Krypt3ia

(Greek: κρυπτεία / krupteía, from κρυπτός / kruptós, “hidden, secret things”)

7 Key Elements for Fed Cybersecurity

leave a comment »

Below are 7 key points to a Gartner report on the future of Federal Cyber Security and it’s failures thus far. I agree with these points en toto and would add this. Make the CISO office have some power to affect change and enforce the requirements for information security as well as technical security.

I would also add that this CISO position should also be attended by an agency solely devoted to infosec and all its aspects.

Like mom used to say: “If you aren’t going to do it right, don’t do it at all”

Full article here

  1. Stop Studying and Start Acting – There have been plenty of existing efforts to define and measure the shortcomings of cybersecurity, so there is no need to reinvent the wheel.
  2. Harmonize Federal Security Standards with Commercial Equivalents – Although there will always be a need for higher levels of security than commercial standards allow, harmonizing the base level will eliminate duplication and waste and enable the government to drive suppliers to higher levels of security more easily. Similar harmonization at the federal level of data privacy and disclosure rules is needed, as well.
  3. Use Purchasing Power to Drive Security to be Built-In – Because the key to increasing cybersecurity lies in reducing vulnerabilities, all government software procurements should require application vulnerability testing as part of the acceptance criteria.
  4. Evaluate Existing Regulations and Rejuvenate Enforcement – There are areas where federal legislation is needed to harmonize conflicting state laws, but the biggest bang for the federal buck will be in the actual enforcement of existing rules and regulations.
  5. Keep Offense and Defense Separate – The primary goal of a cybersecurity strategy must be to make attacks ineffective through prevention rather than detect successful attacks by enabling surveillance. Combining the two functions will inevitably result in lower levels of security and possibly increased privacy violations.
  • Reward Best Practices – Most of the publicity tends to go toward the government agencies with low Federal Information Security Management Act scores in annual audits, and currently there seems to be little or no effort to spread best practices across agencies.
  • Establish a Federal Chief Information Security Office, Not a Cybersecurity Czar – The bottom line is that increasing the national cybersecurity is an operations issue. The problems are well-understood, solutions are known, and gaps have been identified. Organizations with high security in private industry and government almost invariably have a strong security office and a chief information security officer, and that should be the model that the U.S. government follows.
  • Written by Krypt3ia

    2009/06/04 at 13:21

    Leave a Reply

    Fill in your details below or click an icon to log in:

    WordPress.com Logo

    You are commenting using your WordPress.com account. Log Out / Change )

    Twitter picture

    You are commenting using your Twitter account. Log Out / Change )

    Facebook photo

    You are commenting using your Facebook account. Log Out / Change )

    Google+ photo

    You are commenting using your Google+ account. Log Out / Change )

    Connecting to %s

    %d bloggers like this: