[Senate Hearing 113-295]
[From the U.S. Government Printing Office]
S. Hrg. 113-295
THE CYBERSECURITY PARTNERSHIP
BETWEEN THE PRIVATE SECTOR
AND OUR GOVERNMENT: PROTECTING OUR
NATIONAL AND ECONOMIC SECURITY
=======================================================================
JOINT HEARING
before the
COMMITTEE ON COMMERCE,
SCIENCE, AND TRANSPORTATION
and the
COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS
UNITED STATES SENATE
ONE HUNDRED THIRTEENTH CONGRESS
FIRST SESSION
__________
MARCH 7, 2013
__________
Printed for the use of the Committee on Commerce, Science, and
Transportation
----------
U.S. GOVERNMENT PRINTING OFFICE
88-180 PDF WASHINGTON : 2014
-----------------------------------------------------------------------
For sale by the Superintendent of Documents, U.S. Government Printing
Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800;
DC area (202) 512-1800 Fax: (202) 512-2104 Mail: Stop IDCC,
Washington, DC 20402-0001
SENATE COMMITTEE ON COMMERCE, SCIENCE, AND TRANSPORTATION
ONE HUNDRED THIRTEENTH CONGRESS
FIRST SESSION
JOHN D. ROCKEFELLER IV, West Virginia, Chairman
BARBARA BOXER, California JOHN THUNE, South Dakota, Ranking
BILL NELSON, Florida ROGER F. WICKER, Mississippi
MARIA CANTWELL, Washington ROY BLUNT, Missouri
FRANK R. LAUTENBERG, New Jersey MARCO RUBIO, Florida
MARK PRYOR, Arkansas KELLY AYOTTE, New Hampshire
CLAIRE McCASKILL, Missouri DEAN HELLER, Nevada
AMY KLOBUCHAR, Minnesota DAN COATS, Indiana
MARK WARNER, Virginia TIM SCOTT, South Carolina
MARK BEGICH, Alaska TED CRUZ, Texas
RICHARD BLUMENTHAL, Connecticut DEB FISCHER, Nebraska
BRIAN SCHATZ, Hawaii RON JOHNSON, Wisconsin
WILLIAM COWAN, Massachusetts
Ellen L. Doneski, Staff Director
James Reid, Deputy Staff Director
John Williams, General Counsel
David Schwietert, Republican Staff Director
Nick Rossi, Republican Deputy Staff Director
Rebecca Seidel, Republican General Counsel and Chief Investigator
SENATE COMMITTEE ON HOMELAND SECURITY
AND GOVERNMENTAL AFFAIRS
THOMAS R. CARPER, Delaware, Chairman
CARL LEVIN, Michigan TOM COBURN, Oklahoma, Ranking
MARK L. PRYOR, Arkansas JOHN McCAIN, Arizona
MARY L. LANDRIEU, Louisiana RON JOHNSON, Wisconsin
CLAIRE McCASKILL, Missouri ROB PORTMAN, Ohio
JON TESTER, Montana RAND PAUL, Kentucky
MARK BEGICH, Alaska MICHAEL B. ENZI, Wyoming
TAMMY BALDWIN, Wisconsin KELLY AYOTTE, New Hampshire
HEIDI HEITKAMP, North Dakota
Richard J. Kessler, Staff Director
John P. Kilvington, Deputy Staff Director
Beth M. Grossman, Chief Counsel
Keith B. Ashdown, Republican Staff Director
Christopher J. Barkley, Republican Deputy Staff Director
Andrew C. Dockham, Chief Counsel
C O N T E N T S
----------
Page
Hearing held on March 7, 2013.................................... 1
Statement of Senator Rockefeller................................. 1
Prepared statement........................................... 3
Statement of Senator Carper...................................... 4
Prepared statement........................................... 6
Statement of Senator Thune....................................... 8
Statement of Senator Coburn...................................... 9
Prepared statement........................................... 10
Statement of Senator Warner...................................... 30
Statement of Senator Cowan....................................... 35
Statement of Senator Johnson..................................... 36
Statement of Senator Baldwin..................................... 38
Statement of Senator Pryor....................................... 40
Statement of Senator Ayotte...................................... 76
Witnesses
Hon. Janet Napolitano, Secretary, U.S. Department of Homeland
Security....................................................... 11
Prepared statement........................................... 13
Hon. Patrick D. Gallagher, Ph.D., Under Secretary of Commerce for
Standards and Technology, U.S. Department of Commerce.......... 19
Prepared statement........................................... 21
David E. Kepler, Chief Sustainability Officer, Chief Information
Officer, Business Services and Executive Vice President, The
Dow Chemical Company........................................... 42
Prepared statement........................................... 44
Gregory C. Wilshusen, Director, Information Security Issues, U.S.
Government Accountability Office............................... 48
Prepared statement........................................... 50
Appendix
American Gas Association, prepared statement..................... 83
Response to written questions submitted to Hon. Janet Napolitano
by:
Hon. Amy Klobuchar........................................... 88
Hon. Kelly Ayotte............................................ 89
Hon. Dan Coats............................................... 92
Hon. Ron Johnson............................................. 98
Response to written questions submitted to Hon. Patrick D.
Gallagher by:
Hon. Kelly Ayotte............................................ 101
Hon. Dan Coats............................................... 102
Hon. Ron Johnson............................................. 102
Response to written questions submitted to David E. Kepler by:
Hon. Amy Klobuchar........................................... 103
Hon. Dan Coats............................................... 104
Hon. Marco Rubio............................................. 105
Hon. Ron Johnson............................................. 106
Response to written questions submitted by Hon. Ron Johnson to
Gregory C. Wilshusen........................................... 106
THE CYBERSECURITY PARTNERSHIP
BETWEEN THE PRIVATE SECTOR
AND OUR GOVERNMENT: PROTECTING OUR NATIONAL AND ECONOMIC SECURITY
----------
THURSDAY, MARCH 7, 2013
U.S. Senate,
Committee on Commerce, Science, and Transportation,
Committee on Homeland Security and Governmental Affairs,
Washington, DC.
The Committees met, pursuant to notice, at 2:30 p.m., in
room SD-G50, Dirksen Senate Office Building, Hon. John D.
Rockefeller IV, Chairman of the Commerce Committee, presiding.
OPENING STATEMENT OF HON. JOHN D. ROCKEFELLER IV,
U.S. SENATOR FROM WEST VIRGINIA
Chairman Rockefeller. Ladies and gentlemen, this hearing
will come to order.
I have one quick announcement to make--and that is, I was
just told that we may have a vote on John Brennan, for the CIA,
coming up within a relatively short period of time, so we need
to be as efficient as possible. But, on the other hand, we can
come back from that.
So, let me make my opening statement. And I know that Tom
is coming.
Long ago, we made the decision in this country that private
companies would build, and that they would own, our key
transportation, communications, and energy networks. That was,
and still is, a good decision. Given the opportunity to earn a
reasonable profit on their investment, private companies build
our railroads, our wireline telephone network, our aviation
system, our pipelines, and so many other physical assets that
we have. They were built by private corporations, private
money, and are owned by them.
But, this isn't just our past, it's our future, too. With
the encouragement and support of Federal, State, and local
governments, private companies are hard at work today building
the broadband network that will be the key to our country's
success in the 21st century. What we have always asked these
companies for in return is that they serve, not just the
interests of their shareholders, but also the broader general
interests of the country, however one wants to define that.
As those of us who serve on the Commerce Committee know
well, getting big things done in this country, and in this
body, is slow. It's very slow. And it always takes, on really
big stuff, the private sector and the public sector, working
together. It just has to be that way. That's the kind of
partnership we will need to address the grave new threat that
our country faces today, which are cyber attacks, which, 4
years ago, were treated lightly, and today are still treated
too lightly, in my judgment, but is the number one national
security threat that the country faces.
Back in 2009, when I started working on this issue with
Senator Olympia Snowe, cybersecurity was just an exotic idea.
To some, it still is just that, or it's an idea to push aside
and take up later. But, it is not. Almost every day, we read
about another company, another Government agency that's been
electronically attacked by adversaries trying to cause economic
damage or searching for sensitive information, and getting it.
It's not a threat that we can address through a traditional
military response, of course, and it's not a threat that
individual companies can handle through their normal risk
mitigation practices. It's a threat that challenges our
traditional notion of the public and private spheres. That's
what makes it interesting.
A cyber attack against a government agency or a defense
contractor is an attack against our nation. An attack against a
private company dealing with--say, a water company--is an
attack against our nation. So is it with an attack on a private
company that provides power or clean water to millions of
Americans; an attack against any of these pieces, even though
they might be privately operated, is an attack against our
nation's critical infrastructure and, therefore, against us, as
a nation.
Since I've been working on this issue, I've had a lot of
good and productive sessions with the private sector. But, you
know what? We also have wasted an awful lot of time by turning
an urgent national security issue into a partisan political
fight. How one does that on the number one national security
threat, I don't know, but somehow we've managed to do it.
Back in 2010, we passed, in the Commerce Committee, a cyber
bill. We did it unanimously. And we did that because we didn't
have any vote, everybody just agreed, and it zipped right
through. However, we couldn't get enough votes, in 2012, to
start debate, even, on this issue on the Senate floor even
though the whole military and intelligence establishment was
going crazy at our lack of movement.
The Obama administration got tired of waiting for us. I
can't blame them. This is a problem that's growing worse every
day. So, on February 12 of this year, the President released an
Executive order that takes some very important steps--not
enough, because he can't create the law that's necessary for
some things, but they worked very hard to make this Executive
order a welcoming invitation to the private sector to work
together on this problem. It seeks to formalize and to
strengthen the working relationships many companies already
have with our cybersecurity experts in the Federal Government.
The Executive order starts a process with NIST--can NIST be
helpful? I think this can be helpful. Some others don't think
so, because it's called a ``government agency.'' We're going to
hear more about the Executive orders from our witnesses. The
Senators sitting in this dais today understand what an urgent
issue this is. We all want to do something. We want to come
together. We want to be ruled by our common sense, not by other
interests. So, we have our work cut out.
[The prepared statement of Chairman Rockefeller follows:]
Prepared Statement of Hon. John D. Rockefeller IV, U.S. Senator from
West Virginia and Chairman, U.S. Senate Committee on Commerce, Science,
and Transportation
Long ago we made the decision that in this country, private
companies would build and own our key transportation, communications,
and energy networks. That was and still is a good decision. Given the
opportunity to earn a reasonable profit on their investment, private
companies built our railroads, our wireline telephone network, our
aviation system, our pipelines, and many other physical assets that
have fueled our country's phenomenal economic success. This isn't just
our past. It's our future too. With the encouragement and support of
federal, state, and local governments, private companies are hard at
work today building the broadband network that will be key to our
country's success in the 21st century.
What we have always asked these companies for in return is that
they serve not just the narrow interests of their shareholders, but
also the broader, general interests of this country. As those of us who
serve on the Commerce Committee know very well, getting big things done
in this country always requires a partnership between the public and
private sectors. That's the kind of partnership we will need to address
the grave new threat our country faces today--the threat of cyber
attacks.
Back in 2009, when I started working on this issue with Senator
Snowe, cybersecurity was an exotic idea. Today, four years later, it is
a household word. Almost every day, we read about another company, or
another government agency, that has been electronically attacked by
adversaries trying to cause economic damage or searching for sensitive
information.
It's not a threat we can address through a traditional military
response, and it's not a threat that individual companies can handle
through their normal risk mitigation practices. It's a threat that
challenges our traditional notion of the public and private spheres. A
cyber attack against a government agency or a defense contractor is an
attack against our nation. But so is an attack on a private company
that provides power or clean water to millions of Americans. An attack
against a privately owned and operated piece of our nation's critical
infrastructure is an attack on all of us.
Since I have been working on this issue, I've had a lot of good,
productive discussions with leaders in our business community, our
military, and in other government agencies who understand this threat
and have good ideas about how we can tackle it. But we've also wasted a
lot of time, by turning an urgent national security issue into a
partisan political fight. Back in 2010, we passed a cyber bill out of
the Commerce Committee unanimously, without a vote. By the fall of
2012, we couldn't even get enough votes to close debate on the Senate
floor, even though our country's top national security leaders were
urging us to act.
The Obama Administration got tired of waiting for us. I can't blame
them. This is a problem that is growing worse every day. On February
12, 2013, President Obama released an Executive order that takes some
very important steps to start dealing with our cybersecurity problems.
The order marshals the resources and the expertise we have in many
different Federal agencies to start strengthening our country's ability
to defend ourselves from cyber attacks.
The Obama Administration worked very hard to make this Executive
order a welcoming invitation to the private sector to work together on
this problem. It seeks to formalize and strengthen the working
relationships many companies already have with our cybersecurity
experts in the Federal Government. One of the most important
initiatives in the Executive order is to start a process at the
National Institute of Standards and Technology (NIST) that will develop
cybersecurity standards and best practices with U.S. companies.
We are going to hear more about the Executive order from our
witnesses today, and we are going hear a lot more about cybersecurity
in the 113th Congress. The Senators sitting at this dais today--and
many more who are not sitting up here--understand what an urgent issue
this is. We understand that some of steps we need to take to defend our
people and our critical infrastructure cannot be accomplished by a
presidential order. We have to work with each other. We have to trust
each other. We have to move forward.
And I turn to my distinguished Chairman.
And the only--I regret to say this, but this is--since it's
not a public meeting, it doesn't hurt me anymore--the only West
Virginian--no----
Senator Carper. One of two.
Chairman Rockefeller.--one of two in the United States
Senate. The one who isn't is the one who's just finished
talking.
STATEMENT OF HON. THOMAS R. CARPER,
U.S. SENATOR FROM DELAWARE
Chairman Carper. And the one who is wishes he had his
money.
[Laughter.]
Chairman Carper. Nothing like being born in a log cabin,
I'll tell you.
I'm thrilled to be here with Senator Rockefeller, our
Chair--co-Chair--and Senator Thune and my wingman, here, Tom
Coburn, with whom I've worked on a lot of things.
I'm delighted with our witnesses.
And, Secretary, Pat, we're happy that you could join us
today.
I'm told that our committees have not held a joint hearing
for over 35 years; I guess, since 1975, to be exact. We need to
be able to work together; this is a shared responsibility, and
not just between government and private sector; this is a
shared responsibility here on Capitol Hill: executive branch,
legislative branch, and different committees, and different
parties. So, this is a great way to get started. I'm happy that
we're doing this.
But, we're having this hearing today because, as Chairman
Rockefeller has said, America's economy and our national
security are under attack. This is not the kind of war that
some of us served in earlier in our lives or read about in the
history books or have watched on television. The war that's
occurring today is a war that's occurring in cyberspace, it's
occurring in realtime, because, literally as I speak,
sophisticated cyber thieves are stealing our ideas, our
intellectual property, the very innovation, or the seed corn,
if you will, that fuels our economy in years to come.
Recent report by Mandiant, an American cybersecurity firm,
points the finger for much--not all, but much of the cyber
threat thievery that's going on, to a military unit in China.
Even more alarming are the reports that hackers are constantly
probing the companies that run our nation's critical
infrastructure--our electric grid, our gas lines, our
waterworks, the banking systems, among others.
Since this past summer, for example, websites for a number
of major U.S. banks have become the target of repeated cyber
attacks that have caused a disruption and service delays. We
read about that every week, almost every day. But, once inside
a company network, these hackers can do a lot more than steal
information or create a temporary nuisance. Among other things,
they can shut down our electric grid or release dangerous
chemicals into our water supply or into our air. We only have
to think about the cyber attack that reportedly destroyed more
than 30,000 computers at oil giant Saudi Aramco to know that
the threat is real and it is serious.
Several of our colleagues, including Senator Rockefeller,
Senators Feinstein and Collins, and former Chair of the
Committee that I'm now privileged to chair, Joe Lieberman,
worked diligently with others to move cybersecurity legislation
that Senator Rockefeller has mentioned. Unfortunately, we
couldn't come together to pass this vital piece of bipartisan
legislation. But, given the growing cyber threats that America
faces, we're now more determined than ever to put in place a
thoughtful, comprehensive cyber policy to protect our nation,
its people, its critical infrastructures, and its economy.
Because of Congress's failure to act last year, and the
serious nature of the threat, the President has issued, as we
know, an Executive order, last month, to better protect our
nation's cyber networks. Instead of drafting the order behind
closed doors, the White House was very open with the process,
conducting numerous listening sessions with companies and trade
groups so that the good ideas could be freely shared and
adopted, and bad ideas could be rejected.
Final product is an order that takes a number of critical
steps to improve the security of our critical infrastructure.
One of these steps enhances the way we share cyber threat
information between the Federal Government and the private
sector. For instance, in response to the concerns of many in
industry, the order looks to increase the volume, the
timeliness, and the quantity of cyber threat information shared
with the private sector. The order also relies on public-
private partnerships to strengthen the digital backbone of our
most sensitive systems. In fact, the order calls on the private
sector to lead the development of new security framework, in
coordination with NIST, National Institution--National
Institute of Standards and Technology.
Companies may voluntarily adopt the new cybersecurity
framework or work with their current regulations on their
solutions. To encourage the adoption of any new framework,
though, the order calls for using carrots instead of sticks.
For example, the order requires the Department of Homeland
Security and other Federal agencies to establish a set of
incentives to promote participation in the program. It also
requires Homeland Security to expedite the granting of security
clearances to the people who run our critical infrastructure,
so that industry can better understand the threats that they
face.
Privacy and civil liberties protections are also a key
consideration throughout the order. In fact, agencies are
required to incorporate privacy safeguards in all their
activities under the order. And, while I commend the President
for issuing this important order, there's only so much that he,
or any President, could do, using the authorities granted to a
President under existing law. Those authorities are simply not
enough to get the job done. That's where we come in.
Now is the time to begin the process of gathering input
from the administration and the broad array of stakeholders in
order to ascertain what Congress needs to do, what we need to
do, to build on, or fill in the gaps, if you will, around this
Executive order so that--that the President has promulgated.
For example, we know that what--that more needs to be done
on information sharing so that companies can more freely share
their best practices and threat information with each other and
with our government. We should also consider how we can further
improve the protection of our nation's critical infrastructure,
including offering incentives, such as liability protection, in
certain instances.
In addition, we need to be modernize the dated process we
have in place to ensure that the security of our Federal
network, something that we call FISMA, an area that Senator
Coburn and I have worked on for quite some time, along with
Senator Collins.
It's also important for us to clarify the roles and
responsibilities of Federal agencies involved in cybersecurity
so that we know who should be held accountable for our
successes or failures in tackling this growing threat.
And finally, we must also continue to develop the next
generation of cyber professionals, grow our own, and better
coordinate our cyber research-and-development efforts. A lot of
people in this country of ours question, today, whether we're
still able to set aside partisan differences or other
differences--the stakes are high--and summon the political will
to do what's best for America. The stakes are high. And it's
important--as the Chairman has said, here--important that we
should set aside our difference, whether political or
otherwise, and do what's right for our country. And I'm
confident, I'm encouraged, that, with the cooperation of the
folks that are on these committees and our colleagues with whom
we serve, that we're up to the task, and we're going to seize
this opportunity.
Thank you, Mr. Chairman.
[The prepared statement of Chairman Carper follows:]
Prepared Statement of Hon. Thomas R. Carper, U.S. Senator from Delaware
I am very pleased to be here today with our colleagues from the
Senate Commerce Committee hosting a joint hearing on cybersecurity, an
incredibly important topic for our country. I would like to thank
Chairman Rockefeller, Ranking Member Thune, and my Ranking Member, Dr.
Coburn--along with our staff members--for all their work on this
hearing. I would also like to thank our witnesses for being here today
and for their valuable service to our country.
I am told that our Committees have not held a joint hearing for
over 35 years--since 1975 to be exact. It is fitting that we have come
together again to address this issue because we definitely need a true
partnership to pass comprehensive cybersecurity legislation in this
Congress--a partnership between Democrats and Republicans, the House
and the Senate, Congress and the Administration; and, as the title of
this hearing indicates, between government and industry.
We are having this hearing today because America's economy and our
national security are under attack. This is not the kind of war that
some of us served in earlier in our lives, or read about in history
books, or watched on TV. This war is occurring in cyberspace and in
real time. Literally as I speak, sophisticated cyber thieves are
stealing American ideas and intellectual property--the very innovation
that fuels our economy.
A recent report by Mandiant, an American cybersecurity firm, points
the finger for much of this cyber theft to a military unit in China.
Even more alarming are the reports that hackers are constantly probing
the companies that run our Nation's critical infrastructure--our
electrical power grid, gas lines, waterworks, and banking system, among
others.
Since this past summer, for example, websites for a number of major
U.S. banks have become the target of repeated cyber attacks that have
caused disruption and service delays. But once inside a company
network, these hackers can do a lot more than steal information or
create a temporary nuisance. Among other things, they can shut down our
electric grid or release dangerous chemicals into our water supply.
We only have to think about the cyber attack that reportedly
destroyed more than 30,000 computers at oil giant Saudi Aramco to know
this threat is real--and serious. Several of our colleagues, including
Senators Rockefeller, Feinstein, and Collins, and the former Chairman
of the Committee I now chair, Joe Lieberman, worked diligently to move
cyber legislation last year. Unfortunately, the Senate could not come
together to pass this vital piece of bipartisan legislation. But given
the growing cyber threats that America faces, we are now more
determined than ever to put in place a comprehensive cyber policy to
protect our nation, its people, its critical infrastructure, and its
economy.
Because of Congress' failure to act last year and the serious
nature of the threat, the President issued an Executive Order last
month to better protect our Nation's cyber networks. Instead of
drafting the Order behind closed doors, the White House was very open
with the process, conducting numerous ``listening sessions,'' with
companies and trade groups so that good ideas could be freely shared
and adopted. The final product is an Order that takes a number of
critical steps to improve the security of our critical infrastructure.
One of these steps enhances the way we share cyber threat
information between the Federal Government and the private sector. For
instance, in response to the concerns of many in industry, the Order
looks to increase the volume, timeliness, and quality of cyber threat
information shared with the private sector.
The Order also relies on a public-private partnership to strengthen
the digital backbone of our most sensitive systems. In fact, the Order
calls on the private sector to lead the development of new security
frameworks in coordination with the National Institute of Standards and
Technology.
Companies may voluntarily adopt the new cybersecurity framework or
work with their current regulators on other solutions. To encourage the
adoption of any new framework, the Order calls for using carrots
instead of sticks. For example, the Order requires the Department of
Homeland Security and other Federal agencies to establish a set of
incentives to promote participation in the program.
It also requires Homeland Security to expedite the granting of
security clearances to the people who run our critical infrastructure,
so that industry can better understand the threats they face. Privacy
and civil liberties protections are also a key consideration throughout
the Order. In fact, agencies are required to incorporate privacy
safeguards in all their activities under the Order.
While I commend the President for issuing this very important
Order, there was only so much he could do using the authorities granted
to him under existing law. Those authorities are simply not enough to
get the job done. Now is the time to begin the process of gathering
input from the Administration and a broad array of stakeholders in
order to ascertain what Congress needs to do to build on the Executive
order that the President has promulgated.
For example, we know that more needs to be done on information
sharing so that companies can more freely share best practices and
threat information with each other, and with the Federal Government. We
should also consider how we can further improve the protection of our
Nation's critical infrastructure, including offering incentives such as
liability protection in certain instances. In addition, we need to
modernize the dated process we have in place to ensure the security of
our Federal networks. This is an area that I have worked on for years.
It is also important for us to clarify the roles and
responsibilities of Federal agencies involved in cybersecurity so that
we know who should be held accountable for our success or failure in
tackling this growing threat. Finally, we must also continue to develop
the next generation of cyber professionals and better coordinate our
cyber research and development efforts.
A lot of people in this country of ours question today whether
we're still able to set aside our partisan differences when the stakes
are high and summon the political will to do what's best for America. I
believe this joint hearing is a good step in showing the American
people we can. I look forward to working with our colleagues, as well
as with the Administration, industry, and other stakeholders, to pass
critically needed cyber legislation.
Chairman Rockefeller. The distinguished Ranking Member of
the Commerce Committee, Senator Thune.
STATEMENT OF HON. JOHN THUNE,
U.S. SENATOR FROM SOUTH DAKOTA
Senator Thune. Thank you, Mr. Chairman and Chairman Carper.
I look forward, along with you and with Senator Coburn and
members of both of our committees, to examining the need for a
greater cybersecurity partnership between the private sector
and the Federal Government.
No one can deny the serious threat that we're confronting
in cyberspace. Almost daily, we learn of new cyber threats and
attacks targeting our government agencies and companies that
drive our economy. In these perilous economic times, it's
especially troubling that the intellectual capital that fuels
our prosperity is being siphoned off by cyber criminals and
even nation--states.
The National Counterintelligence Executive, the country's
chief counterintelligence official, summed it up this way in
2011, and I quote, ``Trade secrets developed over thousands of
working hours by our brightest minds are stolen in a split
second and transferred to our competitors.'' This large-scale
theft cannot be allowed to continue unchecked. We must find
solutions that leverage the innovation and know-how of the
private sector, as well as the expertise and information held
by the Federal Government. And, given the escalating nature of
the threat, we should look for solutions that will have an
immediate impact.
As today's hearing title suggests, one thing we must do is
strengthen the partnership between the government and the
private sector. As one of our witnesses, David Kepler, of The
Dow Chemical Company, observed in his testimony, timely
information sharing between government and industry, and among
industry peers, is key to this collaboration.
The Chair of the House Intelligence Committee has said
that, according to intelligence officials, allowing the
government to share classified information with private
companies could stop up to 90 percent of cyber attacks on U.S.
networks. Even if the figure was only 60 to 70 percent, the
return would be well worth the effort.
Improving research and development is another area where
our focus could yield new tools to secure the cyber domain. We
should not underestimate the value of R&D. I'm proud to know
that South Dakota's own Dakota State University is one of only
four schools in the nation designated by the National Security
Agency as a National Center of Academic Excellence in Cyber
Operations.
It's no secret that, during the last Congress, the Senate
reached an impasse on cybersecurity legislation. It is my
hope--and I suspect that it's our shared hope--that we can
avoid another stalemate in this Congress. Today's hearing
represents a good start.
As we all recognize, this issue crosses the jurisdictional
boundaries of many committees, so it is appropriate, if
somewhat challenging, that we've joined with our colleagues on
the Homeland Security and Governmental Affairs Committee today.
Of course, given the importance of this topic and the value of
hearing from multiple stakeholders, I look forward to
additional sessions in the Commerce Committee as we seek
consensus on this vital matter.
Our hearing today takes place against the backdrop of the
President's recently released Executive order on cybersecurity
and related Presidential policy directive. Even though I, like
many of my colleagues, was skeptical about executive action,
the order's release may provide an opportunity for Congress to
find common ground on other steps that will improve our
cybersecurity. Of course, we must also conduct meaningful
oversight of the Executive order's implementation.
I look forward to hearing from Secretary Napolitano and
Under Secretary Gallagher today regarding the steps the
Department of Homeland Security and the National Institute of
Standards and Technology are taking to ensure that the
Executive order's promise of improved partnership and
collaboration with the private sector is realized in practice.
I'm particularly interested in hearing about how the Executive
order builds upon or enhances existing mechanism for public-
private collaboration. And I'll be interested in the views of
our GAO witness, Greg Wilshusen, as to whether the Federal
Government is up to the task envisioned by the Executive order,
given persistent shortcomings in its own cybersecurity efforts
identified by the watchdog agency.
Again, Mr. Chairman, I thank you, and I thank all of the
witnesses for being here today, and I look forward to hearing
their testimony.
Chairman Rockefeller. Distinguished Senator from Oklahoma,
Tom Coburn.
STATEMENT OF HON. TOM COBURN,
U.S. SENATOR FROM OKLAHOMA
Senator Coburn. Thank you, Mr. Chairman.
Welcome, to all the witnesses. I appreciate you being here.
Senator Carper and I had a little demonstration or
presentation on the Executive order yesterday, and I have to
say I was impressed with the thoroughness and the presentation
of it.
I'm highly disappointed that OMB didn't release the FISMA
report. And there's no reason for it, other than it's--shows
significant criticism of our ability to manage critical
information within the Federal Government. And I will apologize
to them vociferously if, in fact--my assessment of that report.
But, to not put it out before this hearing is absolutely
ridiculous, because we all know--and the GAO's going to testify
today what we all know--is the status within our own government
on how well we're doing. And so, it's unfortunate that we've
chosen not to have a critical piece of information that
analyzes a report card on us for this hearing.
The--I am appreciative of the leadership of the President
and his staff in doing this Executive order. I think it was
timely and it was appropriate. And I'll speak to the issue that
nobody wants to directly speak to, is--the reason the bill
didn't go through the Senate is because there's a--there is a
disagreement on the liability protections for business and
industry, when they share their information, to protect them
against frivolous lawsuits. And in the hearings that Senator
Carper and I have had that have been classified thus far, there
hasn't been one person who's testified--all administrative
witnesses, all administration--who don't agree that those
protections are going to have to be there for us to accomplish
what we need to do for our country. And so, what we have to do
is, we have to get past that one issue, and we have to address
the real issues in front of us.
The other thing that I would like to emphasize is the
fact--and Senator Thune spoke about it, and I know Senator
Rockefeller and Senator Carper care immensely about it--and
that's the intellectual property loss that this country loses
every year. And General Alexander, head of the NSA, has said
it's around $400 billion a year. And if we do not create a
workable situation, what we're doing is taking the investment
that we spend every year, that we want to spend, in terms of RD
in this country, and giving it away.
So, we have to find a way to solve this problem, in the
Senate, and we have to work across the aisle and across the
special interest groups that don't want certain things because
it might create a lack of a supreme benefit for their cause.
What we have to do is what's in the best interests of the
nation. And I think the President has shown real leadership
with this Executive order, and now we need to come behind it
and firm it up.
And I appreciate, also, Senator Rockefeller, his
cooperation on the witnesses for this. I want to thank you
publicly for that. Having a hearing on cybersecurity and not
listening to the expert at GAO would be inappropriate. And Mr.
Wilshusen is here, and he's knowledgeable, and I look forward
to his testimony, on the second panel.
Thank you.
[The prepared statement of Ranking Member Coburn follows:]
Prepared Statement of Hon. Tom Coburn, U.S. Senator from Oklahoma,
Ranking Member, U.S. Senate Committee on Homeland Security and
Governmental Affairs
Thank you, Mr. Chairman. Welcome to all the witnesses. I appreciate
you being here. Senator Carper and I had a little demonstration or
presentation on the executive order yesterday. And I have to say I was
impressed with the thoroughness and the presentation of it.
I am highly disappointed that OMB didn't release the FISMA report.
There is no reason for it other than it shows significant criticism of
our ability to manage critical information within the Federal
Government. I will apologize to them vociferously if, in fact, my
assessment of that report--but to not put it out before this hearing is
absolutely ridiculous, because we all know, and the GAO's going to
testify today what we all know, is the status within our own government
on how well we're doing, and so it's unfortunate that we have chosen
not to have a critical piece of information that analyzes a report card
on us for this hearing.
I am appreciative of the leadership of the President and his staff
in doing this Executive order. I think it was timely and appropriate.
I'll speak to the issue that nobody wants directly to speak to, is the
reason the bill didn't go through the Senate is because there is a
disagreement on the liability protections for business and industry
when they share their information to protect them against frivolous
lawsuits. In the hearings that Senator Carper and I have had, that have
been classified thus far, there hadn't been one person who has
testified, all the administrative witnesses--all of administration--who
do not agree that those protections are going to have to be there for
us to accomplish what we need to do for our country. We have to get
past that one issue, and we have to address the issues in front of us.
