Protecting Critical Infrastructure: A New Approach - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Government // Cybersecurity

Protecting Critical Infrastructure: A New Approach

NIST's cyber-security framework gives critical-infrastructure operators a new tool to assess readiness. But will operators put this voluntary framework to work?

Download the entire May issue of InformationWeek Government, distributed in an all-digital format (registration required).

Symantec may not fit the image of a US critical-infrastructure operator, but it wasted little time reassessing its security practices using a set of national cyber-security guidelines released in February by the National Institute of Standards and Technology.

The Framework for Improving Critical Infrastructure Cybersecurity, developed over the past year at the White House's direction, gives executives in 16 critical-infrastructure industries -- including communications, defense, energy, financial services, health, transportation, and water -- a new tool for assessing and improving their organizations' cyber-security posture.

The guidelines are voluntary. But because they represent the recommendations of hundreds of public- and private-sector organizations and companies, rather than just government, industry experts are optimistic that companies will take them seriously. The framework is labeled Version 1.0 and will evolve as needs are identified and addressed, says NIST director Patrick D. Gallagher.

"We are really happy with how the framework ended up," says Jeff Greene, senior policy counsel for Symantec, which has begun using the framework to evaluate its own practices. "It's a good tool for organizations of all sizes. I was surprised at how useful our people found it." As would be expected of a large IT security vendor, Symantec already had a sophisticated security program, but "we are using it as a way to look at everything we're doing."

Paul Martini, CEO of Iboss Network Security, sees the framework as "a good first step" toward improving the security of privately owned facilities.

NIST and industry officials maintain that, while it's in the interests of critical-infrastructure operators to follow the framework, it will still take incentives from Congress and prodding from regulators to ensure widespread adoption. And even if the operators follow the NIST guidelines to the letter, they may only deter and not thwart sophisticated attackers.

One of the criticisms of the framework is that it doesn't tell critical-infrastructure operators what to do or which tools to use. It's technology-neutral: Product choices are left to each operator as risks are identified and addressed. "I understand the lack of specificity," says Ed Hammersla, Raytheon's managing director of cyber-security products. Only broad guidelines can address common issues across a wide range of industry sectors and organizational sizes and types. But even as threats and technology change, the framework's guidelines should remain relevant, Hammersla says.

Another criticism is that the framework will serve as a back door for more government regulation. Although following the guidelines is voluntary, former White House cyber-security adviser Richard Clarke called the framework a "semi-coercive" effort that threatens those that don't adopt it with liability and lawsuits.

Index to proven standards
The framework's main components are vetted industry and government standards and best practices for identifying, detecting, protecting against, and responding to threats and attacks.

The framework's strength, says Unisys chief information security officer Dave Frymier, is its cross-industry taxonomy and index to NIST, ISO/IEC, COBIT, and other technical guidelines for assessing risks and managing and protecting IT assets. "People think this is a compliance document. It's really a scorecard," Frymier says. But for the first time, "you can compare your security posture across your industry," he says, praising NIST for "creating a framework that can be tailored to different industries."

'The Cybersecurity Framework is a 'foundation for a solution' for protecting the nation's infrastructure.' -- Harry D. Raduege, chairman, Deloitte Center for Cyber Innovation
"The Cybersecurity Framework is a 'foundation for a solution' for protecting the nation's infrastructure." -- Harry D. Raduege, chairman, Deloitte Center for Cyber Innovation

While the impetus for the framework was a presidential executive order issued in February 2013, its roots run much deeper.

"The voluntary framework owes its existence in large part to the failure of Congress to achieve consensus on this issue through 2012," says Ian Wallace, a visiting fellow with the Brookings Institution's Center for 21st Century Security and Intelligence and formerly of the British Ministry of Defense. Harry D. Raduege, a member of the Commission on Cybersecurity for the 44th Presidency, dates the origins of the framework to a 2008 report from the commission, which called cyber-security a major national security problem and recommended, among other things, regulating cyberspace and updating US computer law. Although Congress introduced numerous bills during the next three congressional sessions, none of them were passed. "We were in complete gridlock," Raduege says.

Raduege, former director of the Defense Information Systems Agency and now chairman of the Deloitte Center for Cyber Innovation, doesn't think the resulting document is a second-best alternative to federal regulation. He called it "a foundation for a solution."

Three-tiered approach
The main element of the NIST framework, which isn't designed to replace existing security programs, is a set of industry and government

Next Page

William Jackson is writer with the <a href="" target="_blank">Tech Writers Bureau</A>, with more than 35 years' experience reporting for daily, business and technical publications, including two decades covering information ... View Full Bio

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
1 of 2
Comment  | 
Print  | 
More Insights
Oldest First  |  Newest First  |  Threaded View
User Rank: Author
5/14/2014 | 11:28:37 PM
Supply chain application
During a May 13-14, 2014 forum, a White House Aid, Ari Schwartz said that one of the ways the Cybersecurity Framework is being put to special use is with companies trying to guard against weak links in their supply chains.  He explained for isntance how banks, with their own security standards, nonetheless are using the common templated from the Framework to assess the security posture of some of the companies/industries that serve as suppliers to banks.


InformationWeek Is Getting an Upgrade!

Find out more about our plans to improve the look, functionality, and performance of the InformationWeek site in the coming months.

How CIO Roles Will Change: The Future of Work
Jessica Davis, Senior Editor, Enterprise Apps,  7/1/2021
A Strategy to Aid Underserved Communities and Fill Tech Jobs
Joao-Pierre S. Ruth, Senior Writer,  7/9/2021
10 Ways AI and ML Are Evolving
Lisa Morgan, Freelance Writer,  6/28/2021
White Papers
Register for InformationWeek Newsletters
Current Issue
Flash Poll