Cyber and Technology Innovation and executive director of Cybersolarium.org, tells CSO that the CPGs are “really important for small- and medium-sized businesses.” Big companies, “what I would call the systemically important critical infrastructure structure, or what Jen Easterly might call the priority systemically important entities,” are less likely to need the kind of easily digested advice contained in the CPGs, Montgomery says, because they have already studied the NIST Framework and are implementing more ambitious programs. “This is about that big middle, and for that reason, I think there’s value in this,” he says.

Room for improvement on cybersecurity goals

CISA plans to work with critical infrastructure sectors to enhance the goals as it begins the development of sector-specific goals and to identify any additional cybersecurity practices not already included in its common baseline. Bossert said that based on his review, there don’t seem to be any network security controls referenced. “That’s a place where I’m going to work with them to see if we can flush out the adoption of new capabilities.”

“I would say there are other things they missed,” Montgomery says, such as controls listed in NIST’s 800 series of security publications or the ISA Secure set of security tools and documents. “That might have been an advantage [for CISA] in more readily acknowledging the other tools that are available.”

Although supply chain is referenced in the goals, “I think that over time they’re going to come back to it, Montgomery says, “I suspect the next time we see this updated, we’ll see a larger section on supply chain.”

How long will the cybersecurity goals stay voluntary?

Although CISA stresses that the CPGs are strictly voluntary, some say the fact that the NIST CSF has now been incorporated into recommendations by CISA under a White House national security memorandum moves the desired cybersecurity outcomes closer to becoming regulatory requirements. “Anytime the federal government issues something like this, it’s going to be air quotes ‘voluntary’ until you’re voluntold, and then you’ll just be told,” Miller says.

According to Miller, it would behoove organizations to embrace the CPGs to improve their cybersecurity postures and, perhaps, stave off regulation. “I’m a big DHS fan, but if you don’t respond in a meaningful way, there will likely be regulation to follow. “We know, based on the memorandum, that if we don’t participate, we could very realistically face additional regulations that will probably look a lot like these in the future. So, we could probably at least start going down this path and start showing some progress.”

“I don’t think anyone would be surprised to hear that this administration has been signaling an intention to regulate the industry on cybersecurity in maybe a significant way,” Bossert says. “People are trying to read tea leaves, and those who are trying to read tea leaves are going to read [the CPGs] as maybe this is the first step. And maybe the second step will be to turn these into compulsory regulatory requirements. For now, I don’t read it that way.”

CISA goals might lead to industry cybersecurity best practices

Whatever the case, the CPGs are establishing benchmarks that regulators, insurers, and executives can use as guidelines for assessing cybersecurity performance according to a more formal rubric. “Having the Department of Homeland Security put this out gives it an extra level of attention that may capture the attention of boards and senior leadership,” says Montgomery.

The CPGs “can go a long way if you’re struggling to get budget or resources,” Miller says. “If DHS is asking, that gives you a little bit of extra push” to gain funding from upper management for cybersecurity or get them to help in some other way.

“Because DHS has issued these, now it’s in a practical sense, more likely that companies in the critical infrastructure sector are going to adopt these as best practices or as industry standards,” Bossert says. “I think it’s not about the government right now telling them that they have to, but if all of the similarly situated companies in their sector adopt them, those become the baseline standard for negligence. Once common standards materialize inside any industry or industry segment, they tend to form a baseline of good practice and conduct that others meet and hopefully meet or exceed.”

Copyright © 2022 IDG Communications, Inc.



Source_link

flyytech

flyytech

Next Post
The Light Side Of The ANTEC Dark League DF800 FLUX

The Light Side Of The ANTEC Dark League DF800 FLUX

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended.

VMware ESXi server ransomware evolves, after recovery script released

VMware ESXi server ransomware evolves, after recovery script released

February 9, 2023
New on Amazon Prime Video in September 2022: Everything streaming

New on Amazon Prime Video in September 2022: Everything streaming

August 30, 2022

Trending.

Shop now. Pay later. on the App Store

Shop now. Pay later. on the App Store

February 25, 2023
Volla Phone 22 review

Volla Phone 22 review

March 26, 2023
USIU student team qualifies for Microsoft Imagine Cup World Championship

USIU student team qualifies for Microsoft Imagine Cup World Championship

April 5, 2023
Thermalright Peerless Assassin 120 SE Review: Incredible, Affordable Air Cooling Performance

Thermalright Peerless Assassin 120 SE Review: Incredible, Affordable Air Cooling Performance

September 27, 2022
Google 3D animals & AR objects: Full list & gallery

Google 3D animals & AR objects: Full list & gallery

December 27, 2022

Flyy Tech

Welcome to Flyy Tech The goal of Flyy Tech is to give you the absolute best news sources for any topic! Our topics are carefully curated and constantly updated as we know the web moves fast so we try to as well.

Follow Us

Categories

  • Apple
  • Applications
  • Audio
  • Camera
  • Computers
  • Cooking
  • Entertainment
  • Fitness
  • Gaming
  • Laptop
  • lifestyle
  • Literature
  • Microsoft
  • Music
  • Podcasts
  • Review
  • Security
  • Smartphone
  • Travel
  • Uncategorized
  • Vlogs

Site Links

  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions

Recent News

TSMC Is Sprinting to 2nm to Satisfy Demand From Nvidia, Apple

TSMC Is Sprinting to 2nm to Satisfy Demand From Nvidia, Apple

June 5, 2023
Mass Exploitation of Zero-Day Bug in MOVEit File Transfer Underway

Mass Exploitation of Zero-Day Bug in MOVEit File Transfer Underway

June 5, 2023

Copyright © 2022 Flyytech.com | All Rights Reserved.

No Result
View All Result
  • Home
  • Apple
  • Applications
    • Computers
    • Laptop
    • Microsoft
  • Security
  • Smartphone
  • Gaming
  • Entertainment
    • Literature
    • Cooking
    • Fitness
    • lifestyle
    • Music
    • Nature
    • Podcasts
    • Travel
    • Vlogs

Copyright © 2022 Flyytech.com | All Rights Reserved.

What Are Cookies
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT