Featured CISA Issues Preliminary Cross-Sector Cybersecurity Goals and Objectives for Critical Infrastructure Control Systems | Akin Gump Strauss Hauer & Feld LLP

Published on September 30th, 2021 📆 | 4225 Views ⚑

0

CISA Issues Preliminary Cross-Sector Cybersecurity Goals And Objectives For Critical Infrastructure Control Systems – Technology


iSpeech.org

United States:

CISA Issues Preliminary Cross-Sector Cybersecurity Goals And Objectives For Critical Infrastructure Control Systems

To print this article, all you need is to be registered or login on Mondaq.com.

On September 22, 2021, as required by President Biden's National Security Memorandum of July 28, 2021,
the Department of Homeland Security's (DHS) Cybersecurity and
Infrastructure Security Agency (CISA) issued preliminary cross-sector cybersecurity
performance goals and objectives for critical infrastructure
control systems. CISA developed these goals and objectives-which
are currently voluntary-in coordination with the Department of
Commerce's National Institute of Standards and Technology
(NIST) after an "initial crosswalk of available control system
resources and recommended practices . . . produced by the
government and the private sector." They are "intended to
provide a common understanding of the baseline security practices
that critical infrastructure owners and operators should follow to
protect national and economic security, as well as public health
and safety."

As we noted here, the National Security Memorandum
established "a voluntary initiative intended to drive
collaboration between the Federal Government and the critical
infrastructure community to improve cybersecurity of control
systems." It also directed DHS to "lead the development
of preliminary cross-sector control system cybersecurity
performance goals as well as sector-specific performance
goals." The preliminary goals were due September 22, 2021, and
final cross-sector and sector-specific goals are due in July 2022.
Secretary of Homeland Security Alejandro N. Mayorkas and Secretary
of Commerce Gina Raimondo described the goals and objectives as
"part of a long overdue, whole-of-government effort to meet
the scale and severity of the cybersecurity threats facing our
country." And while they are not mandatory or legally
enforceable in their current form, Secretaries Mayorkas and
Raimondo also noted that it is "vital that critical
infrastructure owners and operators immediately take steps to
strengthen their cybersecurity posture toward these high-level
goals."





The preliminary goals span nine categories, and each includes
"specific objectives that support the deployment and operation
of secure control systems that are further organized into baseline
and enhanced objectives." The "baseline" objectives
"represent recommended practices for all control system
operators" while the "enhanced" objectives
"include practices for critical infrastructure supporting
national defense; critical lifeline sectors (i.e. energy,
communications, transportation, and water); or where failure of
control systems could have impacts to safety." The nine
categories-the order of which CISA notes "is not intended to
imply a prioritization or specific progression of
operations"-are:

  1. This includes identifying and documenting
    cybersecurity risks to control systems using established
    recommended practices and providing dedicated resources to address
    cybersecurity risk and resiliency.
  2. This
    includes integrating cybersecurity and resilience into system
    architecture and design in accordance with established recommended
    practices "for segmentation, zoning, and isolating critical
    systems" and regularly reviewing and updating them to include
    lessons learned from operating experience.
  3. This includes documenting and controlling
    "hardware and software inventory, system settings,
    configurations, and network traffic flows throughout control system
    hardware and software lifecycles."
  4. This includes
    limiting physical access to "systems, facilities, equipment,
    and other infrastructure assets, including new or replacement
    resources in transit, . . . to authorized users" and securing
    against "risks associated with the physical
    environment."
  5. This includes protecting "the
    control system and its data against corruption, compromise, or
    loss."
  6. This includes implementation of "continuous
    monitoring of control systems cybersecurity threats and
    vulnerabilities."
  7. This
    includes training personnel "to have the fundamental knowledge
    and skills necessary to recognize control system cybersecurity
    risks and understand their roles and responsibilities within
    established cybersecurity policies, procedures, and
    practices."
  8. This includes implementation and testing of "control system
    response and recovery plans with clearly defined roles and
    responsibilities."
  9. This includes identification of risks "associated with control
    system hardware, software, and managed services" and
    establishment of policies and procedures "to prevent the
    exploitation of systems through effective supply chain risk
    management."

CISA also provides "Sample Evidence of Implementation"
for each set of goals and objectives "to demonstrate what
successful implementation . . . might entail for an
organization." In other words, "[s]uccessfully
implementing all baseline objectives would equate to successful
implementation of a goal." In addition, CISA states that
"while all of the goals . . . are foundational activities for
effective risk management, they represent high-level cybersecurity
best practices." But "[i]mplementation of the
[preliminary] goals and objectives . . . is not an exhaustive guide
to all facets of an effective cybersecurity program." Rather,
CISA and NIST developed and refined the preliminary goals
"with as much interagency and industry input as practical for
the initial timeline using existing coordinating bodies. DHS
expects to conduct much more extensive stakeholder engagement as
the goals are finalized" by July 2022.

Our sense is that the extent to which incorporating such goals
and objectives into a cybersecurity program would be challenging or
costly will depend heavily on the characteristics of existing
programs (if any) and what specific actions would be relevant and
feasible for each affected entity. Indeed, there likely will be
much variability from entity to entity. However, two main features
of the preliminary goals and objectives stick out. First, they are
clear, concise and straightforward. While implementation likely
would vary across sectors and entities, they are at least well
organized and easy to understand. And second, CISA provided
"Sample Evidence of Implementation" notes for each goal
and objective, which likely would prove highly useful in measuring
and, as needed, demonstrating progress and performance going
forward. With regard to next steps, it would be prudent for
affected control system owners and operators in relevant critical
infrastructure sectors to review the preliminary goals and
objectives in detail and begin to think about any necessary
adjustments to their cybersecurity programs and practices that
might be necessary to meet them. Beginning this work well in
advance of the final cross-sector and sector-specific goals next
year could pay significant dividends over time.

The content of this article is intended to provide a general
guide to the subject matter. Specialist advice should be sought
about your specific circumstances.

POPULAR ARTICLES ON: Technology from United States

Updated 09.16.2021: Digital Asset SEC Timeline

Perkins Coie LLP

The Digital Asset SEC Timeline serves as an interactive compilation of select SEC guidance, enforcement actions, and speeches relating to the application of the federal securities laws to digital assets.

Source link

Tagged with:



Comments are closed.