The other thing that I would like to emphasize is the intellectual
property loss that this country loses every year. General Alexander,
head of the NSA, has said it's around $400 billion a year, and if we do
not create a workable situation, what we are doing is taking the
investment that we spend every year that we want to spend in terms of
R&D in this country, and giving it away.
We have to find a way to solve this problem in the Senate, and we
have to work across the aisle and across the special interest groups
that don't want certain things, because it might create a lack of a
supreme benefit for their cause. What we have to do is what's in the
best interest of the nation, and I think the President has shown real
leadership with this Executive order, and now we need to come behind
and firm it up.
I appreciate--also, Senator Rockefeller, his cooperation on the
witnesses for this. I want to thank you publicly for that. Having a
hearing on cybersecurity and not listening to the expert at GAO would
be inappropriate, and Mr. Wilshusen is here, and he's knowledgeable,
and I look forward to his testimony in the second panel.
Thank you.
Chairman Rockefeller. Thank you, Senator Coburn.
And we now go to our first two witnesses. We're glad
they're here.
The Honorable Janet Napolitano, who's Secretary, U.S.
Department of Homeland Security.
I see you at more hearings, on more television, than
anybody else within a 10-mile radius of Washington, D.C. But,
fortunately, you're here today for us. Please proceed.
STATEMENT OF HON. JANET NAPOLITANO, SECRETARY,
U.S. DEPARTMENT OF HOMELAND SECURITY
Secretary Napolitano. Well, thank you. Thank you, Chairman
Rockefeller and Ranking Member Thune and Chairman Carper,
Ranking Member Coburn, members of the Committee. I appreciate
the opportunity to testify regarding our cybersecurity efforts
at the Department of Homeland Security. And I also want to
thank Under Secretary Gallagher for our partnership with NIST
with the Department of Commerce.
This is, as you all have acknowledged, an urgent and
important topic. As you know, DHS is responsible for securing
unclassified Federal civilian government networks and working
with owners and operators of critical infrastructure to help
them secure their own networks. We also coordinate the national
response to significant cyber incidents, and create and
maintain a common operational picture for cyberspace across the
government.
This is critical, time-sensitive work, because we confront
a dangerous combination of known and unknown cyber
vulnerabilities and adversaries with strong and rapidly
expanding capabilities. Threats range from denial-of-service
attacks to theft of valuable intellectual property to
intrusions against government networks and systems that control
our nation's critical infrastructure. These attacks come from
every part of the globe. They come every minute of every day.
They are continually increasing in seriousness and
sophistication.
To protect Federal networks, DHS is deploying technology to
detect and to block cyber intrusions, and we are developing
continuous diagnostic capabilities while providing guidance on
what agencies need to do to protect themselves. We also work
closely and regularly with owners and operators of critical
infrastructure to strengthen their facilities through onsite
risk assessment, mitigation, and incident response, and by
sharing risk and threat information. For example, we provided
classified cyber threat briefings and technical assistance to
help banks improve their defensive capabilities following the
recent spate of DDOS attacks.
DHS is home to the National Cybersecurity and
Communications Integration Center, the NCCIC. The NCCIC is an
around-the-clock cyber situational awareness and incident-
response center, which, over the past 4 years--and that's as
old as it is--has responded to nearly a half a million incident
reports and released more than 26,000 actionable cybersecurity
alerts to public-and private-sector partners. Last year, the
Computer Emergency Readiness Team, US-CERT, resolved
approximately 190,000 cyber incidents and issued more than
7,450 alerts--in and of itself, a 68 percent increase from the
year before--and our Industrial Control System Cyber Emergency
Response Team responded to 177 incidents while completing 89
site visits, deploying 15 teams to respond to significant
private-sector cyber incidents involving control systems.
Since 2009, DHS components have prevented $10 billion in
potential losses through cyber crime investigations. We have
arrested more than 5,000 individuals in connection with cyber
crime. And we partner closely with the Departments of Justice
and Defense to ensure that a call to one is a call to all. So,
while each agency operates within the parameters of its
authorities, our overall Federal response to cyber incidents of
consequence is coordinated among the three agencies. Where
agency authorities overlap, as in law enforcement protection
and response, we also directly coordinate with and support each
other.
This synchronization--a call to one is a call to all--
ensures that all of our capabilities are brought to bear
against cyber threats, enhances our ability to share timely and
actionable information with a variety of partners.
But, while our accomplishments are significant and
cybersecurity remains a priority for the administration, in
order to be able to best meet this growing threat, we need
Congress to enact a suite of comprehensive cybersecurity
legislation. I appreciate the efforts made in the last Congress
to pass bipartisan legislation, but the inability to get this
done has, indeed, required the President to take executive
action.
The EO [Executive order] on Improving Critical
Infrastructure Cybersecurity supports more efficient sharing of
realtime cyber threat information with the private sector. It
directs DHS to develop a voluntary program to promote the
adoption of a new cybersecurity framework, and assists the
private sector in its implementation. The accompanying
Presidential Policy Directive on Critical Infrastructure,
Security, and Resilience also directs the executive branch to
strengthen our capability to understand and share information
about how well critical infrastructure systems are functioning,
and the consequence of potential failure. And it calls for a
comprehensive research-and-development plan to guide the
government's effort to enhance market-based innovation.
These two documents, the EO and the PPD, reflect input from
stakeholders of all viewpoints across government, industry, and
the advocacy community. Their ideas and lessons were
incorporated, as were rigorous protections for individual
privacy and civil liberties. Importantly, the EO calls us to
work within current authorities and increase voluntary
cooperation with the private sector. It does not grant any new
regulatory authority or establish additional incentives for
participation in a voluntary program.
Nonetheless, we continue to believe that a comprehensive
suite of legislation is necessary to build stronger, more
effective public/private partnerships in the realm of cyber.
Specifically, Congress should enact legislation to incorporate
privacy and civil liberty safeguards into all aspects of
cybersecurity, further increase information sharing, and
establish and promote the adoption of standards for critical
infrastructure, give law enforcement additional tools to fight
crime in the Digital Age, create a national data-breach
reporting requirement; and, finally, give DHS hiring authority
equivalent to that of the NSA.
We also know that threats to cyberspace, and the need to
address them, do not diminish because of budget cuts. Even in
the current fiscal climate, we do not have the luxury of making
significant reductions to our capabilities without having
significant impacts. Sequester reductions will require us to
scale back the development of critical capabilities for the
defense of Federal cyber networks. It will disrupt long-term
efforts to grow our cybersecurity workforce, and delay the
implementation of E3A by approximately 1 year. In addition,
sequester has resulted in canceling major cybersecurity
exercises by which, involving international, Federal, State,
local, private-sector partners, we actually work through the
various problem sets and scenarios we confront.
The American people expect us to secure the country from a
growing cyber threat and to ensure that critical infrastructure
is protected. Further action is needed by Congress, including
immediate action to address the sequester, if we are to meet
our responsibilities. We must act now, not years from now.
So, I look forward to working with both committees to make
sure we continue to do everything possible to keep the nation
safe.
I thank you for your continued guidance and support, and
for the opportunity to be with you this afternoon.
[The prepared statement of Secretary Napolitano follows:]
Prepared Statement of Hon. Janet Napolitano, Secretary,
U.S. Department of Homeland Security
Chairmen Rockefeller and Carper, Ranking Members Thune and Coburn,
and Members of the Committees:
I am pleased to join you today, and I thank the Committee for your
strong support for the Department of Homeland Security (DHS) over the
past four years and, indeed, since the Department's founding ten years
ago.
I can think of no more urgent and important topic in today's
interconnected world than cybersecurity, and I appreciate the
opportunity to explain the Department's mission in this space and how
we continue to improve cybersecurity for the American people as well as
work to safeguard the nation's critical infrastructure and protect the
Federal Government's networks.
Current Threat Landscape
Cyberspace is woven into the fabric of our daily lives. According
to recent estimates, this global network of networks encompasses more
than two billion people with at least 12 billion computers and devices,
including global positioning systems, mobile phones, satellites, data
routers, ordinary desktop computers, and industrial control computers
that run power plants, water systems, and more.
While this increased connectivity has led to significant
transformations and advances across our country--and around the world--
it also has increased the importance and complexity of our shared risk.
Our daily life, economic vitality, and national security depend on
cyberspace. A vast array of interdependent IT networks, systems,
services, and resources are critical to communication, travel, powering
our homes, running our economy, and obtaining government services. No
country, industry, community or individual is immune to cyber risks.
The word ``cybersecurity'' itself encompasses protection against a
broad range of malicious activity, from denial of service attacks, to
theft of valuable trade secrets, to intrusions against government
networks and systems that control our critical infrastructure.
The United States confronts a dangerous combination of known and
unknown vulnerabilities in cyberspace and strong and rapidly expanding
adversary capabilities. Cyber crime has also increased significantly
over the last decade. Sensitive information is routinely stolen from
both government and private sector networks, undermining the integrity
of the data contained within these systems. We currently see malicious
cyber activity from foreign nations engaged in espionage and
information warfare, terrorists, organized crime, and insiders. Their
methods range from distributed denial of service (DDoS) attacks and
social engineering to viruses and other malware introduced through
thumb drives, supply chain exploitation, and leveraging trusted
insiders' access.
We have seen motivations for attacks vary from espionage by foreign
intelligence services to criminals seeking financial gain and hackers
who may seek bragging rights in the hacker community. Industrial
control systems are also targeted by a variety of malicious actors who
are usually intent on damaging equipment and facilities or stealing
data. Foreign actors are also targeting intellectual property with the
goal of stealing trade secrets or other sensitive corporate data from
U.S. companies in order to gain an unfair competitive advantage in the
global market.
Cyber attacks and intrusions can have very real consequences in the
physical world. Last year, DHS identified a campaign of cyber
intrusions targeting natural gas and pipeline companies that was highly
targeted, tightly focused and well crafted. Stolen information could
provide an attacker with sensitive knowledge about industrial control
systems, including information that could allow for unauthorized
operation of the systems. As the President has said, we know that our
adversaries are seeking to sabotage our power grid, our financial
institutions, and our air traffic control systems. These intrusions and
attacks are coming all the time and they are coming from different
sources and take different forms, all the while increasing in
seriousness and sophistication.
The U.S. Government has worked closely with the private sector
during the recent series of denial-of-service incidents. We have
provided classified cyber threat briefings and technical assistance to
help banks improve their defensive capabilities and we have increased
sharing and coordination among the various government elements in this
area. These developments reinforce the need for government, industry,
and individuals to reduce the ability for malicious actors to establish
and maintain capabilities to carry out such efforts.
In addition to these sophisticated attacks and intrusions, we also
face a range of traditional crimes that are now perpetrated through
cyber networks. These include child pornography and exploitation, as
well as banking and financial fraud, all of which pose severe economic
and human consequences. For example, in March 2012, the U.S. Secret
Service (USSS) worked with U.S. Immigration and Customs Enforcement
(ICE) to arrest nearly 20 individuals in its ``Operation Open Market,''
which seeks to combat transnational organized crime, including the
buying and selling of stolen personal and financial information through
online forums. As Americans become more reliant on modern technology,
we also become more vulnerable to cyber exploits such as corporate
security breaches, social media fraud, and spear phishing, which
targets employees through e-mails that appear to be from colleagues
within their own organizations, allowing cyber criminals to steal
information.
Cybersecurity is a shared responsibility, and each of us has a role
to play. Emerging cyber threats require the engagement of our entire
society--from government and law enforcement to the private sector and,
most importantly, members of the public. The key question, then, is how
do we address this problem? This is not an easy question because
cybersecurity requires a layered approach. The success of our efforts
to reduce cybersecurity risks depends on effective identification of
cyber threats and vulnerabilities, analysis, and enhanced information
sharing between departments and agencies from all levels of government,
the private sector, international entities, and the American public.
Roles, Responsibilities, Activities
DHS is committed to ensuring cyberspace is supported by a secure
and resilient infrastructure that enables open communication,
innovation, and prosperity while protecting privacy, confidentiality,
and civil rights and civil liberties by design.
Securing Federal Civilian Government Networks
DHS has operational responsibilities for securing unclassified
Federal civilian government networks and working with owners and
operators of critical infrastructure to secure their networks through
cyber threat analysis, risk assessment, mitigation, and incident
response capabilities. We also are responsible for coordinating the
national response to significant cyber incidents and for creating and
maintaining a common operational picture for cyberspace across the
government.
DHS directly supports Federal civilian departments and agencies in
developing capabilities that will improve their cybersecurity posture
in accordance with the Federal Information Security Management Act
(FISMA). To protect Federal civilian agency networks, our National
Protection and Programs Directorate (NPPD) is deploying technology to
detect and block intrusions through the National Cybersecurity
Protection System and its EINSTEIN protective capabilities, while
providing guidance on what agencies need to do to protect themselves
and measuring implementation of those efforts.
NPPD is also developing a Continuous Monitoring as a Service
capability, which will result in an array of sensors that feed data
about an agency's cybersecurity risk and present those risks in an
automated and continuously-updated dashboard visible to technical
workers and managers to enhance agencies' ability to see and counteract
day-to-day cyber threats. This capability will support compliance with
Administration policy, be consistent with guidelines set forth by the
National Institute of Standards and Technology (NIST), and enable
Federal agencies to move from compliance-driven risk management to
data-driven risk management. These activities will provide
organizations with information necessary to support risk response
decisions, security status information, and ongoing insight into
effectiveness of security controls.
Protecting Critical Infrastructure
Critical infrastructure is the backbone of our country's national
and economic security. It includes power plants, chemical facilities,
communications networks, bridges, highways, and stadiums, as well as
the Federal buildings where millions of Americans work and visit each
day. DHS coordinates the national protection, prevention, mitigation,
and recovery from cyber incidents and works regularly with business
owners and operators to take steps to strengthen their facilities and
communities. The Department also conducts onsite risk assessments of
critical infrastructure and shares risk and threat information with
state, local and private sector partners.
Protecting critical infrastructure against growing and evolving
cyber threats requires a layered approach. DHS actively collaborates
with public and private sector partners every day to improve the
security and resilience of critical infrastructure while responding to
and mitigating the impacts of attempted disruptions to the Nation's
critical cyber and communications networks and to reduce adverse
impacts on critical network systems.
DHS enhances situational awareness among stakeholders, including
those at the state and local level, as well as industrial control
system owners and operators, by providing critical cyber threat,
vulnerability, and mitigation data, including through Information
Sharing and Analysis Centers, which are cybersecurity resources for
critical infrastructure sectors. DHS is also home to the National
Cybersecurity & Communications Integration Center (NCCIC), a 24x7 cyber
situational awareness, incident response, and management center that is
a national nexus of cyber and communications integration for the
Federal Government, intelligence community, and law enforcement.
Responding to Cyber Threats
DHS is responsible for coordinating the Federal Government response
to significant cyber or physical incidents affecting critical
infrastructure. Since 2009, the NCCIC has responded to nearly half a
million incident reports and released more than 26,000 actionable
cybersecurity alerts to our public and private sector partners. The DHS
Office of Intelligence and Analysis is a key partner in NCCIC
activities, providing tailored all-source cyber threat intelligence and
warning to NCCIC components and public and private critical
infrastructure stakeholders to prioritize risk analysis and mitigation.
An integral player within the NCCIC, the U.S. Computer Emergency
Readiness Team (US-CERT) also provides response support and defense
against cyber attacks for Federal civilian agency networks as well as
private sector partners upon request. US-CERT collaborates and shares
information with state and local government, industry, and
international partners, consistent with rigorous privacy,
confidentiality, and civil liberties guidelines, to address cyber
threats and develop effective security responses. In 2012, US-CERT
processed approximately 190,000 cyber incidents involving Federal
agencies, critical infrastructure, and our industry partners. This
represents a 68 percent increase from 2011. In addition, US-CERT issued
over 7,455 actionable cyber-alerts in 2012 that were used by private
sector and government agencies to protect their systems, and had over
6,400 partners subscribe to the US-CERT portal to engage in information
sharing and receive cyber threat warning information.
The Department's Industrial Control Systems Cyber Emergency
Response Team (ICS-CERT) also responded to 177 incidents last year
while completing 89 site assistance visits and deploying 15 teams with
US-CERT to respond to significant private sector cyber incidents. DHS
also empowers owners and operators through a cyber self-evaluation
tool, which was used by over 1,000 companies last year, as well as in-
person and on-line training sessions.
Successful response to dynamic cyber threats requires leveraging
homeland security, law enforcement, and military authorities and
capabilities, which respectively promote domestic preparedness,
criminal deterrence and investigation, and national defense. DHS, the
Department of Justice (DOJ), and the Department of Defense (DOD) each
play a key role in responding to cybersecurity incidents that pose a
risk to the United States. In addition to the aforementioned
responsibilities of our Department, DOJ is the lead Federal department
responsible for the investigation, attribution, disruption, and
prosecution of domestic cybersecurity incidents while DOD is
responsible for securing national security and military systems as well
as gathering foreign cyber threat information and defending the Nation
from attacks in cyberspace. DHS supports our partners in many ways. For
example, the United States Coast Guard as an Armed Force has partnered
with U.S. Cyber Command and U.S. Strategic Command to conduct military
cyberspace operations.
While each agency operates within the parameters of its
authorities, the U.S. Government's response to cyber incidents of
consequence is coordinated among these three agencies such that ``a
call to one is a call to all.'' Synchronization among DHS, DOJ, and DOD
not only ensures that whole of government capabilities are brought to
bear against cyber threats, but also improves government's ability to
share timely and actionable cybersecurity information among a variety
of partners, including the private sector.
Combating Cybercrime
DHS employs more law enforcement agents than any other Department
in the Federal Government and has personnel stationed in every state
and in more than 75 countries around the world. To combat cyber crime,
DHS relies upon the skills and resources of the USSS and ICE and works
in cooperation with partner organizations to investigate cyber
criminals. Since 2009, DHS has prevented $10 billion in potential
losses through cyber crime investigations and arrested more than 5,000
individuals for their participation in cyber crime activities.
The Department leverages the 31 USSS Electronic Crimes Task Forces
(ECTF), which combine the resources of academia, the private sector,
and local, state and Federal law enforcement agencies to combat
computer-based threats to our financial payment systems and critical
infrastructure. A recently executed partnership between ICE Homeland
Security Investigations and USSS demonstrates the Department's
commitment to leveraging capability and finding efficiencies. Both
organizations will expand participation in the existing ECTFs. In
addition to strengthening each agency's cyber investigative
capabilities, this partnership will produce benefits with respect to
the procurement of computer forensic hardware, software licensing, and
training that each agency requires. The Department is also a partner in
the National Cyber Investigative Joint Task Force, which serves as a
collaborative entity that fosters information sharing across the
interagency.
We work with a variety of international partners to combat
cybercrime. For example, through the U.S.-EU Working Group on
Cybersecurity and Cybercrime, which was established in 2010, we develop
collaborative approaches to a wide range of cybersecurity and
cybercrime issues. In 2011, DHS participated in the Cyber Atlantic
tabletop exercise, a U.S.-EU effort to enhance international
collaboration of incident management and response, and in 2012, DHS and
the EU signed a joint statement that advances transatlantic efforts to
enhance online safety for children. ICE also works with international
partners to seize and destroy counterfeit goods and disrupt websites
that sell these goods. Since 2010, ICE and its partners have seized
over 2,000 domain names associated with businesses selling counterfeit
goods over the Internet. To further these efforts, the Administration
issued its Strategy on Mitigating the Theft of U.S. Trade Secrets last
month. DHS will act vigorously to support the Strategy's efforts to
combat the theft of U.S. trade secrets--especially in cases where trade
secrets are targeted through illicit cyber activity by criminal
hackers.
In addition, the National Computer Forensic Institute has trained
more than 1,000 state and local law enforcement officers since 2009 to
conduct network intrusion and electronic crimes investigations and
forensic functions. Several hundred prosecutors and judges as well as
representatives from the private sector have also received training on
the impact of network intrusion incident response, electronic crimes
investigations, and computer forensics examinations.
Building Partnerships
DHS serves as the focal point for the Government's cybersecurity
outreach and awareness efforts. Raising the cyber education and
awareness of the general public creates a more secure environment in
which the private or financial information of individuals is better
protected. For example, the Multi-State Information Sharing and
Analysis Center (MS-ISAC) opened its Cyber Security Operations Center
in November 2010, which has enhanced NCCIC situational awareness at the
state and local government level and allows the Federal Government to
quickly and efficiently provide critical cyber threat, risk,
vulnerability, and mitigation data to state and local governments. MS-
ISAC has since grown to include all 50 states, three U.S. territories,
the District of Columbia, and more than 200 local governments.
The Department also has established close working relationships
with industry through partnerships like the Protected Critical
Infrastructure Information (PCII) Program, which enhances voluntary
information sharing between infrastructure owners and operators and the
government. The Cyber Information Sharing and Collaboration Program
established a systematic approach to cyber threat information sharing
and collaboration between critical infrastructure owners and operators
across the various sectors. And, in 2010, we launched a national
campaign called Stop.Think.Connect to spread public awareness about how
to keep our cyber networks safe.
In addition, DHS works closely with international partners to
enhance information sharing, increase situational awareness, improve
incident response capabilities, and coordinate strategic policy issues
in support of the Administration's International Strategy for
Cyberspace. For example, the Department has fostered international
partnerships in support of capacity building for cybersecurity through
agreements with Computer Emergency Response and Readiness Teams as well
as the DHS Science & Technology Directorate (S&T). Since 2009, DHS has
established partnerships with Australia, Canada, Egypt, India, Israel,
the Netherlands, and Sweden.
Fostering Innovation
The Federal Government relies on a variety of stakeholders to
pursue effective research and development projects that address
increasingly sophisticated cyber threats. This includes research and
development activities by the academic and scientific communities to
develop capabilities that protect citizens by enhancing the resilience,
security, integrity, and accessibility of information systems used by
the private sector and other critical infrastructure. DHS supports
Centers of Academic Excellence around the country to cultivate a
growing number of professionals with expertise in various disciplines,
including cybersecurity.
DHS S&T is leading efforts to develop and deploy more secure
Internet protocols that protect consumers and industry Internet users.
We continue to support leap-ahead research and development, targeting
revolutionary techniques and capabilities that can be deployed over the
next decade with the potential to redefine the state of cybersecurity
in response to the Comprehensive National Cybersecurity Initiative. For
example, DHS was a leader in the development of protocols at the
Internet Engineering Task Force called Domain Name System Security (DNS
SEC) Extensions. DNS SEC is necessary to protect Internet users from
being covertly redirected to malicious websites and helps prevent
theft, fraud, and abuse online by blocking bogus page elements and
flagging pages whose Domain Name System (DNS) identity has been
hijacked. S&T is also driving improvements through a Transition to
Practice Program as well as liability and risk management protections
provided by the Support Anti-terrorism by Fostering Effective
Technology (SAFETY) Act that promote cyber security technologies and
encourage their transition into successful use.
Growing and Strengthening our Cyber Workforce
We know it only takes a single infected computer to potentially
infect thousands and perhaps millions of others. But at the end of the
day, cybersecurity is ultimately about people. The most impressive and
sophisticated technology is worthless if it's not operated and
maintained by informed and conscientious users.
To help us achieve our mission, we have created a number of
competitive scholarship, fellowship, and internship programs to attract
top talent. We are growing our world-class cybersecurity workforce by
creating and implementing standards of performance, building and
leveraging a cybersecurity talent pipeline with secondary and post-
secondary institutions nationwide, and institutionalizing an effective,
ongoing capability for strategic management of the Department's
cybersecurity workforce. Congress can support this effort by pursuing
legislation that provides DHS with the hiring and pay flexibilities we
need to secure Federal civilian networks, protect critical
infrastructure, respond to cyber threats, and combat cybercrime.
Recent Executive Actions
As discussed above, America's national security and economic
prosperity are increasingly dependent upon the cybersecurity of
critical infrastructure. With today's physical and cyber infrastructure
growing more inextricably linked, critical infrastructure and emergency
response functions are inseparable from the information technology
systems that support them. The government's role in this effort is to
share information and encourage enhanced security and resilience, while
identifying and addressing gaps not filled by the marketplace.
Last month, President Obama issued Executive Order 13636 on
Improving Critical Infrastructure Cybersecurity as well as Presidential
Policy Directive 21 on Critical Infrastructure Security and Resilience,
which will strengthen the security and resilience of critical
infrastructure through an updated and overarching national framework
that acknowledges the increased role of cybersecurity in securing
physical assets.
DHS Responsibilities
The President's actions mark an important milestone in the
Department's ongoing efforts to coordinate the national response to
significant cyber incidents while enhancing the efficiency and
effectiveness of our work to strengthen the security and resilience of
critical infrastructure. The Executive order supports more efficient
sharing of cyber threat information with the private sector and directs
NIST to develop a Cybersecurity Framework to identify and implement
better security practices among critical infrastructure sectors. The
Executive order directs DHS to establish a voluntary program to promote
the adoption of the Cybersecurity Framework in conjunction with Sector-
Specific Agencies and to work with industry to assist companies in
implementing the framework.
The Executive order also expands the voluntary DHS Enhanced
Cybersecurity Service program, which promotes cyber threat information
sharing between government and the private sector. This engagement
helps critical infrastructure entities protect themselves against cyber
threats to the systems upon which so many Americans rely. This program
is a good example of information sharing with confidentiality, privacy
and civil liberties protections built into its structure. DHS will
share with appropriately cleared private sector cybersecurity providers
the same threat indicators that we rely on to protect the .gov domain.
Those providers will then be free to contract with critical
infrastructure entities and provide cybersecurity services comparable
to those provided to the U.S. Government.
Through the Executive order, the President also directed agencies
to incorporate privacy, confidentiality, and civil liberties
protections. It specifically instructs DHS to issue a public report on
activities related to implementation, which would therefore enhance the
existing privacy policy, compliance, and oversight programs of DHS and
the other agencies.
In addition, the Presidential Policy Directive directs the
Executive Branch to strengthen our capability to understand and
efficiently share information about how well critical infrastructure
systems are functioning and the consequences of potential failures. It
also calls for a comprehensive research and development plan for
critical infrastructure to guide the government's effort to enhance
market-based innovation.
Because the vast majority of U.S. critical infrastructure is owned
and operated by private companies, reducing the risk to these vital
systems requires a strong partnership between government and industry.
There is also a role for state, local, tribal and territorial
governments who own a significant portion of the Nation's critical
infrastructure. In developing these documents, the Administration
sought input from stakeholders of all viewpoints in industry,
government, and the advocacy community.
Their input has been vital in crafting an order that incorporates
the best ideas and lessons learned from public and private sector
efforts while ensuring that our information sharing incorporates
rigorous protections for individual privacy, confidentiality, and civil
liberties. Indeed, as we perform all of our cyber-related work, we are
mindful of the need to protect privacy, confidentiality, and civil
liberties. The Department has implemented strong privacy and civil
rights and civil liberties standards into all its cybersecurity
programs and initiatives from the outset. To accomplish the integrated
implementation of these two directives, DHS has established an
Interagency Task Force made up of representatives from across all
levels of government.
Continuing Need for Legislation
It is important to note that the Executive order directs Federal
agencies to work within current authorities and increase voluntary
cooperation with the private sector to provide better protection for
computer systems critical to our national and economic security. It
does not grant new regulatory authority or establish additional
incentives for participation in a voluntary program. We continue to
believe that a suite of legislation is necessary to implement the full
range of steps needed to build a strong public-private partnership, and
we will continue to work with Congress to achieve this.
The Administration's legislative priorities for the 113th Congress
build upon the President's 2011 Cybersecurity Legislative Proposal and
take into account two years of public and congressional discourse about
how best to improve the Nation's cybersecurity. Congress should enact
legislation to incorporate privacy, confidentiality, and civil
liberties safeguards into all aspects of cybersecurity; strengthen our
critical infrastructure's cybersecurity by further increasing
information sharing and promoting the establishment and adoption of
standards for critical infrastructure; give law enforcement additional
tools to fight crime in the digital age; and create a National Data
Breach Reporting requirement.
Conclusion
The American people expect us to secure the country from the
growing danger of cyber threats and ensure the Nation's critical
infrastructure is protected. The threats to our cybersecurity are real,
they are serious, and they are urgent.
I look forward to working with this Committee and the Congress to
ensure we continue to take every step necessary to protect cyberspace,
in partnership with government at all levels, the private sector, and
the American people, and continue to build greater resiliency into
critical cyber networks and systems.
I appreciate this Committee's guidance and support as together we
work to keep our Nation safe. Thank you, again, for the attention you
are giving to this urgent matter.
Chairman Rockefeller. Thank you, Secretary.
Now The Honorable Patrick Gallagher, who's Under Secretary
of Commerce for Standards and Technology, and Director of the
National Institute of Standards and Technology, which is in the
U.S. Department of Commerce, and which is just chock full of
Nobel laureates. It's one of the ultimate gems in Washington,
D.C., and is not used as it should be.
Please proceed, sir.
STATEMENT OF HON. PATRICK D. GALLAGHER, Ph.D.,
UNDER SECRETARY OF COMMERCE FOR STANDARDS AND TECHNOLOGY, U.S.
DEPARTMENT OF COMMERCE
Dr. Gallagher. Thank you very much. And it's a real
pleasure to be here.
Let me begin by thanking both Chairmen Rockefeller and
Carper, and both Ranking Members Thune and Coburn, and members
of both committees, for the opportunity to testify today. It's
a particular pleasure to be joining one of my critical partners
in this effort, Secretary Napolitano.
Let me very briefly summarize NIST's role in our
responsibilities to develop a framework for reducing cyber risk
and critical infrastructure under the Executive order.
It may be a surprise to some that an agency of the U.S.
Department of Commerce has been given this key role in
cybersecurity but, in fact, NIST has a long history in this
area. We have provided technical support to cybersecurity for
over 50 years, working closely with our Federal partners. And
also because NIST is a technical, but nonregulatory agency, we
provide a unique interface with industry to support their
efforts in technical and standards development. Today, NIST has
programs in a wide variety of cybersecurity areas, including
cryptography, network security, security automation, hardware
roots of trust, and identity management.
As directed in the Executive order, NIST will work with
industry to develop a cybersecurity framework that supports
performance goals established by the Department of Homeland
Security. DHS, then, in coordination with sector specific
agencies, will support the adoption of the cybersecurity
framework by owners and operators of critical infrastructure
and other interested entities through a voluntary program.
To be successful, two major elements have to be part of
this approach:
First, it will require an effective partnership with DHS.
Last month, I signed a Memorandum of Agreement with DHS Under
Secretary Rand Beers to ensure that our work was fully
coordinated with DHS.
Second, the cybersecurity framework must be developed
through a process that is industry-led and open and transparent
to all stakeholders. By having industry develop their own
practices that are responsive to the performance goals, the
process will ensure that it is both robust, technically, but
also aligned with their business needs.
This approach has many advantages. It does not dictate
specific solutions to industry, but promotes industry offering
their own solutions. It allows solutions to be developed that
are compatible with business and market conditions. And, by
leveraging industry's own considerable capacity, it brings more
talent and expertise to the table to tackle this topic.
This is not a new or novel approach for NIST. We have
utilized very similar approaches in the recent past to address
other pressing national priorities, notable examples being
smart grid and cloud computing. We know how to do this.
