| AUTHORITYID | CHAMBER | TYPE | COMMITTEENAME |
|---|---|---|---|
| hshm00 | H | S | Committee on Homeland Security |
[House Hearing, 115 Congress]
[From the U.S. Government Publishing Office]
ASSESSING THE STATE OF FEDERAL CYBERSECURITY RISK DETERMINATION
=======================================================================
HEARING
BEFORE THE
SUBCOMMITTEE ON
CYBERSECURITY AND
INFRASTRUCTURE PROTECTION
OF THE
COMMITTEE ON HOMELAND SECURITY
HOUSE OF REPRESENTATIVES
ONE HUNDRED FIFTEENTH CONGRESS
SECOND SESSION
__________
JULY 25, 2018
__________
Serial No. 115-73
__________
Printed for the use of the Committee on Homeland Security
[GRAPHICS NOT AVAILABLE IN TIFF FORMAT]
Available via the World Wide Web: http://www.govinfo.gov
__________
U.S. GOVERNMENT PUBLISHING OFFICE
34-445 PDF WASHINGTON : 2019
-----------------------------------------------------------------------------------
For sale by the Superintendent of Documents, U.S. Government Publishing Office,
http://bookstore.gpo.gov. For more information, contact the GPO Customer Contact Center,
U.S. Government Publishing Office. Phone 202-512-1800, or 866-512-1800 (toll-free).
E-mail, gpo@custhelp.com.
COMMITTEE ON HOMELAND SECURITY
Michael T. McCaul, Texas, Chairman
Lamar Smith, Texas Bennie G. Thompson, Mississippi
Peter T. King, New York Sheila Jackson Lee, Texas
Mike Rogers, Alabama James R. Langevin, Rhode Island
Lou Barletta, Pennsylvania Cedric L. Richmond, Louisiana
Scott Perry, Pennsylvania William R. Keating, Massachusetts
John Katko, New York Donald M. Payne, Jr., New Jersey
Will Hurd, Texas Filemon Vela, Texas
Martha McSally, Arizona Bonnie Watson Coleman, New Jersey
John Ratcliffe, Texas Kathleen M. Rice, New York
Daniel M. Donovan, Jr., New York J. Luis Correa, California
Mike Gallagher, Wisconsin Val Butler Demings, Florida
Clay Higgins, Louisiana Nanette Diaz Barragan, California
Thomas A. Garrett, Jr., Virginia
Brian K. Fitzpatrick, Pennsylvania
Ron Estes, Kansas
Don Bacon, Nebraska
Debbie Lesko, Arizona
Brendan P. Shields, Staff Director
Steven S. Giaier, General Counsel
Michael S. Twinchek, Chief Clerk
Hope Goins, Minority Staff Director
------
SUBCOMMITTEE ON CYBERSECURITY AND INFRASTRUCTURE PROTECTION
John Ratcliffe, Texas, Chairman
John Katko, New York Cedric L. Richmond, Louisiana
Daniel M. Donovan, Jr., New York Sheila Jackson Lee, Texas
Mike Gallagher, Wisconsin James R. Langevin, Rhode Island
Brian K. Fitzpatrick, Pennsylvania Val Butler Demings, Florida
Don Bacon, Nebraska Bennie G. Thompson, Mississippi
Michael T. McCaul, Texas (ex (ex officio)
officio)
Kristen M. Duncan, Subcommittee Staff Director
Moira Bergin, Minority Subcommittee Staff Director
C O N T E N T S
----------
Page
Statements
The Honorable John Ratcliffe, a Representative in Congress From
the State of Texas, and Chairman, Subcommittee on Cybersecurity
and Infrastructure Protection:
Oral Statement................................................. 1
Prepared Statement............................................. 3
The Honorable Cedric L. Richmond, a Representative in Congress
From the State of Louisiana, and Ranking Member, Subcommittee
on Cybersecurity and Infrastructure Protection:
Oral Statement................................................. 4
Prepared Statement............................................. 5
The Honorable Bennie G. Thompson, a Representative in Congress
From the State of Mississippi, and Ranking Member, Committee on
Homeland Security:
Prepared Statement............................................. 6
Witnesses
Mr. Ken Durbin, Senior Strategist, Global Government Affairs,
Symantec:
Oral Statement................................................. 8
Prepared Statement............................................. 9
Ms. Summer Fowler, Technical Director, Cybersecurity Risk and
Resilience, Software Engineering Institute, CERT, Carnegie
Mellon University:
Oral Statement................................................. 13
Prepared Statement............................................. 14
Mr. Ari Schwartz, Managing Director of Cybersecurity Services,
Cybersecurity Risk Management Group, Venable LLP, Testifying on
Behalf of the Cybersecurity Coalition and Center for
Cybersecurity Policy and Law:
Oral Statement................................................. 18
Prepared Statement............................................. 19
Appendix
Questions From Honorable James R. Langevin for Summer Fowler..... 33
Questions From Honorable James R. Langevin for Ari Schwartz...... 34
ASSESSING THE STATE OF FEDERAL CYBERSECURITY RISK DETERMINATION
----------
Wednesday, July 25, 2018
U.S. House of Representatives,
Committee on Homeland Security,
Subcommittee on Cybersecurity and
Infrastructure Protection,
Washington, DC.
The subcommittee met, pursuant to notice, at 10:38 a.m., in
room HVC-210, Capitol Visitor Center, Hon. John Ratcliffe
(Chairman of the subcommittee) presiding.
Present: Representatives Ratcliffe, Bacon, Donovan, Katko,
Richmond, and Langevin.
Mr. Ratcliffe. Good morning. The Committee on Homeland
Security, Subcommittee on Cybersecurity and Infrastructure
Protection will come to order.
The subcommittee is meeting this morning to receive
testimony regarding how the Federal Government understands and
manages enterprise-wide cybersecurity risks. I now recognize
myself for an opening statement.
As we convene today, this subcommittee is concerned that
the Federal Government is not yet equipped to determine how
threat actors seek to gain access to our private information.
This challenge is one of the reasons I introduced, and
yesterday the full committee passed, the Advancing
Cybersecurity Diagnostics and Mitigation Act. H.R. 6443 will
codify and provide direction to DHS regarding the CDM program.
This was a bipartisan effort and I thank the Ranking Member,
Mr. Richmond, as well as Mr. Katko, Mr. Donovan, Mr.
Fitzpatrick, and Mr. Langevin, for working with me on this
important issue because there is an evident lack of strategy in
mitigating risk across our Federal agencies.
Cyber work force gaps and legacy IT systems are
vulnerabilities in the Federal Government's cybersecurity
posture but the efficacy of our basic cybersecurity practices
remain common liabilities. To this end the Office of Management
and Budget and Department of Homeland Security released a
report earlier this year entitled Federal Cybersecurity Risk
Determination Report Action Plan. This report spoke to many of
the challenges faced in securing enterprise-wide Federal
Government IT systems.
Perhaps not surprisingly OMB and DHS determined that 74
percent of Government agencies have cybersecurity programs that
are either at risk or at high risk. The risk assessments
performed by these agencies showed that a lack of threat
information results in ineffective allocations of limited cyber
resources. This overall situation creates enterprise-wide gaps
in our network visibility, IT tool, and capability
standardization, and common operating procedures, all of which
negatively impact Federal cybersecurity.
Given the significant and ever-increasing danger of threats
and the absence of good data inventory, risk management must be
fully integrated into every aspect of an organization. Leaders
of Federal agencies at all organizational levels must
understand the responsibilities and they must be accountable
for protecting organizational assets and managing security and
privacy risks.
The OMB and DHS report identified four main actions that
are necessary to address cybersecurity risks across the Federal
enterprise. First, Federal agencies must increase their
cybersecurity threat awareness. This seems like a too obvious
of a recommendation but often those charged with defending
agency networks lack timely information regarding the tactics,
techniques, and procedures that our adversaries are using to
exploit Government information systems.
Second, OMB urged agencies to standardize IT and
cybersecurity capabilities to control costs and to improve
asset management. Generally speaking agencies do not have
standardized cybersecurity processes, which ultimately impacts
their ability to efficiently and effectively combat cyber
threats.
The Continuous Diagnostics and Mitigation program or CDM
will accelerate both IT management efforts and cybersecurity
improvements across the Federal Government. In fact, my bill,
the Advancing Cybersecurity Diagnostics and Mitigation Act will
require the program to evolve thereby ensuring that agency CIOs
and DHS have the visibility necessary, not only to combat
threats, but also to target modernization resources and efforts
where they are most needed.
The third recommended action is that agencies must
consolidate their security operation centers to improve
incident detection and response capabilities. OMB found that
only 27 percent of agencies can detect and investigate attempts
to access large volumes of data. This troubling statistic
should cause us all to pause.
While the report identifies that Federal agencies currently
lack network visibility, the DHS's CDM program can assist with
this issue by providing insight into what is occurring on
networks--after all, you cannot defend what you cannot see.
Finally, OMB recommended that agencies increase
accountability through improved governance processes, indeed
both the Federal Information Security Management Act and
President Trump's Executive Order on Strengthening the
Cybersecurity and Federal Networks and Critical Infrastructure
already identify the agency head as the official ultimately
responsible for each agency's cybersecurity.
Of course, agency heads often delegate cyber risk
management responsibilities to the chief information officer
and chief information security officer but agency leadership
should increase its oversight of and its engagement in their
agency's cybersecurity ecosystem.
Ultimately a collaborative approach to mitigating cyber
threats is meant to prioritize meeting the needs of DHS's
partners and is consistent with the growing recognition among
Government, academic, and corporate leaders, that cybersecurity
is increasingly interdependent across sectors and must be a
core aspect of risk management strategies.
We are in an era that requires flexibility, resiliency, and
discipline. I look forward to a candid conversation with our
witnesses today about ensuring our Federal networks can embody
these goals. Your thoughts and opinions are important as we
oversee the state of Federal Government cybersecurity risks.
[The statement of Chairman Ratcliffe follows:]
Statement of Chairman John Ratcliffe
July 25, 2018
This subcommittee is concerned that the Federal Government is not
equipped to determine how threat actors seek to gain access to private
information. There is an evident lack of strategy in mitigating risk
across Federal agencies. Cyber workforce gaps and legacy IT systems are
vulnerabilities in the Federal Government's cybersecurity posture, but
the efficacy of our basic cybersecurity practices are common
liabilities.
To this end, the Office of Management and Budget and Department of
Homeland Security released a report earlier this year entitled
``Federal Cybersecurity Risk Determination Report and Action Plan.''
This report spoke to many of the challenges faced in securing
enterprise-wide Federal Government IT systems.
Perhaps not surprisingly, OMB and DHS determined that 74 percent of
Government agencies have cybersecurity programs that are either at-risk
or high-risk. The risk assessments performed by these agencies showed
that a lack of threat information results in ineffective allocations of
limited cyber resources. This overall situation creates enterprise-wide
gaps in network visibility, IT tool and capability standardization, and
common operating procedures, all of which negatively impact Federal
cybersecurity.
Given the significant and ever-increasing danger of threats and the
absence of good data inventory, risk management must be fully
integrated into every aspect of an organization. Leaders of Federal
agencies at all organizational levels must understand their
responsibilities and must be accountable for protecting organizational
assets and managing security and privacy risks.
The OMB and DHS report identified four main actions that are
necessary to address cybersecurity risks across the Federal enterprise.
First, Federal agencies must increase their cybersecurity threat
awareness. This seems like too obvious of a recommendation, but often,
those charged with defending agency networks lack timely information
regarding the tactics, techniques, and procedures that adversaries use
to exploit Government information systems.
Second, OMB urged agencies to standardize IT and cybersecurity
capabilities to control costs and improve asset management. Generally
speaking, agencies do not have standardized cybersecurity processes,
which ultimately impacts their ability to efficiently and effectively
combat threats. The Continuous Diagnostics and Mitigation program, or
CDM, will accelerate both IT management efforts and cybersecurity
issues across the Federal Government. In fact, a bill that I introduced
last week H.R. 6443, the Advancing Cybersecurity Diagnostics and
Mitigation Act, will require the program to evolve to ensure agency
CIO's and DHS have the visibility necessary not only to combat threats,
but also to target modernization resources and efforts where they are
most needed.
Third, agencies must consolidate their security operations centers
to improve incident detection and response capabilities. OMB found that
only 27 percent of agencies can detect and investigate attempts to
access large volumes of data. This troubling statistic should cause all
of us to pause. While the report identifies that Federal agencies
currently network visibility, DHS's CDM program can assist with this
issue by providing insights into what is occurring on networks. After
all you can't defend what you can't see.
And finally, OMB recommended that agencies increase accountability
through improved governance processes. Indeed, both the Federal
Information Security Management Act and President Trump's Executive
Order on Strengthening the Cybersecurity of Federal Networks and
Critical Infrastructure already identify the agency head as the
official ultimately responsible for each agency's cybersecurity. Of
course, agency heads often delegate cyber risk management
responsibilities to the chief information officer and chief information
security officer, but agency leadership should increase its oversight
of, and engagement in, their agency's cybersecurity ecosystem.
Ultimately, a collaborative approach to mitigating cyber threats is
meant to prioritize meeting the needs of DHS partners, and is
consistent with the growing recognition among Government, academic, and
corporate leaders that cybersecurity is increasingly interdependent
across sectors and must be a core aspect of risk management strategies.
We are in an era that requires flexibility, resiliency, and
discipline, I look forward to a candid conversation with our witnesses
about ensuring Federal networks can embody these goals. I look forward
to hearing from our witnesses. Your thoughts and opinions are important
as we oversee the state of Federal Government cybersecurity risks.
Mr. Ratcliffe. The Chair recognizes the Ranking Member of
the subcommittee, the gentleman from Louisiana, Mr. Richmond,
for his opening statement.
Mr. Richmond. Good morning.
I want to thank Chairman Ratcliffe for holding today's
hearing on the Federal Cybersecurity Risk Determination Report
and Action Plan.
It is no secret that Federal networks are an attractive
target to our adversaries and cyber criminals alike. Thales
eSecurity 2018 Data Threat Report found Federal agencies
experienced more data breaches than any other sector.
State actors such as Russia, China, Iran, and North Korea
have become more sophisticated, more emboldened and more brazen
and the data stored on our networks about American citizens,
our National security plans, and our economy, is important to
them.
We have authorized and funded programs to defend our
Federal networks and this subcommittee has performed rigorous
oversight over many of them, this Congress. I am familiar with
the challenges related to implementation of the Department of
Homeland Security's Continuous Diagnostics and Mitigation
program, CDM, as well as cyber threat information sharing so I
was not terribly surprised by some of the Federal cybersecurity
risk determination reports general findings.
But the devil is in the details. I could have told you for
example that the collective ability of our Federal agencies to
understand what is happening on their networks isn't what it
should be but I did not realize that fewer than half of the 96
agencies surveyed can detect encrypted ex-filtration of
information at target levels or that only 27 percent can detect
and investigate attempts to access large volumes of data.
I knew that resource challenges have stunted the maturation
of programs designed to protect Federal networks but I was
troubled to learn that agencies are not equipped to make
strategic investment decisions with money Congress provides.
While I could have assumed that agencies could improve
their Cyber Incident Response procedures or how cyber risks are
communicated, I could not have predicted that just over half of
the agencies surveyed had validated Cyber Incident Response
roles in the past year and only 59 percent of agencies have a
mechanism to issue enterprise-wide cyber threat alerts. We have
to do better than this.
The Federal Cybersecurity Risk Determination Report
identified important actions the Federal Government should
undertake to resolve existing capability gaps. Many of the
proposed solutions leverage CDM tools, some of which have yet
to be fully implemented or may not be deployed anytime soon.
Yesterday, this committee approved legislation Chairman
Ratcliffe introduced, and which I co-sponsored, to make the CDM
program more robust, more accountable. I would be interested in
hearing from our witnesses about how the Federal Government can
optimize the potential of CDM and improve its implementation.
Additionally, I would be interested to know if the
witnesses disagree with any of the action items identified in
the risk determination report or if they are critical or issues
critical to risk management that the report failed to address.
Finally, I will be interested in hearing the witnesses'
thoughts about the importance of leadership from the White
House when it comes to improving the cybersecurity of our
Federal networks.
Before I close I want to point out on a separate subject
that we are heading into August recess without making any
progress toward reauthorization of the Chemical Facility Anti-
Terrorism Standards, known as the CFATS program.
Ranking Member Thompson and I have repeatedly asked the
Majority to hold oversight hearings with the Department and
begin work on negotiating and forming CFATS' reauthorization
legislation. Neither has happened and I am concerned that we
may not have enough legislative days left to get
reauthorization past the finish line. I hope the majority will
make CFATS a priority when we return from the August recess so
we can avoid a temporary extension.
With that I thank the witnesses for being here today. I
look forward to their testimony.
I yield back the balance of my time.
[The prepared statement of Ranking Member Richmond
follows:]
Statement of Ranking Member Cedric Richmond
July 25, 2018
Good morning. I would like to thank Chairman Ratcliffe for holding
today's hearing on the Federal Cybersecurity Risk Determination Report
and Action Plan.
It is no secret that Federal networks are an attractive target to
our adversaries and cyber criminals alike.
Thales e-Security's 2018 Data Threat Report found Federal agencies
experience more data breaches than any other sector.
State actors--such as Russia, China, Iran, and North Korea--have
become more sophisticated, more emboldened, and more brazen.
And the data stored on our networks--about American citizens, our
National security plans, and our economy--is important to them.
We have authorized and funded programs to defend our Federal
networks, and this subcommittee has performed rigorous oversight over
many of them this Congress.
I am familiar with the challenges related to implementation of the
Department of Homeland Security's Continuous Diagnostic and Mitigation
Program (CDM) as well as cyber threat information sharing.
So I wasn't terribly surprised by some of the Federal Cybersecurity
Risk Determination Report's general findings.
But the devil is in the details.
I could have told you, for example, that the collective ability of
our Federal agencies to understand what is happening on their networks
isn't what it should be.
But I didn't realize that fewer than half of the 96 agencies
surveyed can detect encrypted exfiltration of information at target
levels, or that only 27 percent can detect and investigate attempts to
access large volumes of data.
I knew that resource challenges have stunted the maturation of
programs designed to protect Federal networks, but I was troubled to
learn that agencies are not equipped to make strategic investment
decisions with the money Congress provides.
And, while I could have assumed that agencies could improve their
cyber incident response procedures or how cyber risks are communicated,
I could not have predicted that just over half of the agencies surveyed
had validated cyber incident response roles in the past year and only
59 percent of agencies have a mechanism to issue enterprise-wide cyber
threat alerts.
We have to do better than this.
The Federal Cybersecurity Risk Determination Report identified
important actions the Federal Government should undertake to resolve
existing capability gaps.
Many of the proposed solutions leverage CDM tools, some of which
have yet to be fully implemented or may not be deployed any time soon.
Yesterday, this committee approved legislation Chairman Ratcliffe
introduced, and which I cosponsored, to make the CDM program more
robust and more accountable.
I will be interested to hear from our witnesses about how the
Federal Government can optimize the potential of CDM and improve its
implementation.
Additionally, I would be interested to know if the witnesses
disagree with any of the action items identified by the Risk
Determination Report or if there are issues critical to risk management
that the report failed to address.
Finally, I will be interested in hearing the witnesses' thoughts
about the importance of leadership from the White House when it comes
to improving the cybersecurity of our Federal networks.
Before I close, I want to point out that we are heading into August
recess without making any progress toward reauthorization of the
Chemical Facility Anti-Terrorism Standards (CFATS) program.
Ranking Member Thompson and I have repeatedly asked the Majority to
hold oversight hearings with the Department and begin work on
negotiating informed CFATS reauthorization legislation.
Neither has happened, and I am concerned that we may not have
enough legislative days left to get reauthorization past the finish
line.
I hope the Majority will make CFATS a priority when we return from
August recess so we can avoid a temporary extension.
With that, I thank the witnesses for being here today, and I look
forward to their testimony.
I yield back the balance of my time.
Mr. Ratcliffe. I thank the gentleman.
Other Members of the committee are reminded that opening
statements may be submitted for the record.
[The statement of Ranking Member Thompson follows:]
Statement of Ranking Member Bennie G. Thompson
July 25, 2018
Good morning. I want to thank Chairman Ratcliffe and Ranking Member
Richmond for holding today's hearing on the ``State of Federal
Cybersecurity Risk Determination''.
At the outset, I would like to echo Ranking Member Richmond's
disappointment that we are heading into August recess without making
any meaningful progress on reauthorizing the Chemical Facility Anti-
Terrorism Standards Program (CFATS), which expires in less than 6
months.
As far as I know, the CFATS program has bipartisan support on this
committee. It is also popular with the regulated community, and, most
importantly, makes our communities safer.
Given the limited number of legislative days left, I hope this
committee acts quickly when we return in September to fulfill our
obligations as authorizers and put CFATS on the track to
reauthorization.
Turning to the subject of today's hearing--although I am pleased
that OMB and DHS have undertaken a review of the risk determination and
acceptance choices across the Federal Government, I am troubled that
many of our cybersecurity capabilities are not as mature as they ought
to be.
When I joined the Select Committee on Homeland Security in 2003,
every expert I heard from told me that the Federal Government was 10
years behind where it should in with respect to cybersecurity.
Despite the investments we have made since then, it seems we are in
the same boat--10 years behind where we need to be.
Federal agencies still struggle to access timely, actionable threat
information and share it enterprise-wide.
Agencies still do not have full visibility of what is happening on
their networks or who has access to different pieces of information.
And we still have not figured out how to strategically allocate
funding to address risk.
Despite the devastating data breaches like the 2015 Office of
Personnel Management heist of the personal information of 22.1 million
people, non-defense agencies spent less than $51 million encrypting
data rest in fiscal year 2017.
Meanwhile, of the $80 billion we spend annually on IT systems
across the Federal Government, 80 percent is spent maintaining legacy
systems that are more vulnerable and less secure.
We need to start putting our money where the risk is.
This is not the first time we have heard these recommendations.
So, there is one thing I would like to know from our witnesses
today: How can the Federal Government finally jump the 10-year gap
between where we are and where we should be?
I know it will take technology. I know it will take money. And,
importantly, I know it will take leadership.
I am concerned that the White House has limited its ability to lead
as effectively as it could in this space by eliminating the
Cybersecurity Coordinator position and dragging out the appointment of
the Federal CIO and CIOs and large agencies.
Nevertheless, as Members of Congress, we will continue our rigorous
oversight to hold the administration accountable for the action items
outlined in the Federal Cybersecurity Risk Determination Report and
Action Plan.
With that, I look forward to hearing from our witnesses, and I
yield back the balance of my time.
Mr. Ratcliffe. We are pleased to have a distinguished panel
of witnesses before us today on this very important topic.
Mr. Ken Durbin is a senior strategist of global government
affairs for Symantec. Mr. Durbin has been providing compliance
and risk management solutions to the public sector for over 25
years and has authored multiple articles on CRM issues. Thank
you for being here this morning.
Ms. Summer Fowler is the technical director for the
cybersecurity, risk, and resilience in the Software Engineering
Institute at Carnegie Mellon. In this role Ms. Fowler is
responsible for executing the strategic plan for a research
portfolio focused on improving the security and resilience of
organizational assets. Ms. Fowler, thank you for being here to
provide your insights today.
Finally, Mr. Ari Schwartz is the managing director of
cybersecurity services in the risk management group of Venable.
Mr. Schwartz is testifying today on behalf of the Cybersecurity
Coalition and Center for Cybersecurity Policy and Law.
Prior to his time at Venable, Mr. Schwartz served on the
National Security Council as a special assistant to the
President, and senior director for cybersecurity. Thank you for
being here today Mr. Schwartz.
I would now ask the witnesses to stand and raise your right
hand, so I can swear you in to testify.
[Witnesses sworn.]
Let the record reflect that each of the witnesses has been
so sworn. You may be seated.
The witnesses' full written statements will appear in the
record.
The Chair now recognizes Mr. Durbin for 5 minutes for his
opening statement.
STATEMENT OF KEN DURBIN, SENIOR STRATEGIST, GLOBAL GOVERNMENT
AFFAIRS, SYMANTEC
Mr. Durbin. Chairman Ratcliffe, Ranking Member Richmond,
thank you for the opportunity to testify.
I would like to start by setting the stage with regards to
the current threat landscape. Attackers continue to evolve; to
avoid detection, attackers are employing what we call living-
off-the-land--using operating system features or legitimate
network administration tools to compromise victim's networks.
Using good programs to do bad things is difficult to detect
because it is disguised as normal operations. We recently
discovered one such attack that had compromised satellite
operators, telecommunications companies, and a defense
contractor.
We identified the attack using an advanced hunting tool we
call ``Targeted Attack Analytics'' which crawls through massive
datasets looking for minute indicators of malicious activity.
Cryptojacking is another common attack. We have seen the
rise of a new category of web-based coin-miner attacks that use
an individual's browser to hijack their computer's processing
power to mine cryptocurrency. Detections of coin-miners on
endpoint computers increased by 8,500 percent in 2017.
We saw an uptick in supply chain attacks where attackers
hijacked software updates to gain entry to well-guarded
networks. The Petya outbreak was the most notable example of a
supply chain attack. Attackers used accounting software as the
point of entry.
Now turning to the Federal Cybersecurity Risk Determination
Report and Action Plan, the report is a tough but fair
assessment of the current state of the Executive branch's
cybersecurity posture and it looks to build on existing
security frameworks to make improvements.
I want to take a moment to commend OMB for recognizing the
value of the NIST Cybersecurity Framework or CSF as a tool to
improve the current state of the Executive branch's risk
management efforts.
Typically, an agency collects data from over 200 FISMA
controls, across 10 control families, to evaluate cybersecurity
readiness. That same data can be consolidated into the 5 CSF
functions for a clearer view into their cyber readiness. The
report made several recommendations.
In the first the report notes that 38 percent of Federal
cyber incidents did not have an identified attack vector and
recommends implementing the Cyber Threat Framework or CTF to
help categorize cybersecurity risks. However, it is not clear
how categorizing attacks would have helped protect against the
cyber events that compromised information and systems.
To reduce the number of identified attacks, I recommend
that along with implementing the CTF, OMB put a strong emphasis
on cybersecurity solutions that automate the detection and
remediation of cyber events through communication between
strategic control points, hunting for indicators that are
compromised.
I commend OMB's efforts to develop a risk-based budget
process to direct IT purchases to reduce identified risk.
Another way to reduce identified risk would be to require
agencies to add recommendations contained in IG FISMA audits as
line items in their budget requests to ensure they receive
adequate prioritization.
The report also recommends standardizing IT and
cybersecurity capabilities. This can be achieved through the
Continuous Diagnostics and Mitigation or CDM program. CDM
achieves the same goals by focusing on standardized
capabilities rather than a standardized vendor. However, the
CDM program needs to be accelerated: 5 years after CDM was
launched, phase 1 to 4 has still not been fully deployed.
The third recommendation is to consolidate agency security
operation centers to improve overall incident detection and
response. While this is part of the solution, detecting the ex-
filtration of data requires more than consolidation, which
brings me to the fourth recommendation, accountability.
I want to focus on the data-level protection's aspect of
this recommendation. Far too often we see the Government equate
data-level protection with the encryption of data. While
encryption is important, the Government's focus needs to be
expanded to include prevention, specifically data loss
prevention or DLP. DLP can discover and categorize sensitive
data and can enforce policies about what can be done with that
data. DLP can automatically encrypt data before it is
transmitted even if the end-user forgot to encrypt it
themselves.
I recommend that DHS advance the data protection phase of
CDM which would have the added benefit of protecting the high-
value assets identified by agencies during the 2015 Cyber
Sprint.
I hope these observations build on OMB's recommendations
and maximize their ability to improve our Government
cybersecurity posture.
Thank you for the opportunity to testify.
[The prepared statement of Mr. Durbin follows:]
Prepared Statement of Ken Durbin
July 25, 2018
Chairman Ratcliffe, Ranking Member Richmond, my name is Ken Durbin,
CISSP, and I am a senior strategist for Symantec Global Government
Affairs and Cybersecurity. I have been providing solutions to the
public sector for over 30 years. My focus on compliance and risk
management (CRM) and the critical infrastructure sector has allowed me
to gain insights into the challenge of balancing compliance with the
implementation of cybersecurity solutions. Additionally, I focus on the
standards, mandates, and best practices from NIST, OMB, DHS, SANS, etc.
and their application to CRM. I spend a significant amount of my time
on the NIST Cybersecurity Framework (CSF)\1\, the DHS CDM Program and
the emerging EU Global Data Protection Regulation (GDPR.)
---------------------------------------------------------------------------
\1\ NIST Cybersecurity Framework (CSF): Provides guidance to
private companies on how best to prevent, detect, and respond to cyber
attacks.
---------------------------------------------------------------------------
Symantec Corporation is the world's leading cybersecurity company
and has the largest civilian threat collection network in the world.
Our Global Intelligence NetworkTM tracks over 700,000 global
adversaries, records events from 126.5 million attack sensors world-
wide, and monitors threat activities in over 157 countries and
territories. Additionally, we process more than 2 billion emails and
over 2.4 billion web requests each day. We maintain 9 Security Response
Centers and 6 Security Operations Centers around the globe, and all of
these resources combined give our analysts a unique view of the entire
cyber threat landscape. On our consumer side, we combined Norton
Security with LifeLock's Identity and Fraud Protection to deliver a
comprehensive cyber defense solution to a growing consumer base of
nearly 4.5 million people.
In my testimony I will provide:
an overview of the current threat landscape, including
highlights of our 2018 Internet Security Threat Report
(ISTR),\2\
---------------------------------------------------------------------------
\2\ https://www.symantec.com/security-center/threat-report.
---------------------------------------------------------------------------
an assessment of the Federal Cybersecurity Risk
Determination Report and Action Plan that was released in May,
high-level recommendations on addressing some of challenges
highlighted in the report.
the threat landscape
From the recent Thrip attack on satellite and telecommunications
systems to the spread of WannaCry and Petya/NotPetya, to the rapid
growth in coinminers, the past year has provided us with many reminders
that digital security threats can come from new and unexpected sources.
With each passing year, not only has the sheer volume of threats
increased, but the threat landscape has become more diverse, with
attackers working harder to discover new avenues of attack and cover
their tracks while doing so. Symantec's annual ISTR provides a
comprehensive view of the threat landscape, including insights into
global threat activity, cyber criminal trends, and motivations for
attackers. Below are some key highlights from this year's report and
our recent work.
Attackers are Evolving
Last month, we issued a report about a previously unknown attack
group known as Thrip.\3\ Thrip is a sophisticated attacker that used a
technique we call ``living off the land''--using operating system
features or legitimate network administration tools to compromise
victims' networks. Simply put, they use good programs to do bad things.
These types of attacks are difficult to detect because malicious
activity is disguised as normal system operations. This continued a
trend we reported on in the ISTR, that attackers are relying less on
malware and zero-day vulnerabilities. Instead, they are looking for new
attack vectors that make less ``noise'' and can be hard for some
defenders to detect.
---------------------------------------------------------------------------
\3\ https://www.symantec.com/blogs/threat-intelligence/thrip-hits-
satellite-telecoms-defense-
targets?om_ext_cid=biz_social_NAM_twitter_Asset%2BType%2B%2B-
%2BBlog,Campaign%2B-%2BThreat%2BAlert.
---------------------------------------------------------------------------
When we discovered Thrip, they had already compromised satellite
operators, telecommunications companies, and a defense contractor. We
identified this malicious activity using an advanced hunting tool we
call Targeted Attack Analytics, which crawls through massive data sets
looking for minute indicators of malicious activity. When we find
something--like Thrip--we update our protections to stop it in the
future. Thrip was not the first living off the land attack, and it will
not be the last, and defenders must evolve to stay ahead of the next
attack.
Cryptojacking
During the past year, an astronomical rise in cryptocurrency values
triggered a cryptojacking gold rush with cyber criminals attempting to
cash in on a volatile market. This gave rise to a new category of
malware called ``coinminers'' that attach to an individual's browser
and utilizes their computers processing power to mine cryptocurrency.
Detections of coinminers on endpoint computers increased by 8,500
percent in 2017. With a low barrier of entry--only requiring a couple
lines of code to operate--cyber criminals are harnessing stolen
processing power and cloud CPU usage from consumers and enterprises to
mine cryptocurrency. Coinminers can slow devices, overheat batteries,
and in some cases, render devices unusable. For enterprise
organizations, coinminers can put corporate networks at risk of
shutdown and inflate cloud CPU usage, adding cost. Macs are not immune
either, with Symantec detecting an 80 percent increase in coinmining
attacks against Mac OS. By leveraging browser-based attacks, criminals
do not need to download malware to a victim's Mac or PC to carry out
cyber attacks.
IoT
IoT devices continue to be ripe targets for exploitation. Symantec
found a 600 percent increase in overall IoT attacks in 2017, which
means that cyber criminals could exploit the connected nature of these
devices to mine en masse.
Targeted Attack Groups
The number of targeted attack groups is on the rise with Symantec
now tracking 140 organized groups. Last year, 71 percent of all
targeted attacks started with spear phishing--the oldest trick in the
book--to infect their victims. As targeted attack groups continue to
leverage tried and true tactics to infiltrate organizations, the use of
zero-day threats is falling out of favor. Only 27 percent of targeted
attack groups have been known to use zero-day vulnerabilities at any
point in the past. The security industry has long discussed what type
of destruction might be possible with cyber attacks. This conversation
has now moved beyond the theoretical, with 1 in 10 targeted attack
groups using malware designed to disrupt.
Supply Chain Attacks
Symantec identified a 200 percent increase in attackers injecting
malware implants into the software supply chain in 2017. That's
equivalent to 1 attack every month as compared to 4 attacks the
previous year. Hijacking software updates provides attackers with an
entry point for compromising well-guarded networks. The Petya outbreak
was the most notable example of a supply chain attack. After using
Ukrainian accounting software as the point of entry, Petya used a
variety of methods to spread laterally across corporate networks to
deploy their malicious payload.
Ransomware for Profit
In 2016, the profitability of ransomware led to a crowded market.
In 2017, the market made a correction, lowering the average ransom cost
to $522 and signaling that ransomware has become a commodity. Many
cyber criminals may have shifted their focus to coin mining as an
alternative to cashing in while cryptocurrency values are high.
Additionally, while the number of ransomware families decreased, the
number of ransomware variants increased by 46 percent, indicating that
criminal groups are innovating less but are still very productive.
assessment of the federal cybersecurity risk determination report and
action plan
The Office of Management and Budget (OMB), in response to
Presidential Executive Order (EO) 13800, Strengthening the
Cybersecurity of Federal Networks and Critical Infrastructure, produced
a report that provides a tough but fair assessment of the current state
of the Executive branch's Cybersecurity Posture. The EO and the report
builds upon the efforts of previous administrations and works within
existing frameworks, including FISMA,\4\ FITARA,\5\ CDM,\6\ and CSF.
While none of these are perfect, OMB sees their value and seeks to
improve them. The EO held OMB to a tight time line in which to produce
the report and OMB held agencies to a similarly aggressive time line.
This alone sent a strong message, both about the seriousness of the
situation and about the administration's commitment to improving the
Executive branch's cybersecurity posture.
---------------------------------------------------------------------------
\4\ Federal Information Security Management Act: Requires
Government agencies to implement security systems to protect
information and information systems.
\5\ Federal Information Technology Acquisition Reform Act: Changed
the way the Federal Government buys and manages its computer
technology.
\6\ Continuous Diagnostics and Mitigation: Four-phase program that
monitors what is on a network, who is on a network, what is happening
on a network, and how data is protected for Federal agencies.
---------------------------------------------------------------------------
As a threshold matter, I would like to commend the administration
and OMB for recognizing the value of the CSF as a tool to improve the
current state of the Executive branch's risk management efforts. The
CSF's power is its ability to take a complex set of cybersecurity data
and present them in a clear, logical, and simplified way such that one
does not need to be a cyber expert to gain valuable insight and make
important decisions. For example: An agency now needs to collect data
from over 200 FISMA controls across 10 control families to evaluate
cybersecurity readiness. That same data can be consolidated into the 5
CSF functions (identify, protect, detect, respond, and recover) for a
clearer view into their cyber readiness.
Recommendation No. 1: Increase Cybersecurity Threat Awareness
To highlight the need for increasing cybersecurity threat
awareness, the report points out that ``38 percent of Federal cyber
incidents did not have an identified attack vector.'' This equates to
11,802 cyber incidents that ``led to the compromise of information or
system functionality in fiscal year 2016.'' To improve this situation
the report recommends implementing the Cyber Threat Framework (CTF)
with the idea that it will help prioritize and manage cybersecurity
risks. The CTF was developed to enable consistent characterization and
categorization of cyber threat events; in other words, to provide a
common lexicon to describe and understand threats. This, of course is a
worthwhile pursuit, but it is not clear how the CTF would have helped
protect against the 11,802 cyber events that compromised information
and systems.
I recommend that, along with implementing the CTF, OMB put a strong
emphasis on cybersecurity solutions that can automate the detection and
remediation of cyber events. Automated cybersecurity solutions that can
communicate between strategic control points hunting for indicators of
compromise (IoCs) will help to reduce the number of unidentified
attacks, and reduce the burden caused by the shortage of qualified
cyber professionals.
I applaud OMB's efforts to develop a risk-based budgeting process
to help direct IT purchases toward products, solutions, and services
that will have a direct impact on reducing identified risk. OMB may
want to consider taking this effort one step further to address one
long-standing issue around agency IG Report recommendations. IG Reports
regularly contain risk-based recommendations that are carryovers from
previous year's reports, and often they remain unresolved due to budget
or staffing issues. Adding IG recommendations as line items in an
agency's budget request could be a way to ensure the recommendations
receive adequate prioritization. Additionally, DHS has modified the CDM
program to allow agencies to submit Requests for Service (RFS) to
fulfill specific needs. Known as CDM DEFEND, this may be another
vehicle to address risk-based procurement.
Recommendation No. 2: Standardize IT and Cybersecurity Capabilities
This recommendation harkens back to the massive GSA ``desktop''
contracts of the 1980's and 1990's. For the most part those contracts
mandated a standardized PC platform with specific software
preinstalled. (The original contract required a Zenith 286 with DOS,
Harvard Graphics, Lotus123, and WordStar.) This did have some of the
same advantages spelled out in the report, including consistent
software versions, ease of patching, known configurations, and
simplified troubleshooting. The downside was that even if a competitor
of Zenith had a better PC it was next to impossible to justify not
using the desktop contract.
I believe the Continuous Diagnostics and Mitigation (CDM) concept
achieves the goals set forth in this recommendation by focusing on
standardized capabilities rather than a standardized vendor. However,
in order to be effective in meeting this goal, the CDM Program will
need move faster--5 years after CDM was launched Phase 1 has still not
been fully deployed. DHS has taken steps to accelerate the program,
launching CDM DEFEND, which utilizes the GSA Alliant Contract and
extends the period of performance of awarded Task Orders.
Recommendation No. 3: Consolidate Agency SOCs
Redundant Security Operation Centers (SOCs) working in silos are
ineffective when trying to defend an enterprise. Consolidating SOCs and
coordinating their efforts will improve overall incident detection and
response. OMB states that only 47 percent of agencies can detect
encrypted exfiltration incidents, and only 27 percent have the ability
to detect an exfiltration attempt. Consolidation is part of the
solution but detecting the exfiltration of data by a SOC across an
agency, especially a Federated agency requires more than consolidation.
A SOC must have the right tools in place to tag and monitor the
activity of sensitive data on an endpoint, server, data center, in
storage, or in the cloud. A SOC also needs the ability to look into
encrypted traffic and scan for sensitive data and malware. If a SOC
does detect a data exfiltration threat, the SOC needs to have a
solution in place to mitigate the threat, preferably utilizing
automation.
Recommendation No. 4: Drive Accountability Across Agencies
I would like to focus on the ``data-level protections'' aspect of
this recommendation. OMB acknowledges the call from industry, privacy
advocates, and the GAO for an increased focus on data-level
protections. However, the Government must expand the scope of data-
level protection to include data-level prevention as well. Far too
often we see the Government equate data-level protection with the
encryption of data, both in transit and at rest. Encryption is
important, but its focus is limited to data ``protection.'' This
thinking needs to be expanded to include prevention--specifically
``data-loss prevention'' (DLP) capabilities that prevent the misuse of
data in the first place. DLP solutions can discover where sensitive
data lives, categorize the data based on its sensitivity and control
who has access to the data. DLP can also enforce policies that describe
what can be done with data. For example, DLP can block data from being
copied to a thumb drive, emailed to a personal email account, block
access to data from certain locations, or during certain times. DLP can
even automatically encrypt data before its transmitted even if the end-
user forgot to encrypt it themselves.
CDM is slated to address Data Protection in Phase 4 of the Program.
I recommend that DHS advance Data Protection so it is implemented
concurrently with on-going and planned CDM Task Orders. This would have
the added benefit of maximizing the effort undertaken by agencies
during the OMB mandated Cyber Sprint of 2015 and its follow-on
components. Under the Cyber Sprint agencies were to identify their
``high-value'' assets but were not provided with solutions to protect
those assets. The Data Protection capabilities of CDM, along with CDMs
funding would go a long way toward protecting high-value assets in a
timely manner.
conclusion
This committee understands as well as anyone that cyber threats are
growing in number and complexity at an alarming pace and that
Government agencies continue to be an attractive target. The OMB report
takes a clear-eyed and unbiased look at the current state of our
cybersecurity preparedness and does not shy away from pointing out
areas that need significant improvement, and makes recommendations that
build upon proven efforts of previous administrations. I hope my ideas
can build on OMB's recommendations and maximize their ability to
improve our Government's cybersecurity posture. Thank you for the
opportunity to testify before this committee, and I would be happy to
take any questions you may have.
Mr. Ratcliffe. Thank You, Mr. Durbin.
The Chair now recognizes Ms. Fowler for 5 minutes.
STATEMENT OF SUMMER FOWLER, TECHNICAL DIRECTOR, CYBERSECURITY
RISK AND RESILIENCE, SOFTWARE ENGINEERING INSTITUTE, CERT,
CARNEGIE MELLON UNIVERSITY
Ms. Fowler. Good morning.
Thank you, Chairman Ratcliffe, Ranking Member Richmond, and
all subcommittee Members for this opportunity. On behalf of my
team at Carnegie Mellon University's Software Engineering
Institute CERT Cybersecurity Program or SEI, I am excited to
contribute today and share our research and experience in cyber
risk determination.
OMB's May 2018 report as has been noted contains four core
recommendations that we believe are excellent steps to
improving Federal cybersecurity posture.
Our work at the SEI can build on and enhance these
recommendations. Cyber risk management requires analysis and
mitigation of two sides, both the threat and of the consequence
or impact of risks that occur.
We know that our cyber exposure is increasing as software
is embedded in more aspects of our lives and Government
operations and our adversaries are using these exposures to
launch more frequent and more sophisticated attacks.
Understanding these threats is important but cyber risk
management is not only about managing cyber attack--failures of
technology, breakdowns in governance or process, human errors,
and even physical phenomena like natural disasters, are also
cyber risks.
Addressing cyber risks holistically requires a resilience
approach, a word I was very happy to hear Mr. Ratcliffe using,
and that approach focuses on mitigating the impact of any type
of disruptive event. Operational resilience is the ability to
achieve mission objectives before, during, and after any
disruptive event, whether it is a cyber attack or a system
failure. Fundamental to operational resilience is identifying
and prioritizing assets that are critical to each
organization's mission.
Our team at the SEI has codified operational resilience in
the CERT Resilience Management Model. We have applied this
model in partnership with DHS by assessing over 600
organizations across all 16 critical infrastructure sectors.
These voluntary assessments provide organizations with the
baseline understanding of their cybersecurity capabilities. The
assessment team also provides the organization with resource
guides and recommendations on how to make improvements.
The CERT RMM is used as a way to measure capabilities
against the NIST Cybersecurity Framework and other industry
standards but the operational resilience approach moves beyond
checklist compliance, to enable organizations to make
demonstrable steps to improve cybersecurity posture.
Most importantly CERT RMM does not require an organization
to start a new cybersecurity program. It allows an organization
to baseline capabilities and build a road map for improvement
that is both complimentary to and improves organization's
inputs to Federal programs like the DHS CDM program. CERT RMM
also provides a structured way for organizations to identify,
analyze, and mitigate the risks of older, or legacy,
information technology as was noted in the OMB report as a
major concern.
In many cases as the report recommends, depreciated legacy
systems will be modernized or moved to platforms like the
cloud. The asset management practices in CERT RMM ensure that
the highest-priority assets for each organization are addressed
first but introducing new capabilities like the Cloud also
introduces new cyber risks.
CERT RMM provides structured guidance on the management of
supply chain including new ways to continuously measure and
manage the risks of third-party dependencies. A holistic
resilience approach is especially important as the Government
integrates cyber physical systems into the Federal landscape.
Cyber physical systems are often built with functionality as a
primary goal and cybersecurity as a secondary or tertiary goal
at best.
The military and Federal Government are adopting cyber
physical systems in areas like medical devices, in VA
hospitals, and census collection capabilities.
To mitigate cyber risks, we must address both threats and
consequences in a balanced way with the focus on prioritization
of assets that are most critical to our mission.
Thank you for the opportunity to participate today and to
discuss how we can advance cyber risk determination and
management through operational resilience practices.
[The prepared statement of Ms. Fowler follows:]
Prepared Statement of Summer Fowler
July 25, 2018
Chairman Ratcliffe and Ranking Member Richmond, thank you for the
opportunity to participate in this hearing on assessing cybersecurity
risk. I am the technical director of cybersecurity risk and resilience
for the CERT division, part of Carnegie Mellon University's Software
Engineering Institute (SEI)\1\, a Department of Defense (DoD)
Federally-Funded Research and Development Center (FFRDC). The SEI
conducts research and development in software engineering and
cybersecurity, working to transition new and emerging innovations into
Government and industry. The SEI holds a unique role as a FFRDC
sponsored by the DoD that is also authorized to work with organizations
outside of the DoD, including engagement across the Federal Government,
the private sector, and academia. As such, we have been working with
Department of Homeland Security's critical infrastructure protections
since they were established in 2013. Our research, prototyping, mission
application, training, and education activities are heavily
interrelated and are relevant to a broad range of problem sets, such as
protection of the Nation's critical infrastructure and improved
software engineering for large-scale systems of systems.
---------------------------------------------------------------------------
\1\ https://www.sei.cmu.edu/.
---------------------------------------------------------------------------
Disruptions of critical functions that are reliant on computer
systems are inevitable. No organization, government, or agency can
anticipate every disruption or prevent every cyber attack. Agencies
must be able to anticipate and respond to changes in their risk
environment at a moment's notice. Furthermore, despite these
disruptions, organizations should be capable of continuing operations
and meeting mission goals.
We at the SEI applaud the work of the Office of Management and
Budget, detailed in the May 2018 report ``Federal Cybersecurity Risk
Determination Report and Action Plan.'' As a high-level assessment of
Government cybersecurity risks, the report identifies four core actions
that I believe will indeed, done correctly, mitigate a significant
number of cyber risks across the Federal agencies.
Notwithstanding, there are some finer points, not included in the
report that are worth discussing and implementing. First, the report
concentrates on only one half of cyber risk management. In order to
successfully execute cyber risk management, agencies must ensure they
analyze and manage cyber risk or threats as well as the potential
impact of the cyber risks and threats on their organization. While the
report concentrates on the threat of cybersecurity and proposes better
understanding of the cyber risk, outlining the potential effect of any
realized threat requires just as much effort.\2\ If agencies are to
achieve the ability to complete their mission no matter the cyber
threat, it is imperative that we manage both the cyber threat and the
consequences of the attacks.
---------------------------------------------------------------------------
\2\ As reinforced in NIST 800.39, Managing Information Security
Risk Organization, Mission, and Information System View and NIST
800.37, Guide for Applying the Risk Management Framework to Federal
Information Systems A Security Life Cycle Approach.
---------------------------------------------------------------------------
Accomplishing this continuity of operations requires a resilience
approach to cybersecurity--an integrated, holistic way to manage
security risks, business continuity, disaster recovery, and IT
operations, executed in the context of each organization's mission and
strategy.
Second, by the report's own admission, it does not cover older,
legacy information technology (IT) or workforce challenges. Both legacy
IT and the workforce shortage are significant and must be addressed if
the Federal enterprise is to understand the current cyber risk
environment and credibly prepare for the future.
The SEI's Enterprise Risk and Resilience research includes
advancing cyber risk management and enhancing it via the planning,
integration, execution, and governance of operational resilience. We
leverage our research to develop best practices, resilience management
models, tools, and techniques for measuring and improving enterprise
risk management and operational resilience in the form of actionable
guidance for the DoD and Federal civilian agencies.
operational resilience
Operational Resilience is the ability to continue to operate, and
to meet the organization's mission, in the face of evolving cyber
conditions. In the ever-changing cyber and technological landscape,
organizations need techniques that allow people, processes, and systems
to adapt to changing patterns. These patterns include the incessant
introduction of both unique threat actors and the means by which
systems are exploited. Operational resilience is obtained by ensuring
your cyber risk management takes into account both the threat and the
consequences of cyber risk.
Cyber risk management, as proposed by the report, is a process to
identify, analyze, dispose of, monitor, and adjust approaches to
handling threats. Yet we know cyber risk management alone is not enough
to ensure that we are prepared to address current and emerging threats.
The concept of risk management must adhere to formula between
likelihood of threat and consequence of impact.
At the SEI we have found cyber risk is best managed by determining
potential impact first. This requires articulation of mission,
enumeration of critical services or activities to achieve mission, and
asset management.\3\ Once critical assets are identified, then we can
walk back toward a list of specific threat types and threat actors.
Cyber professionals whose efforts are concentrated in the assessment of
threats are often doing very good cybersecurity work; however, without
consideration of impact and asset management, they may not be
protecting the assets most critical to that particular organization.
Focusing on mission objectives and critical assets creates operational
resiliency in an organization regardless of the source or type of
threat. This focus on mission context also improves the ability to
communicate risk, ultimately helping to address finding No. 4 in the
OMB report.
---------------------------------------------------------------------------
\3\ Asset management is a collection of practices to identify and
prioritize the people, processes, data, technology, and facilities
required to execute the activities.
---------------------------------------------------------------------------
Examining consequences helps organizations to identify and mitigate
operational risks that could lead to service disruptions before they
occur. Organizations can then prepare for and respond to disruptive
events in a way that demonstrates balance of command and control of
threat mitigation, incident response, and service continuity. Finally,
by establishing a robust understanding of assets, agencies can
prioritize investments needed to protect, respond, recover, and restore
mission-critical services and operations after an incident and within
acceptable time frames.
Considering impact is key for comprehensive cyber risk management
leading to resilience. If an agency looks only to malicious threats to
operations, it risks missing 17 percent (1 in 5) of overall data
breaches, which are the result of human error. In the health care and
information industries, these errors are much higher at 35 percent and
26 percent respectively.\4\ Organizations cannot overlook the role of
humans in the management of cyber risks. A malicious act of deliberate
sabotage or the unintentional actions of a confused system operator can
both lead to a profound disruption. A resilience approach is agnostic
of the type of disruption and enables the organization to plan for,
avoid, detect, respond to, and recover from incidents including natural
disasters, human error, or malicious cyber attacks.
---------------------------------------------------------------------------
\4\ Verizon 2018 Data Breach Investigations Report, https://
www.verizonenterprise.com/resources/reports/
rp_DBIR_2018_Report_execsummary_en_xg.pdf.
---------------------------------------------------------------------------
Furthermore, in today's ever-increasing global economy, many
organizations depend on external entities for information and
technology, increasing the potential risk to their missions and key
services. These third-party entities are an extension of the
organization and are often given a trusted place in the management of
systems and processes. When trust in an external entity is misplaced or
misused, the consequences can be significant. Examples include breaches
due to a third party's failure to protect data, poor integrity of
hardware and software deployed within an organization, or malicious use
of trusted extrinsic relationships to gain access to or harm the
organization. Agencies must approach the management of supply chain,
also called third-party or external dependencies, with a risk-based
approach. This approach includes adopting new ways of continuously
measuring and managing the risk from external dependencies.
Additionally, agencies can and should determine the maturity of
their external dependencies-management practices. Guided by specific
service-level agreements, which establish meaningful measures of
cybersecurity performance, agencies can better understand and manage
the capabilities of their external dependencies, thus increasing
organizational resiliency. For example, external dependencies
management is especially critical as the Government continues to
modernize its IT capabilities using cloud service providers.
Last, for true operational resilience, agencies must move beyond
simplistic checklist compliance or penetration testing and take
demonstrable steps to improve cybersecurity posture. Our team at
Carnegie Mellon University has codified operational resilience in the
CERT Resilience Management Model (CERT-RMM).\5\ Developed by deriving
practical tools and methods from the best concepts that academia has to
offer and best practices from the public and private sectors, CERT-RMM
has been applied to measure and evaluate organizations of all sizes and
compositions. Developed initially in collaboration with members of the
financial services community, CERT-RMM has been used more than 600
times by the Department of Homeland Security to measure the cyber
resilience across all 16 critical infrastructure sectors. CERT-RMM can
also be used as a way to measure capabilities against the NIST
Cybersecurity Framework. Enabling agencies both to ensure compliance
and to show measurable improvement in cybersecurity posture, CERT-RMM
provides a resource guide mapped to several industry and Government
standards.
---------------------------------------------------------------------------
\5\ https://resources.sei.cmu.edu/library/asset-
view.cfm?assetid=508084.
---------------------------------------------------------------------------
Most importantly, CERT-RMM is a framework that does not require
agencies to start over, but allows every organization, whatever its
current competence, a way to assess baseline capabilities and develop a
roadmap for improvement as an enhancement to cyber risk management.
This also enables a way to address the next topic of legacy information
technology (IT).
legacy it
Organizations do not have unlimited resources with the option of
replacing older systems and software en masse to help mitigate new
cybersecurity threats. Most, in both Government and the private sector,
have a mix of old and new systems all connected to each other and most
likely accessible to threat actors via the internet. While layers of
safeguards are placed between these systems and the outside world,
legacy IT remains a serious concern and has led to many notable cyber
breaches despite these defenses. Knowing where the most fragile legacy
IT systems are located is essential. Consequently, at a minimum an
organization must engage in effective asset management to gain a
detailed inventory of IT. Without a valid inventory, accompanied by a
network map, it is unlikely any organization could adequately defend
itself or have appropriate continuity plans in place. Moving these
deprecated legacy systems to a more secure platform, like the cloud, is
a valid and appealing option. Asset management practices enable us to
prioritize what needs to be moved in order to ensure that our highest-
priority assets are addressed first. Asset management practices are key
ingredients that allow an analysis of the risk and reward of migrating
legacy IT to new operating models such as third-party cloud service
providers.
workforce development
It is not a secret; there is a shortage of experienced and capable
cybersecurity personnel. Some studies indicate that the global
workforce shortage will reach almost 2 million by 2022.\6\ Furthermore,
Federal agencies face stiff competition from private industry for the
limited supply of cyber professionals that do exist. Consequently,
organizations need a long-term plan for amplifying their cybersecurity
capabilities. Agencies would benefit from an accurate and objective
evaluation of their cyber workforce, and with the right methods and
technologies, organizations can identify gaps in essential competencies
that are unique to their workforce. This allows agencies to make
better, targeted, hires as well as continuing education decisions for
current employees, resulting in more efficient use of taxpayer dollars.
It will take a combination of strategic hiring and developing staff in
parallel to meet the need for qualified resources. Programs like
Scholarship for Service,\7\ which provides tuition and stipends to
students studying cybersecurity and related fields, represent a vital
pipeline of cybersecurity professionals for the Federal Government.
Agencies should leverage these options, along with partnerships and
training such as the Carnegie Mellon University CISO Executive
Certificate Program or incident handling courses, to maximum advantage
in their workforce development strategies.
---------------------------------------------------------------------------
\6\ https://iamcybersafe.org/gisws/.
\7\ https://www.sfs.opm.gov/--CMU-SEI is a participating
institution.
---------------------------------------------------------------------------
Additionally, we need to make cybersecurity an integrated part of
our educational curricula starting with our youngest students.
Following the 2007 cyber attacks that crippled dozens of its government
and corporate sites, Estonia evolved its approach to cybersecurity to
include robust educational programs at all age levels and is now
recognized as having the best cybersecurity in Europe. In 1961 our
Nation committed to a dramatic expansion of our space program with a
goal of being the first nation to land a human on the moon. Similarly,
addressing our cyber risks with the goal of a Federal Government that
is resilient against current and future cyber disruptions requires a
National initiative to prepare our workforce. It is essential that we
commit to research in emerging areas like artificial intelligence,
autonomy, and data analytics methods, and the corresponding training,
that will advance our cyber risk management practices in the future.
conclusion
Cyber risks are not unlike other risks that organizations face.
Constrained by limited resources, we must mitigate cyber risks by
addressing both threats and consequences in a balanced way. The goal is
to ensure that we are operationally resilient, preserving the ability
to achieve our mission, despite any disruptions, such as cyber attacks.
To be resilient requires us to understand and prioritize our assets,
including technology, data, facilities, as well as people and
processes, so that we can invest in the protection and continuity of
the assets most critical to our mission. This is a fundamental concept
in operational resilience practices that will enhance Federal cyber
risk management capabilities.
Addressing these challenges and the actions listed in the report is
even more necessary as we address the integration and risks of cyber
physical systems (CPS) in the Federal landscape. Cyber physical systems
already exist in manufacturing, health care, automotive systems, and
financial services to name a few. These CPS systems were often built
with functionality as a goal and cybersecurity as a secondary or
tertiary consideration at best. The U.S. military and Federal
Government are also integrating CPS in areas like medical devices in VA
hospitals, internet of things capabilities in the U.S. Mint, or census
collection activities. These capabilities present new attack surfaces
for our adversaries and require that we advance our cybersecurity risk
management practices with a focus on operational resilience.
Thank you again for the opportunity to participate in this hearing
and to discuss how we can better address cyber risks through
operational resilience practices.
Mr. Ratcliffe. Thank you, Ms. Fowler.
The Chair now recognizes Mr. Schwartz for 5 minutes for his
opening statement.
STATEMENT OF ARI SCHWARTZ, MANAGING DIRECTOR OF CYBERSECURITY
SERVICES, CYBERSECURITY RISK MANAGEMENT GROUP, VENABLE LLP,
TESTIFYING ON BEHALF OF THE CYBERSECURITY COALITION AND CENTER
FOR CYBERSECURITY POLICY AND LAW
Mr. Schwartz. Chairman Ratcliffe, Ranking Member Richmond,
and Members of the committee, thank you for the opportunity to
appear before you today to discuss our views on the Federal
Cybersecurity Risk Management.
I do so in my role as coordinator of the Cybersecurity
Coalition, the leading policy coalition of companies that
develop cybersecurity products and services.
These issues before us today are not new. Twelve years ago,
I was on an advisory board, the Information Security Privacy
Advisory Board that NIST hosts, and at that time the chairman
of the Government Reform Committee was Tom Davis at the time,
would give grades to Cabinet agencies on how they were doing on
cybersecurity.
We had before our advisory board the deputy CIO of one
agency that had consistently failed for the past 8 years and so
I took this time, and this deputy CIO was actually retiring
from Government service at that time, so I thought that this
was a good opportunity to hear from him directly as to why
Government agencies continued to fail. I asked the question you
know, what would it take for you to do to succeed?
He said, ``Well you know, one time many years ago I got a
D, right? We got a D and no one paid attention to that at all,
so we are better off failing, right? We can get resources if we
fail. If we use the resources that we are given, the best we
are going to do is a D or a D-minus. So what good is it for us
to try and play to the tests and try and pass these tests as
opposed to fail, right?''
This was a security expert that knew what he was talking
about in the security space but had no incentive to do what
Government was pushing him to do. I think those incentives have
changed in terms of the policy space but not in terms of the
leadership space and not in terms of getting the attention and
getting the resources needed to actually fix the problems.
We have seen that the move to risk management I think helps
agencies to tailor the test themselves so that it is based more
on risk to the particular agency as opposed to the basic
checkbox that we used to have, much more so and under the old
FISMA guidance before the reform FISMA of 2014 came forward.
OMB suggests in their report that came out in May that the
goal should be to empower the CIO. This has been done for years
and years and has not succeeded. Instead we should do exactly
what Mr. Chairman, you suggested in your opening statement,
which is to make sure that we hold the leadership accountable.
The Trump administration in their Executive Order says that
that is their goal to hold Secretaries and deputy secretaries
directly responsible for what happens at the agency in terms of
cybersecurity but the CIOs themselves have many, many jobs to
do and security is only a small part of what they do.
Instead we should move to do what has been happening in the
private sector which is to have the CISOs report to the
leadership directly themselves and make sure that the CISOs
have some ability to influence the policy and make sure that
then the leadership when they are asked questions from above
that they have the ability to go to the CISO and hear things
directly from them.
The question is now, how do we hold that agency leadership
accountable and we make it so that there is a reason to pass
and to do the right thing in this space? From my experience I
would suggest that having the director of OMB responsible for
making sure that agency heads are paying attention this issue
as a central mission issue, right? When people don't become the
Secretary of the Interior or the Secretary of Agriculture or
others, in order to do cybersecurity but you still have to make
it part of their mission to do so.
That is going to take OMB, that is going to take the White
House chief of staff, making these calls and making sure that
it is not just an incident that gets the attention of the
Secretary but that it is on the radar all the time. You can
also do this at the deputy director level with a deputy
director of management and making sure that they are the ones
making the calls.
Of course, Congress in your regular oversight of agencies,
when you have those Secretaries and deputy secretaries in front
of you, you can ask these questions, at other hearings as well
and make sure that they are being held responsible for what is
happening at the agencies.
Now, is the time to make sure that the agencies are being
held responsible for their failures and rapidly addressing
these known risks.
I thank you for again for having me today. I look forward
to your questions.
[The prepared statement of Mr. Schwartz follows:]
Statement of Ari Schwartz
July 25, 2018
Chairman Ratcliffe, Ranking Member Richmond, and Members of the
committee, I am Ari Schwartz. Thank you for the opportunity to appear
before you today to discuss our views on the Federal Cybersecurity Risk
Determination Report and Action Plan. I do so in my role as coordinator
of the Cybersecurity Coalition, the leading policy coalition of
companies that develop cybersecurity products and services.\1\
---------------------------------------------------------------------------
\1\ About the Center for Cybersecurity Policy and Law and the
Cybersecurity Coalition: The Center for Cybersecurity Policy and Law is
a nonprofit (501(c)(6)) organization that develops, advances, and
promotes best practices and educational opportunities among
cybersecurity professionals. The Center provides a forum for thought
leadership for the benefit of those in the industry including members
of civil society and Government entities in the area of cybersecurity
and related technology policy. The Center seeks to leverage the
experience of leaders in the field to ensure a robust marketplace for
cybersecurity technologies that will encourage professionals,
companies, and groups of all sizes to take steps to improve their
cybersecurity practices. The Center hosts several initiatives focusing
on a range of critical cybersecurity issues, including the
Cybersecurity Coalition, Better Identity Coalition, and the Hardware
Component Vulnerability Disclosure Project. The Cybersecurity Coalition
brings together industry-leading companies to share their expertise and
unique perspective on critical policy issues, both in the United States
and internationally. The Coalition is focused on several active and
critical policy issues that require close alignment and coordination to
protect the vital interests of the cybersecurity products industry,
including: Promoting responsible vulnerability research and disclosure;
promoting effective privacy processes within cybersecurity policy;
establishing Government requirements for agency systems; increasing
information sharing and threat intelligence; and promoting sound
cybersecurity practices in government at all levels. Coalition members
include Arbor Networks, AT&T, CA Technologies, Cisco, Citrix,
Cybereason, Intel, McAfee, Mozilla, Palo Alto Networks, Rapid7, Red
Hat, and Symantec.
---------------------------------------------------------------------------
Over the past decade, the Federal Government has steadily moved
away from ``check box compliance'' mandates to a risk management
approach to address cybersecurity issues. Major steps in this move have
included:
The Cybersecurity Cross Agency Priority (CAP) goals,\2\
which ensured that agencies would receive individualized review
of their risk management plans;
---------------------------------------------------------------------------
\2\ See Obama Admin. Archives, Cross-Agency Priority Goal
Cybersecurity, available at https://
obamaadministration.archives.performance.gov/content/
cybersecurity.html.
---------------------------------------------------------------------------
The Federal Information Security Modernization Act of
2014,\3\ which provided authorities to increase risk
assessments of agencies;
---------------------------------------------------------------------------
\3\ Pub. L. 113-283.
---------------------------------------------------------------------------
The Cybersecurity National Action Plan, which created a
Federal chief information security officer (CISO) at the Office
of Management and Budget (OMB); and
Perhaps most notably, the Presidential Executive Order on
Strengthening the Cybersecurity of Federal Networks and
Critical Infrastructure,\4\ which required Federal agencies to
utilize the NIST Cybersecurity Framework \5\ to establish a
process to manage risk and holds agency heads accountable for
doing so.
---------------------------------------------------------------------------
\4\ Executive Order 13800.
\5\ Nat'l Inst. of Standards and Tech., Framework for Improving
Critical Infrastructure Cybersecurity, Version 1.0 (2014).
---------------------------------------------------------------------------
A risk management approach offers each agency the ability to focus
on their specific needs and enables them to demonstrate growth in their
cybersecurity efforts while taking steps to address the most critical
threats to their mission.
OMB's May 2018 Federal Cybersecurity Risk Determination Report and
Action Plan shows that, despite some limited progress, agencies have a
lot more to do to effectively manage cybersecurity risk.
This is not an unexpected result. Agencies are not adequately
resourced to manage cybersecurity risk, and do not have proper cross-
departmental coordination processes to identify and resolve any
barriers to achieving this goal. The Federal Government has not
prioritized cybersecurity risk management and simply changing policies
to help agencies measure risk will not change their policies on its
own.
So what will change agencies' approaches to cybersecurity risk
management and drive real improvement? The May 2017 Executive Order had
the right idea. It is up to OMB and the President to hold agency
leadership accountable to improve.
The OMB Report suggests that chief information officers (CIOs) are
not empowered to make the necessary changes and suggests that
leadership should empower them to do so. While that is one approach
that seems to have worked for some agencies, we would recommend that to
really make a change in agencies, senior leadership needs to oversee
cybersecurity risk management. In other words, security officers should
not be reporting to the CIO, but to the deputy secretary or the
Secretary. A similar move has started to take place in private
companies where CISOs are no longer reporting to CIOs but to CEOs or
COOs or directly to the Board of Directors. This shift in thinking has
happened because CEOs and Boards of Directors have felt pressure to
improve cybersecurity at companies as the result of countless breaches
and incidents that have created real and material risk that simply
cannot be ignored or delegated to only the information technology
teams.
For this to work in the U.S. Government, the director of OMB, the
White House chief of staff, and the President must hold the Secretaries
directly accountable for cybersecurity risk management at the agencies.
Similarly, the deputy director for management at OMB must hold the
deputy secretaries accountable. Congress must adequately resource
agencies and hold the leadership at all levels accountable for managing
risk through public oversight. Without this accountability, other
measures, however well-intended and necessary, will not be able to
succeed to the extent needed to secure our Government.
At this point, every agency's leadership has been told that they
are responsible for the cybersecurity of their agencies. Agencies have
now been measured and have not fared well.
Now is the time to hold the agency leadership responsible for
failures and to rapidly address these known cybersecurity risks.
Mr. Ratcliffe. Thank you, Mr. Schwartz.
I now recognize the gentleman from New York, Mr. Donovan
for 5 minutes.
Mr. Donovan. Thank you, Mr. Chairman.
Thank you all for sharing your expertise with us but to
show you how I lack expertise I have a VCR back home it still
flashes 12 and you cannot see because you are facing us but all
the young people behind you now, Googling, ``What is a VCR?''.
So just so I can understand the problem properly, if we are
protecting our gold in Fort Knox and there is only one entrance
in there, we have a good chance of making sure anybody who gets
through there is a person that ought to get through unless they
are disguising themselves as someone else and I guess in your
field you would call that just looking like a friendly user to
get into a network when you are actually an infiltrator.
The difficulty is when you have more than one entrance I
guess or if you have secured your entrance but there are other
people who have entrances and are not securing it as well as
you are, that causes vulnerabilities in Fort Knox and causes
vulnerabilities in systems I suspect because it was hard for me
to grasp before I joined this committee on like, why cannot we
just protect this?
If we know, as much as the bad guy, do we anticipate what
they are going to do? I think Ms. Fowler you used word
resiliency and the Chairman used the word resiliency.
Before we have a tragedy or an intruder so could you kind-
of like frame the problem for me so I could understand it
because I think I have to understand the problem before we
could actually come up with or understanding what your
suggested solutions are?
Mr. Durbin. OK. Thank you for the question. It is a complex
situation, a lot of it has to do with the diversity of the
Federal Government, the diversity of the agencies, how they are
organized, some are more flat, some are federated, some have
more resources than others do so it is coming up with a common
baseline of what is it that we have and what is it that we are
trying to protect.
I believe that the CDM program in their Phase 1 certainly
is trying to fix that situation by doing that definition. Phase
1 the goal is to go out and identify all hardware and software
assets because some have made the comment and it is very true,
you cannot defend what you cannot see.
So now that we are closing in on the end of Phase 1, we
will have a much better look at what it is we are trying to
defend so that we know, what all those different entry points
are that you referred to and then we can work on providing
protections against all of those different attack vectors.
The other issues are legacy systems that we have talked
about. You have a disparity between different people's products
and solutions that they are using for access management or for
determining who is qualified, who has privileges to access a
certain system and should they have those accesses so a lot of
this needs to be discovered and baselined so that we have an
understanding of what the problems are and then we can come up
with solutions to solve them.
Mr. Donovan. Thank you.
Ms. Fowler.
Ms. Fowler. Yes. I am excited to hear you use the word
resilience because it really is about resilience. When you use
the example of gold that needs to be protected, it is not even
just against someone who trying to steal that gold but when we
think about the fact that the gold is housed somewhere, it is
in a container could it be impacted by a natural disaster,
could someone who is working there make a mistake, and that
would also cause us to lose our ability to access or use that
gold.
So we really want to look at this from a holistic
standpoint of not just trying to figure out what it is that an
adversary is trying to do but to understand what it is that is
most important to us and how we can ensure that it will not be
impacted in any negative way, right? From any sort of
disruption.
That really even starts before understanding what our
assets are and that is related to what we talked about with
having leadership have a real skin in this game. It is being
able to articulate and communicate what it is that we are
trying to achieve from a mission standpoint so you know,
organizations like Health and Human Services and Department of
Energy have different missions that they need to achieve, they
have different services that they are going to provide to
achieve those missions, and then the assets that support those
services are what we really need to protect. So it is the
identification of the assets that are important to each
mission.
The way we can use the limited resources that we have best
is to be able to articulate our risk appetite against those
assets that are in our organizations and make sure that
programs like CDM are focused on those.
So you know, my way of explaining this to you would be, let
us not just look at this in terms of a threat from a cyber
attack but a holistic, how do we protect against the impact of
any negative consequence?
Ms. Fowler, thank you.
Mr. Schwartz.
Mr. Schwartz. You talked about protecting the gold in Fort
Knox but that reminds me of a saying that they use in the
military about ``protecting diamonds and toothbrushes'' which
is, if we were to protect diamonds the same way as we protect
our toothbrushes, we would have a lot of toothbrushes and not
very many diamonds.
That is part of what both Mr. Durbin or Ms. Fowler are
discussing here, which is how do we do risk management in this
space, in a way where we can identify the assets and then do
the risk profile in a way that makes sure that we are
protecting that information in the right way that it needs to
be protected?
Prior to the NIST framework, the NIST Cybersecurity
Framework, which Mr. Durbin mentioned, the Federal Government
actually pretty much just had a list of the things you need you
for every system and did not really take the less important
systems or more important systems and kind-of do that balancing
test of how should we be protecting this particular system.
Now we are moving toward a time when we are doing that
kind-of risk management and that is what this OMB report's
really about, is how agencies are looking at risk in this
space; how are they identifying it, how do they do these
different pieces, right?
I break the NIST profile into identify, protect, detect,
respond, recover, which I break up into two pieces, one is the
defense side so the identify and protect, and then the other
side detect, respond, recover I think of as a resilience side,
as Ms. Fowler has been saying right?
So that is the how do you get to do both sides of that and
make sure you are doing it the right way for each system and
that is the kind of approach that now agencies are taking for
the most part but they still have problems in terms of actually
putting the protections in place, actually making sure that
they are resilient in the way that they need to be even for the
most critical systems.
Mr. Donovan. I thank you all again for your expertise.
Mr. Chairman, I yield back, which time I don't have any
more.
Mr. Ratcliffe. Well, thank the gentleman.
The Chair recognizes the Ranking Member, Mr. Richmond--the
Chair recognizes my friend and colleague from Rhode Island, Mr.
Langevin.
Mr. Langevin. Thank you, Mr. Chairman. I thank the Ranking
Member.
Thank the panel also for their testimony today, the
expertise, the insights that you bring to these challenging
topics.
Let me begin if I could with Mr. Schwartz, you spoke of the
need to hold Secretaries, not CISOs accountable for the
security of their agencies' networks and I certainly would
agree.
I remember what happened when a Secretary of Defense Ash
Carter started taking a deeper interest in this topic and doing
a deep-dive requiring weekly reports being given to him and
even on the issue of establishing a Bug Bounty Program when he
said, ``We are going to make this happen,'' he started telling
people and programs to get out of their way and make it happen,
it did.
So I can see the why it is so important to have Secretary
buy-in but you know, it seems that for years poor results on
FISMA scores have not been enough in other agencies though to
motivate action.
So my question is what could the administration do to
encourage real action to address these continued deficiencies
and ensure cybersecurity leadership at the highest levels and
again from your perspective why is it so important to have
Secretarial buy-in?
Mr. Schwartz. Thank you, Mr. Langevin. Thank you for your
continued leadership on these issues too.
I think there is a lot in that question in terms of, how do
we get leadership to actually focus on this?
I do think that the executive--or the Trump Executive Order
that came out in May 2017 actually put us in the right place,
which is before the Secretaries had all of their goals in place
they were told that cybersecurity was a major issue.
But it takes staying on top of that to do that. That means
holding Cabinet meetings around cybersecurity and the President
going around and asking each agency what they are doing,
holding up the report card from OMB and asking them, ``What are
you doing to do more,'' right? That is what really taking the
Executive Order and actually implementing it means in this
space.
I realize that there are a lot of other things going on but
that is what is going to make a difference in this area, is
making sure that the Secretary knows that they are going to be
going into a meeting and that they have to prepare for it and
the 50 people that follow them around and do every day and do
that thing for that day, this is going to be the thing that we
are doing today, right?
Therefore, everything needs to be in line and we need to
get the CISO in front of us so he can give us the answers of
what we need----
Mr. Langevin. Yes.
Mr. Schwartz. Rght? That is the only way that it is going
to change.
This is the same thing that is happening in the private
sector too, not every company is doing this, those that are,
are more successful.
Mr. Langevin. Yes. Yes, I would agree. I mean, if the top
people are not paying attention to this then clearly it becomes
a secondary priority but the President or the Cabinet
Secretaries are the ones that are driving this then clearly
everyone's going to stand up, shine the shoes, and get this
done the right way.
So, Mr. Schwartz, on another issue with small- and medium-
sized businesses have largely resorted to outsourcing not just
their IT but also the security of their IT given their limited
budgets. In a similar vein the OMB report suggests that shared
services are key to addressing risk management issues, yet we
have made little progress to that end.
So Mr. Schwartz, if you could, what barriers do agencies
face in getting to shared or outsourced services and how do we
overcome them?
Mr. Schwartz. Yes. The shared services one is a tricky
problem for a lot of agencies. Part of it is just the culture
of the fact that they have had been doing internal security for
years and years and they have to move away from that and spend
the money on the cloud company doing the protections for them
rather than keeping that same security in-house.
The small agencies in particular, those that don't even
have a large IT department are never going to be able to have
enough security professionals and technology to protect
themselves, whereas the cloud companies specialize in that, the
managed security services specialize in that so there is a need
to move in that way.
I think the main challenges that they face are really
procurement challenges though because you know, you want to do
oversight of the agencies that you are in charge of doing
oversight over. If they are turning over a lot of their budget
to other agencies in order to run their services, you lose
oversight over their IT, right?
I understand that from a Congressional point of view but
that is how we are going to improve with the small- and medium-
size agencies, is by Members of Congress understanding that and
being willing to take the risk of saying, ``OK, we understand
that you are going in someone else's purview, we are losing
some control here.''
But we know, that that agency has security in place and
that they have oversight over what they are doing as well, and
our information being held by that agency and being overseen by
companies in that space that run the managed services in that
space is going to be acceptable.
Mr. Langevin. Very good.
Thank you for those answers. As you can imagine I have
several more but time is expired.
So I will yield back. I will have some questions to submit
for the record unless we go to a second round.
Thank you. Thank you all.
Mr. Ratcliffe. I thank the gentleman.
The Chair now recognizes the gentleman from Nebraska, Mr.
Bacon for 5 minutes.
Mr. Bacon. Thank you, Mr. Chairman. I appreciate it. Thank
you for coming in here and sharing your expertise.
I used to work in the cyber offensive side a little bit,
cyber intelligence side, and we have some of the best
capabilities in the world there but we were also the most
vulnerable when it comes to defense and other people cyber
attack. I heard a cyber leader once describ us as living in a
big glass house and we had the biggest rocks, not very
comforting at times.
One of the things that the OMB and DHS report calls for is
the consolidations of the Security Operations Center and
instead of each one having their own by consolidating it to one
big one, do you see that as a significant advantage or does
having this does it make everybody equally vulnerable if you
get into one, you get in everybody?
So I would like to have your thoughts on that. Thank you.
Mr. Durbin. Yes. Thanks for the question. So having a SOC
for the sake of having a SOC may not be the best strategy. It
comes down to your ability to stand up a SOC that has the right
tools and capabilities to accomplish what it is you are trying
to do.
So if you are in a position where it would be better for
you to merge with somebody else's SOC that has proven
technologies and has the access capability that might be the
better way to go so I agree with the recommendation of the
report, the consolidation of SOCs will improve some
efficiencies.
Mr. Bacon. So it gives the best capabilities available for
everybody----
Mr. Durbin. Exactly. Yes. Now----
Mr. Bacon. It standardizes the best----
Mr. Durbin. Yes.
Mr. Bacon. OK.
Mr. Durbin. Yes and of course you need to make sure that
you consolidate to a SOC that does have the excess capacity and
that does have the tools in place----
Mr. Bacon. Right.
Mr. Durbin. That are going to accomplish the mission.
This recommendation was also made around the idea of
improving the ability to detect data ex-filtration and simply
consolidating SOCs may not accomplish that. You know, the SOC
has to have the right tools and to be able to discover where
the data lives and tag that data as sensitive so that you can
then monitor----
Mr. Bacon. But by consolidating we can invest in that one
and make sure that we have the best capabilities----
Mr. Durbin. Exactly.
Mr. Bacon. I would say, but would you all just agree?
Mr. Schwartz. Agreed.
Mr. Bacon. OK.
Ms. Fowler. Yes.
Mr. Bacon. Are we doing better Mr. Schwartz, when it comes
to sharing intel data because we don't have a lot of silos. I
mean, you touch on this with Mr. Langevin a little bit but are
we doing better making progress?
Mr. Schwartz. There is some progress there. I think a lot
of the private sector is still really frustrated. A lot of it
comes down to getting security clearances and the right people
getting the information so I still hear a lot of frustration.
I think internally inside the Government it has gotten a
lot better though----
Mr. Bacon. It seems to be having a combined security
operation center allows you to share that data faster because
you can see where there is infiltration or ex-filtration.
I had a just a question Mr. Durbin because this fascinates
me. Evidently, you have talked about a group, well, let me just
read it here, ``Symantec has engaged regarding a new attack
group known as `Thrip','' and the ways in which they are living
off the land in order to get info systems,'' can you talk about
this new threat and living off the land, what does that mean
and what kind of a cyber threat is this?
Mr. Durbin. So living off the land is how we are describing
a technique where if an attack group creates a complex
sophisticated piece of malware that they use to infiltrate a
system, it is going to be relatively easier to detect that
because we haven't seen it before, it doesn't look right, it
raises a flag so if an attack group can utilize a network
administration tool that administrators commonly used to scan
networks to see what they have and somebody sees that activity
inside the network it is not going to raise a flag----
Mr. Bacon. It's camouflaged?
Mr. Durbin. Yes, they could say, OK, well somebody's just
scanning the network because that is part of what they do----
Mr. Bacon. Right.
Mr. Durbin. So that--and that is just one example using
PowerShell scripts and things, is just ways to mask their
abilities so it is not as easy to detect.
Mr. Bacon. It makes sense.
One last question, I know, the Russians use a lot of
phishing techniques, that is how they entered the DNC server.
It seems to me that makes us the most vulnerable, is that
technique. What can we do to better defend against these
phishing techniques that are going on?
I will just open up to whoever feels like they have the
best answer.
Ms. Fowler. Go ahead.
Mr. Schwartz. I would say getting better identity
management is really the key to the phishing techniques. I
mean, right now, a lot of times we still rely on username,
passwords, and moving toward techniques that move beyond that.
They talk about that a bit in the report that there has
been a move toward use of cards sort-of which I think does help
to some degree inside the Government but it is really about the
credential and whether you can secure that credential.
Ms. Fowler. We absolutely do see phishing as one of the
most common vectors for having attacks occur. A couple of
things that we need to do.
One is training although we know, that no matter how much
we train people over and over it takes just one person to hit
the link and cause the issue to occur so thinking about
advances in terms of automation and analytics and the things
that we are doing in the areas of Machine Learning.
So this is going to take us advancing past our adversaries'
capabilities and investing in the research that will get us
there.
Mr. Bacon. Thank you, Mr. Chairman.
Mr. Ratcliffe. The Chair now recognizes my friend from
Louisiana, Mr. Richmond.
Mr. Richmond. Thank you, Mr. Chairman. I think you touched
on it a little bit but from my perspective, when it comes to
Federal network security I see at least two systematic problems
but they stem directly from the White House, one of which is
the tendency to undercut or diminish the role of authority
figures, eliminating the cybersecurity coordinator is a good
example.
Second, it is taking far too long to fill senior positions
like chief information officers and at the end of last year
nearly one-third of the agencies were still operating without a
permanent CIO and the Federal CIO was not named until January
and the Federal CISO was selected just last week.
How important is strong, clear leadership structures when
it comes to cybersecurity particular for an agency trying to
instill a culture of risk awareness? I know, Mr. Schwartz you
mentioned having a chief executive that will hold people's feet
to the fire, the question becomes can that be delegated and
without a cybersecurity coordinator, where do we find
ourselves?
So anyone can answer that, let us start with Mr. Schwartz.
Mr. Schwartz. Yes. I have always felt that the
cybersecurity coordinator should be I mean, it should be
brought up to be a deputy level.
There was a commission, the Obama Commission that was
preparing for the next President, suggested that it be raised
to an assistant to the President but I actually think it makes
sense to have it at the deputy level particularly for the
reason of being able to call out deputy secretaries on these
kinds of issues and make sure that they are held accountable.
Getting rid of that position totally I think is a step
backward from being able to do that. I mean, you can have a
deputy play that role but they are going to have 90 other jobs,
right? So how much time can they actually spend calling up
deputies and asking them how they are doing on cybersecurity or
if you are supposed to be having someone dedicated toward just
doing, offensive capabilities, defensive capabilities inside
the Government as well as critical infrastructure protection
too but having this one piece be part of their job as a deputy
at the level of deputies I think makes a lot of sense.
So again, I think that they took a major step backward by
getting rid of the position totally rather than elevating it
the way they should have.
Ms. Fowler. I agree that governance and leadership are the
most critical first step in establishing good cyber risk
management practices. It is also a matter of making sure that
the work force itself who is in those positions are trained in
these areas and understand how to manage cyber risk like other
risks are managed.
We often look at cybersecurity as something that is special
or not understood and really, we need to manage cyber risk like
we manage other risks inside of the organization and that is a
matter of using those limited resources in the best way
possible.
So the leaders that we do put in place it is incumbent that
they set that risk appetite and understand what the tolerance
ranges are for that organization and communicate those to the
work force.
The work force is doing the absolute best that they can to
do all of the right technical things, it is just ensuring that
they are provided the guidance that it is going in the right
step so the governance aspect of this is that most important
first step.
Mr. Durbin. I would just simply add that no matter what
cybersecurity program you are trying to set up, it is key to
get buy-in from all levels of the organization and that is no
different with the Federal Government.
Mr. Richmond. Let me ask this because I think that it also
came up but the Federal Government's always lagging behind the
times and we are about 10 years back from where we should be in
terms of our cybersecurity.
How can Congress empower or provide the resources for our
Federal agencies to actually be proactive and better prepared
for the future and then anticipate the risk as opposed to
always been on the back end?
Ms. Fowler. So I will speak to that in terms of what I
think is required for us as a Nation to move forward and you
will see in the written testimony, I think this requires a
National initiative to address cybersecurity as a need across
all sectors.
You know, in 1961 we made this goal to put a human being on
the Moon and that sparked interest in a whole lot of different
science and technology that was developed. We need to have a
similar initiative which goes down into our education levels at
all levels starting very early which makes this a part of every
level of education so that the work force in the future is
prepared for this.
We saw this with Estonia when Estonia experienced their
crippling attacks, that Government decided to really put the
initiative forward to educate across all levels of their
citizenship and now, they are recognized maybe arguably but as
the No. 1 in cybersecurity in all of Europe.
I see that we need to put forth an educational initiative
that will prepare our work force for this in the future.
Mr. Richmond. Thank you. Thank you. I see that my time has
expired so I will just yield back.
Mr. Ratcliffe. Yes. Let me give you all--first of all, the
Chair recognizes himself for questions.
Ms. Fowler, I very much appreciated your remarks there and
I agree. I have talked about a cyber moonshot and identifying
an approach that will address some of the concerns that you
related and if you believe as I do that cybersecurity risks
present perhaps our greatest National security threat right now
and going forward then we need to have some sort of a cyber
moonshot to address those threats.
But I want to give each of the witnesses a chance to weigh
in on the Ranking Member's very good question, one that I had
as well.
So Mr. Durbin.
Mr. Durbin. If you were to take a look at the original CDM
documents 5 years ago and look at the projections of where they
thought they would be by now, we would be in much better shape.
There are reasons why we are not there yet. Phase 1 is a
critical phase, it builds the foundation. We basically had told
the agencies let us know, give us an inventory of all of your
assets so that we can then turn around and provide you with a
tool that is going to give you an accurate inventory count.
So there was no shock when after Phase 1 was deployed and
that tool was turned on, the number of assets in the agencies
was found to be severely under-reported.
That is a good thing. It is a good thing that we now have
visibility into what it is we are trying to protect so that
took more time than they originally thought.
So if we were to accelerate the other phases and let us get
to the point where we can automate the authority to operate
process, every 72 hours we are doing a scan, so an organization
knows you know, am I able to operate, do I have some
deficiencies that need to be repaired in kind-of real-time, I
think that would put us in a much better position.
They did add Data Protection as a Phase 4. I applaud them
for that but that is what the bad guys are after. They are
after the data so while we are trying to figure everything else
out, let us protect the data, let us lock that down.
Mr. Ratcliffe. Perfect. Thank you.
Mr. Schwartz.
Mr. Schwartz. Thank you, Mr. Chairman. This you know,
responding directly to your comments on this issue about the
cyber moonshot and the threat that comes from cyber and the
space compared to other threats. I mean, look at what we have
done on terrorism, right?
We have done a pretty good job in terms of trying to
resource-out how we protect this country from terrorism but we
have been told for the past 7 years that cyber is overtaking
terrorism as the most major threat to this country and we are
not getting the resources to cyber that we have for terrorism.
So I am not sure that that is a moonshot or what you call
it but there is this question of paying as much attention to
this problem as to address it in the way that we think of it as
the size problem that it actually is.
That is why I focus on you have to have Cabinet-level
meetings in order to do that, you have to put the resources
toward it that are commensurate with it and we are not doing
that now, so we cannot expect to get the results particularly
at small agencies in order to protect themselves when we are
not helping them out to do that.
Mr. Ratcliffe. Terrific. Thank you.
As I mentioned in my opening, the OMB and DHS report that I
think the specific number was 71 of 96 Federal agencies have
cybersecurity programs that are either at risk or at high risk
and a statistic that really jumped out at me as being
particularly disturbing and I am wondering if the number
surprised you as you read that and whether it does or not.
When we talk about reversing the trend there, I mean, I
mentioned CDM as a solution there but I want to make sure that
that we are talking about all the potential solutions to
reversing that trend and give you all the chance to weigh in on
making those points.
Mr. Durbin. So I guess the percentage did not surprise me
all that much given the fact that CDM is behind and that some
of the recommendations made in last year's Executive Order are
just now starting to take hold so again it did not surprise me.
I do see CDM as a way to fix a lot of what is in that
report instead of creating a new program, let us utilize what
is already there and let us improve it, let us empower it so
that we can target those specific issues and bring that
percentage down as quickly as possible.
Mr. Ratcliffe. Terrific. Thank you.
Ms. Fowler. I would agree that the 71 is not surprising. It
is also consistent with what we have seen through our work with
DHS, what the SEI has done with DHS in looking at the private
sector with the owners and operators of critical
infrastructure.
I would say that CDM in accelerating that program will be
help in terms of giving us visibility into what our
capabilities are.
Again, I do want to see us move toward an operational
resilience approach where even before we start thinking about
what it is in terms of a threat actor that we need to worry
about that we think about the most critical assets inside of
each organization.
Mr. Ratcliffe. So can I stop you there Ms.----
Ms. Fowler. Sure.
Mr. Ratcliffe [continuing]. Fowler because you talk about
that in terms of the resilience factor. Are there key metrics
that we can be looking at to determine how effective we are
being in terms of making progress on resilience?
Ms. Fowler. Absolutely. We do have something called the
``Cyber Resilience Review'' which is a set of questions that
look across 10 domains of cybersecurity and that can help give
a maturity measure of how you are doing in terms of the
completeness of the practices and also the institutionalization
or sophistication of the practices that you have in place.
The third element of that is something that you yourself
mentioned sir, which is efficacy of practice and that is
something that has been a concern and continues to be a concern
back at the SEI because we can be doing a lot of things very
well and they might not be the right things to do.
Much like we do in the medical industry, we set up very
scientifically rigorous tests and we do a lot of data analysis
behind whether or not those tests work in very specific ways.
We don't have a lot of those practices occurring in
cybersecurity to say, ``Does this control actually do what we
want it to do in the face of this threat?'' That is something
that I think that the Government could invest research in to
make sure that the efficacy of the practices is as good as the
completeness of the practices.
Mr. Ratcliffe. Great point. Thank you.
Mr. Schwartz I will give you the last word.
Mr. Schwartz. Sure. So I mean, I addressed this in my oral
testimony but just to take it a little bit further. I mean,
what do we do with agencies that are a high risk? Do we spend
more money there? Do you give them more money to continue to
fail? Do you fire people? So they have less people there to do
the job that they need to do.
I think each agency is a sort-of its own case and what we
need to do is give people a reason to succeed and make sure
that the leadership understands what they need to do to
succeed.
Sometimes there are a lot of barriers in the way to
success, OK, then you have got to tackle this one at a time and
get the right people from the entire agency in order to do that
and to address those one at a time but it involves digging in,
in each of those agencies and figuring out what the right path
to success is.
It is part of what risk management is but it is also just
management at an agency at this point.
Mr. Ratcliffe. Well I want to thank all of our witnesses.
This has been incredibly insightful and valuable for all of
us. Thank you all for being here today.
I also want to thank the Members of the committee for their
questions and remind them that they can submit additional
questions for the witnesses and it sounds like at least one of
the Members will and we will ask the witnesses to respond to
those in writing.
Pursuant to Committee Rule VII(D), the hearing record will
be held open for a period of 10 days.
Without objection, the subcommittee stands adjourned.
[Whereupon, at 11:40 a.m., the subcommittee was adjourned.]
A P P E N D I X
----------
Questions From Honorable Jim Langevin for Summer Fowler
Question 1. You spoke in your testimony about the importance of
understanding the potential effect of realized cyber threats. The 2015
OPM breach exposed a gap in OPM's understanding of the damage that
could result from the loss of security clearance records--a risk more
consequential to other Federal agencies.
What can the administration do to address cyber risk management
holistically, rather than agency by agency?
Answer. The Federal Government is an enterprise comprising
departments and agencies with specific objectives and missions that
support the larger Federal objective of serving the public. Addressing
cyber risks at this level requires an enterprise risk management (ERM)
approach. Carnegie Mellon University's Software Engineering Institute
developed an ERM process that is targeted at not only managing risks
but at ensuring organizational and mission resilience. Organizational
resilience is the ability for a department or agency to achieve its
mission before, during, and after a disruptive event (such as a cyber
attack) and to return to normal operations as soon as possible. Our 10-
step ERM process is shown in Figure 1.
figure 1: ensuring organizational resilience via erm
The process must begin by establishing governance, risk appetite,
and risk tolerance ranges. This should be done at the top levels of the
Federal Government and communicated down to all departments and
agencies so that they have an understanding of targets/goals for their
cybersecurity programs. This can be daunting at the enterprise level,
but it is a best practice that large private companies use to ensure
alignment of cybersecurity activities to overall business objectives.
While the cyber risks will still be owned and managed at the
department/agency level, this also provides a standardized way for
cross-agency dependencies and risks (e.g., risk of OPM data breach to
other agencies) to be communicated and managed.
Enterprise risk management addresses cyber risks holistically by
first focusing on mission objectives, critical assets, and requirements
before leaping to technical solutions. This process also provides a
structured way to develop measures and metrics to monitor performance
of cybersecurity and cyber risk management practices at an enterprise
level.
Unfortunately, if we were to comprehensively answer the question of
cyber risk management, detailing each step, our response would likely
be too long to be appropriate for this forum. However, both the CERT
Resilience Management Model (CERT-RMM) handbook \1\ and ``The 3 Pillars
of Enterprise Cyber Risk Management,''\2\ from the Insider Threat Blog,
are readily available on-line. Additionally, the SEI is more than happy
to schedule discussions with Rep. Langevin and his staff. This
invitation is of course extended to any Member and his/her staff.
---------------------------------------------------------------------------
\1\ https://resources.sei.cmu.edu/asset_files/Handbook/
2016_002_001_514462.pdf.
\2\ https://insights.sei.cmu.edu/insider-threat/2017/11/the-3-
pillars-of-enterprise-cyber-risk-management.html.
---------------------------------------------------------------------------
Question 2. One continuing challenge with prioritizing Federal
expenditures on cybersecurity controls is the lack of viable metrics
for assessing the effectiveness of those controls in reducing
cybersecurity risks.
What are the obstacles to closing that gap so that we can measure
the relative value of various cybersecurity controls? How is SEI
working to overcome those obstacles?
Answer. Thank you for recognizing and articulating this challenge.
Although cybersecurity is viewed as a technically advanced field of
study, we are still in our infancy when it comes to measuring efficacy
of capabilities. Other scientific fields such as medicine perform
rigorous studies following the scientific method with a hypothesis and
control groups to determine the efficacy of capabilities. In
cybersecurity, we are still relying on subject-matter expertise and
compliance as our primary tools for ``measuring'' capabilities.
The challenge in applying the scientific method is that in any
given instance of measuring a cybersecurity capability, there are
several factors to consider:
1. The operating environment and its configuration (e.g., a
computer server).
2. The cybersecurity control being applied and its configuration
(e.g., a firewall).
3. Potential threat(s) and/or threat actor(s) (e.g., criminal
hacker).
Each of these factors has multiple possible states that must be
tested. This means that testing the NIST 800-53 controls, for example,
would require tens of thousands of test cases to account for the
various operating environments, control configurations, and potential
threats. I have written more about measuring cybersecurity performance
in the CERT blog ``Cybersecurity Performance: 8 Indicators.''\3\
---------------------------------------------------------------------------
\3\ https://insights.sei.cmu.edu/insider-threat/2018/03/
cybersecurity-performance-8-indicators.html.
---------------------------------------------------------------------------
Carnegie Mellon University's Software Engineering Institute is
investing a portion of its Congressional Line Item research funding to
develop and validate a methodology for measuring the efficacy of a
cybersecurity practice. If successful, the community will have a new
methodology for measuring the cybersecurity of a system and be able to
rank order the importance of the controls needed to protect it. This is
a nascent concept and will require additional investment into research
and transition into practice, but it is an important step in making
scientifically valid improvements in cybersecurity. Future work will
use emerging artificial intelligence concepts to automate the
methodology and simplify the process.
Questions From Honorable Jim Langevin for Ari Schwartz
Question 1. Having served on the National Security Council, can you
speak to the cross-agency issues that are likely to emerge without a
Cybersecurity Coordinator at the White House?
Answer. In 2008, a Center for Strategic International Studies
(CSIS) bi-partisan Commission led by Chairman McCaul and Representative
Langevin called for:
``An assistant to the President for cyberspace, who directs and is
supported by a new office in the EOP--the National Office of
Cyberspace. This office would be small (10 to 20 people) and would
provide programmatic oversight for the many programs that involve
multiple agencies . . .
``Because cybersecurity requires coordination of activities across
agencies, the White House is the best place to locate this function. It
alone has the authority to ensure coordination. The most appropriate
place in the White House is the NSC.''\4\
---------------------------------------------------------------------------
\4\ ``Securing Cyberspace for the 44th Presidency: A Report by the
CSIS Commission on Cybersecurity for the 44th President'' December 2008
https://csis-prod.s3.amazonaws.com/s3fs-public/legacy_files/files/
media/csis/pubs/081208_securingcyberspace_44.pdf. See page 36.
When the Obama administration took office, it created a cyber
policy office in the NSC and put a special assistant to the President
in charge of this office with the title, White House Cybersecurity
Coordinator, reporting to the assistant to the President for Homeland
Security and Counterterrorism.\5\ At the time, several commentators
suggested that this role was ranked too low in the NSC structure given
the current and anticipated importance of cybersecurity for the Nation.
Nevertheless, this office grew to 10 to 15 people and became an
effective structure to coordinate and provide oversight and direction
for a wide range of programs and initiatives involving multiple
agencies. The office also became a focal point for interaction with the
private sector on high-level issues of policy and National security.
---------------------------------------------------------------------------
\5\ In my time at the White House, it was explained to me that for
the NSC: An assistant to the President is the Presidential Commissioned
Officer that could run meetings at the level of an agency head or
Secretary; a deputy assistant to the President could run coordination
meetings at deputy secretary; and a special assistant to the President
could run meetings at under secretary or assistant secretary. There
were exceptions to this rule but it gives a sense of overall hierarchy
in relation to the rest of the Executive branch.
---------------------------------------------------------------------------
Listing all of the successes of the cyber office since its
inception would be a considerable effort, but during my 2\1/2\ years at
NSC Cyber under the leadership of then-Cybersecurity Coordinator
Michael Daniel, we coordinated a number of important policies and
actions:
Creation and promotion of the NIST Cybersecurity Framework;
Creation of the Cyber Threat Intelligence Integration
Center;
The Executive Order on Cyber Sanctions;
Development of a working Vulnerabilities Equities Process;
Creation of a standards body for Information Sharing and
Analysis Organizations;
The remediation of the Heartbleed vulnerability and greatly
increased speed in patching critical vulnerabilities in
Government agencies;
Agreement with the Chinese government on norms related to
corporate espionage through cyber means;
Agreement among agencies on roles in cyber incident
response;
Implementation of U.S. Cyber Operations Plan (PPD-20), which
was drafted by NSC Cyber prior to my arrival;
Reconstituting the interagency Cyber Response Group (CRG);
Working with Congress to draft the Cybersecurity Information
Sharing Act (CISA), which passed and had implementation
coordinated by NSC Cyber after my departure; and
Sponsoring the successful White House Cybersecurity Summit
at Stanford University in February 2015, where companies
pledged to move forward on several important joint
cybersecurity projects with Government.
While the cybersecurity policy coordination in the U.S. Government
is by no means perfect, it improved demonstrably from where it was when
the CSIS Commission first made its recommendation.
In fact, in 2016 the bi-partisan President's Commission on
Enhancing National Cybersecurity \6\ again recommended that the
President elevate the current position of Cybersecurity Coordinator to
an assistant to the President. The report explains that the position
should have responsibility for bringing together the Federal
Government's efforts to protect its own systems and data and to secure
the larger digital economy, and as well as for informing and
coordinating with the director of the Office of Management and Budget
on efforts by the Federal chief information officer and chief
information security officer in order to secure Federal agencies.
---------------------------------------------------------------------------
\6\ https://www.nist.gov/sites/default/files/documents/2016/12/02/
cybersecurity-commission-report-final-post.pdf.
---------------------------------------------------------------------------
In general, I agree with both commissions that the special
assistant role was too low level to be as effective as possible.
However, instead of raising the level to an assistant to the President.
I would split the difference and suggest that the cyber coordinator be
a deputy assistant to the President. This would allow the NSC to work
closely with the deputy secretaries to make cybersecurity a lead issue
for every Cabinet agency and better create areas of consensus around
important new cyber policy, while still providing the ability to raise
major policy issues to a higher level when disagreement occurs.
The current administration has decided against all of these
approaches. It has demoted the role of NSC Cyber by not replacing the
cybersecurity coordinator and removed the related commissioned officer
position entirely. It also has demoted the Homeland Security and
Counterterrorism advisor to a deputy. While this may still provide a
tenuous hold onto the increased coordination among agencies that was so
hard-earned over the last decade, I am concerned that eventually this
coordination will decline and the result will be a de-prioritization of
cybersecurity as a National security issue. Either there will be a
cybersecurity incident that causes confusion among agencies, or the old
rivalries and petty squabbles among agencies will return at a time when
the White House leadership is not able to organize and offer a
consensus path forward.
I find the decision to demote the NSC Cyber particularly
frustrating because at the beginning of this administration there
seemed to be the possibility that greater progress could be made toward
increased coordination.
Question 2. Having been intimately involved with a very successful
cybersecurity Executive Order, EO 13636, and the NIST Cybersecurity
Framework that came out of it, what is your impression of how agencies
are making use of the CSF now that they are mandated to?
Answer. The NIST Cybersecurity Framework (``CSF'') was designed to
provide standards, guidelines, and best practices to help entities
manage cybersecurity-related risk. Conversely, the CSF was not designed
to provide a prescriptive set of requirements that must be satisfied in
order to achieve a desired outcome. This risk-management approach can
be distinguished from the checklist-oriented compliance style that many
agencies have historically relied upon. Following the implementation of
EO 13636, which created the CSF with a focus on critical infrastructure
organizations, it has been encouraging to see that the current
administration required agency use of the CSF with EO 13800.
Agencies are clearly adapting to the risk-management approach and
incorporating it into agency practices. However, risk management as an
approach must permeate beyond the IT departments and must have buy-in
more broadly among other parts of Government in order for the CSF to
have the desired impact.
In particular, the inspector generals (IGs) must begin to
understand how to audit properly to a risk-based approach. Too often
the IGs seem to want to return to the checklist of cybersecurity
controls. Under a risk-based approach like those encouraged under the
CSF, an auditor must not only make a determination if the organization
is implementing controls, but if the organization is prioritizing the
implementation of controls properly.
To be fair, measuring a risk-based approach to cybersecurity
management is more challenging than simply running through a list of
things to determine whether they are being done or not. However, we
should not allow that challenge to deter progress. Risk-based
management is a well-understood approach, and is used extensively by
the most sophisticated organizations in both the public and private
sectors, with demonstrable results.
[all]
| MEMBERNAME | BIOGUIDEID | GPOID | CHAMBER | PARTY | ROLE | STATE | CONGRESS | AUTHORITYID |
|---|---|---|---|---|---|---|---|---|
| Smith, Lamar | S000583 | 8177 | H | R | COMMMEMBER | TX | 115 | 1075 |
| Thompson, Bennie G. | T000193 | 8020 | H | D | COMMMEMBER | MS | 115 | 1151 |
| Langevin, James R. | L000559 | 8140 | H | D | COMMMEMBER | RI | 115 | 1668 |
| Rogers, Mike D. | R000575 | 7788 | H | R | COMMMEMBER | AL | 115 | 1704 |
| McCaul, Michael T. | M001157 | 8166 | H | R | COMMMEMBER | TX | 115 | 1804 |
| Richmond, Cedric L. | R000588 | 7960 | H | D | COMMMEMBER | LA | 115 | 2023 |
| Keating, William R. | K000375 | 7975 | H | D | COMMMEMBER | MA | 115 | 2025 |
| Barletta, Lou | B001269 | 8129 | H | R | COMMMEMBER | PA | 115 | 2054 |
| Payne, Donald M., Jr. | P000604 | 8373 | H | D | COMMMEMBER | NJ | 115 | 2097 |
| Perry, Scott | P000605 | H | R | COMMMEMBER | PA | 115 | 2157 | |
| Vela, Filemon | V000132 | H | D | COMMMEMBER | TX | 115 | 2167 | |
| McSally, Martha | M001197 | H | R | COMMMEMBER | AZ | 115 | 2225 | |
| Watson Coleman, Bonnie | W000822 | H | D | COMMMEMBER | NJ | 115 | 2259 | |
| Rice, Kathleen M. | R000602 | H | D | COMMMEMBER | NY | 115 | 2262 | |
| Katko, John | K000386 | H | R | COMMMEMBER | NY | 115 | 2264 | |
| Ratcliffe, John | R000601 | H | R | COMMMEMBER | TX | 115 | 2268 | |
| Hurd, Will | H001073 | H | R | COMMMEMBER | TX | 115 | 2269 | |
| Donovan, Daniel M., Jr. | D000625 | H | R | COMMMEMBER | NY | 115 | 2293 | |
| Barragan, Nanette Diaz | B001300 | H | D | COMMMEMBER | CA | 115 | 2311 | |
| Demings, Val Butler | D000627 | H | D | COMMMEMBER | FL | 115 | 2320 | |
| Higgins, Clay | H001077 | H | R | COMMMEMBER | LA | 115 | 2329 | |
| Bacon, Don | B001298 | H | R | COMMMEMBER | NE | 115 | 2337 | |
| Fitzpatrick, Brian K. | F000466 | H | R | COMMMEMBER | PA | 115 | 2345 | |
| Garrett, Thomas A., Jr. | G000580 | H | R | COMMMEMBER | VA | 115 | 2353 | |
| Gallagher, Mike | G000579 | H | R | COMMMEMBER | WI | 115 | 2355 | |
| Estes, Ron | E000298 | H | R | COMMMEMBER | KS | 115 | 2358 | |
| Lesko, Debbie | L000589 | H | R | COMMMEMBER | AZ | 115 | 2368 | |
| Jackson Lee, Sheila | J000032 | 8174 | H | D | COMMMEMBER | TX | 115 | 588 |
| King, Peter T. | K000210 | 8064 | H | R | COMMMEMBER | NY | 115 | 635 |

Disclaimer:
Please refer to the About page for more information.