Since this is industry's framework, the NIST role is to act
as a convener and technical contributor. By working closely
with our Federal partners, we also ensure that industry's work
is relevant to their missions to protect the public.
So, what is in this framework? The short answer is,
whatever is needed to achieve the needed cybersecurity
performance, but, in practice, we expect the framework will
include standards, methodologies, procedures, and processes
that align the business, policy, and technological approaches
to address the cyber risk for critical infrastructure.
Let me touch, briefly, on the topic of standards and their
importance to success in this effort.
First, by ``standards,'' I'm using the term as industry
does. These are agreed-upon specifications, or norms, that
allow compatibility of efforts to achieve a goal. These are not
the same thing as regulation. Industry standards are developed
through a multi-stakeholder voluntary consensus process, and it
is this process that gives these standards their power and
their broad acceptance around the world. These standards are
not static. They can be changed to meet technological advances
and meet new performance requirements. And, in fact,
performance-based standards promote innovation specifically
because they allow new products--services to be developed in a
way that's not a tradeoff.
Mr. Chairman, I appreciate the challenge before us. This EO
requires the framework to be developed within a year. A
preliminary framework, in fact, is due within 8 months. We have
already issued a request for information to gather relevant
input from industry and other stakeholders. We are actively
inviting those stakeholders to participate in the framework
process. The early response has been very positive.
Over the next few months, we will convene a series of
workshops, where we will develop the framework, because this
forum allows the necessary collaboration and engagement with
industry. Our first organizational workshop will be held on
April 3. In May, we will release our initial findings from the
request for information, and our analysis of this response.
And, by the 8-month point, we will have an initial draft
framework, including an initial list of standards, guidance,
and practices.
The President's Executive order lays out an urgent and
ambitious agenda, but it is designed around an active
collaboration between the public and private sectors. And I
believe that this partnership provides the needed capacity to
meet this agenda and it will effectively give us the tools to
manage the cybersecurity risk we face.
And I appreciate the Committees holding this joint hearing.
It's reflective of the partnership we'll need to be successful
in this effort. And I look forward to answering any questions
you may have.
[The prepared statement of Dr. Gallagher follows:]
Prepared Statement of Hon. Patrick D. Gallagher, Ph.D., Under Secretary
of Commerce for Standards and Technology, U.S. Department of Commerce
Introduction
Chairmen Rockefeller and Carper, Ranking Members Thune and Coburn,
members of the Committees, I am Patrick Gallagher, Under Secretary of
Commerce for Standards and Technology and Director of the National
Institute of Standards and Technology (NIST), a non-regulatory bureau
within the U.S. Department of Commerce. Thank you for this opportunity
to testify today on NIST's role under Executive Order 13636,
``Improving Critical Infrastructure Cybersecurity'' and our
responsibility to develop a framework for reducing cyber risks to
critical infrastructure.
The Role of NIST in Cybersecurity
Let me begin with a few words on NIST itself: NIST's mission is to
promote U.S. innovation and industrial competitiveness by advancing
measurement science, standards, and technology in ways that enhance
economic security and improve our quality of life. Our work in
addressing technical challenges related to national priorities has
ranged from projects related to the Smart Grid and electronic health
records to atomic clocks, advanced nanomaterials, and computer chips.
In the area of cybersecurity, we have worked with Federal agencies,
industry, and academia since 1972 on the development of the Data
Encryption Standard. Our role to research, develop and deploy
information security standards and technology to protect information
systems against threats to the confidentiality, integrity and
availability of information and services, was strengthened through the
Computer Security Act of 1987 and reaffirmed through the Federal
Information Security Management Act of 2002. Consistent with this
mission, NIST is actively engaged with industry, academia, and other
parts of the Federal Government including the intelligence community,
and elements of the law enforcement and national security communities,
coordinating and prioritizing cybersecurity research, standards
development, standards conformance demonstration and cybersecurity
education and outreach.
Our broader work in the areas of information security, trusted
networks, and software quality is applicable to a wide variety of
users, from small and medium enterprises to large private and public
organizations including agencies of the Federal Government and
companies involved with critical infrastructure.
Executive Order 13636, ``Improving Critical Infrastructure
Cybersecurity''
On February 13, 2013, the President signed Executive Order 13636,
``Improving Critical Infrastructure Cybersecurity,'' which gave NIST
the responsibility to develop a framework to reduce cyber risks to
critical infrastructure (the Cybersecurity Framework). As directed in
the Executive order, NIST, working with industry, will develop the
Cybersecurity Framework and the Department of Homeland Security (DHS)
will establish performance goals. DHS, in coordination with sector-
specific agencies, will then support the adoption of the Cybersecurity
Framework by owners and operators of critical infrastructure and other
interested entities, through a voluntary program.
Our partnership with DHS will drive much of our effort. Last month
I signed a Memorandum of Agreement with DHS Under Secretary Rand Beers
to ensure that our work with industry for the Cybersecurity Framework,
and also with cybersecurity standards, best practices, and metrics, is
fully integrated with the information sharing, threat analysis,
response, and operational work of DHS. This will enable a more holistic
approach to addressing the complex nature of the challenge at hand.
A Cybersecurity Framework is an important element in addressing the
challenges of improving the cybersecurity of our critical
infrastructure. A NIST-coordinated and industry-led Framework will draw
on standards and best practices that industry is already involved in
developing and adopting. NIST coordination will ensure that the process
is open and transparent to all stakeholders, and will ensure a robust
technical underpinning to the framework. This approach will
significantly bolster the relevance of the resulting Framework to
industry, making it more appealing for industry to adopt.
Why This Approach?
This multi-stakeholder approach leverages the respective strengths
of the public and private sectors, and helps develop solutions in which
both sides will be invested. The approach does not dictate solutions to
industry, but rather facilitates industry coming together to offer and
develop solutions that the private sector is best positioned to
embrace.
I would also like to note that this is not a new or novel approach
for NIST. We have utilized very similar approaches in the recent past
to address other pressing national priorities. The lessons learned from
those experiences are informing how we are planning for and structuring
our current effort. In 2009, the Energy Independence and Security Act
(EISA) mandated NIST to develop a standards framework to help with the
deployment of a nationwide, end-to-end interoperable Smart Grid.
Following a similar approach to the one envisioned for the
Cybersecurity Framework, NIST coordinated a forward leaning approach
involving more than 1500 representatives from approximately 21 distinct
domains that now constitute the Smart Grid.
This effort led to the development of a framework called the Smart
Grid Roadmap that defined the domains of the Smart Grid and the
interfaces for those domains, identified existing standards for these
domains, prioritized standards needs and identified standards gaps.
Many of these standards gaps are currently being addressed in various
standards development organizations around the world. We are seeing the
results of this effort pay off in many ways. Cybersecurity standards
are being developed and adopted to secure different elements of the
electrical grid. Standards based deployments of secure Smart Meters are
enabling consumers safe and secure access to data about electricity
usage. The U.S. Smart Grid Roadmap is being used as a template for
frameworks in many countries around the world. Automakers are reaching
agreement regarding chargers for electric vehicles. All these
developments have helped address important policy objectives while also
positioning the U.S. as a leader in Smart Grid development and
deployment.
Another example of how NIST has brought together the public and
private sector to address technical challenges is NIST's work in the
area of Cloud Computing technologies. The unique partnership formed by
NIST has enabled us to develop important definitions and architectures,
and is now enabling broad Federal Government deployment of secure Cloud
Computing technologies.
What is the Cybersecurity Framework?
The Cybersecurity Framework will consist of standards,
methodologies, procedures and processes that align policy, business,
and technological approaches to address cyber risks for critical
infrastructure. Once the Framework is established, the Department of
Homeland Security (DHS), in coordination with sector-specific agencies,
will then support the adoption of the Cybersecurity Framework by owners
and operators of critical infrastructure and other interested entities
through a voluntary program. Regulatory agencies will also review the
Cybersecurity Framework to determine if current cybersecurity
requirements are sufficient, and propose new actions if it is
determined they are insufficient.
This approach reflects both the need for enhancing the security of
our critical infrastructure and the reality that the bulk of critical
infrastructure is owned and operated by the private sector. Any efforts
to better protect critical infrastructure need to be supported and
implemented by the owners and operators of this infrastructure. It also
reflects the reality that many in the private sector are already doing
the right things to protect their systems and should not be diverted
from those efforts through new requirements.
The Important Role of Standards in the Cybersecurity Framework
I'd like to explain why this approach relies on standards,
methodologies, procedures and processes, and why we believe it to be a
critical part of our work under the Executive order. First of all, by
standards, I am referring to agreed-upon best practices against which
we can benchmark performance. Thus, these are NOT regulations.
Typically these standards are the result of industry coming together to
develop solutions for market needs and are developed in open
discussions and agreed upon by consensus of the participants. This
process also gives standards the power of broad acceptance around the
world. Standards have a unique and key attribute of scalability. By
this I mean, that when we can use solutions that are already adopted by
industry, or can readily be adopted and used by industry, then those
same solutions reduce transactions costs for our businesses and provide
economies of scale when deployed in other markets, which makes our
industries more competitive.
A partnership with industry to develop, maintain, and implement
voluntary consensus standards related to cybersecurity best ensures the
interoperability, security and resiliency of this global infrastructure
and makes us all more secure. It also allows this infrastructure to
evolve in a way that embraces both security and innovation--allowing a
market to flourish to create new types of secure products for the
benefit of all Americans.
Developing the Cybersecurity Framework
NIST's initial steps towards implementing the Executive order
include issuing a Request for Information (RFI) to gather relevant
input from industry and other stakeholders, and asking stakeholders to
participate in the Cybersecurity Framework process. This RFI was
published last week and we are already getting informal feedback from
industry and other stakeholders on the RFI. Given the diversity of
sectors in critical infrastructure, these initial efforts will help
identify existing cross-sector security standards and guidelines that
are immediately applicable or likely to be applicable to critical
infrastructure. Industry has begun responding to the RFI and is coming
to the table to work with us on this analysis.
Underlying all of this work, NIST sees its role in developing the
Cybersecurity Framework as partnering with industry and other
stakeholders to help them develop the Framework. In addition to this
critical convening role, our work will be to compile and provide
guidance on principles that are applicable across the sectors for the
full-range of quickly evolving threats, based on inputs from DHS and
other agencies. NIST's unique technical expertise in various aspects of
cybersecurity related research, technology development and an
established track record of working with a broad cross-section of
industry and government agencies in the development of standards and
best practices positions us very well to address this significant
national challenge in a timely and effective manner.
The approach of the Executive order will allow industry to protect
our Nation from the growing cybersecurity threat while enhancing
America's ability to innovate and compete in a global market. It also
helps grow the market for secure, interoperable, innovative products to
be used by consumers anywhere.
Next Steps
The Executive order requirement for the Framework to be developed
within one year, and a preliminary framework due within eight months
gives this task a sense of urgency. We have already initiated an
aggressive outreach program to raise awareness of this issue and begin
engaging industry and stakeholders. Over the next few months, NIST will
bring many diverse stakeholders to the table through a series of
``deep-dive'' engagements. Throughout the year, you can expect NIST to
use its capabilities to gather the input needed to develop the
Framework.
In addition to the Request for Information (RFI), we are planning a
series of workshops and events to ensure that we can cover the breadth
of considerations that will be needed to make this national priority a
success. Our first workshop will be held in early April to initiate the
process of identifying existing resources and gaps, and to prioritize
the issues to be addressed as part of the framework. In May, we are
planning to release initial findings from early analyses of the
responses to the RFI. This will mark a transition into the dialogue
regarding the foundations of the framework.
In June, the Departments of Commerce, Homeland Security, and
Treasury will submit reports regarding incentives designed to increase
participation with the voluntary program. NIST will be supporting the
report drafted by the Department of Commerce, which will analyze the
benefits and relative effectiveness of such incentives.
Around the five-month mark, in July, NIST will host a workshop to
present initial considerations for the Framework, based on the analysis
conducted with the responses to the RFI. This workshop will be the most
in-depth of the three, with an emphasis on particular issues that have
been identified from the initial work--including the specific needs of
different sectors. At eight months, we will have an initial draft
Framework that clearly outlines areas of focus and initial lists of
standards, guidelines and best practices that fall into those areas
In a year's time, once we have developed an initial Framework,
there will still be much to do. For example, our partners at the
Department of Homeland Security will be working with specific sectors
to build strong voluntary programs for specific critical infrastructure
areas. Their work will then inform the needs of critical infrastructure
and the next versions of the Framework. The goal at the end of this
process will be for industry to take and update the Cybersecurity
Framework themselves--allowing it to evolve when needed.
Conclusion
The cybersecurity challenge facing critical infrastructure is
greater than it ever has been. The President's Executive order reflects
this reality, and lays out an ambitious agenda founded on active
collaboration between the public and private sectors. NIST is mindful
of the weighty responsibilities with which we have been charged by
President Obama, and we are committed to listening to, and working
actively with, critical infrastructure owners and operators to develop
a Cybersecurity Framework.
Thank you, for the opportunity to present NIST's views regarding
critical infrastructure cybersecurity security challenges. I appreciate
the Committees holding this joint hearing- it is reflective of the
working partnership we have with Department of Homeland Security and
other agencies to tackle cybersecurity issues. We have a lot of work
ahead of us--and I look forward to working with both Committees to help
us address these pressing challenges. I will be pleased to answer any
questions you may have.
Patrick D. Gallagher
Dr. Patrick Gallagher was confirmed as the 14th Director of the
U.S. Department of Commerce's National Institute of Standards and
Technology (NIST) on Nov. 5, 2009. He also serves as Under Secretary of
Commerce for Standards and Technology, a new position created in the
America COMPETES Reauthorization Act of 2010, signed by President Obama
on Jan. 4, 2011.
Gallagher provides high-level oversight and direction for NIST. The
agency promotes U.S. innovation and industrial competitiveness by
advancing measurement science, standards, and technology. NIST's FY
2012 resources total $750.8 million from the Consolidated and Further
Continuing Appropriations Act of 2012 (P.L. 112-55), with an estimated
additional annual income of $62.7 million in service fees, and $128.9
million from other agencies. The agency employs about 2,900 scientists,
engineers, technicians, support staff, and administrative personnel at
two main locations in Gaithersburg, Md., and Boulder, Colo.
Gallagher had served as Deputy Director since 2008. Prior to that,
he served for four years as Director of the NIST Center for Neutron
Research (NCNR), a national user facility for neutron scattering on the
NIST Gaithersburg campus. The NCNR provides a broad range of neutron
diffraction and spectroscopy capability with thermal and cold neutron
beams and is presently the Nation's most used facility of this type.
Gallagher received his Ph.D. in Physics at the University of Pittsburgh
in 1991. His research interests include neutron and X-ray
instrumentation and studies of soft condensed matter systems such as
liquids, polymers, and gels. In 2000, Gallagher was a NIST agency
representative at the National Science and Technology Council (NSTC).
He has been active in the area of U.S. policy for scientific user
facilities and was chair of the Interagency Working Group on neutron
and light source facilities under the Office of Science and Technology
Policy. Currently, he serves as co-Chair of the Standards Subcommittee
under the White House National Science and Technology Council.
Chairman Rockefeller. Thank you, sir.
I'm going to ask a question, and the four who spoke will
too, but we'll be very brief, because there are a lot of people
here. We're going to go according to the early bird rule. To
start, I'm just going to ask one quick question to both of you.
There are some people who say, ``Look, the House basically
has information sharing in its bill.'' It doesn't have much
about workforce, it doesn't have much about standards, it
doesn't have much about a lot of things, which I think are
critical to a good bill, but it's in their bill, so, in theory,
in that most people would agree with that, if you wanted to get
a piece of legislation, you could just hold yourself back to
information sharing. I think that's wholly insufficient. I
don't think that's a wise, useful, constructive approach to the
kind of bill that we can't really come back to each and every
year. We've got to do our full work this year.
So, I'm asking, starting with you, Secretary Napolitano, do
you think that information sharing alone is sufficient?
Secretary Napolitano. No. I think you've got it right, Mr.
Chairman.
In terms of the House bill, even in the information-sharing
area, I think there were some deficiencies in it. It had no
privacy protections built around it, which is very important in
the--particularly in the civilian realm. And it resided almost
all of the cybersecurity information monitoring
responsibilities within the NSA, which, of course, is part of
the military. We're talking about a totally different
environment here, the domestic environment, the partnership
with core critical infrastructure.
But, beyond that, what we are looking for is legislation
that can, if necessary, put in statute the clarity of the roles
and responsibilities now contained in the EO, so that that is
preserved, moving forward; a bill that looks at the basic
standard-setting that we need for core critical infrastructure
of the country; a bill that addresses FISMA as we move, and try
to move, from a paperwork-dominated statute to one that
requires and embodies continuous diagnostics, in realtime; and
increased research and development, among other things.
So, as we kind of lay out the topics involved under the
umbrella of cybersecurity, information sharing is very, very
important. Realtime information sharing is critical, but it is
not the only concern we have in this arena.
Chairman Rockefeller. Thank you.
Secretary Gallagher.
Dr. Gallagher. So, I think--it's hard to add to that
answer, but I think cybersecurity doesn't lend itself to simple
solutions. And I think, in the particular example you gave,
even with information sharing, where you're going to provide
threat information to the private sector, they have to have the
capacity to act on that information. And, to do that, it
involves some of the standards and technology issues that we're
talking about in the framework.
So, I think these things tend to be interdependent and go
hand-in-hand.
Chairman Rockefeller. Senator Carper.
Chairman Carper. Thanks, Mr. Chairman.
I'd like to go back a bit in time with each of you, and go
back to when the Senate--particularly Senators Lieberman,
Collins, Rockefeller, myself, Feinstein--offered the earlier
version of our legislation, our comprehensive legislation. And,
in it, critics said, ``Well, you've got the standards--with
respect to standards,'' that's best practices, if you will, for
critical infrastructure--``basically, you've got it mandated,
and somebody telling us what to do. That somebody might be
DHS.'' They didn't appreciate that very much. And the idea was
rejected. So, we changed it.
As you know, we changed it so that--we came back and said,
``Well, why don't we say that, for critical infrastructure, the
best practices would be, not mandated, but we'd ask the
industries--the owners, the operators of the critical
infrastructure--to tell us what--or to tell the Department of
Homeland Security what the standards ought to be. There would
be a dialogue between--that includes DHS, NSA, FBI, others--and
they would somehow--in this discussion, this roundtable, they'd
figure out what the best practices should be.'' Again, there
was a push-back from the--part of the business community said,
``No, no, that's going to end up with--we'll end up with
mandated best practices, mandated standards in that.''
And so, we come up with this Executive order. And the
Executive order says, as I understand it, ``Your dance partner,
owners of critical infrastructure, is not going to be FBI, it's
not going to be Homeland Security, it's going to be Assistant
Secretary Gallagher and our friends at NIST. And they work with
industry all the time on stuff that's related to this, like''--
that's one of the things that you talked about.
It's--what you've laid out, here, this framework, suggests
to me that each time--it's the third major proposal, here--each
time, it's been changed; and each time, it's been changed to
reflect, maybe the legitimate concerns, or maybe not so
legitimate concerns, that were raised within parts of the
business community.
But, I think we've moved a long ways, y'all have moved a
long ways, and, I think, in smart ways.
As my wingman here, Dr. Coburn, has suggested, there are
still some concerns about liability protection. My
understanding is, on the information-sharing sides, there's not
so much--it's not so much an issue anymore. I think there may
be bipartisan agreement with respect to punitive damages, and
maybe general damages. I think there are some questions about
liability protection on the critical infrastructure side.
Should it be punitive? Should it be more than punitive?
But, there has been a whole lot of movement, as I see it,
from the administration and, I think, from a bipartisan group
of us in the Senate, to meet the legitimate concerns that have
been raised.
Here's my question. Two-part. One, as you've gone out and
done good work in seeking input, Dr. Gallagher, from the
business community, what are you hearing? Is there any
acknowledgment that changes have been made? In a sense, the
administration is kind of negotiating against itself, but I
think we're negotiating after hearing what's being offered by
those who have been critical of our earlier approaches.
Number one, what are you hearing in response to the
changes, this latest iteration? Positive, or not?
And, second--this is, maybe, more for our Secretary--on the
liability side--general and punitive on the information
sharing. That's pretty--most people say that's pretty good, in
terms of give to the business community. And the question is,
what do we have to do in liability, on the critical
infrastructure side, to get their buy-in.
Two questions.
Chairman Rockefeller. And before those are answered, the
vote is premature, but it has started--the cloture motion on
John Brennan--so, we're going to work a tag-team thing here.
Whether we're Republicans or Democrats, it makes no difference.
I'm going to go over. John, you can run faster than I can.
Chairman Carper. Mr. Chairman?
Chairman Rockefeller. Yes.
Chairman Carper. Someone just handed me a note. It says
it's going to be--the first vote is on the Brennan nomination,
the 3:15. If it's agreed to--and I'm encouraged that it's going
to be agreed to----
Chairman Rockefeller. Well, we're 10 minutes into it. It's
already started.
Chairman Carper. Oh, OK. OK. Fair enough.
Chairman Rockefeller. Because we're going to have two
votes.
Chairman Carper. Good. We're going to have two votes. Fair
enough.
Chairman Rockefeller. OK.
Chairman Carper. All right.
Chairman Rockefeller. Go ahead and answer.
Chairman Carper [presiding]. Yes. Two questions, please.
Thank you.
Dr. Gallagher. So, very quickly, let me give you the
reaction that I've been hearing from business. I think,
generally, it's been very positive. And I think the origin of
that reaction has to do with the tension that you've observed
as these negotiations on how standards and requirements play
off each other.
I think one of the reasons the reaction is positive is that
I--and Senator Rockefeller mentioned this in his opening
remark--the tricky issue here is that there is a public
accountability for performance in the forum of critical
infrastructure. If it fails, it causes impact to the nation.
But, these type of standards and requirements also have
business impact; they touch how businesses perform, they touch
their business practices, and they affect the markets. And I
think, generally, there's a reticence to having the government
somehow have an undue impact on their business condition.
So, this arrangement allows, really, kind of the ideal
choreography, because the Department of Homeland Security lays
out the performance expectation--what do we have to achieve,
from a cybersecurity-performance view?--and then charges
industry with coming up with the business and cybersecurity
practices that meet that goal. And then we try to align our
practices.
So, in this complicated mix, where you want this to take
place, I think this is the best of all possible worlds.
NIST is kind of an ideal convener, because we're technical
and we're not in charge of anything. So, we can be sort of
neutral and be a partner with industry as they develop that.
Chairman Carper. Good.
Secretary Napolitano, the second half of the question,
please.
Secretary Napolitano. With respect to liability protection,
I think the administration is already on record as having
supported the targeted liability protections that were in the
bill last year, the bipartisan bill last year. But, the EO also
requires us to look at other ways to incentivize businesses to
raise their practice to meet the standards that are ultimately
seen as optimal. And so, for example, a--exploring, as we are,
whether there could be a procurement preference, for example,
given; whether there could be some kind of a seal of approval
that is given. Now, those are just two ideas that can also
provide incentives, because--recognize that the market, in and
of itself, has not provided sufficient incentive, yet, for all
business to voluntarily raise their standards.
Chairman Carper. All right. This vote's started--thank you
for--both of you--for those responses--the vote started about 8
minutes--9 minutes ago, and----
Thuney, you want to take a shot?
Senator Thune. All right, thank you, Mr. Chairman, I will,
and we'll race over there together.
Let me just, if I might, Secretary Napolitano, direct this
question to you. The Executive order directs the Secretary of
Homeland Security--you--to provide performance goals for the
cybersecurity framework. We've been told the performance goals
are intended to establish the level of security that the
framework should meet. Doesn't the ability to set the
performance goals put DHS in the driver's seat for this
process, no matter how collaborative the initial NIST process
may be?
Secretary Napolitano. Well, we already do this, in the
physical security side, with critical infrastructure. We work
with critical infrastructure in 18 separate sectors to work on
commonly understood performance goals and standards. So, in a
way, Senator, this is simply extending that into the cyber
realm.
But, we intend, and are pursuing, a realm that is very
collaborative in nature. Our goal is to set performance goals.
And NIST, then, establishes the framework and the standards of
how those goals are reached.
So, by way of example, a goal might be for a major--let's
say, a utility--if its major server, or servers, is attacked
and is nonfunctional--to have the capability to restore service
within a certain period of time. What the definition of that
certain period of time is, is something that we would be
working with, with industry, what makes sense, how would they
do it, what are their options, and so forth. But, that would
then feed into the framework that NIST will be establishing.
Senator Thune. And just to elaborate on that a little bit,
how do you intend to ensure that the performance goals are
reasonably attainable by your private sector partners?
Secretary Napolitano. Well, again, the EO requires us to
engage in a collaborative process, and to make sure that all
voices are listened to. And we do this in other areas already.
So, I would say, again, we will simply take some of the lessons
learned from some other things that we have done in the
physical infrastructure realm, and continue them into
cybersecurity.
Senator Thune. All right.
Dr. Gallagher, how will NIST ensure that the framework that
you're directed to develop with industry and other agencies
does not undermine, conflict with, or duplicate existing
mandatory--or voluntary, for that matter--government- or
industry-led standards for each infrastructure sector?
Dr. Gallagher. So, the way we'd like to approach that is by
having the industry and the critical infrastructure community
put the framework together themselves. I think we've--we've
done this approach in smart grid, where--and in cloud
computing--where those same stakeholders, who are operating
under either mandatory or industry-led standards, are quite
willing to put those on the table; and that's actually the
starting point for this framework process. This is not NIST
developing new or additional material; this is much closer--
much better thought of as a harmonization of what industry is
presently doing, itself. So, that's the way of taking care of
that conflict.
Senator Thune. You mention, in your testimony, that--and
I'm going to quote, here--``Many in the private sector are
already doing the right things to protect their systems, and
should not be diverted from those efforts through new
requirements.''
How are you going to work with DHS to ensure the Federal
Government is not diverting companies with new requirements?
Dr. Gallagher. So, I think the way that this works is--and,
in fact, the request for information we just put out asks
companies and stakeholders to share with us their current
practices and standards that they use. And I think the way this
framework is going to look, at the beginning, is, you're going
to see areas of overlap or where there's, you know, maybe,
existing and--from--existing practices from different sectors
that tackled the same problem in different ways. And there's
going to be areas where there are gaps.
And so, the roadmap is going to have a very interesting
sort of--the framework is going to have a roadmap character to
it, where, you know, we can use that to address those areas of
overlap and see whether that's a problem, or not. And I think
the way--industry needs to lead those discussions, not us. And,
conversely, when we see areas where there are gaps, then
there's going to be the ability to organize and set priorities
to address those gaps.
So, I think the process is specifically designed to make
sure we don't reinvent the wheel.
Senator Thune. And one quick question before we go vote--
what's the threshold for sufficient industry feedback and
participation in the framework development process? How are you
going to ensure that you receive enough industry input?
Dr. Gallagher. That's an interesting question. I don't--we
haven't had the problem of insufficient industry involvement in
the past, so we're anticipating the opposite problem, which is
an enormous insurge of participation. And I think what happens
at the working level, through most of these efforts, is, you
pick up on industry's own consensus-standards processes. And
so, the same sort of criteria for whether the right
stakeholders are involved and participating applies there.
And I think the final analysis is going to determine--is
going to look at the quality of their work product. If the
right folks were around the table, and the best ideas were
brought out, and then we're going to have the most viable
product, I guess the final test of all would be the market, you
know, pickup. I mean, the real test of the framework is whether
it's put into practice. And if insufficient involvement was
there, that's not that buy-in, then we're not going to see that
adoption.
Senator Thune. Mr. Chairman, I think we have to go vote.
Chairman Carper. Yes, we do.
Senator Thune. Recess?
Chairman Carper. We're going to do a short recess, probably
10 minutes. We'll be back in about 10 minutes. Thank you for
your patience and letting us go do our nation's work. Thanks so
much.
We're in recess for 10 minutes.
[Recess.]
STATEMENT OF HON. MARK WARNER,
U.S. SENATOR FROM VIRGINIA
Senator Warner [presiding]. Well, this may be the first and
only time I get to chair this combined hearing, for the next 20
or 30 years, so I rushed back. We do have a second vote, but it
appears that the first vote may take some extended time. There
are some folks at the White House. So, hopefully Senator Coburn
will be back shortly, as well, and we'll be able to continue to
move on.
I wanted to look--and I know one of the biggest challenges
we've got on this whole question is, you know, how we set
appropriate standards, how those standards are nimble enough as
a--in a field that is constantly evolving. As somebody who made
a living in the technology field, I'm somewhat familiar with
that. And I think Senator Coburn raised, appropriately, the
right question, how we can then use the information sharing so
that firms are able to share in a way that has both--
appropriate protections in place.
And one thing that I would just add--since I may have a
little bit more time, as folks come back--is that I sense that
there is a changing feeling in the business community, because,
one, the increased amount of cyber activities, cyber attacks;
two, the publicly released Mandiant report, which cited and
specified the activities, particularly coming from China, and
how pervasive they are, and how much intellectual property is
stolen. So, while I, clearly, want to make sure that businesses
get the appropriate protections, I think there's an evolving
feeling, in the business community, that standards that had
some enforcement behind them, other than voluntary, are
important.
And what I wanted to have, perhaps--Mr. Gallagher, start
first--and then Secretary Napolitano address, is this--the
free-rider issue. When you have a voluntary set of standards,
and you have those businesses, entities that meet these
standards, then those that don't, in effect, have that plain
economic free rider effect. And is it not the case that,
particularly within sectoral industries--take utilities, for a
moment--you may have--because the--all the utilities have an
enormous interconnection between them--those free riders who
don't have appropriate protections in place may end up being an
entry point, not only into their own operations, but then into
other firms, because the firewalls between common industry
partners are not as great.
So, if both of you would like a take a crack at this issue
of the free riders--whether you see it, whether you're seeing
an emerging feeling from the business community on this issue.
Dr. Gallagher. So, thank you, Senator Warner.
I think that, with regard to the accountability of the
standards framework, you know, voluntary sometimes feels soft,
as if it's optional. But, the term is used in business--in
fact, standards developed through a voluntary consensus process
by businesses can be, in fact, fairly muscular. They can
include schemes that are there to identify whether products and
services conform to those standards. And those conformity
assessment vehicles, like product marking or various other
things, can be used in their business-to-business
relationships; they can be part of contract requirements, they
can be part of their own procurement requirements, and so
forth. And that's why these standards have such a powerful
market effect, is that they start driving these interactions.
So, I don't think we should believe that, because business
is in charge of the standards environment, that it's going to
be weak. I think--as long as the accountability is there for
the underlying cybersecurity performance, I think they're going
to be inclined to look at making sure that there's a robustness
there and they can identify their supply chain as not
undermining their credibility.
That being said, there is going to be unevenness in
adoption, and I think that's going to be one of the things we
continue to monitor, both with the stakeholders who are helping
us develop the framework and with our Federal partners. In some
cases, it's going to be, maybe, willful; in other cases, it may
be just the size of the company. Small businesses sometimes
face different hurdles, in terms of compliance, than large
companies. And hopefully that's a part of the framework and the
partnership.
Senator Warner. Before Secretary Napolitano answers, I
guess the one thing I would just come back to you at little bit
is, you know, the analogy, a little bit, breaks down where
industry sets a standard, and there may be a marketing
advantage. If you get the Good Housekeeping seal of approval,
that helps you. A competitive product that doesn't have that
Good Housekeeping seal of approval doesn't cause you any risk;
whereas, within an industry--again, critical infrastructure, in
particular--the weakest link could not only provide a way into
your company, even though you've got the Good Housekeeping seal
of approval, and cause harm, or, in addition, you know, you may
have the weakest link, then cause such a problem that there
could be industrywide repercussions even if you got--because
you're not going to have any safe harbor provisions.
Secretary Napolitano, and then also you want to----
Secretary Napolitano. Well, Senator, I think there is a
risk, here. And the risk is the free rider risk, that all who
need to be involved won't invest in order to be involved. But,
I think it's a measured risk, compared to a process that is an
open process, that involves industry from the get-go, and that
really aligns well with what we've done on the physical
security side, and with what NIST has done, in terms of other
types of standard-setting.
One of the questions is, why wouldn't a company
participate? One reason is that they, themselves, do not have
the technical know-how. They don't have the IT personnel, and
the like, to really be able to participate.
One of the things we will be building and encouraging
through this is the exchange of best practices. That exchange,
among those actually in the market, actually can help smaller
entities or those who have not invested what they should have,
already.
And finally, as I mentioned in my opening, I think there's
not just a Good Housekeeping seal-of-approval sort of incentive
that we can build, but, again, looking at things like
procurement preferences, acquisitions, and the like, that
really, at least to the extent that government is a consumer of
these services, can be helpful.
But, there is--as you have identified, this is,
legitimately, a risk.
Senator Warner. Well, I just personally believe that--I
think this collaboration ought to be industry-led. I do believe
there needs to be an enforcement mechanism, and I do think
there needs to be, similar to some of the legislation that was
introduced last year, standards that had some teeth to it. And,
as Mr. Gallagher said, you can have standards with teeth that's
industry-driven, but you've got to have some kind of
enforcement tool.
I want to follow up, Secretary Napolitano, with your
question of ``those entities that might be in a particular
sector that don't have the capabilities.'' You know, how do you
make sure they are able to get the intellectual product that is
being created by, you know, the large utility versus the small
rural utility? If the large utility is spending lots of
resources getting the best and the most efficient cybersecurity
system in place, you know, they're going to be--they may be
reluctant to share that benefit with partners who are, again,
free riders. How do we get over that----
Secretary Napolitano. I think----
Senator Warner.--challenge?
Secretary Napolitano. I think the way to think about that
is their participation in the construct of the framework,
because NIST really sits as kind of a neutral in the creation
of the ultimate framework, but the framework itself provides a
way for all entities involved in a particular area to exchange
information. And I think we've seen that happen with some of
NIST's other activities. So, the process itself could help
solve that problem.
Senator Warner. I'm not--I want Mr. Gallagher to--I'm not
sure I fully got the answer, there, because I'm--you know, this
is a very competitive space right now, as people come out with
cybersecurity products and services. Some are better than
others. You know, you've got--this will constantly be evolving.
You know, one of the concerns, I know, is that we end up with a
stagnant standard that kind of gets industry-accepted,
technology moves ahead, and how do the new movers in that
cybersecurity industry break in if you've already got a
government-established standard? But, somehow or the other,
we've got to figure this out.
Do you have any thoughts on it, Mr. Gallagher?
Dr. Gallagher. Well, I think--you know, I--that's one of
the reason why we don't like to have government set standards
in the United States. I think, by law, we have a preference,
where Federal agencies look to the private sector standards
organizations for their needs as the first preference. And one
of the reasons for that is, they tend to be more dynamic,
because they're market-attuned, and they're going to keep
looking at that.
The tension you point out, where it's a very competitive
market--I mean, the standards process can be weaponized, as you
know. Large companies can come in and want to, you know, take
advantage of the--incorporating their technology in a standard
because of the--the market advantage that would accrue to them
if that was widely adopted. But, the standards processes have
learned how to adopt to those kinds of commercial tensions in
the process. That's really the kind of diplomatic negotiation
that's occurring in the voluntary consensus standards process.
And so, we will be, not replacing that function, we'll--the
framework process will be engaging existing standards
development organizations and leveraging their expertise, and
carrying that out.
Senator Warner. Well--I've run over my time; I'm still not
completely sure how we work that out on the free rider issue.
The last quick--very quick question, and I'll turn it back
to Senator Coburn--it just--when we think about cyber threats,
a lot of what's discussed in the press are those intellectual
property threats and those threats that could actually
interfere, turn on and off, operations. Do we--do you
prioritize nature of threat, those that are simply, in effect,
passive stealing versus those threats that are actually able to
shut down critical infrastructure, for example?
Chairman Carper [presiding]. I'm going to ask our witnesses
just to be very brief in your response, please.
Secretary Napolitano. In some senses, yes. I can explain
later, when there's more time.
Chairman Carper. That was good.
[Laughter.]
Chairman Carper. All right, thanks.
Have you made the second vote? Yes, there is a second vote.
Final passage. You know? OK.
Dr. Coburn.
Senator Coburn. Well, thank you.
Madam Secretary, I--one of the things--you have this great,
big agency--in there--like on FISMA--do you really feel like
you have the authorities you need, right now in your position,
to actually accomplish what we need to do, especially when it
comes to cybersecurity for the government?
Secretary Napolitano. I think we can accomplish much with
our existing authorities. As I've suggested, Senator, I think
some FISMA reform, which would move us out of the paperwork
generation into the Digital Age, very helpful, was considered
part of the original legislation.
The ability to do hiring equivalent, with equivalency to
the sorts of hiring that the NSA could do--because, realize, in
this realm, civilian capacity needs to be enhanced, because
we're going to manage most of this through civilian capacities,
with some utilization of the NSA. And we already have those
arrangements made. But, on that personnel side, we will need
legislative assistance.
Senator Coburn. OK. Do you feel comfortable--and I'm not
asking this question so you'll make a criticism of the
Executive order--do you think we have the proper balance, in
terms of intellectual property and protection of critical
infrastructure, within the Executive order? We're going to help
that, but what's your feeling about that?
Secretary Napolitano. I think, overall, yes. And I think
our key interests--and it's partially a response to Senator
Warner, earlier--is the protection of the country from a cyber
event that could cause undue economic loss or, in worst case
circumstances, even endanger life. So, we fundamentally need to
be concerned with that.
That kind of investment may not be as marketable or return-
on-investment-oriented as, say, protection against the theft of
your intellectual property. I mean, I think there's an easy
economic case, ``This is better for us, it's going to be better
for our bottom line, it's part of the R&D process and our
protection of our intellectual property.''
In the security context, there's a public element to this
that is not reflected immediately in the return on investment.
That's why, from a standpoint of where we focus most of our
efforts--we do the theft of intellectual property, the
counterfeiting, the--all of that, those kinds of cases--but,
where we are focused within the security of the United States
is really on that fundamental attack, that fundamental
interference that could shut us down.
Senator Coburn. Yes. You have all these areas of
responsibility, and a large agency, and we're coming up on a
tenth anniversary of your agency. And we had a great
conversation, when I came out to visit you. But, there are--you
have some real challenges. I mean, they're documented. GAO has
documented, your own IG, as well as our investigative
subcommittee. Do you--can you assure us you're seeing
improvements in all those areas, and you're making the
management adjustments those criticisms that have been rightly
leveled, in terms of difficulties within the agency? Because
your ability to respond to those has a lot to do with your
ability to carry out the function that we're going to be giving
you under the President's Executive order.
Secretary Napolitano. Right. And I think--in terms of
management of a Department that was brought together out of 22
agencies and is still relatively young, I think we have worked
very closely with the GAO and the IG to really tighten the
management and the accountability of the management,
departmentwide.
I can also share with you that there has been no part of
the Department that has expanded so rapidly, in terms of
capability and responsibility, than the part that deals with
cyber. And that's because of the continuing threat that we
face.
Now, with the EO, we will take on even more
responsibilities. Many of these are continuations of things
we've done. Some of them are actual expansions. But, we are
fully prepared to do that.
Senator Coburn. I have to tell you, I have been thoroughly
impressed with the employees and the people that have given us
the briefings that we've had. There's no doubt to their
competence, their dedication, and their service. And I would
just tell you, you should take that back.
Before my time's up, which it almost is, I would ask that
you leave some people here to hear the GAO testimony after you
leave, if you would. I think some of that some of this is spot
on; some of it may not be. But, I think having this--the GAO
outline where they see the problems, and you hearing--somebody
in your agency actually hearing that, and reporting to you what
that is--and the flavor, and the insight that they have, I
think will be beneficial as you work to implement what you're
charged to do.
Secretary Napolitano. Happy to do that, Senator.
Senator Coburn. Thank you.
Chairman Carper. And I second that request. If you could,
that would be great.
All right, I've been waiting to make this introduction for
a while, but--Senator from Massachusetts, Senator Mo Cowan.
Senator Cowan.
STATEMENT OF HON. WILLIAM COWAN,
U.S. SENATOR FROM MASSACHUSETTS
Senator Cowan. Thank you, Mr. Chairman. Madam Secretary,
Mr. Gallagher.
My first question, Madam Secretary, is to you.
First of all, before I offer it, I'd preface it by saying
thank you for your testimony today, and thank you for your
partnership with us up in the Commonwealth of Massachusetts.
You and your team have been very helpful to us, and through
some difficult times. We really do appreciate that.
But, to the issue at hand--and forgive me if I cover a
territory that may have been covered while I was away for the
vote--but, I want to talk a little bit about the concept about
cybersecurity as it relates to, sort of, the concept of the
weakest link in the chain. And we're going to hear testimony
today from a CIO from a major company about--and this is my
description, not his--the--sort of the platinum level of
security, or focus on cybersecurity that they employ. And
that's a very strong link in the chain.
But, while that may be true of Dow Chemical and other
companies, is it fair to say that the failure of any market
participant, particularly when it comes to critical
infrastructure, to improve their defenses, on the cybersecurity
side, to a minimum baseline standard leaves us all exposed,
notwithstanding those platinum structures in place, and leaves
us exposed, not only to some significant costs, but some
significant security concerns?
Secretary Napolitano. Senator, I think the--our efforts are
to have everyone raised to a certain baseline standard. There
may be entities that do more than that, but a certain baseline.
And that should be attached with greater real time information
sharing, because information sharing is a big part of this, and
exchange of best practices, new technologies, and the like.
But, there is no--there is no mandate, per se, in the Executive
order. So, we are getting at this through a cooperative,
voluntary regime.
Senator Cowan. And through that cooperative, voluntary
regime--I just want to be clear--you do believe that there is--
there is value in that minimum baseline standard across all
players in this critical sector. Fair to say?
Secretary Napolitano. Yes. I think it--there is value,
because what we are trying to do is, in a realm where there is
an increasing number and sophistication of cyber threats from a
variety of actors, making sure we are best prepared, as a
country, to prevent or, if necessary, respond, and to mitigate
any damage.
Senator Cowan. And perhaps--this question, to you, Dr.
Gallagher--I've talked to a number of folks with particular
knowledge and expertise in this field, including Cynthia
LaRose, of Mintz Levin, about privacy in cybersecurity issues,
and the point has been made to me that the market participants,
obviously, should play an important role with the government in
establishing baseline standards that are out there, and there
should be--the ability of the market player is to have a
significant influence over what those standards are. But, if
businesses may be left to their own devices, we may never get
to a point where we can ensure ourselves that we've properly,
across all critical infrastructure issues, sort of addressed
cybersecurity, because of the difference in scale of entities
and a difference in focus. Would you agree with that
assessment?
Dr. Gallagher. I think, if it's not done correctly, that
could happen. I think the challenge is--turning to private
sector-led standard-setting when the public sector needs those
standards means that there's an accountability of the private
sector to that performance. In other words, the--it's not the
same thing as saying there's an abrogation of responsibility by
the public sector by saying we want industry's help in doing
it.
So, I think the EO correctly lays this out. It starts with
a process where we try to articulate the cybersecurity standard
of performance that we'd like to engage on. And then we let
industry, who knows the market, who understands their
technology, who understands the dynamics, attempt to respond to
that.
In the final analysis, I guess the public sector will have
to evaluate whether that meets the public's needs to secure the
safety of the U.S. population, and respond accordingly. But, we
do this very often. I think, you know, it's not uncommon for
government agencies, in procurement and regulation and so
forth, to depend on the private sector. And, in fact, the
private sector wants to be responsive to that, generally,
because they want their efforts to be aligned with those needs.
Senator Cowan. Thank you.
Chairman Rockefeller [presiding]. Senator Johnson.
STATEMENT OF HON. RON JOHNSON,
U.S. SENATOR FROM WISCONSIN
Senator Johnson. Thank you, Mr. Chairman.
Madam Secretary, Mr. Gallagher, thanks for coming before
us.
Mr. Gallagher, I was actually pleased to see, in your
testimony, that you said the approach should not dictate
solutions, but, rather, facilitate it. I think that was one of
the things that kind of bogged us down last time, when we tried
to pass a cybersecurity bill.
And this is really a question for both of you. As you have
gone around and talked to industry--certainly my input was, I
think, last time around, there was an assumption, or a
presumption, that business had to be dictated to. You know, I
come from industry. I really think businesses want to protect
their cyber assets and realize that government really has a
real role to play here, and has a lot of valuable information.
So, can you just give me your evaluation, in terms of
that--I guess, that assessment? How willing is business? How
often do they really have to be nudged along a little bit more
forcefully?
Madam Secretary.
Secretary Napolitano. In general, the responsible business
players recognize the multiple interests involved, and our work
is furthered when there's truly a collaborative atmosphere. We
all want to solve problems. No one is benefited if there's a
major or successful cyber attack within the United States. So,
we're approaching it from that dimension.
To the extent this is a national security issue, which it
is, and we are leaving it to a collaborative process to help
resolve, that is a first. Normally, when security is concerned,
it is much more of a government, kind of, top-down, as it were,
philosophy. So, this is a grand and bold experiment, in that
regard. But, I proceed on the notion that we can make this
work, and that we will.
Senator Johnson. Thank you.
Mr. Gallagher.
Dr. Gallagher. I would confirm that. I don't want to talk
about the irresponsible players, but, I mean, my reaction, in
working with business leaders, particularly in critical
infrastructure, is, they acutely feel their obligation to
protect the public, and want to perform.
I think the underlying issue--and this touches on some
comments that Senator Warner raised, as well--is, this will
work best of all when good cybersecurity is also good business.
And when that alignment occurs, I think that's when the magic
happens and this really works very powerfully. And that's
related to this discussion on incentives. And I think one of
the things that can come out of this process, since this is an
industry-led standards development effort, is, we will be
monitoring those areas where the standard-setting and adoption
seem to be--where there seems to be a headwind that is related
to, maybe, disincentives or, you know--and those will be
important information for us to pay attention to. But, I think
that's where this wins most dramatically, is when good security
is also good business.
Senator Johnson. Now, last time around, the regulations
were stated to be voluntary, but I think businesses viewed that
as saying, ``Yes, it was voluntary, but pretty coercive,
particularly after 1 year.'' What has changed? Because it
sounds like the reaction from businesses has changed pretty
dramatically. I mean, what, specifically, did you change, in
terms of that voluntary nature of the EO, in your proposals?
Secretary Napolitano. I think one of the things that
happened is that there was a process, led by the White House,
to engage business in the construction of the EO, itself. So,
it didn't just kind of spring like, you know, Athena from the
head of Zeus, but it was really a collaborative process to
begin with.
So, it's, you know--and the second thing I would mention,
Senator, is, we have--we didn't stop work because the bill
failed. I mean, we were already, all summer, you know, working
on, How do we make sure that we are looking at adequate cyber
performance goals? And what could standard-setting look like in
this regime? So--and I think that gave, perhaps, assurance to
some in the business community that we truly are engaged in a
collaborative process.
Senator Johnson. OK. One of my assumptions is that just the
word ``comprehensive'' makes things more difficult around here.
There are certainly different components to cybersecurity that
could potentially--I'm just saying potentially--could be
enacted in a step-by-step basis.
First of all, do you agree with that? Does it have to be
comprehensive? And if it could be a step-by-step approach, do
you have a priority? I know, Mr. Gallagher, I think you've
listed the five pieces of legislative actions that are
required. But, is comprehensive required, or, if it's not
possible to get that, can we go step-by-step?
Dr. Gallagher. So, I think the problem with cybersecurity,
of course, is, you're talking about a system behavior. And so,
in the end, you have this problem, where it's a chain of
performance, and you're as strong as your weakest link. And
that's one of the reasons that you always have to think about
the whole.
But, you're right, in order to make progress, you can't
boil the whole ocean at once, and I think you have to set
priorities. I think the Executive order, and this process, will
allow that to happen. Clearly, part of this is dealing with
known threats and known vulnerabilities, just good cyber
hygiene and putting it into practice robustly. Some of this is
putting in the tools that allow us to do adaptive
cybersecurity. How do we react to the new information, the new
threat information, the type of cybersecurity automation tools?
And some of this is, how do sector-specific organizations
address, you know, their requirements in the--you know, in
their context, to protect the public, in the advent of a cyber.
So, it's a complicated challenge, in the sense that the
whole matters, but you have to work at it in pieces.
Senator Johnson. OK, thank you.
Chairman Rockefeller. Senator Baldwin.
STATEMENT OF HON. TAMMY BALDWIN,
U.S. SENATOR FROM WISCONSIN
Senator Baldwin. Thank you, Chairman Rockefeller and
Ranking Member Thune. Thank you, to my Chairman, Carper, and
Ranking Member Coburn.
I'm new to the Senate, new to the Homeland Security and
Governmental Affairs Committee, but, back in my House service,
I had the opportunity to serve on the House Energy and Commerce
Committee, where I started to become more aware, and sometimes
more alarmed, about our need to protect our critical
infrastructure and the threats faced by cyber penetrations, et
cetera. And I look forward to the opportunity to be involved in
this issue, moving forward, but looking at it more broadly than
just the jurisdiction of the Energy and Commerce Committee,
although it was pretty broad.
In that vein, I wanted to start, Madam Secretary--in your
testimony, you briefly referenced the National Cybersecurity
and Communications Integration Center, which is a 24/7 response
center for potential cyber threats. And I wonder if you could
describe for me in greater detail the sort of--the functions of
this center, what sort of business it's seeing, and if you
could highlight a few stories of success that have been
achieved through the creation of the center.
Secretary Napolitano. The NCCIC, as we refer to it, is a
24/7 watch center. It has a number of partners on the watch
center. Importantly, both the NSA and the FBI are partners
there, as we are partners with the FBI in the--their JTTF
center, as we partner with the NSA, as well. So, when you think
about roles and responsibilities, the DHS, the FBI, and the NSA
have really figured out for themselves the lanes in the road
and how a call to one is a call to all.
It is constantly getting information. It gets reports from
the private sector. It sends information out. It deals with
mitigation efforts. It deploys teams to help mitigate damage,
particularly in the area of industrial control systems. It's a
very important subset of this that we've seen a lot of activity
in. It really is our key information collection, sharing,
collating, analysis area in the cyber realm.
One recent area we've been heavily involved in is a whole
spate of DDOS attacks against the financial sector, and
assisting them in responding, and also helping them to work
around the DDOS attacks that they are experiencing.
I would invite you or any members of the Committees. We'd
be happy to host you at the NCCIC to see what really has been
built out there.
Senator Baldwin. Thank you. You mentioned, in your
response, working with industries that have industrial control
systems. And want to sort of ask a related question. I was
talking about my experience, in the House, on Energy and
Commerce, and the cybersecurity issues that are raised there. I
understand, from what I've been learning lately, that the
financial services industry has some of the best protections in
place against cyber threats, and certain, you know, other
sectors that are protecting essential infrastructure have more
lax protections in place, how we say.
I guess I'm wondering how the best practices from the
financial services industry can be applied to other sectors,
and to what extent the absence of industrial control systems in
that sector hinder the application of those best practices.
What's--what can go across sectors and be learned, and the fact
that they don't have SCADA systems, you know, that it's not
going to be that helpful in the other sectors?
Secretary Napolitano. One of the things about cyber is that
this is not--although we talk about sectors, they're not
stovepiped, they're all interconnected. We live in a
interconnected world, in every respect. There are some things
that are being done in the financial sector that will easily
migrate into performance goals, and, indeed, perhaps even into
a framework. There are other things that are not as----
Senator Baldwin. Can you----
Secretary Napolitano.--applicable.
Senator Baldwin.--can you outline--or can you mention some
of those, just so I get a clear sense of what can migrate
easily?
Secretary Napolitano. I'd rather not, in an open setting.
Senator Baldwin. Oh, OK.
Secretary Napolitano. But, we'd be happy to provide a
briefing for you.
Senator Baldwin. Great. And I cut you off. You were saying,
there are some things that migrate easily.
Secretary Napolitano. And some that don't. But, to the--you
know, one of the things that we will be working on with NIST
is, as we set performance goals, and as we engage in this
process, what does the framework absorb by way of things that
are interconnected and that apply across a broad spectrum.
Senator Baldwin. Thank you.
Chairman Rockefeller. All right.
We go now to Senator Pryor. And then, that'll be the end of
the first panel.
And I want to apologize to the first panel, because we've
kept you here a long time. Part of it was my fault, but I
apologize.
Senator Pryor.
STATEMENT OF HON. MARK PRYOR,
U.S. SENATOR FROM ARKANSAS
Senator Pryor. Thank you, Mr. Chairmen. And I use that word
in the plural. Thank you all for your leadership on this.
Secretary Napolitano, always good to see you. Thank you for
being here again today. You mentioned, just briefly, something
in your opening statement about the sequester and some of the
adjustments you're going to have to make this year. Could you
elaborate on that?
Secretary Napolitano. Well, as you know, the sequester
applies virtually account--it does apply account-by-account
across the government, and limits our flexibility, in terms of
where we put resources. The result is, for example, in our CERT
teams, we were looking at, I think, a 10 to 12 percent
reduction there, in terms of being able to fill vacancies. We
are, importantly, I think, probably going to have to delay the
deployment of the next generation of security for the civilian
aspect of the Federal Government, the so-called E3A program,
for a year, because we just are not going to be able to meet
the deadlines, given the lack of resources that had previously
been budgeted. So, those are two concrete things I can give
you.
Senator Pryor. Thank you.
Dr. Gallagher, do you have similar impacts from the
sequester?
Dr. Gallagher. Similar, but not nearly at that scale. So--
--
Senator Pryor. We understand, sure.
Dr. Gallagher.--yes, I think, for NIST, the reductions--so,
the main role of NIST in the Executive order is one of
convening and technical support. So, obviously, those are the
two areas. But, by intentionally pivoting this so that this is
an industry-driven process, I am hopeful that there is a very
minimal impact on our ability to deliver the framework with the
sequester. I think the real impact of the budget, in this
particular case, is going to be more a long-term one, as--
because I see the framework process as being a continuous one,
and I hope it doesn't impact our ability to provide technical
support to that ongoing process.
Senator Pryor. Yes, that actually was my next question for
you, because I assume that, if we do cybersecurity--and I hope
we do--that you will have an ongoing role, but, at some point,
obviously, resources have to be a consideration for you. So, in
a shrinking budget environment, have you thought through how
you're going to manage that, or do you have enough information
yet?
Dr. Gallagher. Well, the way you manage that is by setting
some priorities. And I--you know, our priorities, in supporting
standards coordination, are to support the highest priorities
of other agencies. So, the NIST role in supporting standards is
one of direct support to other agencies. So, it's hard to see
that cybersecurity's not going to be at the top of that list.
So, it may impact other priority areas.
Senator Pryor. Right. I understand. And that--I think
that's a concern of both committees, here.
Dr. Gallagher, next month you're having a--sort of a public
workshop in Gaithersburg, I believe. What are you hoping to
accomplish with that? And is that going to be the only one, or
will others follow?
Dr. Gallagher. It will be the one--one of several. We
anticipate at least four workshops, over the next 8 months, to
develop the framework. We learned, from both our cloud
computing efforts and from the smart grid standards efforts,
that these type of robust workshops were a very powerful way of
bringing together the stakeholders, because you've got to put a
mix of stakeholders in a room and hammer out some of these
issues. You can get pretty far with calls for information, and
people submitting things. But, in the end, there has to be
direct negotiation.
So, the first meeting is organizational. It's going to be,
How do we set up the framework process to be productive?
Hopefully, we'll be looking at what the performance objectives
from DHS start to look like and how do we organize the effort
so that we can produce the initial framework in 8 months.
Senator Pryor. And is this a workshop just for public
sector, or is it public and private?
Dr. Gallagher. We're going to invite everyone who can
contribute.
Senator Pryor. OK. So, how many people is that going to be,
or how many organizations----
Dr. Gallagher. I'm--well, in the case of smart grid, we
were up over 1600 people fairly quickly, and this is a broader
area, so it could be quite large.
Senator Pryor. Do you include--are you including State and
local governments----
Dr. Gallagher. Yes.
Senator Pryor.--in that? Good.
Mr. Chairman, thank you. That's all I have. Thank you.
Chairman Rockefeller. Thank you, Senator Pryor.
I think Chairman Carper wants to say something, as you go,
but stay, for the moment.
Chairman Carper. Real brief.
Thanks very much for coming. Thanks very much for your work
and the work of a lot of folks that you lead, for getting us
this far.
A reporter asked me, earlier today, if the Executive order
might be seen as an excuse for us not legislating; maybe we
don't need to do much heavy lifting on--in the--on the
legislative side. And I said, ``No, I think it's an incentive
for finishing the work that we began in earnest in the last
Congress.'' And I'm encouraged, today, that we've moved even
further, and that we're--I'm encouraged that we're going to get
this done.
So, Mr. Chairman, and to our panel, thank you so much.
Chairman Rockefeller. I share similar sentiments. I'm very
grateful to you both. Testifying probably is not the thing you
most enjoy in life, but you were very helpful. You're both very
smart, you both run very important organizations. Thanks a lot.
Our second panel will be--now, I pray I get this right;
Senator Thune has tried to help me--Mr. Greg Wilshusen--is that
a thumbs-up or a thumbs-down?
Mr. Wilshusen. Thumbs up.
Chairman Rockefeller. Thumbs up, okay--who's Director of
Information Security Issues for the U.S. Government
Accountability Office. He was invited by Senator Thune and all
of us. And also, Mr. David Kepler, who is Chief Sustainability
Officer and Chief Information Officer, Business Services and
Executive Vice President at a small company called Dow.
We welcome you.
And why don't you go--are you friends now?
[Laughter.]
Chairman Rockefeller. OK. Why don't you go first, Mr.
Wilshusen. Yes.
STATEMENT OF DAVID E. KEPLER, CHIEF SUSTAINABILITY
OFFICER, CHIEF INFORMATION OFFICER, BUSINESS
SERVICES AND EXECUTIVE VICE PRESIDENT, THE DOW CHEMICAL COMPANY
Mr. Kepler. Thank you, Chairman Rockefeller, and thank you,
Chairman Carper, as well, and Ranking Member Thune and Ranking
Member Coburn.
I'm the Chief Information Officer and Chief Sustainability
Officer for The Dow Chemical Company, and Dow appreciates the
opportunity to provide our view on the state of cybersecurity
in the U.S. today.
Today's companies regularly have to manage major
information security issues, including corporate espionage,
intellectual property theft, hactivists, attacks on our
systems, and cyber criminals. Companies also have to be
prepared to manage and mitigate risks, such as acts of
terrorisms or sabotage, that may have severe physical and/or
financial consequences.
As an example, Dow monitors and logs approximately 300
million generic network events a day. This gets distilled down
to about 300 investigations each day, and results in about 10
mitigations we have to address. We manage an incident a month.
This requires a major team effort, with a multi-day event--a
multi-day team response.
So, companies have a vested interest, along with a duty to
their stockholders, employees, and communities, to protect and
defend their facilities, processes, and intellectual property
against these cyber inclusions. However, industry must rely on
the Federal Government to approach cybersecurity to deploy an
offensive perspective by preempting attacks, when possible,
through the pursuit and prosecution of criminals behind these
events.
Since 9/11, The Dow Chemical Company, and many other
chemical companies, have made significant investments in the
areas to improve security. For example, the American Chemistry
Council, as part of its responsible care approach, devised the
security code which requires companies to adhere to the
chemical industry best practices for both cyber and physical
security.
Dow believes that the protection of the country's
infrastructure can be addressed most effectively by moving
forward with policy which strengthens the collaboration between
the Federal Government and the private sector. These key
principles of collaboration are, one, advancing more specific
and timely information sharing between government, industry,
and among industry peers; two, reasonable protection for
sharing threat or attack information between the government and
other companies; and, finally, it also has to lead to
aggressive pursuit and prosecution of criminal--cyber
criminals.
Dow does not support prescriptive regulation legislation or
specific technologies or methods. Legislations that set up a
system requiring significant resources to comply with this type
of regulatory framework and the resources from addressing the
threats and risks we need for mitigation. Issues around
cybersecurity are in constant flux, and proper management
requires a fluid and fast risk-based response. Complex
regulatory mandates will only slow the advancement of cyber
risk and management systems.
Effective two-way cybersecurity and physical information
sharing must be linked together, and it must be timely,
specific, and actionable, to help promote the flow of
information. Information provided by the private sector and
government should be adequately protected.
On liability, the protection afforded under the Support
Anti-
terrorism by Fostering Effective Technologies, or the SAFETY
Act of 2002, we think are appropriate for consideration for
cybersecurity.
I was asked to comment on the Executive order on improving
cybersecurity, and Dow supports the information-sharing
initiatives included in the order. I believe we need to do
more, in the long run. If there is anyplace for new
legislation, it is to provide reasonable protection for
information sharing to incur a broader-based sharing in the
industries with government.
Leveraging security standards into the government
procurement practice is a good idea.
Section 7, describing the cyber framework, I think this
reflects a good sentiment and an approach; however, we do need
to recognize that sector specific approaches and a clear
willingness to build on prior work that private sectors have
done is important. And this can't be a one-size-fits-all model,
based on the industries we're trying to manage in the critical
infrastructure.
Section 9, the declaration of risk and managing the
criteria for reasonable result in an incident, needs to be
better defined. The concern is, we'd create a large list of
risks that are not clearly prioritized within a sector, and
then push generic standards into that sector that's trying to
manage the systems that they have to deal with, both in
physical and cybersecurity.
Also, there needs to be more clarity on the position, in
Section 9, that the Secretary shall not indemnify any
commercial information technology products or consumer
information technology services under this section. I hope this
doesn't mean that the IT industry gets a free pass. We need
their help in making this a successful endeavor.
The concept of a partnership is to work together on a
common goal. The outcome of the effort, in cybersecurity,
should not be measured by how many regulations we create, but
how much progress we make against a real threat to our
country's security in progress. We are here to do our part.
Thank you.
[The prepared statement of Mr. Kepler follows:]
Prepared Statement of David E. Kepler, Chief Sustainability Officer,
Chief Information Officer, Business Services and Executive Vice
President, The Dow Chemical Company
The Dow Chemical Company appreciates the opportunity to submit
these written comments to the Senate Committee on Commerce, Science,
and Transportation and the Senate Committee on Homeland Security and
Government Affairs. We applaud the Committee for holding a hearing on
cyber security and the necessary collaboration between government and
the private sector.
About Dow
Dow was founded in Michigan in 1897 and is one of the world's
leading manufacturers of chemicals, plastics and advanced materials.
Dow combines the power of science and technology to passionately
innovate what is essential to human progress. Dow connects chemistry
and innovation with the principles of sustainability to help address
many of the world's most challenging problems such as the need for
clean water, renewable energy generation and conservation, and
increasing agricultural productivity. Dow's diversified industry-
leading portfolio of specialty chemical, advanced materials,
agrosciences and plastics businesses delivers a broad range of
technology-based products and solutions to customers in approximately
160 countries and in high growth sectors such as electronics, water,
energy, coatings and agriculture. More information about Dow can be
found at www.dow.com.
Cyber Security: A Manufacturing Company's Perspective
Cyber threat activity across the business community and the
government has continued to increase over the last decade. The main
driver of this change is in the profile of the threat itself which has
matured from random acts primarily by individuals to now include well
resourced organizations outside the United States. These new threats
are targeted in areas that range from commercial espionage to terrorism
to activism. Companies have a vested interest--along with a duty to
their stockholders, employees and communities--to protect and defend
their facilities, processes and intellectual property against these
cyber intrusions.
The Dow Chemical Company and many other chemical companies have
made significant investments in all of these areas to address cyber
threats. After 9/11 for example, the American Chemistry Council (ACC),
as part of its Responsible Care approach, devised the Responsible Care
Security Code which requires companies to adhere to the chemical
industry best practices for security, both physical and cyber. Dow has
invested heavily in, and is constantly upgrading, the physical and
information defensive protection systems guarding our Company. However,
industry must rely on the Federal Government to approach cyber
security, working in partnership with other countries, to deploy an
offensive perspective by preempting attacks when possible and through
the pursuit and prosecution of the criminals behind these threats.
The management systems rely on information and knowledge, and there
is a need for identifying better approaches to work with government in
improving information sharing. Increased focus on real time and
efficient information sharing programs should be improved to foster,
incentivize and increase the sharing of threat activity.
Dow believes that protection of the country's critical
infrastructure can be addressed most effectively by moving forward with
legislation which strengthens the collaboration between the Federal
Government and the private sector. The key principles of this
collaboration are:
Timely information sharing between government and industry
and among industry peers.
Reasonable protection for companies sharing threat or attack
information with the government and their industry peers.
Aggressive pursuit and prosecution of cyber criminals.
IT and telecommunication suppliers must continue to improve the
security of their products and services and be unified in providing
services that their customers can rely on for threat response.
Dow does not support prescriptive regulatory legislation on
specific technologies or methods. Legislation that sets up a system
requiring significant resources to simply comply with a regulatory
scheme diverts resources from addressing the threats and risks in need
of mitigation. Issues surrounding cyber security are in constant flux
and proper management requires a fluid and fast response. Complex
regulatory schemes will only slow the advancement of cyber risk
management systems.
Background
The Internet has become critical to the operations of business,
government and global commerce. It is an open and dynamic venue for the
exchange and collection of ideas and information. For the United States
it has been a key enabler for maintaining the country's
competitiveness. Some elements inside and outside the country, however,
have seized on this open framework and have found innovative ways to
use it for illegal financial gains, victimization of the innocent and
to advance ambitions that are not in the interest of the United States.
Today, companies regularly have to manage major information security
issues, including: corporate espionage, intellectual property theft and
malicious activism. Companies also must be prepared to manage and
mitigate risks such as acts of terrorism or sabotage that could have
severe physical and/or financial consequences. The Dow Chemical
Company, like many large corporations, is regularly attack from sources
that are advanced, persistent and targeting our intellectual property.
In many cases, the highly sophisticated attackers are based in foreign
countries.
Efforts to develop a public-private partnership to protect against
cyber attacks has a long history. In 2003, one of the key objectives of
the National Strategy to Secure Cyberspace was to provide a framework
for public and private partnership including the sharing of
information. Much progress has been made, but today's cyber attacks are
much more advanced and it is clear that more ongoing progress is needed
to ensure the continued prevention of a severe systemic failure of
public or private critical infrastructure. It will require a more
responsive, integrated, and resilient national system to prepare for
and respond to these threats.
Chemical Industry Cyber Security Leadership
Large companies such as Dow are seeing an increase in the risks we
face. The internet, including the growth of social media, has elevated
our exposure to threat actors such as hacktivists (hackers with a
targeted malicious intent to vandalize or stop business as their
protest method) and nation states sponsoring industrial espionage or
cyber criminals. As society and industry move toward increased mobility
and pervasiveness of information technology, the frequency and cost of
cyber-incidents will continue to increase. These risks require a joint
public and private effort to be managed effectively.
In 2001, Dow and other American Chemistry Council (ACC) members
voluntarily adopted the Responsible Care Security Code (RCSC). The
RCSC is a comprehensive security management program that addresses both
physical and cyber security. It requires a comprehensive assessment of
security vulnerabilities and risks to implement protective measures
across a company's value chain. Since RCSC's inception, ACC members
have invested more than $11 billion in security enhancements including
both physical and cyber security protections. Security, in all its
dimensions, continues to be a top priority for Dow and the chemical
industry. Our record of accomplishment and cooperation with Congress,
DHS and others is undisputed.
Dow has led in several business and public forums which focus on
advancing cyber security within the chemical sector. Dow regularly
provides leadership or participates with the following organizations:
ChemITC
Chemical Information Technology Center (ChemITC) of
the American Chemistry Council (ACC) is a forum for
companies in and associated with the ACC to address common
IT issues. Through strategic programs and networking groups
dedicated to addressing specific technology issues,
ChemITC is committed to advancing the cyber security of
its member organizations.
Chemical Sector Coordinating Council (CSCC)
Pursuant to the Homeland Security Act of 2002, the
purpose of the CSCC is to facilitate effective coordination
between Federal infrastructure protection programs, the
infrastructure protection activities of the private sector
and those of state, local, territorial and tribal
governments.
National Infrastructure Advisory Council (NIAC)
The NIAC provides the President, through the Secretary
of Homeland Security, with advice on the security of
critical infrastructures, both physical and cyber,
supporting sectors of the economy.
International Society for Automation (ISA)
ISA has primary responsibility for the development of
the ISA-62443 series of standards addressing cyber security
for industrial automation and control systems (IACS). As
each standard is developed it is submitted simultaneously
to ANSI and IEC as a U.S national and international
standard, respectively.
Cyber Security Management at the Dow Chemical Company
Dow has a comprehensive set of policies, standards and procedures
based on guidance from organizations such as the National Institute of
Standards and Technology (NIST) and established industry standards such
as ISO 27001 and the ISA/IEC 62443 series for industrial automation.
Due to the very fluid nature of cyber threats, Dow is continuously
refreshing its practices and technology based on its experience as well
as the best available information from the government, industry and
other public sources. We frequently benchmark with peer Chemical Sector
and broader Manufacturing Sector companies as well as other industries
to manage the risk of a cyber attack. We also enlist external private
entities to evaluate our security posture.
Dow's information security is based on a multi-layer defense
strategy. This includes continuing to enhance our IT infrastructure to
meet the standards of other companies with high-value security profiles
as well as elevating the protection for the Company's most sensitive
intellectual and physical assets. Dow uses a risk-based approach for
the implementation of these controls. Developing strong partnerships
between Dow's Information Security group and all Dow business units is
vital to managing the flow of sensitive information and protecting
critical infrastructure.
Strong collaboration with security vendors and partnerships with
government agencies have been essential in preventing, detecting and
responding to threats. We work closely with the chemical sector
liaisons from the Department of Homeland Security and in forums such as
the Industrial Control Systems Joint Working Group (ICSJWG). Working
with government agencies has been valuable due to their collaborative
nature. Dow believes that a public-private sector collaborative
approach to cyber security is the best way to achieve common security
goals for individual companies as well as the country. Using a risk-
based approach that leverages the existing work of the international
cyber security community will facilitate implementation of practices
that are both effective and flexible.
Dow's multi-layer defense strategy begins with employees. Our
ongoing security awareness programs help employees understand the ever-
changing threats in the cyber landscape. People are the new perimeter--
our greatest defense, and if not informed and educated, could be our
weakest link. We have an ongoing global awareness campaign to:
(1) Educate users on policies and the risks we face;
(2) Drive commitment to the security program by making security
initiatives a personal responsibility;
We continue to evaluate and improve the technical and non-technical
response capabilities related to cyber threat incidents and we have
made significant investments in state-of-the-art technologies to detect
anomalous cyber activity which is the predecessor to most cyber
attacks. Dow has defined threat response processes to handle these
issues when detected and has established a core team of highly skilled
employees to coordinate response and proactively mitigate risk to the
Company's systems. In order to maintain a highly secure environment,
Dow has a team of security professionals who regularly leverage and
collaborate with security vendors and government resources to implement
and improve security controls.
Private Sector Needs from Congress and the Administration
Dow believes that protection of the country's critical
infrastructure can be addressed most effectively by moving forward with
legislation which strengthens the collaboration between the public and
the private sectors. This collaboration must recognize the benefits of
a risk based and performance based approach, its relationship to
physical security, two-way information sharing, prosecution of cyber
criminals and protection from liability. This should be done in a way
that does not impact the relationships developed over the last decade.
Effective two-way cyber security information sharing between the
public and private sectors must be timely, specific and actionable, and
protected from public disclosure. A public/private partnership will
vastly improve the flow of information and ideas to quickly identify
threats and vulnerabilities. To help promote the flow of information,
information voluntarily provided by the private sector should be
adequately protected from public disclosure. The unintended
consequences of Freedom of Information Act requests must be addressed.
Liability protection for the private sector as a result of a cyber
attack must also be provided as long as appropriate management systems
have been applied to address potential threats. This will help promote
participation amid the more rapid penetration of emerging technologies.
The liability protections afforded under the Support Anti-terrorism by
Fostering Effective Technologies (SAFETY) Act of 2002 are appropriate
to consider.
Companies such as Dow are in a defensive mode when it comes to
cybercrime. There must be better enforcement of U.S. laws against
cybercrime with more aggressive prosecution of cyber criminals in an
attempt to deter the act. U.S. laws should be updated and strengthened
to protect critical infrastructure from cyber attacks and hold those
accountable for perpetrating intentional acts designed to cause harm to
critical infrastructure operating systems or for stealing intellectual
property and personal information for financial gain. Additionally, the
U.S. Federal Government should develop strong international
partnerships that work together to identify international threats.
Without a focused strategy to address the borderless nature of
cybercrime, the private sector will continue to fight an uphill battle.
Dow believes the Federal Government has a role in setting an
example, by ensuring higher quality security-embedded solutions and
services by technology suppliers are built into their systems.
Suppliers of IT products and services are best positioned to address
issues within the solutions they create and have a responsibility to
test and enhance product security, to understand their vulnerability
before releasing items into the marketplace. Information technology
suppliers and software developers must design for critical
infrastructure high-availability and long-lived assets in accordance
with rigorous compliance standards. The IT industry is in the best
position to enhance security controls. If they do not, it passes an
additional burden downstream, and duplicates effort and costs onto the
customers in regulated industries. Just as the chemical sector adopted
the Responsible Care model, the IT and telecommunication industries
must be encouraged by their customer based to create self-regulated
security practices and services.
Legislation
Dow advocates for legislation that codifies the principles outlined
above. In summary, legislation that facilitates information sharing
between industry and government and among industry peers is needed.
Ideal information sharing legislation offers liability protections for
early sharing threat or attack information with the government and
provides antitrust relief to share with industry peers. Information
should include strategic assessments, best practices, and lessons
learned from events and incidents. Cyber criminals and nation state
actors must not be allowed to continue to operate with relative
impunity. They must believe that there are consequences for their
actions. Finally, the IT and Telecommunications industries must create
products which are inherently more secure.
Dow does not support prescriptive regulatory legislation on
specific technologies or methods. Legislation that sets up a system
requiring significant resources to simply comply with a regulatory
scheme diverts resources from addressing the threats and risks in need
of mitigation. Cyber security is a constantly changing portfolio and
proper management requires a fluid and fast response. Complex
regulatory schemes will only slow cyber risk management systems.
Executive Order on Improving Critical Infrastructure Cyber Security
Dow supports the information sharing initiatives included in the
recent Executive order. However, Dow is concerned with the proposed
approach of a voluntary program for critical infrastructure industries
to adopt cybersecurity standards. Voluntary programs, normally, allow
industry to develop their own standards that are risk and performance
based that consider the specific sector environment, and are followed
by a certification system to ensure compliance. Responsible Care
Security code, for one, is a successful example for the Chemical
sector.
Government defined or selected standards can miss the specific
challenges that are required to be addressed by each industry sector.
It is initiated as a voluntary program, but it could develop in such a
way that companies will be forced to adopt prescriptive standards due
to the fact that information on program adoption for ``high risk''
industries may be made public. More concerning this could be done
without a review process and could be used to leverage in ways that may
not be beneficial to lowering overall risk. The president or Congress
should not allow pseudo-regulations without legislation to occur.
Dow will actively participate in industry forums like ACC, Chamber
of Commerce, the Business Roundtable and all government initiatives to
fully support successful implementation of any cyber security efforts
which better protect our communities and industries.
Chairman Rockefeller. Thank you, sir, very much.
Now we go to Greg Wilshusen.
STATEMENT OF GREGORY C. WILSHUSEN, DIRECTOR,
INFORMATION SECURITY ISSUES, U.S. GOVERNMENT ACCOUNTABILITY
OFFICE
Mr. Wilshusen. Chairman Rockefeller, Chairman Carper,
Ranking Member Coburn, Ranking Member Thune, and other members
of the Committees, thank you very much for the opportunity to
testify today at today's hearing on cybersecurity.
As you know, Federal agencies and our nation's critical
infrastructures have become increasingly dependent on
interconnected systems and networks that carry out essential
operations. While creating significant benefits, this
dependency also introduces vulnerabilities in cyber-based
threats. These threats could have a potentially serious impact
on Federal operations and essential services provided by the
private sector.
Underscoring the importance of this issue, we have once
again designated Federal information security and cyber-
critical infrastructure protection as a governmentwide high-
risk area. Today, I'll discuss the cyber threats confronting
the private sector and Federal Government, several challenges
to securing systems, and our assessment of the national
cybersecurity strategy.
But, before I do, if I may, I'd like to recognize several
of my colleagues who were instrumental in developing the body
of work upon which my statement is based. Attending with me is
Lee McCracken and Jeff Woodward, in the back, in the second
row; in addition, Naba Barkakati, John de Ferrari, Rich Hung,
Nicole Jarvis, and David Plocher made significant
contributions.
Cyber-based threats to systems supporting critical
infrastructure in Federal operations are evolving and growing.
These threats come from a variety of sources, giving--including
employees and other insiders, criminal groups, hackers, and
foreign nations. These sources vary, in terms of their
capabilities, willingness to act, and motives. The unique
nature of cyber-based attacks can vastly enhance their reach
and their impact. They can originate from around the globe and
adversely affect economic and national security, and public
health and safety.
Over the past 6 years, the number of cyber incidents
reported by Federal agencies to US-CERT has increased from
about 5500 in Fiscal Year 2006 to 48,562 in Fiscal Year 2012,
an increase of 782 percent. These incidents, and the recently
reported cyber-based attacks against businesses, further
underscore the need to manage and bolster the security of
Federal systems and our nation's critical cyber assets.
However, the Federal Government continues to face
challenges in effectively securing its systems and those
supporting critical infrastructure. While actions have been
taken to address aspects of these challenges, issues remain. A
longstanding challenge has been designing and implementing
risk-based information security programs at Federal agencies.
Another challenge has been establishing and identifying
standards for critical infrastructures; and other challenges
include detecting, responding to, and mitigating cyber
incidents; securing the use of new technologies; and managing
risk to the global IT supply chain.
Over the past 12 years, the Federal Government has
identified a variety of documents that were intended to
articulate a national cybersecurity strategy; however, it has
not developed an overarching strategy that synthesizes the
relevant portions of these documents or provides a
comprehensive description of the current strategy. In addition,
the strategy documents sometimes did not incorporate desirable
characteristics that enhanced their usefulness. While the
documents have generally included elements such as problem
definition, goals, and subordinate objectives, they have not
always fully addressed milestones and performance measures,
cost and resource information, clearly defined roles and
responsibilities, and linkage with other key strategy
documents.
In our February 2013 report, we recommended that the White
House cybersecurity coordinator develop an overarching
cybersecurity strategy that addresses all key desirable
characteristics and addresses cyber challenge areas.
Also last month, the President issued an Executive order on
improving critical infrastructure cybersecurity. The Executive
order includes actions aimed at addressing challenges in
developing standards for critical infrastructure and sharing
information. Although it is too soon to comment on its
effectiveness, the order assigns specific responsibilities to
specific individuals with specific deadlines; thus, providing
clarity of responsibility and a means for establishing
accountability.
In summary, addressing the ongoing challenges and
implementing effective cybersecurity within the government, as
well in collaboration with the private sector and other
partners, requires the Federal Government to better define and
more effectively implement an integrated national strategy that
fully addresses key characteristics, provides a roadmap for
resolving identified challenges, articulates a clear process
for overseeing agency risk management, and assures
accountability for results.
This concludes my statement. I'll be happy to answer any
questions you may have.
[The prepared statement of Mr. Wilshusen follows:]
Prepared Statement of Gregory C. Wilshusen, Director, Information
Security Issues, United States Government Accountability Office
``Cybersecurity: A Better Defined and Implemented National Strategy is
Needed to Address Persistent Challenges''
Chairmen Rockefeller and Carper, Ranking Members Thune and Coburn,
and Members of the Committees:
Thank you for the opportunity to testify at today's hearing on the
cybersecurity partnership between the private sector and our
government.
As you know, with the advance of computer technology, Federal
agencies and our nation's critical infrastructures--such as the
electricity grid, water supply, telecommunications, and emergency
services--have become increasingly dependent on computerized
information systems and electronic data to carry out operations and
process, maintain, and report essential information. While bringing
significant benefits, this dependency can also create vulnerabilities
to cyber-based threats. Pervasive and sustained cyber attacks against
the United States could have a potentially serious impact on Federal
and nonfederal systems and operations. Underscoring the importance of
this issue, we have designated Federal information security as a high-
risk area since 1997 and in 2003 expanded this area to include
protecting computerized systems supporting our nation's critical
infrastructure.\1\
---------------------------------------------------------------------------
\1\ See most recently, GAO, High-Risk Series: An Update, GAO-13-283
(Washington, D.C.: Feb. 14, 2013).
---------------------------------------------------------------------------
Federal law and policy call for a risk-based approach to managing
cybersecurity within the government and also specify activities to
enhance the cybersecurity of public and private infrastructures that
are essential to national security, economic security, and public
health and safety. Over the last 12 years, the Federal Government has
developed a number of strategies and plans for addressing cybersecurity
based on this legal framework, including the National Strategy to
Secure Cyberspace, issued in February 2003, and subsequent plans and
strategies that address specific sectors, issues, and revised
priorities.
In my testimony today, I will summarize (1) several challenges
faced by the Federal Government in effectively implementing
cybersecurity, including complying with the Federal Information
Security Management Act, and (2) the extent to which the national
cybersecurity strategy includes key desirable characteristics of
effective strategies. My statement is based on our recently released
report examining the Federal Government's cybersecurity strategies and
the status of Federal efforts to address challenges in implementing
cybersecurity,\2\ as well as other previous work in this area. (Please
see app. I for a list of related GAO products.)
---------------------------------------------------------------------------
\2\ GAO, Cybersecurity: National Strategy, Roles, and
Responsibilities Need to Be Better Defined and More Effectively
Implemented, GAO-13-187 (Feb. 14, 2003).
---------------------------------------------------------------------------
The work on which this statement is based was conducted in
accordance with generally accepted government auditing standards. Those
standards require that we plan and perform audits to obtain sufficient,
appropriate evidence to provide a reasonable basis for our findings and
conclusions based on our audit objectives. We believe that the evidence
obtained provided a reasonable basis for our findings and conclusions
based on our audit objectives.
Background
Threats to systems supporting critical infrastructure and Federal
information systems are evolving and growing. Advanced persistent
threats--where adversaries possess sophisticated levels of expertise
and significant resources to pursue their objectives repeatedly over an
extended period of time--pose increasing risks. In 2009, the President
declared the cyber threat to be ``[o]ne of the most serious economic
and national security challenges we face as a nation'' and stated that
``America's economic prosperity in the 21st century will depend on
cybersecurity.'' \3\ The Director of National Intelligence has also
warned of the increasing globalization of cyber attacks, including
those carried out by foreign militaries or organized international
crime. In January 2012, he testified that such threats pose a critical
national and economic security concern.\4\ To further highlight the
importance of the threat, on October 11, 2012, the Secretary of Defense
stated that the collective result of attacks on our nation's critical
infrastructure could be ``a cyber Pearl Harbor; an attack that would
cause physical destruction and the loss of life.'' \5\
---------------------------------------------------------------------------
\3\ President Barack Obama, ``Remarks by the President on Securing
Our Nation's Cyber Infrastructure'' (Washington, D.C.: May 29, 2009).
\4\ James R. Clapper, Director of National Intelligence,
``Unclassified Statement for the Record on the Worldwide Threat
Assessment of the U.S. Intelligence Community for the Senate Select
Committee on Intelligence'' (January 31, 2012).
\5\ Secretary of Defense Leon E. Panetta, ``Remarks by Secretary
Panetta on Cybersecurity to the Business Executives for National
Security, New York City'' (New York, NY: Oct. 11, 2012).
---------------------------------------------------------------------------
The evolving array of cyber-based threats facing the nation pose
threats to national security, commerce and intellectual property, and
individuals. These threats can be unintentional or intentional.
Unintentional threats can be caused by software upgrades or defective
equipment that inadvertently disrupt systems. Intentional threats
include both targeted and untargeted attacks from a variety of sources.
These sources include business competitors, corrupt employees, criminal
groups, hackers, and foreign nations engaged in espionage and
information warfare. Such threat sources vary in terms of the types and
capabilities of the actors, their willingness to act, and their
motives. Table 1 shows common sources of adversarial cybersecurity
threats.
------------------------------------------------------------------------
Table 1.--Sources of Adversarial Threats to Cybersecurity
------------------------------------------------------------------------
Threat source Description
------------------------------------------------------------------------
Bot-network operators Bot-network operators use a network, or bot-net,
of compromised, remotely controlled systems to
coordinate attacks and to distribute phishing
schemes, spam, and malware attacks. The services
of these networks are sometimes made available
on underground markets (e.g., purchasing a
denial-of-service attack or services to relay
spam or phishing attacks).
------------------------------------------------------------------------
Business competitors Companies that compete against or do business
with a target company may seek to obtain
sensitive information to improve their
competitive advantage in various areas, such as
pricing, manufacturing, product development, and
contracting.
------------------------------------------------------------------------
Criminal groups Criminal groups seek to attack systems for
monetary gain. Specifically, organized criminal
groups use spam, phishing, and spyware/malware
to commit identity theft, online fraud, and
computer extortion.
------------------------------------------------------------------------
Hackers Hackers break into networks for the thrill of the
challenge, bragging rights in the hacker
community, revenge, stalking, monetary gain, and
political activism, among other reasons. While
gaining unauthorized access once required a fair
amount of skill or computer knowledge, hackers
can now download attack scripts and protocols
from the Internet and launch them against victim
sites. Thus, while attack tools have become more
sophisticated, they have also become easier to
use. According to the Central Intelligence
Agency, the large majority of hackers do not
have the requisite expertise to threaten
difficult targets such as critical U.S.
networks. Nevertheless, the worldwide population
of hackers poses a relatively high threat of an
isolated or brief disruption causing serious
damage.
------------------------------------------------------------------------
Insiders The disgruntled organization insider is a
principal source of computer crime. Insiders may
not need a great deal of knowledge about
computer intrusions because their knowledge of a
target system often allows them to gain
unrestricted access to cause damage to the
system or to steal system data. The insider
threat includes contractors hired by the
organization, as well as careless or poorly
trained employees who may inadvertently
introduce malware into systems.
------------------------------------------------------------------------
International International corporate spies pose a threat to
corporate spies the United States through their ability to
conduct economic and industrial espionage a and
large-scale monetary theft and to hire or
develop hacker talent.
------------------------------------------------------------------------
Nations Nations use cyber tools as part of their
information-gathering and espionage activities.
In addition, several nations are aggressively
working to develop information warfare doctrine,
programs, and capabilities. Such capabilities
enable a single entity to have a significant and
serious impact by disrupting the supply,
communications, and economic infrastructures
that support military power--impacts that could
affect the daily lives of citizens across the
country. In his January 2012 testimony, the
Director of National Intelligence stated that,
among state actors, China and Russia are of
particular concern.
------------------------------------------------------------------------
Phishers Individuals or small groups execute phishing
schemes in an attempt to steal identities or
information for monetary gain. Phishers may also
use spam and spyware or malware to accomplish
their objectives.
------------------------------------------------------------------------
Spammers Individuals or organizations distribute
unsolicited e-mail with hidden or false
information in order to sell products, conduct
phishing schemes, distribute spyware or malware,
or attack organizations (e.g., a denial of
service).
------------------------------------------------------------------------
Spyware or malware Individuals or organizations with malicious
authors intent carry out attacks against users by
producing and distributing spyware and malware.
Several destructive viruses and worms have
harmed files and hard drives, and reportedly
have even caused physical damage to critical
infrastructure, including the Melissa Macro
Virus, the Explore.Zip worm, the CIH (Chernobyl)
Virus, Nimda, and Code Red.
------------------------------------------------------------------------
Terrorists Terrorists seek to destroy, incapacitate, or
exploit critical infrastructures in order to
threaten national security, cause mass
casualties, weaken the economy, and damage
public morale and confidence. Terrorists may use
phishing schemes or spyware/malware in order to
generate funds or gather sensitive information.
------------------------------------------------------------------------
Source: GAO analysis based on data from the Director of National
Intelligence, Department of Justice, Central Intelligence Agency, and
the Software Engineering Institute's CERT Coordination Center.
a According to the Office of the National Counterintelligence Executive,
industrial espionage, or theft of trade secrets, occurs when an actor,
intending or knowing that his or her offense will injure the owner of
a trade secret of a product produced for or placed in interstate or
foreign commerce, acts with the intent to convert that trade secret to
the economic benefit of anyone other than the owner. See Foreign Spies
Stealing U.S. Economic Secrets in Cyberspace.
These sources of cybersecurity threats make use of various
techniques to compromise information or adversely affect computers,
software, a network, an organization's operation, an industry, or the
Internet itself. Table 2 provides descriptions of common types of cyber
attacks.
------------------------------------------------------------------------
Table 2.--Common Types of Cyber Attacks
------------------------------------------------------------------------
Types of attack Description
------------------------------------------------------------------------
Cross-site scripting An attack that uses third-party web resources to
run a script within the victim's web browser or
scriptable application. This occurs when a
browser visits a malicious website or clicks a
malicious link. The most dangerous consequences
occur when this method is used to exploit
additional vulnerabilities that may permit an
attacker to steal cookies (data exchanged
between a web server and a browser), log key
strokes, capture screen shots, discover and
collect network information, and remotely access
and control the victim's machine.
------------------------------------------------------------------------
Denial-of-service An attack that prevents or impairs the authorized
use of networks, systems, or applications by
exhausting resources.
------------------------------------------------------------------------
Distributed denial-of- A variant of the denial-of-service attack that
service uses numerous hosts to perform the attack.
------------------------------------------------------------------------
Logic bombs A piece of programming code intentionally
inserted into a software system that will cause
a malicious function to occur when one or more
specified conditions are met.
------------------------------------------------------------------------
Phishing A digital form of social engineering that uses
authentic-looking, but fake, e-mails to request
information from users or direct them to a fake
website that requests information.
------------------------------------------------------------------------
Passive wiretapping The monitoring or recording of data, such as
passwords transmitted in clear text, while they
are being transmitted over a communications
link. This is done without altering or affecting
the data.
------------------------------------------------------------------------
Structured Query An attack that involves the alteration of a
Language injection database search in a web-based application,
which can be used to obtain unauthorized access
to sensitive information in a database.
------------------------------------------------------------------------
Trojan horse A computer program that appears to have a useful
function, but also has a hidden and potentially
malicious function that evades security
mechanisms by, for example, masquerading as a
useful program that a user would likely execute.
------------------------------------------------------------------------
Virus A computer program that can copy itself and
infect a computer without the permission or
knowledge of the user. A virus might corrupt or
delete data on a computer, use e-mail programs
to spread itself to other computers, or even
erase everything on a hard disk. Unlike a worm,
a virus requires human involvement (usually
unwitting) to propagate.
------------------------------------------------------------------------
War driving The method of driving through cities and
neighborhoods with a wireless-equipped computer-
sometimes with a powerful antenna-searching for
unsecured wireless networks.
------------------------------------------------------------------------
Worm A self-replicating, self-propagating, self-
contained program that uses network mechanisms
to spread itself. Unlike viruses, worms do not
require human involvement to propagate.
------------------------------------------------------------------------
Source: GAO analysis of data from the National Institute of Standards
and Technology, United States Computer Emergency Readiness Team, and
industry reports.
The unique nature of cyber-based attacks can vastly enhance their
reach and impact, resulting in the loss of sensitive information and
damage to economic and national security, the loss of privacy, identity
theft, and the compromise of proprietary information or intellectual
property. The increasing number of incidents reported by Federal
agencies, and the recently reported cyber-based attacks against
individuals, businesses, critical infrastructures, and government
organizations have further underscored the need to manage and bolster
the cybersecurity of our government's information systems and our
Nation's critical infrastructures.
Number of Cyber Incidents Reported by Federal Agencies Continues to
Rise
The number of cyber incidents affecting computer systems and
networks continues to rise. Over the past 6 years, the number of cyber
incidents reported by Federal agencies to the U.S. Computer Emergency
Readiness Team (US-CERT) has increased from 5,503 in Fiscal Year 2006
to 48,562 in Fiscal Year 2012, an increase of 782 percent (see fig. 1).
[GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]
Source: GAO analysis of US-CERT data for fiscal years 2006-2012
Of the incidents occurring in 2012 (not including those that were
reported as under investigation), improper usage,\6\ malicious code,
and unauthorized access were the most widely reported types across the
Federal Government. As indicated in figure 2, which includes a breakout
of incidents reported to US-CERT by agencies in Fiscal Year 2012,
improper usage, malicious code, and unauthorized access accounted for
55 percent of total incidents reported by agencies.
---------------------------------------------------------------------------
\6\ An incident is categorized as ``improper usage'' if a person
violates acceptable computing use policies.
[GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]
---------------------------------------------------------------------------
Source: GAO analysis of US-CERT data for fiscal year 2012.
In addition, reports of cyber incidents affecting national
security, intellectual property, and individuals have been widespread,
with reported incidents involving data loss or theft, economic loss,
computer intrusions, and privacy breaches. Such incidents illustrate
the serious impact that cyber attacks can have on Federal and military
operations; critical infrastructure; and the confidentiality,
integrity, and availability of sensitive government, private sector,
and personal information. For example, according to US-CERT, the number
of agency-reported incidents involving personally identifiable
information increased 111 percent from Fiscal Year 2009 to Fiscal Year
2012--from 10,481 to 22,156.
Federal Law and Policy Establish Information Security Responsibilities
for Agencies
The Federal Government's information security responsibilities are
established in law and policy. The Federal Information Security
Management Act of 2002 (FISMA) \7\ sets forth a comprehensive risk-
based framework for ensuring the effectiveness of information security
controls over information resources that support Federal operations and
assets. In order to ensure the implementation of this framework, FISMA
assigns specific responsibilities to agencies, the Office of Management
and Budget (OMB), the National Institute of Standards and Technology
(NIST), and inspectors general:
---------------------------------------------------------------------------
\7\ Title III of the E-Government Act of 2002, Pub. L. No. 107-347,
Dec. 17, 2002; 44 U.S.C 3541, et seq.
Each agency is required to develop, document, and implement
an agency-wide information security program and to report
annually to OMB, selected congressional committees, and the
U.S. Comptroller General on the adequacy of its information
security policies, procedures, practices, and compliance with
---------------------------------------------------------------------------
requirements.
OMB's responsibilities include developing and overseeing the
implementation of policies, principles, standards, and
guidelines on information security in Federal agencies (except
with regard to national security systems \8\). It is also
responsible for reviewing, at least annually, and approving or
disapproving agency information security programs.
---------------------------------------------------------------------------
\8\ As defined in FISMA, the term ``national security system''
means any information system used by or on behalf of a Federal agency
that (1) involves intelligence activities, national security-related
cryptologic activities, command and control of military forces, or
equipment that is an integral part of a weapon or weapons system, or is
critical to the direct fulfillment of military or intelligence missions
(excluding systems used for routine administrative and business
applications); or (2) is protected at all times by procedures
established for handling classified national security information. See
44 U.S.C. Sec. 3542(b)(2).
NIST's responsibilities under FISMA include the development
of security standards and guidelines for agencies that include
standards for categorizing information and information systems
according to ranges of risk levels, minimum security
requirements for information and information systems in risk
categories, guidelines for detection and handling of
information security incidents, and guidelines for identifying
an information system as a national security system.\9\
---------------------------------------------------------------------------
\9\ FISMA limits NIST to developing, in conjunction with the
Department of Defense and the National Security Agency, guidelines for
agencies on identifying an information system as a national security
system, and for ensuring that NIST standards and guidelines are
complementary with standards and guidelines developed for national
security systems.
Agency inspectors general are required to annually evaluate
the information security program and practices of their agency.
The results of these evaluations are to be submitted to OMB,
and OMB is to summarize the results in its reporting to
---------------------------------------------------------------------------
Congress.
In the 10 years since FISMA was enacted into law, Executive Branch
oversight of agency information security has changed. As part of its
FISMA oversight responsibilities, OMB has issued annual guidance to
agencies on implementing FISMA requirements, including instructions for
agency and inspector general reporting. However, in July 2010, the
Director of OMB and the White House Cybersecurity Coordinator \10\
issued a joint memorandum \11\ stating that the Department of Homeland
Security (DHS) was to exercise primary responsibility within the
Executive Branch for the operational aspects of cybersecurity for
Federal information systems that fall within the scope of FISMA.
---------------------------------------------------------------------------
\10\ In December 2009, a Special Assistant to the President was
appointed as Cybersecurity Coordinator to address the recommendations
made in the Obama administration's 2009 Cyberspace Policy Review.
\11\ OMB, Memorandum M-10-28, Clarifying Cybersecurity
Responsibilities and Activities of the Executive Office of the
President and the Department of Homeland Security (Washington, D.C.:
July 6, 2010).
---------------------------------------------------------------------------
The OMB memo also stated that in carrying out these
responsibilities, DHS is to be subject to general OMB oversight in
accordance with the provisions of FISMA. In addition, the memo stated
that the Cybersecurity Coordinator would lead the interagency process
for cybersecurity strategy and policy development. Subsequent to the
issuance of M-10-28, DHS began issuing annual reporting instructions to
agencies in addition to OMB's annual guidance.
Regarding Federal agencies operating national security systems,
National Security Directive 42 \12\ established the Committee on
National Security Systems, an organization chaired by the Department of
Defense (DOD), to, among other things, issue policy directives and
instructions that provide mandatory information security requirements
for national security systems. In addition, the defense and
intelligence communities develop implementing instructions and may add
additional requirements where needed. An effort is underway to
harmonize policies and guidance for national security and non-national
security systems. Representatives from civilian, defense, and
intelligence agencies established a joint task force in 2009, led by
NIST and including senior leadership and subject matter experts from
participating agencies, to publish common guidance for information
systems security for national security and non-national security
systems.\13\
---------------------------------------------------------------------------
\12\ National Security Directive 42, National Policy for the
Security of National Security Telecommunications and Information
Systems (July 5, 1990).
\13\ See GAO, Information Security: Progress Made in Harmonizing
Policies and Guidance for National Security and Non-National Security
Systems, GAO 10 916 (Washington, D.C.: Sept. 15, 2010).
---------------------------------------------------------------------------
Various laws and directives have also given Federal agencies
responsibilities relating to the protection of critical
infrastructures, which are largely owned by private sector
organizations. The Homeland Security Act of 2002 created the Department
of Homeland Security. Among other things, DHS was assigned with the
following critical infrastructure protection responsibilities: (1)
developing a comprehensive national plan for securing the critical
infrastructures of the United States, (2) recommending measures to
protect those critical infrastructures in coordination with other
groups, and (3) disseminating, as appropriate, information to assist in
the deterrence, prevention, and preemption of, or response to,
terrorist attacks.
Homeland Security Presidential Directive 7 (HSPD-7) was issued in
December 2003 and defined additional responsibilities for DHS, sector-
specific agencies, and other departments and agencies. The directive
instructed sector-specific agencies to collaborate with the private
sector to identify, prioritize, and coordinate the protection of
critical infrastructures to prevent, deter, and mitigate the effects of
attacks. It also made DHS responsible for, among other things,
coordinating national critical infrastructure protection efforts and
establishing uniform policies, approaches, guidelines, and
methodologies for integrating Federal infrastructure protection and
risk management activities within and across sectors.
On February 12, 2013, the President issued an executive order on
improving the cybersecurity of critical infrastructure.\14\ Among other
things, it stated that the policy of the U.S. government is to increase
the volume, timeliness, and quality of cyber threat information shared
with U.S. private sector entities and ordered the following actions to
be taken:
---------------------------------------------------------------------------
\14\ Exec. Order No. 13636, 78 Fed. Reg. 11737 (Feb. 19, 2013). The
order is also available at http://www.whitehouse.gov/the-press-office/
2013/02/12/executive-order-improving-critical-infra
structure-cybersecurity.
The Attorney General, the Secretary of Homeland Security,
and the Director of National Intelligence are, within 120 days
of the date of the order, to issue instructions for producing
unclassified reports of cyber threats and establish a process
---------------------------------------------------------------------------
for disseminating these reports to targeted entities.
Agencies are to coordinate their activities under the order
with their senior agency officials for privacy and civil
liberties and ensure that privacy and civil liberties
protections are incorporated into such activities. In addition,
DHS's Chief Privacy Officer and Officer for Civil Rights and
Civil Liberties are to assess the privacy and civil liberties
risks and recommend ways to minimize or mitigate such risks in
a publicly available report to be released with 1 year of the
date of the order.
The Secretary of Homeland Security is to establish a
consultative process to coordinate improvements to the
cybersecurity of critical infrastructure.
The Secretary of Commerce is to direct the Director of NIST
to lead the development of a framework to reduce cyber risks to
critical infrastructure. The framework is to include a set of
standards, methodologies, procedures, and processes that align
policy, business, and technological approaches to address cyber
risks and incorporate voluntary consensus standards and
industry best practices to the fullest extent possible. The
Director is to publish a preliminary version of the framework
within 240 days of the date of the order, and a final version
within 1 year.
The Secretary of Homeland Security, in coordination with
sector-specific agencies, is to establish a voluntary program
to support the adoption of the Cybersecurity Framework by
owners and operators of critical infrastructure and any other
interested entities. Further, the Secretary is to coordinate
the establishment of a set of incentives designed to promote
participation in the program and, along with the Secretaries of
the Treasury and Commerce, make recommendations to the
President that include analysis of the benefits and relative
effectiveness of such incentives, and whether the incentives
would require legislation or can be provided under existing law
and authorities.
The Secretary of Homeland Security, within 150 days of the
date of the order, is to use a risk-based approach to identify
critical infrastructure where a cybersecurity incident could
reasonably result in catastrophic regional or national effects
on public health or safety, economic security, or national
security.
Agencies with responsibilities for regulating the security
of critical infrastructure are to consult with DHS, OMB, and
the National Security Staff to review the preliminary
cybersecurity framework and determine if current cybersecurity
regulatory requirements are sufficient given current and
projected risks. If current regulatory requirements are deemed
to be insufficient, agencies are to propose actions to mitigate
cyber risk, as appropriate, within 90 days of publication of
the final Cybersecurity Framework. In addition, within 2 years
after publication of the final framework, these agencies, in
consultation with owners and operators of critical
infrastructure, are to report to OMB on any critical
infrastructure subject to ineffective, conflicting, or
excessively burdensome cybersecurity requirements.
Also on February 12, 2013, the White House released Presidential
Policy Directive (PPD) 21, on critical infrastructure security and
resilience.\15\ This directive revokes HSPD-7, although it states that
plans developed pursuant to HSPD-7 shall remain in effect until
specifically revoked or superseded. PPD-21 sets forth roles and
responsibilities for DHS, sector-specific agencies, and other Federal
entities with regard to the protection of critical infrastructure from
physical and cyber threats. It also identifies three strategic
imperatives to refine and clarify functional relationships across the
Federal Government (which includes two national critical
infrastructures centers for physical and cyber infrastructure), enable
efficient information exchange by identifying baseline data and systems
requirements, and implement an integration and analysis function to
inform planning and operational decisions.
---------------------------------------------------------------------------
\15\ The White House, Presidential Policy Directive/PPD-21,
Critical Infrastructure Security and Resilience (Feb. 12, 2013), http:/
/www.whitehouse.gov/the-press-office/2013/02/12/presiden
tial-policy-directive-critical-infrastructure-security-and-resil.
---------------------------------------------------------------------------
The directive calls for a number of specific implementation
actions, along with associated time frames, which include developing a
description of the functional relationships within DHS and across the
Federal Government related to critical infrastructure security and
resilience; conducting an analysis of the existing public-private
partnership model; identifying baseline data and system requirements
for the efficient exchange of information and intelligence;
demonstrating a near real-time situational awareness capability for
critical infrastructure; updating the National Infrastructure
Protection Plan; and developing a national critical infrastructure
security and resilience research and development plan. Finally, the
directive identifies 16 critical infrastructure sectors and their
designated Federal sector-specific agencies.
The Federal Government Continues to Face Challenges in Effectively
Implementing Cybersecurity
We and Federal agency inspector general reports have identified
challenges in a number of key areas of the Federal Government's
approach to cybersecurity, including those related to protecting the
Nation's critical infrastructure. While actions have been taken to
address aspects of these challenges, issues remain in each of the
following areas.
Designing and implementing risk-based cybersecurity programs at
Federal agencies. Shortcomings persist in assessing risks, developing
and implementing security controls, and monitoring results at Federal
agencies. Specifically, for Fiscal Year 2012, 19 of 24 major Federal
agencies reported that information security control deficiencies were
either a material weakness or significant deficiency in internal
controls over financial reporting. Further, inspectors general at 22 of
24 agencies cited information security as a major management challenge
for their agency. Most of the 24 major agencies had information
security weaknesses in most of five key control categories:
implementing agency-wide information security management programs that
are critical to identifying control deficiencies, resolving problems,
and managing risks on an ongoing basis; limiting, preventing, and
detecting inappropriate access to computer resources; managing the
configuration of software and hardware; segregating duties to ensure
that a single individual does not control all key aspects of a
computer-related operation; and planning for continuity of operations
in the event of a disaster or disruption (see fig. 3).
[GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]
Source: GAO analysis of agency, inspectors general, and GAO reports
as of December 13, 2012.
As we noted in our October 2011 report on agencies' implementation
of FISMA requirements, an underlying reason for these weaknesses is
that agencies have not fully implemented their information security
programs.\16\ As a result, they have limited assurance that controls
are in place and operating as intended to protect their information
resources, thereby leaving them vulnerable to attack or compromise.
Accordingly, we have continued to make numerous recommendations to
address specific weaknesses in risk management processes at individual
Federal agencies. Recently, some agencies have demonstrated improvement
in this area. For example, we reported in November 2012 that during
Fiscal Year 2012, the Internal Revenue Service (IRS) continued to make
important progress in addressing numerous deficiencies in its
information security controls over its financial reporting systems.\17\
Nonetheless, applying effective controls over agency information and
information systems remains an area of significant concern.
---------------------------------------------------------------------------
\16\ GAO, Information Security: Weaknesses Continue Amid New
Federal Efforts to Implement Requirements, GAO-12-137 (Washington,
D.C.: Oct. 3, 2011).
\17\ GAO, Financial Audit: IRS's Fiscal Years 2012 and 2011
Financial Statements, GAO-13-120 (Washington, D.C.: Nov. 9, 2012).
---------------------------------------------------------------------------
Establishing and identifying standards for critical
infrastructures. As we reported in December 2011, DHS and other
agencies with responsibilities for specific critical infrastructure
sectors have not yet identified cybersecurity guidance applicable to or
widely used in each of the sectors.\18\ Moreover, sectors vary in the
extent to which they are required by law or regulation to comply with
specific cybersecurity requirements. Within the energy sector, for
example, experts have identified a lack of clarity in the division of
responsibility between Federal and state regulators as a challenge in
securing the U.S. electricity grid. We have made recommendations aimed
at furthering efforts by sector-specific agencies to enhance critical
infrastructure protection. The recently issued executive order is also
intended to bolster efforts in this challenge area.
---------------------------------------------------------------------------
\18\ GAO, Critical Infrastructure Protection: Cybersecurity
Guidance Is Available, but More Can Be Done to Promote Its Use, GAO-12-
92 (Washington, D.C.: Dec. 9, 2011).
---------------------------------------------------------------------------
Detecting, responding to, and mitigating cyber incidents. DHS has
made progress in coordinating the Federal response to cyber incidents,
but challenges remain in sharing information among Federal agencies and
key private-sector entities, including critical infrastructure owners.
Difficulties in sharing information and the lack of a centralized
information-sharing system continue to hinder progress. The February
executive order contains provisions aimed at addressing these
difficulties by, for example, establishing a process for disseminating
unclassified reports of threat information. Challenges also persist in
developing a timely cyber analysis and warning capability. While DHS
has taken steps to establish a timely analysis and warning capability,
we have reported that it had yet to establish a predictive analysis
capability and recommended that the department establish such
capabilities.\19\ According to DHS, tools for predictive analysis are
to be tested in Fiscal Year 2013.
---------------------------------------------------------------------------
\19\ GAO, Cyber Analysis and Warning: DHS Faces Challenges in
Establishing a Comprehensive National Capability, GAO-08-588
(Washington, D.C.: July 31, 2008).
---------------------------------------------------------------------------
Promoting education, awareness, and workforce planning. In November
2011, we reported that Federal agencies leading strategic planning
efforts for cybersecurity education and awareness had not identified
details for achieving planned outcomes and that specific tasks and
responsibilities were unclear.\20\ We recommended, among other things,
that these agencies collaborate to clarify responsibilities and
processes for planning and monitoring their activities. We also
reported that only two of eight agencies in our review had developed
cyber workforce plans, and only three of the eight agencies had a
department-wide training program for their cybersecurity workforce. We
recommended that these agencies take steps to improve agency and
government-wide cybersecurity workforce efforts. Agencies concurred
with the majority of our recommendations and outlined steps to address
them.
---------------------------------------------------------------------------
\20\ GAO, Cybersecurity Human Capital: Initiatives Need Better
Planning and Coordination, GAO-12-8 (Washington, D.C.: Nov. 29, 2011).
---------------------------------------------------------------------------
Supporting cyber research and development. The support of targeted
cyber research and development (R&D) has been impeded by implementation
challenges among Federal agencies. In June 2010, we reported that R&D
initiatives were hindered by limited sharing of detailed information
about ongoing research, including the lack of a process for sharing
results of completed projects or a repository to track R&D projects
funded by the Federal Government.\21\ To help facilitate information
sharing about planned and ongoing R&D projects, we recommended
establishing a mechanism for tracking ongoing and completed Federal
cybersecurity R&D projects and their funding, and that this mechanism
be used to develop an ongoing process to share R&D information among
Federal agencies and the private sector. As of September 2012, this
mechanism had not been fully developed.
---------------------------------------------------------------------------
\21\ GAO, Cybersecurity: Key Challenges Need to Be Addressed to
Improve Research and Development, GAO-10-466 (June 3, 2010).
---------------------------------------------------------------------------
Securing the use of new technologies. Addressing security concerns
related to the use of emerging technologies such as cloud computing,
social media, and mobile devices is a continuing challenge. In May
2010, we reported that Federal agencies had not taken adequate steps to
ensure that security concerns were addressed in their use of cloud-
based services, and made several recommendations to address cloud
computing security, which agencies have begun to implement.\22\
Further, we reported in June 2011 that Federal agencies did not always
have adequate policies in place for managing and protecting information
they access and disseminate through social media platforms such as
Facebook and Twitter and recommended that agencies develop such
policies.\23\ Most of the agencies agreed with our recommendations. In
September 2012, we reported that the U.S. Federal Communications
Commission could do more to encourage mobile device manufacturers and
wireless carriers to implement a more complete industry baseline of
mobile security safeguards.\24\ The commission generally concurred with
our recommendations.
---------------------------------------------------------------------------
\22\ GAO, Information Security: Federal Guidance Needed to Address
Control Issues with Implementing Cloud Computing, GAO-10-513
(Washington, D.C.: May 27, 2010).
\23\ GAO, Social Media: Federal Agencies Need Policies and
Procedures for Managing and Protecting Information They Access and
Disseminate, GAO-11-605 (Washington, D.C.: June 28, 2011).
\24\ GAO, Information Security: Better Implementation of Controls
for Mobile Devices Should Be Encouraged, GAO-12-757 (Washington, D.C.:
Sept. 18, 2012).
---------------------------------------------------------------------------
Managing risks to the global information technology supply chain.
Reliance on a global supply chain for information technology products
and services introduces risks to systems, and Federal agencies have not
always addressed these risks. Specifically, in March 2012, we reported
that four national security-related agencies varied in the extent to
which they had defined supply chain protection measures for their
information systems and were not in a position to develop implementing
procedures and monitoring capabilities for such measures.\25\ We
recommended that the agencies take steps as needed to address supply
chain risks, and the departments generally concurred.
---------------------------------------------------------------------------
\25\ GAO, IT Supply Chain: National Security-Related Agencies Need
to Better Address Risks, GAO-12-361 (Washington, D.C.: Mar. 23, 2012).
---------------------------------------------------------------------------
Addressing international cybersecurity challenges. While the
Federal Government has identified the importance of international
cooperation for cybersecurity and has assigned related roles and
responsibilities to Federal agencies, its approach to addressing
international aspects of cybersecurity has not been fully defined or
implemented. We reported in July 2010 that the government faced a
number of challenges in this area, relating to providing top-level
leadership to coordinate actions among agencies, developing a national
strategy, coordinating policy among key Federal entities, ensuring that
international technical standards and policies do not impose
unnecessary trade barriers, participating in international cyber-
incident response efforts, investigating and prosecuting international
cybercrime, and developing international models and norms for
behavior.\26\ We recommended that the government develop a global
cyberspace strategy to help address these challenges. While such a
strategy has been developed and includes goals such as the development
of international cyberspace norms, it does not fully specify outcome-
oriented performance metrics or timeframes for completing activities.
---------------------------------------------------------------------------
\26\ GAO, Cyberspace: United States Faces Challenges in Addressing
Global Cybersecurity and Governance, GAO-10-606 (Washington, D.C.: July
2, 2010).
---------------------------------------------------------------------------
The U.S. National Cybersecurity Strategy Has Evolved over Time but Is
Not Well Defined
The Federal Government has issued a variety of documents over the
last decade that were intended to articulate a national cybersecurity
strategy. The evolution of the Nation's cybersecurity strategy is
summarized in figure 4.
[GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]
Source: GAO analysis of federal strategy documents.
These strategy documents address aspects of the above-mentioned
challenge areas. For example, they address priorities for enhancing
cybersecurity within the Federal Government as well as for encouraging
improvements in the cybersecurity of critical infrastructures within
the private sector.
However, as we noted in our February 2013 report, the government
has not developed an overarching national cybersecurity strategy that
synthesizes the relevant portions of these documents or provides a
comprehensive description of the current strategy.\27\ The Obama
administration's 2009 Cyberspace Policy Review recommended a number of
actions, including updating the 2003 National Cybersecurity Strategy.
However, no updated strategy document has been issued. In May 2011, the
White House announced that it had completed all the near-term actions
outlined in the 2009 policy review, including the update to the 2003
national strategy. According to the administration's fact sheet on
cybersecurity accomplishments,\28\ the 2009 policy review itself serves
as the updated strategy. The fact sheet stated that the direction and
needs highlighted in the Cyberspace Policy Review and the previous
national cybersecurity strategy were still relevant, and it noted that
the administration had updated its strategy on two subordinate cyber
issues, identity management and international engagement. Nonetheless,
these actions do not fulfill the recommendation that an updated
strategy be prepared for the President's approval. As a result, no
overarching strategy exists to show how the various goals and
activities articulated in current documents form an integrated
strategic approach.
---------------------------------------------------------------------------
\27\ GAO-13-187.
\28\ The White House, ``Fact Sheet: The Administration's
Cybersecurity Accomplishments'' (May 12, 2011), accessed on July 26,
2012, http://www.whitehouse.gov/the-press-office/2011/05/12/fact-sheet-
administrations-cybersecurity-accomplishments.
---------------------------------------------------------------------------
In addition to lacking an integrated strategy, the government's
current approach to cybersecurity lacks key desirable characteristics
of a national strategy. In 2004, we developed a set of desirable
characteristics that can enhance the usefulness of national strategies
in allocating resources, defining policies, and helping to ensure
accountability.\29\ Table 3 summarizes these key desirable
characteristics.
---------------------------------------------------------------------------
\29\ See GAO, Combating Terrorism: Evaluation of Selected
Characteristics in National Strategies Related to Terrorism, GAO-04-
408T (Washington, D.C.: Feb. 3, 2004).
--------------------------------------------------------------------------
Table 3.--Desirable Characteristics for a National Strategy
------------------------------------------------------------------------
Desirable
characteristic Description
------------------------------------------------------------------------
Purpose, scope, and Addresses why the strategy was produced, the
methodology scope of its coverage, and the process by which
it was developed.
------------------------------------------------------------------------
Problem definition and Addresses the particular national problems and
risk assessment threats the strategy is directed toward.
------------------------------------------------------------------------
Goals, subordinate Addresses what the strategy is trying to achieve
objectives, and steps to achieve those results, as well as
activities, and the priorities, milestones, and performance
performance measures measures to gauge results.
------------------------------------------------------------------------
Resources, Addresses what implementation of the strategy
investments, and risk will cost, the sources and types of resources
management and investments needed, and where resources and
investments should be targeted based on
balancing risk reductions with costs.
------------------------------------------------------------------------
Organizational roles, Addresses who will be implementing the strategy,
responsibilities, and what their roles will be compared to others,
coordination and mechanisms for them to coordinate their
efforts.
------------------------------------------------------------------------
Linkage to other Addresses how a national strategy relates to
strategies and other strategies' goals, objectives, and
implementation activities, and to subordinate levels of
government and their plans to implement the
strategy.
------------------------------------------------------------------------
Source: GAO.
Existing cybersecurity strategy documents have included selected
elements of these desirable characteristics, such as setting goals and
subordinate objectives, but have generally lacked other key elements.
The missing elements include the following:
Milestones and performance measures. The government's strategy
documents include few milestones or performance measures,
making it difficult to track progress in accomplishing stated
goals and objectives. This lack of milestones and performance
measures at the strategic level is mirrored in similar
shortcomings within key programs that are part of the
government-wide strategy. For example, in 2011 the DHS
inspector general recommended that the department develop and
implement performance measures to track and evaluate the
effectiveness of actions defined in its strategic plan,\30\
which the department had yet to do as of January 2012.
---------------------------------------------------------------------------
\30\ DHS, Office of Inspector General, Planning, Management, and
Systems Issues Hinder DHS' Efforts to Protect Cyberspace and the
Nation's Cyber Infrastructure, OIG-11-89 (Washington, D.C.: June 2011).
Cost and resources. While past strategy documents linked
certain activities to Federal agency budget requests, none have
fully addressed cost and resources, including justifying the
required investment, which is critical to gaining support for
implementation. Specifically, none of the strategy documents
provided full assessments of anticipated costs and how
---------------------------------------------------------------------------
resources might be allocated to meet them.
Roles and responsibilities. Cybersecurity strategy documents
have assigned high-level roles and responsibilities but have
left important details unclear. Several GAO reports have
likewise demonstrated that the roles and responsibilities of
key agencies charged with protecting the cyber assets of the
United States are inadequately defined. For example, the
chartering directives for several offices within the Department
of Defense assign overlapping roles and responsibilities for
preparing for and responding to domestic cyber incidents. In an
October 2012 report, we recommended that the department update
its guidance on preparing for and responding to domestic cyber
incidents to include a description of roles and
responsibilities.\31\ Further, in March 2010, we reported that
agencies had overlapping and uncoordinated responsibilities
within the Comprehensive National Cybersecurity Initiative and
recommended that OMB better define roles and responsibilities
for all key participants.\32\
---------------------------------------------------------------------------
\31\ GAO, Homeland Defense: DOD Needs to Address Gaps in Homeland
Defense and Civil Support Guidance, GAO-13-128 (Washington, D.C.: Oct.
24, 2012).
\32\ GAO, Cybersecurity: Progress Made but Challenges Remain in
Defining and Coordinating the Comprehensive National Initiative, GAO-
10-338 (Washington, D.C.: Mar. 5, 2010).
In addition, while the law gives OMB responsibility for
oversight of Federal information security, OMB transferred
several of its oversight responsibilities to DHS. OMB officials
stated that enlisting DHS to perform these responsibilities has
allowed OMB to have more visibility into agencies'
cybersecurity activities because of the additional resources
and expertise provided by DHS. While OMB's decision to transfer
these responsibilities is not consistent with FISMA, it may
have had beneficial practical results, such as leveraging
resources from DHS. Nonetheless, with these responsibilities
now divided between the two organizations, it is remains
unclear how they are to share oversight of individual
departments and agencies. Additional legislation could clarify
---------------------------------------------------------------------------
these responsibilities.
Linkage with other key strategy documents. Existing
cybersecurity strategy documents vary in terms of priorities
and structure, and do not specify how they link to or supersede
other documents. Nor do they describe how they fit into an
overarching national cybersecurity strategy. For example, in
2012, the Obama administration identified three cross-agency
cybersecurity priorities, but no explanation was given as to
how these priorities related to those established in other
strategy documents.
Actions Needed to Ensure More Effective Implementation of Cybersecurity
Given the range and sophistication of the threats and potential
exploits that confront government agencies and the Nation's cyber
critical infrastructure, it is critical that the government adopt a
comprehensive strategic approach to mitigating the risks of successful
cybersecurity attacks. In our February report, we recommended that the
White House Cybersecurity Coordinator develop an overarching Federal
cybersecurity strategy that includes all key elements of the desirable
characteristics of a national strategy.\33\ Such a strategy, we
believe, will provide a more effective framework for implementing
cybersecurity activities and better ensure that such activities will
lead to progress in securing systems and information. This strategy
should also better ensure that Federal Government departments and
agencies are held accountable for making significant improvements in
cybersecurity challenge areas by, among other things, clarifying how
oversight will be carried out by OMB and other Federal entities. In the
absence of such an integrated strategy, the documents that comprise the
government's current strategic approach are of limited value as a tool
for mobilizing actions to mitigate the most serious threats facing the
Nation.
---------------------------------------------------------------------------
\33\ GAO-13-187.
---------------------------------------------------------------------------
In addition, many of the recommendations previously made by us and
agency inspectors general have not yet been fully addressed, leaving
much room for more progress in addressing cybersecurity challenges. In
many cases, the causes of these challenges are closely related to the
key elements that are missing from the government's cybersecurity
strategy. For example, the persistence of shortcomings in agency
cybersecurity risk management processes indicates that agencies have
not been held accountable for effectively implementing such processes
and that oversight mechanisms have not been clear. It is just such
oversight and accountability that is poorly defined in cybersecurity
strategy documents.
In light of this limited oversight and accountability, we also
stated in our report that Congress should consider legislation to
better define roles and responsibilities for implementing and
overseeing Federal information security programs and protecting the
Nation's critical cyber assets. Such legislation could clarify the
respective responsibilities of OMB and DHS, as well as those of other
key Federal departments and agencies.
In commenting on a draft of the report, the Executive Office of the
President agreed that more needs to be done to develop a coherent and
comprehensive strategy on cybersecurity but did not believe producing
another strategy document would be beneficial. Specifically, the office
stated that remaining flexible and focusing on achieving measurable
improvements in cybersecurity would be more beneficial than developing
``yet another strategy on top of existing strategies.'' We agree that
flexibility and a focus on achieving measurable improvements in
cybersecurity is critically important and that simply preparing another
document, if not integrated with previous documents, would not be
helpful. The focus of our recommendation is to develop an overarching
strategy that integrates the numerous strategy documents, establishes
milestones and performance measures, and better ensures that Federal
departments and agencies are held accountable for making significant
improvements in cybersecurity challenge areas. The Executive Office of
the President also agreed that Congress should consider enhanced
cybersecurity legislation that addresses information sharing and
baseline standards for critical infrastructure, among other things.
In summary, addressing the ongoing challenges in implementing
effective cybersecurity within the government, as well as in
collaboration with the private sector and other partners, requires the
Federal Government to define and implement a coherent and comprehensive
national strategy that includes key desirable elements and provides
accountability for results. Recent efforts, such as the 2012 cross-
agency priorities and the executive order on improving cybersecurity
for critical infrastructure, could provide parts of a strategic
approach. For example, the executive order includes actions aimed at
addressing challenges in developing standards for critical
infrastructure and sharing information, in addition to assigning
specific responsibilities to specific individuals that are to be
completed within specific timeframes, thus providing clarity of
responsibility and a means for establishing accountability. However,
these efforts need to be integrated into an overarching strategy that
includes a clearer process for oversight of agency risk management and
a roadmap for improving the cybersecurity challenge areas in order for
the government to make significant progress in furthering its strategic
goals and lessening persistent weaknesses.
Chairmen Rockefeller and Carper, Ranking Members Thune and Coburn,
and Members of the Committees, this concludes my statement. I would be
happy to answer any questions you may have.
GAO Contacts and Acknowledgments
If you have any questions regarding this statement, please contact
Gregory C. Wilshusen (wilshuseng@gao.gov) or Dr. Nabajyoti Barkakati
(barkakatin@gao.gov). Other key contributors to this statement include
John de Ferrari (Assistant Director), Richard B. Hung (Assistant
Director), Nicole Jarvis, Lee McCracken, David F. Plocher, and Jeffrey
Woodward.
Appendix I: Related GAO Products
Cybersecurity: National Strategy, Roles, and Responsibilities Need
to Be Better Defined and More Effectively Implemented. GAO-13-187.
Washington, D.C.: February 14, 2013.
High-Risk Series: An Update. GAO-13-283. Washington, D.C.: February
14, 2013.
Information Security: Federal Communications Commission Needs to
Strengthen Controls over Enhanced Secured Network Project. GAO-13-155.
Washington, D.C.: January 25, 2013.
Information Security: Actions Needed by Census Bureau to Address
Weaknesses. GAO-13-63. Washington, D.C.: January 22, 2013.
Information Security: Better Implementation of Controls for Mobile
Devices Should Be Encouraged. GAO-12-757. Washington, D.C.: September
18, 2012.
Mobile Device Location Data: Additional Federal Actions Could Help
Protect Consumer Privacy. GAO-12-903. Washington, D.C.: September 11,
2012.
Medical Devices: FDA Should Expand Its Consideration of Information
Security for Certain Types of Devices. GAO-12-816. August 31, 2012.
Cybersecurity: Challenges in Securing the Electricity Grid. GAO-12-
926T. Washington, D.C.: July 17, 2012.
Electronic Warfare: DOD Actions Needed to Strengthen Management and
Oversight. GAO-12-479. Washington, D.C.: July 9, 2012.
Information Security: Cyber Threats Facilitate Ability to Commit
Economic Espionage. GAO-12-876T. Washington, D.C.: June 28, 2012.
Cybersecurity: Threats Impacting the Nation. GAO-12-666T.
Washington, D.C.: April 24, 2012.
IT Supply Chain: National Security-Related Agencies Need to Better
Address Risks. GAO-12-361. Washington, D.C.: March 23, 2012.
Information Security: IRS Needs to Further Enhance Internal Control
over Financial Reporting and Taxpayer Data. GAO-12-393. Washington,
D.C.: March 16, 2012.
Cybersecurity: Challenges in Securing the Modernized Electricity
Grid. GAO-12-507T. Washington, D.C.: February 28, 2012.
Critical Infrastructure Protection: Cybersecurity Guidance Is
Available, but More Can Be Done to Promote Its Use. GAO-12-92.
Washington, D.C.: December 9, 2011.
Cybersecurity Human Capital: Initiatives Need Better Planning and
Coordination. GAO-12-8. Washington, D.C.: November 29, 2011.
Information Security: Additional Guidance Needed to Address Cloud
Computing Concerns. GAO-12-130T. Washington, D.C.: October 6, 2011.
Information Security: Weaknesses Continue Amid New Federal Efforts
to Implement Requirements. GAO-12-137. Washington, D.C.: October 3,
2011.
Personal ID Verification: Agencies Should Set a Higher Priority on
Using the Capabilities of Standardized Identification Cards. GAO-11-
751. Washington, D.C.: September 20, 2011.
Information Security: FDIC Has Made Progress, but Further Actions
Are Needed to Protect Financial Data. GAO-11-708. Washington, D.C.:
August 12, 2011.
Cybersecurity: Continued Attention Needed to Protect Our Nation's
Critical Infrastructure. GAO-11-865T. Washington, D.C.: July 26, 2011.
Defense Department Cyber Efforts: DOD Faces Challenges in Its Cyber
Activities. GAO-11-75. Washington, D.C.: July 25, 2011.
Information Security: State Has Taken Steps to Implement a
Continuous Monitoring Application, but Key Challenges Remain. GAO-11-
149. Washington, D.C.: July 8, 2011.
Social Media: Federal Agencies Need Policies and Procedures for
Managing and Protecting Information They Access and Disseminate. GAO-
11-605. Washington, D.C.: June 28, 2011.
Cybersecurity: Continued Attention Needed to Protect Our Nation's
Critical Infrastructure and Federal Information Systems. GAO-11-463T.
Washington, D.C.: March 16, 2011.
Information Security: IRS Needs to Enhance Internal Control Over
Financial Reporting and Taxpayer Data. GAO-11-308. Washington, D.C.:
March 15, 2011.
Electricity Grid Modernization: Progress Being Made on
Cybersecurity Guidelines, but Key Challenges Remain to Be Addressed.
GAO-11-117. Washington, D.C.: January 12, 2011.
Information Security: National Nuclear Security Administration
Needs to Improve Contingency Planning for Its Classified Supercomputing
Operations. GAO-11-67. Washington, D.C.: December 9, 2010.
Information Security: Federal Agencies Have Taken Steps to Secure
Wireless Networks, but Further Actions Can Mitigate Risk. GAO-11-43.
Washington, D.C.: November 30, 2010.
Information Security: Federal Deposit Insurance Corporation Needs
to Mitigate Control Weaknesses. GAO-11-29. Washington, D.C.: November
30, 2010.
Information Security: National Archives and Records Administration
Needs to Implement Key Program Elements and Controls. GAO-11-20.
Washington, D.C.: October 21, 2010.
Cyberspace Policy: Executive Branch Is Making Progress Implementing
2009 Policy Review Recommendations, but Sustained Leadership Is Needed.
GAO-11-24. Washington, D.C.: October 6, 2010.
Information Security: Progress Made on Harmonizing Policies and
Guidance for National Security and Non-National Security Systems. GAO-
10-916. Washington, D.C.: September 15, 2010.
Information Management: Challenges in Federal Agencies' Use of Web
2.0 Technologies. GAO-10-872T. Washington, D.C.: July 22, 2010.
Critical Infrastructure Protection: Key Private and Public Cyber
Expectations Need to Be Consistently Addressed. GAO-10-628. Washington,
D.C.: July 15, 2010.
Cyberspace: United States Faces Challenges in Addressing Global
Cybersecurity and Governance. GAO-10-606. Washington, D.C.: July 2,
2010.
Information Security: Governmentwide Guidance Needed to Assist
Agencies in Implementing Cloud Computing. GAO-10-855T. Washington,
D.C.: July 1, 2010.
Cybersecurity: Continued Attention Is Needed to Protect Federal
Information Systems from Evolving Threats. GAO-10-834T. Washington,
D.C.: June 16, 2010.
Cybersecurity: Key Challenges Need to Be Addressed to Improve
Research and Development. GAO-10-466. Washington, D.C.: June 3, 2010.
Information Security: Federal Guidance Needed to Address Control
Issues with Implementing Cloud Computing. GAO-10-513. Washington, D.C.:
May 27, 2010.
Information Security: Opportunities Exist for the Federal Housing
Finance Agency to Improve Control. GAO-10-528. Washington, D.C.: April
30, 2010.
Information Security: Concerted Response Needed to Resolve
Persistent Weaknesses. GAO-10-536T.Washington, D.C.: March 24, 2010.
Information Security: IRS Needs to Continue to Address Significant
Weaknesses. GAO-10-355. Washington, D.C.: March 19, 2010.
Information Security: Concerted Effort Needed to Consolidate and
Secure Internet Connections at Federal Agencies. GAO-10-237.
Washington, D.C.: March 12, 2010.
Information Security: Agencies Need to Implement Federal Desktop
Core Configuration Requirements. GAO-10-202. Washington, D.C.: March
12, 2010.
Cybersecurity: Progress Made but Challenges Remain in Defining and
Coordinating the Comprehensive National Initiative. GAO-10-338.
Washington, D.C.: March 5, 2010.
Critical Infrastructure Protection: Update to National
Infrastructure Protection Plan Includes Increased Emphasis on Risk
Management and Resilience. GAO-10-296. Washington, D.C.: March 5, 2010.
Department of Veterans Affairs' Implementation of Information
Security Education Assistance Program. GAO-10-170R. Washington, D.C.:
December 18, 2009.
Cybersecurity: Continued Efforts Are Needed to Protect Information
Systems from Evolving Threats. GAO-10-230T. Washington, D.C.: November
17, 2009.
Information Security: Concerted Effort Needed to Improve Federal
Performance Measures. GAO-10-159T. Washington, D.C.: October 29, 2009.
Critical Infrastructure Protection: OMB Leadership Needed to
Strengthen Agency Planning Efforts to Protect Federal Cyber Assets.
GAO-10-148. Washington, D.C.: October 15, 2009.
Information Security: NASA Needs to Remedy Vulnerabilities in Key
Networks. GAO-10-4. Washington, D.C.: October 15, 2009.
Information Security: Actions Needed to Better Manage, Protect, and
Sustain Improvements to Los Alamos National Laboratory's Classified
Computer Network. GAO-10-28. Washington, D.C.: October 14, 2009.
Critical Infrastructure Protection: Current Cyber Sector-Specific
Planning Approach Needs Reassessment. GAO-09-969. Washington, D.C.:
September 24, 2009.
Information Security: Federal Information Security Issues. GAO-09-
817R. Washington, D.C.: June 30, 2009.
Information Security: Concerted Effort Needed to Improve Federal
Performance Measures. GAO-09-617. Washington, D.C.: September 14, 2009.
Information Security: Agencies Continue to Report Progress, but
Need to Mitigate Persistent Weaknesses. GAO-09-546. Washington, D.C.:
July 17, 2009.
National Cybersecurity Strategy: Key Improvements Are Needed to
Strengthen the Nation's Posture. GAO-09-432T. Washington, D.C.: March
10, 2009.
Information Technology: Federal Laws, Regulations, and Mandatory
Standards to Securing Private Sector Information Technology Systems and
Data in Critical Infrastructure Sectors. GAO-08-1075R. Washington,
D.C.: September 16, 2008.
Cyber Analysis and Warning: DHS Faces Challenges in Establishing a
Comprehensive National Capability. GAO-08-588. Washington, D.C.: July
31, 2008.
Information Security: Federal Agency Efforts to Encrypt Sensitive
Information Are Under Way, but Work Remains. GAO-08-525. Washington,
D.C.: June 27, 2008.
Privacy: Lessons Learned about Data Breach Notification. GAO-07-
657. Washington, D.C.: April 30, 2007.
Chairman Rockefeller. Thank you very much.
This could be to either of you, or both of you. And this is
on the question of what I consider a desperately bad situation,
in terms of trained work force, for cybersecurity across the
nation.
I was with a business executive, who's a very good friend
of mine, whose company I know very well, and he came in to see
me, not about this subject, but about what his company had a
concern about. And I asked him, ``So, how are you fixed to take
care of yourself on cybersecurity?'' And he's, ``We're fine.''
He said, ``We're fine.''
I don't want to be a psychiatrist, but I know him well
enough--you can read body language, you can read voice
inflection--and I really didn't believe that he meant to say
that. I think he meant to say it, but I didn't believe it.
There wasn't any demonstrated interest in it. His was one of
the most vulnerable of all industries that could be affected
by, you know, attacks--cyber attacks. And so, I didn't say
anything about it, but I just--I noted, in my mind, that there
was a lack of self-confidence, the lack of interest, and it
wasn't believable. And, of course, I might have been absolutely
wrong.
But, that just leads me to this question. There are so many
huge things that we have to do in cybersecurity, but none of
them come to anything unless there is a workforce out there
which is trained, and trained to the specificity of everything
from, you know, standards to what do you do about intellectual
property--I mean, just the whole range. And, you know, sort of
like when we were starting with the E-Rate or the Internet. I
mean, people didn't know anything about it. They knew it was
important, but they didn't know anything about it. Then,
gradually, that took hold.
What, in your mind, should be done to get our country up to
speed on training cybersecurity workforce?
Mr. Wilshusen. Well, I guess I'll take first stab at it. I
think you're absolutely correct, this is an issue for the
nation and certainly for the Federal workforce. We did a review
and issued a report, last year, on human-capital workforce
issues as it relates to cybersecurity. We did work at several
agencies. One of the key themes that we identified is that,
while agencies were generally able to fill many of their
information security positions, they had the most challenge in
identifying those individuals that had the technical skills in
order to effectively implement security at a technical level.
There are a couple of initiatives underway that are
intended to help improve the cyber workforce, to ensure better
training of individuals, as well as to improve societal
knowledge of cybersecurity, beginning early on, through K-12
and onward. One of them is the National Initiative for
Cybersecurity Education that's run by DHS and NIST, who are key
partners in that particular effort.
Chairman Rockefeller. So, they put it into early
curriculum.
Mr. Wilshusen. Yes. And that's one of the areas where the
younger generation's probably more technically literate than I
was at that time, and include it in curriculum early on, and
carry throughout their education.
And then, within the Federal workforce, make sure we have
the appropriate technical training and expertise that we can
develop and grow our own workforce to address the cybersecurity
challenges of today.
Chairman Rockefeller. OK. Well, the Feds are part of it,
private sector is another part of it.
Mr. Kepler. Yes. What I would say is, when you look at the
force we've had to put in our company, it's very technically-
oriented, in terms of engineers, computer scientists. And I
think the key thing the country needs to do, in general, is
still foster the development of that kind of capability. And
we're short of that, not only cybersecurity, but in a lot of
the aspects of the science and technology that we need, to
compete globally.
I think some of the early challenges has been that people
have addressed this as purely an enforcement issue, and so the
basis has been more security oriented than the technology
underlying in content. And so, it's a mix of people who have
thought about this from an enforcement point of view.
But, I think the general view of--the skills are going to
change over time; they change, year over year, what we have to
address. So, having grounded background in computer technology,
in science and math, these are the things that you need to get
people to work on to solve these problems. But, I think the
company--or, country can do well, invested in that in a lot of
different aspects of our prosperity.
Chairman Rockefeller. So, if you do everything you want to
do, how many years will it take for Dow, which is, obviously,
one of the most sophisticated companies in the country, to get
to where you want to be on work force security?
Mr. Kepler. With work--I think we can hire the--you know,
with paying a premium for that. We have almost 150 people, now,
between direct people and contractors, that work in this space.
It's getting the workforce for, actually, the next generation
and the next decade to compete and work in our plants and our
laboratories. And I think that's a critical issue for the
government that's going to take a decade to address, Senator.
Chairman Rockefeller. Which is where we've got to educate--
--
Mr. Kepler. Yes.
Chairman Rockefeller.--how dangerous this is.
Thank you.
Mr. Chairman.
Chairman Carper. Thanks. Thanks, Senator Rockefeller.
Mr. Wilshusen, Senator Coburn suggested you'd be a good
witness, and, boy, he was right.
And, Mr. Kepler, I think you may have been invited by
Senator Thune, as I understand it, and we thank him for
inviting you, and you for coming. We're honored, in Delaware,
that Dow has a significant presence in our state, and think of
you as a--we're fortunate to have you as one of our corporate
citizens.
I think the first question I'm going to ask would be for
either of them, but maybe we start with Mr. Wilshusen, if I
could.
You have a disadvantage, you and the colleagues that you
recognize. Not necessarily--not everybody recognizes the team
that helped put together an effort, and I know a lot of people
were involved in this; we've got great people at GAO, and we
thank you for all that you all do to help us do our jobs--but,
had the disadvantage of preparing your report, which you
released recently, before the administration, sort of, showed
their hand on the Executive order. And just--if you had known
what the Executive order was going to look like, and maybe had
the benefit of this kind of testimony from the Secretary and
from Mr. Gallagher, what would you have--how would your report
have changed, if at all? I think it might have changed some,
but your--in your testimony today, how might it have changed a
bit?
Mr. Wilshusen. Well, actually I don't know if our report
would change much, other than to identify the Executive order
as another strategy-related document that has been developed by
the administration. The Executive order certainly addresses one
of the key challenge areas that we have identified in the past,
in terms of identifying and establishing standards for
cybersecurity in the critical infrastructures. And it also will
help, in terms of another challenge, as it relates to providing
and sharing information to, particularly, those in the private
sector.
But, it's part of an overall strategy, though. It's still,
like other strategy documents, focused on just one component of
an overall national strategy. We still believe that the White
House cybersecurity coordinator should develop an overarching
strategy that integrates this Executive order with the other
strategies.
One of the positive things that we noted with the Executive
order is that it does assign specific responsibilities to
individuals. And that's a plus. It also gives them specific
deadlines in order to perform those activities. That's another
plus. But, it still remains to be seen, in terms of the extent
to which there's follow through to make sure that those
activities are implemented, and implemented effectively.
Chairman Carper. OK. Well, my hope is, before we're done,
and we have done our job on the legislative side, that--or, you
put the two together, what the administration has laid out and
suggested and what we have done, hopefully, in response, to
kind of fill out the package--that you'll say, ``Yes, that's a
pretty good strategy, and now the key is to implement it
well.''
If I could, Mr. Kepler, the--I think you mentioned the word
``protection,'' the kind of--you or maybe one of our earlier
witnesses talked about the kind of protections that--whether
it's the chemical industry, whether it's other segments of our
business industry, that they're looking for needing--I asked
Secretary Napolitano about liability--punitive, general, other
kinds of liability protection. She mentioned that there's more
than just liability that can be afforded as an incentive or a
protection for the--for industry. She mentioned--oh, gosh, I
think she might have mentioned security--you know, expedited
security clearances, so more information would be available to
our key stakeholders.
Talk about what--the kind of protection that Dow or others
in the chemical industry are looking for, and that they need in
order to feel more comfortable with what you're being invited
to participate in.
Mr. Kepler. Yes. And I would make the point that I think
the information protection goes both ways. I think one of the
things that we would look at over the years is, we'd build up a
technology base and, I think, a reasonable operating system
base, but the key thing to make this all work is, you need
competitive intelligence. And we get very little of that, and
we don't have the resources or structure to make that happen.
And so, the ability to get government to feel comfortable to
share, with industry, specific areas that we can address, so we
can get focused, is a critical issue.
So, I think if you contemplate legislation, it should think
about it in both ways.
I think there are issues, when we go across on--not only on
liability, but the concerns, sometimes, of sharing information
on antitrust, and that the--when companies get to start to
share information when there's an incident or an issue, and it
gets into shipments or it gets into some other areas, how to
make sure that we can manage those type of issues in that, as
well.
So, I think the view of liability, you know, in our view,
is that there--early on, within physical, but it actually can
apply to cyber--there's the SAFETY Act that allowed--if you had
a good management system in place, that was reviewed, you could
actually get liability coverage on that. And we've submitted
that, and actually are--fall under that Act, for us.
Chairman Carper. Good. Thank you.
My thanks to you both.
Senator Thune.
Senator Thune. Thank you, Mr. Chairman.
The GAO's recent report--of course, already talked about--
highlighted some of the persistent shortcomings of the Federal
Government's management of its own cybersecurity, which, I
think, begs the question about them directing what the private
sector should do.
And I want to go back, actually, to a 2010 report in which
GAO reported that private-sector expectations are not being met
for receiving usable cyber threat and cyber alert information
from the government. For example, GAO reported that only 27
percent of private sector survey respondents were receiving
actionable cyber threat information and alerts that met their
expectations to a great or moderate extent. Of those receiving
information, there were concerns that the information received
is not tailored to each sector's needs, or the information does
not have enough information to be useful.
So, my question--I would direct this, at least first, to
you, Mr. Wilshusen--and that is, in what areas has the
government made progress in sharing relevant information with
the private sector? And do you have further recommendations?
Mr. Wilshusen. Yes, that's a good question. We have
followed up on our recommendations made in that report, and we
have found that DHS has started to implement a couple of them.
But, it remains a challenge area. DHS has taken a number of
steps. I know the Secretary, earlier, mentioned about the
NCCIC, and that's one area in which it has started to improve
the sharing of information through that mechanism.
I had also heard where the DHS has issued a relatively
large number of security clearances, which can help facilitate
the sharing of information.
But challenges still remain. We still find that, for
example, it has not yet developed a predictive analysis
capability, which would help lead to providing timely threat
information, alert information, to private industry. And, as
Mr. Kepler indicated in his prior remarks, it seems like that
is still an area of improvement that can be made on the part of
DHS and other Federal partners.
Senator Thune. Mr. Kepler, do you feel you're receiving
timely and usable cyber threat and cyber alert information from
the government?
Mr. Kepler. We don't receive content. I think we cooperate
together, but there's a--we do not get specific information.
And when we get attacked or get to a point that we can mitigate
something, to try to go back and understand who it was and
where it was and how we go address it in the future, that is
rarely, if ever, given, and--or known, I don't know.
So, I'd say, you know, we talked about industrial
espionage; there's clearly, from the government's viewpoint, I
think, nation-sponsored espionage going on. I can't--I need the
help of the government to address that. And so, that type of
information, and how to deal with that collaboratively, we do
not get.
Senator Thune. Do you have any----
Mr. Wilshusen. And if I may----
Senator Thune. Yes, go ahead.
Mr. Wilshusen. Excuse me. If I may just add one comment,
too.
Senator Thune. Yes.
Mr. Wilshusen. One of the elements that is probably missing
is making sure that DHS or the Federal partners have a feedback
mechanism, or a loop, where they can solicit and receive
feedback from the private sector partners on how well they're
doing in providing this type of information. It might be
illuminating.
Senator Thune. Yes.
If I might, too, Mr. Kepler, how important is information
sharing peer-to-peer among others in the industry? And how's
that working today? What's needed to improve it? Liability,
antitrust protections, that sort of thing.
Mr. Kepler. Yes, I would say that most of the industries
that got stood up under its critical infrastructure have
learned how to work together within their industries. The
challenge is to start to work across industries. You know,
obviously, if you look at cascading issues with power or with
IT, it's to be able to share information. And I think the
ability to bridge those stovepipes is the area that needs to be
improved.
Senator Thune. What's your biggest concern about the
Executive order implementation process?
Mr. Kepler. Well, I think there are two areas, as I pointed
out. One concern is, to my--just a point, a minute ago--this is
cascading. So, when you think about a significant failure,
which is part of the risk that the Executive order is supposed
to be--address, the--to me, the thing that we have to rely on
is the IT suppliers and the government to have--to make sure
that the communications networks work. And that seems to be--
we're focusing more downstream than upstream on what the
fundamental issue is.
So, I hope, when we look at this, that most of the area
needs to be around cyber in the infrastructure that we're
building around the Internet and how that's being managed,
because we all rely on that, including the government, to work
on.
And the second thing I think--the standards has been talked
a lot, but I think the viewpoint and transparency of how we're
going to do risk assessment--because there's the gross risk of
what could happen, but there's also understanding what's
already been mitigated. So, I get concerned about how you
develop the list of high-priority risks, to identify, to start
to apply the resources you're going to apply. So, you can
create an environment where you create a list of, kind of,
generic issues and risk things, that we don't know how to get
off that risk list. You know, we've been under CFATS and the
physical side, and we've yet to get, you know, sites completely
authorized, in terms of getting assessment against their
authority. And so, you add cyber into that--I just think, in
the next, you know, half a year to a year, to try to get all
that risk assessment done, I think that's the area that we can
have some unintended consequences in, Senator, unless we think
through that clearly.
Senator Thune. Thank you, Mr. Chairman.
Thank you very much.
Chairman Carper. Dr. Coburn?
Senator Coburn. Well, let me follow up on that. You know,
CFATS, as far as I'm concerned, so far, has been a failure. I
don't know if that's your assessment to it, but we've spent
billions of dollars, and we have very limited accomplishments
there. It's not because we don't intend to. It's not. And
cyber's five to six times more complex than that.
And one of the questions is, If DHS can't implement CFATS,
and there hasn't been the same type of cooperative work upward,
in terms of standards--in other words, one of the things--one
of the great things about the Executive order is, the President
did have his staff say, ``Bring industry in, tell us what we
need to do.'' In other words, there was upward communication
from the people who actually know it. And that was somewhat
lacking, in terms of the CFATS, and is still lacking, in my
opinion.
So, do--given your experience on CFATS, what's your
confidence level on DHS on cyber?
Mr. Kepler. I guess that's my point.
Senator Coburn. Yes.
Mr. Kepler. I think you look at CFATS as--the way it's laid
out and put together, I think, is a sound thought process of
how to work. So, we support the concept of CFATS. Do you have
the right mindset to go--actually set standards and evaluate?
Do you have the personnel to work on that?
So, I think the industry, as it relates to standards, the
reality is, they're out there on cyber. We've worked a lot on
process control systems, on management systems, on technology
and networks. The previous panel described that.
The issue is, Are--Do we have a confident structure to
evaluate those risks? And then do the assessment in government
to collaborate with it. And I think that's where you need to
improve.
So, my view has been, it's more an oversight issue than it
is a legislation issue.
Senator Coburn. All right, thank you.
Mr. Wilshusen, I made, in my opening statement, a comment
that we've not seen the report on FISMA. But, you all found
that only 8 of 22 agencies are in compliance with that. And
that's a decline from 13 agencies in 2010. What's the problem?
Mr. Wilshusen. We also are looking forward to receiving
OMB's FISMA report. It usually provides a lot of useful
information, particularly the portion where the IGs conduct
their evaluations of their agency's information security
programs. One of the issues that we have found over the years
and why we have been designating Federal information security
as a high-risk area since 1987 is because of agencies'--I won't
say ``inability,'' but their lack of meaningful success in
securing their systems and meeting many of the requirements for
securing their systems.
Senator Coburn. Let me explain----
Mr. Wilshusen. In your particular----
Senator Coburn. Let me explain what that means----
Mr. Wilshusen. Sure.
Senator Coburn.--so everybody understands. Only eight
Federal agencies, at this time, out of 22, meet the guidelines
for securing their network.
Mr. Wilshusen. And that's actually one of the statistics
for assessing the risk----
Senator Coburn. Right.
Mr. Wilshusen.--which kind of gets to Mr. Kepler's point,
in that it's one of the challenge areas for agencies. It's not
an easy job, in terms of implementing effective security over
time, because the environment is constantly changing, new
technologies are being implemented into the computing
environment, the threats are becoming more sophisticated, and
business practices are changing.
But, at the same time, it's important that agencies
implement the appropriate processes to assess their risk, and
then, based on that risk, select the appropriate controls to
cost-effectively reduce those risks to an acceptable level, and
then assure that those controls are effectively implemented,
tested, and remain appropriate over time.
If agencies don't assess their cyber risks appropriately at
the very beginning and regularly thereafter, it has a cascading
effect, in terms of the effectiveness of other controls.
Senator Coburn. Plus, it wastes a ton of money. You know,
in the Federal Government, we spend $64 billion a year on IT,
and, essentially, 50 percent of it is wasted, because we don't
assess risks, and we don't contract appropriately.
Let me--in 2003, President Bush issued HSPD-7, which
assigned several tasks to DHS pertaining to critical
infrastructure and cybersecurity, including information sharing
with the private sector--this was 2003; that's 10 years ago--
and compiling a list of critical infrastructure.
The Executive order and the Presidential directive issued
by the White House assigns DHS several tasks similar to those
the agency was given in 2003. What's different?
Mr. Wilshusen. I think there are a couple of differences
between the Executive order and HSPD-7. One is that HSPD-7
primarily focused on terrorist activities and counterterrorism;
whereas, this particular Executive order is looking at a more
broadbased threat factor, if you will, and to include
resiliency and the like.
The other big difference here is that NIST is responsible--
or has responsibility for creating the cybersecurity framework.
Senator Coburn. Yes. Actually, they're responsible for
creating the standards, correct?
Mr. Wilshusen. Right. And----
Senator Coburn. The voluntary standards that are going to
be maybe not so voluntary after they're created.
Mr. Wilshusen. Well, their label is a voluntary
cybersecurity framework.
Senator Coburn. Yes.
Mr. Wilshusen. And I believe it's up to DHS and the sector-
specific agencies to develop a program to help encourage
adoption of that framework.
Senator Coburn. I'm over my time, Mr. Chairman, but I
just----
I would like for you to make recommendations to Senator
Carper and I, if you would, on what you would see as the best
oversight function that we could have in looking how the
Presidential directive and the Executive order is carried out.
You know, this is a complex area. None of us are computer
engineers or electrical engineers. And having that guidance
from you would be very helpful to this committee.
Mr. Wilshusen. I'd be happy to talk to your staff to do
that, Dr. Coburn.
Senator Coburn. All right. Thank you.
Chairman Carper. And I'd amend that request to ask that we
share that information, as well, with our two compadres on my
left, Senator Rockefeller and Senator Thune.
All right, next in order--I think Senator Cowan is next in
order, followed by the Senator from New Hampshire, Senator
Ayotte.
Senator Cowan. Thank you, Mr. Chairman.
Gentlemen, thank you for your appearance and testimony
today.
My first question--actually, my first couple of questions
are to you, Mr. Kepler. First, we thank you for coming, and
hope you didn't mind me referring to your--you having a
platinum system in place.
Just a couple of things, and I wonder if you'd tell me if
you agree. It's been said that 85 percent of our nation's
critical infrastructure is owned by the private sector. You--
and, if that is the case, would you agree that, if the owners
of that critical infrastructure fail to harden their systems
and we are subject to a cyber attack, that disruption or
destruction of those systems could carry catastrophic
consequences, not just to the private industry, but to the
government sectors that rely upon it? Do you agree with that?
Mr. Kepler. Yes.
Senator Cowan. And there has been a lot of talk and, I
think, a lot of agreement, frankly, that there's a need for
more and better information sharing, and the issues that are,
necessarily, surrounding that. Do you think--are you satisfied,
from your perspective--and you're someone who looks at these
issues, not just for Dow, but I imagine you think about them
for your industry, as a whole, or private industry--do you
think, if we just have better information sharing and some of
those protections, alone, we will have done enough to sort of
ensure that, at least at a minimum level, we're doing enough,
both in the government and private sector, to thwart cyber
threats?
Mr. Kepler. I think the information sharing is one that
lags the most, so the reality is, I think, though--if you think
about how you mitigate issue--a risk, in general, it's around
applying technology, putting operating disciplines, which you
could call ``standards,'' and management systems in place, and
then having information sharing about what's going on
externally, or competitive intelligence.
I think, over the last 10 years, we've built up a fair
amount of capability, and, really, the standards have evolved a
lot, and the understanding of how to be responsive around those
standards. And the industries that have developed operating
discipline around this, I think, is pretty healthy.
I think the key thing that's missing right now is the
ability to share tactical information. We're getting attacked,
and don't know who from, and we don't have the resources to
work on that. I think the threat has changed in the last 5
years, and--to come from outsources with well-resourced
resources that need to be addressed.
So, I think the information sharing is a key area. I think
the management system around this--because we've got a lot of
rules--I think the management system--I think government has to
help step up and address.
Senator Cowan. When you talk about the rules--actually, in
your testimony, you talked about your concern about overly
prescriptive legislation. In my prior job in State government,
one of the things I had to do was to sort of oversee the
regulatory process. I used to tell the team that the agency
heads, before you regulate, hesitate, to think about the cost
and the impact on businesses and others.
As you think about the--when you say ``overly
prescriptive,'' what, in particular, concerns you that you
don't want to see in legislation, or you're concerned that
legislation might do?
Mr. Kepler. Well, I think, when you start looking at
these--when you talk to companies like ours, and big companies
in structure, you know, you go to some of these sectors, and
there are 40,000 or 50,000 companies that you have to deal
with, or community structures, if you're in water. And one size
does not fit all in that. And you have to be able to assess the
risk. So, while you have all the infrastructure, it's not all
linked. And so, you have to prioritize this. And, to me, that's
the key area that you have to work with the sectors on. If
there's any area we need more area is--what enemy are we trying
to fight, what problem are we trying to solve, and where are
the highest risks in this activity to work on? That's a key
area that I--needs to be addressed, or we'll be applying
standards and structure to areas that probably have a low
priority of risk in that approach.
Senator Cowan. Do you have any viewpoint whether, if we
just had a floor, a baseline that everyone--that everyone could
look to or try to adhere to, that might better aid us to do--
or, to address the concerns?
Mr. Kepler. Yes. And that's my point on--therefore, you
have to have some commitment on--some base floor on the
products that you provide people, and how they get configured,
and then the responsibility and operating base of how you work
on it. So, Dow can bring these resources in, and technologies
in, and set them, but a small business that may be linked into
this thing, or linked into a supply chain of a critical
infrastructure, can't do that. And I think that's where some of
this--the industries that supply those products do have to be
involved, because the--on the smaller businesses, the same
technologies that the consumers use.
Senator Cowan. A question to you, in the first instance,
Mr. Kepler, and then, Mr. Wilshusen--and maybe you can answer
it, as well. And this--sort of picking up off of the Executive
order that the President issued last month--and Mr. Gallagher
spoke about, sort of, the collaborative effort between industry
and government to come together and work together on some
issues--I'm--I wonder if either of you have an opinion about
how useful it might be to create a task force composed of
government cybersecurity experts, security researchers, and
tech vendors to contribute to a database of cyber threats that
could be accessed by critical infrastructure industries, in
realtime, or issue alerts. When you talk about information
sharing, is that something you're thinking of, conceptually?
Mr. Kepler. Well, conceptually, we have US-CERT, that tries
to drive that, for private/public partnership. We have NIAC to
look at the policy structures. We have the standard committees
to work through.
I think there's a cultural issue on information sharing, is
that government does--and I--you know, government doesn't want
to share it, and business is reluctant to share it. So, I think
the legislation has to go at that cultural aspect and deal with
the issues that become the excuses in their liability, on our
side, that is important, right?--and their--you know, the IP
protection, and those things.
On government, there's a--from an enforcement point of
view, you're really nervous about giving up your pursuit of the
criminal. And government, by definition, is nervous about
trying to manage secrets. So, we have to create an environment
where we can share key information on the specific threats.
That's, to me, the critical issue here, not the new
organization structures. We have a lot of those.
Mr. Wilshusen. And I would just add that there is
precedence, to some extent, in that there is a database that's
maintained by NIST. It's called the ``National Vulnerability
Database.'' It's not a database of threats, but it is a
database of vulnerabilities that include, for example, software
defects, or defective software, and misconfigurations. That
database is available to the public to review. And, indeed,
many of the tools that are used to scan network devices may
draw from that database to look for particular vulnerabilities
and misconfigurations in systems.
Senator Cowan. Thank you.
And please forgive my indulgence, Mr. Chairman, for going
over my time. Thank you.
Chairman Carper. No, no, that's fine. Thank you for coming
early and staying late----
Senator Cowan. Thank you.
Chairman Carper.--Senator Cowan.
Senator Ayotte.
STATEMENT OF HON. KELLY AYOTTE,
U.S. SENATOR FROM NEW HAMPSHIRE
Senator Ayotte. Thank you, Mr. Chairman. I appreciate it.
And I want to thank the witnesses for being here today on
such an important issue.
I serve on the Armed Services Committee, as well, and I was
inquiring about our top manufacturer in New Hampshire, BAE
Systems, just to get a sense of what they've invested in. Just
as one company in our state, they've invested over $100 million
in their cyber defenses, which, compared to Dow, is probably
small, but, I think one thing that they brought to my attention
is that they believed, through the interaction they have with
the Pentagon, that they have a world class ability to share
information. Now, they're a defense contractor, so you can
understand why that would be a natural partnership there and
that there was a very good collaborative model. While I'm new
to this committee, and certainly want to understand the work
done by others, one of the worries, I've had, in thinking about
this, as I look at the GAO report that was issued, Mr.
Wilshusen, and I appreciate the work that you did on this, is
the information-sharing difficulties in DHS. And so, we've been
talking about some of the concerns we have about DHS's
capabilities. Are we trying to use any of the models or
patterns from the Pentagon?
And also, it worries me that we're going to have to
replicate something that apparently, in the Pentagon, we're
doing fairly effectively. And so, how do we take those lessons?
And can DHS really get to a point where it is, frankly, as
effective as some of the work being done at the Pentagon?
Mr. Wilshusen. That's an excellent question. And, indeed,
the pilot programs that you're referring to are called the DIB
cyber pilot programs. I think they may have another name as
well. And DIB being the Defense Industrial Base. Last year, GAO
issued a report over those programs and made several
recommendations to enhance them. And, as it so happens, we also
plan to issue another report that will be coming out soon. The
recently issued Executive order has a line in it under--I think
it's under the information-sharing section--that asks DHS to
look at those programs involving the DIB--the Defense cyber
pilot programs--and expand them to the other critical
infrastructure sectors. And so, that is one of the activities
that is planned.
Senator Ayotte. Do you think DHS will have the capability
to do that? The Pentagon is obviously in a situation where
they're dealing with the national security threats, but
industries like Dow are dealing with this, a national security
threat. So, what's your assessment on DHS's ability? I
understand that there's a sort of command to do that in the
Executive order, but how can we help them do that? What's your
opinion on what the difficulties will be with that? I don't
think any of us want to invest in replicating things that
already exist in the government, particularly in the fiscal
constraints we find ourselves in.
Mr. Wilshusen. No, it's usually a good practice to learn
from the efforts of others, to learn both the mistakes, what
did not work, as well as what did work, and then apply those
lessons as you perform your own. And so, certainly there is a
lot of benefit for DHS to do this, and learn from that
particular pilot program by DOD.
In terms of DHS's capability to do that, well, I guess
we'll actually find out, because I must say that I can't really
give you a clear answer on that, because we haven't examined
that particular issue. But its success in other programs,
previously has been mixed. The department has made some
progress in several areas, but, as GAO often reports, more
needs to be done.
Senator Ayotte. So, that worries me, and I hope----
Mr. Wilshusen. Yes.
Senator Ayotte.--that's something we talk about more in
this committee, because this is such an important threat to our
country that it can't be, ``We're just not sure,'' and, ``We
don't know how this is going to work out,'' because, obviously,
we need to all work together to make sure we can prevent the
threats that are facing the country as well as those facing our
businesses and our economic growth.
And I would say, Mr. Kepler, I certainly am reviewing the
Executive order, and want to understand it, but, in my prior
life, I was an attorney general and thinking about liability
protection for the private sector. How does any Executive order
really fully get at the type of liability protection that the
private sector needs, in light of the fact that, presumably,
it's not just liability protection between the government and
the industry that's being regulated, but it's also the
liability protection to third parties.
Mr. Kepler. Well, I think that's the challenge. And I think
that's one--in my comments, I said that that's one area where I
think legislation may be needed to address that.
If you think about major things, like terrorism or
whatever, I think there are some vehicles that you can use,
with the SAFETY Act, but, if you're trying to look at--you
know, I think there are a lot of issues also around
intellectual property and legal things that are already
defined. When you start looking at issues around espionage and
nation state-sponsored commercial espionage, I don't know how--
you know, I think that is something you have to think through
from a legislative point of view, not an Executive order point
of view.
Senator Ayotte. Well, the prior legislation failed in the
Senate so I think all of us want to come to a resolution to
find a bipartisan way forward to address these issues, but
there certainly seemed to be some areas of difficulty. I know
that the liability protection issue is one that Dr. Coburn has
already talked about, and of the difficulties there. But, I'm
of the view that, since we do a lot of comprehensive work
around here, if there are certain areas that we can come to
agreement on, then we should move those immediately, and then
come back to the other areas that we have to address. So, I'm
hoping that this committee, as we work together, will do that,
and continue, as soon as we can get a piece that's important to
industry and important to us, moving forward, to having that
cooperation, that we will move it.
So, that's my commentary on it. And I'm sure that my time
is expired, but I appreciate that both of you are here today,
and I look forward to following up with you and learning more
about how we can effectively accomplish that.
Chairman Carper. I thought those were good questions.
Senator Ayotte. Thank you.
Chairman Carper. I--we're going to have another round, if
it's OK with you, maybe--I'd like to, maybe, do another round.
It's not going to take but maybe 15 minutes. Does that work OK
with your schedule?
Mr. Kepler. Sure.
Chairman Carper. We want to be mindful of your schedules.
Mr. Kepler. No problem, Senator.
Chairman Carper. Good. How about another two rounds?
Mr. Kepler. Whatever you need.
Chairman Carper. We'll start with one.
One of the things I like to do at the end of the hearing is
sometimes to ask witnesses what you've learned--what you've
learned by listening to one another, from our questions and
some of our statements, what maybe you've learned from the
earlier panel. So, just be thinking about what--I mean, what
are your take aways from this?
The other thing I would ask you to share with us is what
should be our take aways. And when I speak to a group,
sometimes I like to tell them what I'm going to tell them, then
I tell them, and then I tell them what I've told them. And so,
you've had a chance to do at least part of that, and I'm going
to ask you, before you leave, to just kind of give that little
sum-up at the end, what should be some our key take aways.
For me, one of the key takeaways has been--and I think it
was our friend from NIST, Pat--I think he said something like,
``When cybersecurity strategy is good business strategy, then
we'll know that we've really gotten somewhere.'' And the--there
has been a lot of back-and-forth on information sharing. And
Senator Ayotte said she, in her previous life, was attorney
general for her state. And I asked some of our staff, ``Why
don't we do a better job at information sharing from the
government side to the private sector?'' And someone used this
as an example, said, ``If you're the FBI, and you're trying to
bust a drug ring, and you know--you may let a deal go down, let
it happen, just in an effort to move up the food chain and then
go after the bigger catches.'' And I don't know if that's
what's going on here, or not, but the--I--one of the messages--
for me, one of the take aways is, information flow has to be a
two-way street. And so, I take that away.
And on--in terms of the capability of DHS--Dr. Coburn's
gone now, but he's--you know, I've been hosting a series of
classified briefings, where we have DHS coming in, we have the
FBI, we have the National Security Agency coming in. And both
he and I have been impressed by the improved capabilities at
DHS. This is not your grandfather's Oldsmobile, this is not
where they were 10 years ago, 5 years ago. They're--they've
gotten some good people, and they've enhanced their
capabilities.
I always like to say that the road to improvement is always
under construction, so obviously they have more to do.
Everything I do, I know I can do better. And certainly that's
true for them.
All right. With that having been said, what did you all
learn? And, second, what are some good take aways that you
would have us to be--just be reinforced with?
Mr. Kepler. Well, I'd follow up your--just your first point
to--or, last point--to comment that I do--when I look at the
scope of DHS, and the challenge they have, it's daunting, and I
appreciate the work they're doing. And I do agree that the
competency of the organization has improved over the years and
stuff.
One of the challenges I would say is, we do keep changing
the rules a little bit on the number of commissions and
structures and groups and things. And so, we're--I'm pleading a
little bit for, maybe, stabilization of that and really doing a
little bit more oversight on the process, and learning from it.
I think the things I learned--I think we came in feeling
that the Executive order had--was in the right spirit of what
we were trying to do. We certainly like the concepts of the
information sharing. We were very big on standards, to begin
with, and we've been that. And I'm very good to see how the
Senate, here, is looking at embracing that, and the Executive
order has embraced that, and I think they really listened well
to the organization. So, I think the spirit of how we want to
get there is there.
If you ask me what the two take aways I'd you to leave
with, I think is--this risk management, to me, and how we
define that, is more important than the standards. I think the
standards momentum is there, so we can, you know, put a stamp
on it. But, I believe it's used effectively in government and
in industry. So, the real issue is, are we really targeting
what problem we want to solve? And I think that's really
putting definition around ``risk management,'' if you will. So,
how do we solve the problems? Who's our real threat? And really
make sure form policy around that.
Chairman Carper. Thanks, Mr. Kepler.
Mr. Wilshusen.
Mr. Wilshusen. Yes, I would say one of the take aways would
be just to continue providing the oversight and emphasizing
followthrough. One of the challenges in the past with the
cybersecurity strategies and the different aspects of them has
been seeing them all the way through and making sure that
there's follow-up, that there are feedback loops. In terms of
the agencies, making sure that what they're doing is the right
thing to do. The keys for this particular committee is to
provide the oversight that it has in the past, and I imagine
will continue to do. And certainly, in our role as GAO, it's to
continue to help agencies evaluate their progress, and make
recommendations, where appropriate.
Chairman Carper. Senator Thune?
Senator Thune. Yes, just one last question, if I might, Mr.
Chairman, for Mr. Kepler.
And I'm interested in knowing what's the most common cyber
attack that your company faces, and how that threat could best
be alleviated.
Mr. Kepler. Yes. If you look at the higher risk ones to--I
mean, so you--these numbers sound bizarre, but when you look at
the things that used to be a big deal, like viruses--there are
still hundreds of thousands of those, and we can protect those
pretty well. I think if you tell--you know, what we're
challenged with the most is the threats from highly resourced
organizations today that are--targeted us and persistent with
us. And the concern is, because those are developed, that they
end up going down and get learned, and they can migrate down
into less sophisticated hands and stuff to work through.
So, I think the fact that we have large organizations--and
by--not by my--by my reading, those are some countries and
organized criminal organizations--that's a big problem, and
it's something that I think government needs to, you know, kind
of step in and help business, and actually the country, work
on.
Senator Thune. IP theft?
Mr. Kepler. You know, I think IP, in general, company to
company, it's--the framework of government today manages that.
It's this issue now of international and, I think, country-
supported IP theft, in doing that, as well as, you know,
basically, just general intelligence gathering into companies
that had never really happened to the extent we're seeing it
now.
Senator Thune. Thank you all very much. Appreciate it.
Thank you, Mr. Chairman.
Chairman Carper. You bet.
One last question, if I could, for Mr. Kepler. What is your
CEO's name? Andrew----
Mr. Kepler. Liveris--Andrew Liveris.
Chairman Carper. Liveris? Well, he came and spoke to a
group of us, not long ago. Very impressive. I think he's--may
hold a leadership position in the Business Roundtable. Is that
true?
Mr. Kepler. Yes, he does.
Chairman Carper. And do you know what that is, by chance?
Mr. Kepler. What his position is? I think he's chairing it,
right now, sir.
Chairman Carper. I think he is, as well. The--we appreciate
very much, and need, the continued input from the Business
Roundtable. We welcome the input from the Chamber of Commerce--
U.S. Chamber of Commerce, and other business groups, as well.
But, we're very mindful of the contribution that Business
Roundtable can make, and would ask that you pass along our
thanks to your CEO and say we'd like to hear more of that,
going forward.
Well, it's been a good hearing. And, Senator Thune, whom I
affectionately call ``Thuney,'' we are here to the bitter end,
but it has not been bitter at all. Not even bittersweet. It has
been good. And I--these are--this is a hard issue. Senator
Thune and my staff have heard me say this before. This is not
an easy issue for me to get my head around. And I--a couple of
months ago, I felt like I almost reached the point where I knew
enough to be dangerous. And after this hearing today, I know
enough to be really dangerous, so--hopefully, really helpful.
And we--it's a shared responsibility, here. It can't be the
legislative side to--just on our own. It can't be just the
executive branch. It just can't be the key stakeholders,
including the business community. So, it's all of us, together,
and--because we have a shared responsibility--and if we do this
right, we're going to help our country a whole lot.
And we--Senator Thune and I, our colleagues, Senator
Rockefeller and Thune, others who serve on our committees, we
want to do this right, and your help--testimony today has
certainly helped in that regard.
So, many thanks to you.
And I understand that the hearing record is going to be
open for another 14 years.
[Laughter.]
Chairman Carper. No, not really. Another 14 days, because
we're on a short--we're on a short time frame here. Fourteen
days for any additional questions or statements from our
colleagues. If you get anything, then respond promptly; we'd be
most grateful.
Anything else for the record, Senator Thune?
Senator Thune. No, sir.
Chairman Carper. With that having been said, it's a wrap.
This hearing is adjourned.
Thank you.
[Whereupon, at 5:05 p.m., the hearing was adjourned.]
A P P E N D I X
Prepared Statement of the American Gas Association
The American Gas Association (AGA) is pleased to submit this
statement for the record for the U.S Senate Committee on Commerce,
Science, and Transportation and Committee on Homeland Security and
Governmental Affairs joint hearing on The Cybersecurity Partnership
Between the Private Sector and Our Government: Protecting our National
and Economic Security (March 7, 2013). In AGA's view, natural gas is
the foundation fuel for a clean and secure energy future providing
benefits for the economy, our environment, and our energy security.
Alongside the economic and environmental opportunity natural gas offers
our country comes great responsibility to protect its distribution
pipeline systems from cyber attacks.
Technological advances over the last decade have made natural gas
utilities more cost-effective, safer, and better able to serve our
customers via web-based programs and tools. Unfortunately, the
opportunity cost of a more connected, more efficient industry is that
we have become an attractive target for increasingly sophisticated
cyber terrorists and cyber thieves. This said, America's investor-owned
natural gas utilities are meeting the threat daily via skilled
personnel, robust cybersecurity system protections, an industry
commitment to security, and a successful ongoing cybersecurity
partnership with the Federal Government.
AGA, founded in 1918, represents more than 200 local energy
companies that deliver clean natural gas throughout the United States.
There are more than 71 million residential, commercial and industrial
natural gas customers in the U.S., of which 92 percent--more than 65
million customers--receive their gas from AGA members. AGA is an
advocate for local natural gas utility companies and provides a broad
range of programs and services for member natural gas pipelines,
marketers, gatherers, international gas companies and industry
associates. Today, natural gas meets almost one-fourth of the United
States' energy needs.
Government-Private Partnerships and Cybersecurity Management: A
Process that Works for Natural Gas Utilities
America's natural gas delivery system is the safest, most reliable
energy delivery system in the nation. This said, industry operators
recognize there are inherent vulnerabilities with employing web-based
software and hardware applications for both industrial control systems
and business operating systems. Because of this, gas utilities apply
myriad cyber standards, guidelines, and related regulations in their
cybersecurity portfolios and participate in an array of government-
sponsored and industry-sponsored cybersecurity initiatives. However,
the most important overall cybersecurity mechanism is the existing
cybersecurity partnership between the government intelligence community
and industry operators. This two-way information sharing provides for
an exchange of vital cybersecurity information within a flexible
framework which allows all stakeholders to be proactive and adapt
quickly to dynamic cybersecurity risks.
Background: The Homeland Security Act of 2002 provides the basis
for Department of Homeland Security (DHS) responsibilities in
protecting the Nation's critical infrastructure and key resources
(CIKR). The Act assigns DHS the responsibility for developing a
comprehensive national plan for securing CIKR. This plan, known as the
National Infrastructure Protection Plan (NIPP), identifies 18 critical
infrastructure sectors within which natural gas transportation is a
subsector of the Energy and Transportation Sectors. The NIPP states
that more than 80 percent of the country's energy infrastructure is
owned by the private sector, and the Federal Government has a statutory
responsibility to safeguard critical infrastructure. For this reason,
information-sharing amongst industry operators and the government
intelligence community is critical to cyber infrastructure protection.
Process: Natural gas utilities are working with government at every
level to detect and mitigate cyber attacks. In particular, the natural
gas transportation subsector works specifically with the DHS Industrial
Control Systems Cyber Emergency Response Team (ICS-CERT) to reinforce
two-way sharing of cybersecurity awareness, detection, and mitigation
programs. This process calls on operators to submit suspicious cyber
activity reports to ICS-CERT, while ICS-CERT, in turn, advises
operators of noted cyber vulnerabilities, mitigation strategies, and
forensic analyses. This open communication has proven over the years to
be an effective, uncomplicated mechanism that bolsters the industry's
overall cybersecurity posture, while advancing the mission of ICS-CERT.
In simple terms, the government intelligence community understands
cyber vulnerabilities; natural gas utilities understand their
operations; and the two come together in a constructive partnership to
protect targeted critical infrastructure.
AGA-Government Cybersecurity Partnerships: AGA works closely with
the DHS Transportation Security Administration (TSA), Pipeline Security
Division within a government-private industry partnership framework for
cybersecurity information sharing. The Aviation and Transportation
Security Act of 2001 gives the TSA Pipeline Security Division
regulatory authority over pipeline security for both physical security
and cybersecurity. The TSA Pipeline Security Division has over the past
decade chosen to partner with pipeline operators in an environment of
guidance rather than regulation/compliance. Partnering has benefitted
all stakeholders because it allows government and pipeline owner/
operators to exchange valuable cybersecurity information typically not
shared in a compliance-driven environment.
AGA also strongly encourages industry participation in DHS-led
training programs, workshops, and system evaluation programs, available
via our partnership with the ICS-CERT and TSA Pipeline Security
Division, as well as relevant cybersecurity programs operated by other
agencies. Moreover, DHS officials regularly meet with industry groups,
such as the AGA board of directors, as well as individual member
companies specifically to review and assess ongoing cyberthreats.
Bottom line, as cybersecurity threats evolve and related risks to gas
industry operations change, our long-standing public-private
partnership with DHS allows natural gas utilities to successfully
collaborate with the government on overall cybersecurity in a fashion
that benefits both parties. The following is a sample list of
government-natural gas industry cybersecurity partnerships:
DHS Classified and Unclassified Cyber Security Briefings.
Industry operators participate in DHS-sponsored classified and
unclassified briefings to receive threat and risk information
and analytics. These briefings are in the form of monthly
teleconferences and semi-annual face-to-face meetings between
the private sector and government intelligence community
analysts. The briefings provide information on the state of the
subsector in reference to emerging threats, security
incidences, and trends. Additionally, AGA is leading the
collaborative effort between the government intelligence
community and private industry to improve on timely, credible,
and actionable information sharing.
DHS Control Systems Security Program. DHS offers various
opportunities to enhance industry operator knowledge on control
system cybersecurity. Industry operators participate in DHS
ICS-CERT training, online forums, recommended practices,
advisories, and interactive live assistance focused
specifically on control system cybersecurity. Industry
operators also receive DHS United States Computer Emergency
Readiness Team (US-CERT) monthly activity summaries and secured
portal advisory communications, submit incident reports for
analysis, and engage in the Industrial Control Systems Joint
Working Group for information exchange.
Oil & Natural Gas Sector Coordinating Council (ONG SCC)
Cyber Security Working Group. Industry operators participate in
this DHS-sponsored forum for effective coordination of oil and
natural gas cybersecurity strategies and activities, policy,
and communication across the sector to support the Nation's
homeland security mission. The ONG SCC provides a venue for
operators to mutually plan, implement, and execute sufficient
and necessary sector-wide security programs, procedures and
processes; exchange information; and assess accomplishments and
progress toward protecting the sector's critical
infrastructure.
TSA Cyber Security CARMA Program. Sponsored by TSA, this
program is intended to develop a nationally-scoped cyber risk
management framework to help industry operators identify where
internal risk management activities align with industry-wide
risk management activities. AGA co-chairs this collaborative
effort and facilitates operator participation and contribution.
Coordination of Federal Government Risk Assessment Programs.
AGA is proactively coordinating meetings of the Department of
Energy, Federal Regulatory Energy Commission, TSA, and ICS-CERT
in an effort to encourage all government entities to align
their various cybersecurity risk assessment programs. The
objective is to compare/contrast the programs and identify
where synergies may be made.
AGA-Industry-Government Cybersecurity Guidelines: Partnership
between the private sector and the government is critical to address
cybersecurity threats to our Nation's critical infrastructure. As such,
AGA and industry operators also collaborate with government partners to
produce effective cybersecurity practices and guidelines. Below are a
few examples:
DHS Transportation Security Administration (TSA), Pipeline
Security Guidelines. Guidelines developed through the
collaborative effort of government and pipeline asset owners to
be used by natural gas and hazardous liquid transmission
pipeline companies, natural gas distribution companies, and
liquefied natural gas facility operators as a framework for the
protection of critical and non-critical pipeline
infrastructure. AGA contributed as subject matter experts, in
particular to the cybersecurity chapter.
DHS Control Systems Security Program, Cyber Security
Evaluation Tool (CSET). A desktop software tool that guides
users through a step-by-step process for assessing the
cybersecurity posture of their industrial control system and
enterprise information technology networks. AGA participated in
the development, testing, and distribution of this material and
contributes to continual improvements to this resource.
Department of Energy (DOE), Roadmap to Achieve Energy
Delivery Systems Cybersecurity. A strategic framework to
improve cybersecurity within the energy sector through a
collaborative vision of industry, vendors, academia, and
government stakeholders. This vision is supported by goals and
time-based milestones for achievement over the next decade. AGA
has been a contributor to this resource since its inception in
2006 with its preliminary release as DOE, Roadmap to Secure
Control Systems in the Energy Sector.
Interstate Natural Gas Association of America (INGAA),
Control System Cyber Security Guidelines for the Natural Gas
Pipeline Industry. A set of guidelines designed to assist
operators of natural gas pipelines in managing control systems
cybersecurity requirements. Aligns with TSA Pipeline Security
Guidelines and other guidelines/standards commonly used across
the oil and natural gas industries. AGA contributed to the
review and comment phase and promotes its availability as a
valuable resource to operators and government.
AGA and INGAA, Security Practices Guidelines, Natural Gas
Industry Transmission and Distribution. Guidelines that provide
an overview of the recommended physical security and
cybersecurity practices and procedures for the transmission and
distribution segments of the natural gas industry. AGA and the
Interstate Natural Gas Association of America lead the
initiative to develop this guidance for natural gas pipeline
and utility operators.
Non-Standardization of Cybersecurity Practices is Paramount
In the recent past, concerns over increasing cyber attacks--
successful or not--on critical infrastructure have led to legislative
efforts to create a set of top-down cybersecurity regulations. AGA
remains concerned that prescriptive cybersecurity regulations, while
well-intentioned, will have little practical impact on cybersecurity
and, in fact, will hinder implementation of robust cybersecurity
programs. First and foremost, prescriptive cybersecurity regulations
would fundamentally transform the productive cybersecurity relationship
natural gas utilities have with the TSA Pipeline Security Division from
a successful partnership to a more standard regulator-regulated mode,
forcing companies to focus more resources on compliance activities than
on cybersecurity itself. Also, from a practical perspective, it is
unlikely that any set of cybersecurity regulations will be dynamic
enough to help companies fight constantly changing and increasingly
sophisticated threats.
Across the natural gas industry, cybersecurity effectiveness is
maximized through the diversity of individual company cybersecurity
approaches, e.g., Defense in Depth strategies and customized detection
and mitigation systems appropriate for individual company networks.
Furthermore, because gas utility control system operations vary amongst
operators, companies adhere to cyber standards, guidelines and related
regulations most relevant to their specific network functions and
vulnerabilities. Companies also turn lessons learned from government-
private industry cybersecurity information sharing partnerships into
actions designed to protect their specific systems. In sum, as
cybersecurity risks and threats change, so do vulnerabilities. Ongoing
implementation of new and diverse cybersecurity tools and procedures,
based on unique individual company requirements, helps companies adapt
to a dynamic cyberthreat environment and bolsters the overall gas
utility industry cybersecurity posture.
The Cybersecurity Executive Order Considered
The Administration's Executive Order (EO), Improving Critical
Infrastructure Cybersecurity, is a data collection exercise, standards
setting program, and outline for future legislative and regulatory
action. In sum, the EO directs the government to: (1) identify all
critical infrastructure entities, (2) prepare ``voluntary''
cybersecurity standards for identified critical infrastructure, (3)
develop incentives designed to entice entities to adopt the
cybersecurity standards, and (4) tasks agencies with existing
cybersecurity authorities to determine whether their current
regulations are sufficient or if new, more prescriptive, cybersecurity
regulation is necessary.
Clearly, Congress will be a not-so-silent partner in implementing
this EO, particularly if agencies with cybersecurity responsibilities,
having found current programs inadequate, lack the authority necessary
to further regulate cybersecurity requirements in their sector. In
addition, while the EO does seek to strengthen the public-private
cybersecurity information sharing partnership, liability and
information security protections necessary for critical infrastructure
owners and operators to fully participate will require new statutory
authority.
Overall, the EO is simply the beginning of a long march to improve
national cybersecurity. AGA is hopeful, and will work to ensure, that
throughout this policy process gas utility industry cybersecurity
concerns will be addressed. To that end, below are a few of our
specific concerns with the EO.
Identifying Critical Infrastructure. The executive order confines
itself largely to ``critical infrastructure'', a categorization that
undoubtedly will include natural gas utilities. Critical infrastructure
is defined in Section 2 of the EO as ``systems and assets, whether
physical or virtual, so vital to the United States that the incapacity
or destruction of such systems and assets would have a debilitating
impact on security, national economic security, national public health
and safety, or any combination of those matters.'' Note that the EO
does not define many terms included in the definition (``debilitating
impact'', ``economic uncertainty'', etc.), potentially opening an
ongoing debate over what systems may be considered critical or not
critical. In addition, AGA strongly suggests that the identification
process include the active and informed participation of critical
infrastructure owner/operators from the start rather than after the
assignment of ``critical'' has been determined by the government. By
doing this, the government avoids placing the owner/operator in a
defensive position with the burden to demonstrate non-criticality.
Further, any list must be secured with appropriate information
protection mechanisms.
Cybersecurity Information Sharing Program. Section 4 of the EO
creates a cybersecurity information sharing program, directing DHS, the
Department of Justice, and the Office of the Director of National
Intelligence to set up cyber threat information sharing processes with
targeted private sector entities. Without question, improved
information sharing can and will benefit critical infrastructure
cybersecurity. However, for industry to fully engage in an information
sharing program, information protection mechanisms (safe harbors) and
liability protections must be afforded to owners/operators who
participate in the program. Without such protections, companies may be
unwilling to participate because of the possibility of information
leaks as well as due to competitive concerns and legal liability
pressures.
NIST ``Cybersecurity Framework''. Section 7 of the EO directs the
National Institutes of Standards and Technology (NIST) to develop, via
an open review process, a ``Cybersecurity Framework'' designed to
improve critical infrastructure cybersecurity. The Framework will
utilize risk and performance based standards/best practices; technology
neutral applications; voluntary consensus standards and industry best
practices; and cross-sector security standards applicable to all
critical infrastructure. Ultimately, NIST's goal is to create a
framework that is ``prioritized, flexible, repeatable, performance-
based, and cost-effective'' to help critical infrastructure owner/
operators manage cyber risk. Good intentions notwithstanding, questions
remain, including:
Given the complexity of the subject, will NIST be able to
meet notice and comment timelines?
Will the final Framework be flexible enough to address every
critical infrastructure sector?
How much influence will critical infrastructure sectors have
in developing the Framework?
Will the Framework morph into mandatory standards?
Industry Adoption of Cybersecurity Framework. Section 8 of the EO
directs DHS to create a ``voluntary'' program to spur critical
infrastructure entities to adopt the NIST Framework. Specifically, DHS
will work with other agencies to review the Framework and develop
implementation guidance to address sector-specific operating
environments. More importantly, DHS will work with the Departments of
Commerce and Treasury to report on existing incentives that might spur
industry participation in the voluntary program as well as any
additional incentives (i.e., liability protections) that would require
new statutory authority. Sector agencies will also report annually on
which critical infrastructure owner/operators participate in the
program. Overall, just how ``voluntary'' this program ends up becoming
is an open question. As AGA and other critical infrastructure
industries have argued, voluntary government programs often morph into
de facto mandatory compliance programs because companies feel compelled
to participate rather than risk opening themselves up to litigation for
not engaging in a program that has the imprimatur of the Federal
Government.
Agency Adoption of NIST Cybersecurity Framework. Section 10 of the
EO notes that once the NIST Framework has been preliminarily drafted
agencies with cybersecurity regulatory responsibilities will review
their existing authorities to determine whether they are sufficient
given the cyberthreat landscape, and whether they can implement the
NIST Framework via regulation. If agencies determine that their current
cybersecurity regulatory requirements are insufficient then they shall
propose new ``actions'' to mitigate cyber risks. This section clearly
pushes sector agencies to create new cybersecurity regulations. These
new requirements would, at a minimum, be based upon the NIST
Cybersecurity Framework; however, there is plenty of suggestion in
Section 10 that agencies move beyond the framework, or seek the
authority to do so. We are hopeful this will not lead to regulation for
regulations sake. For example, despite having the statutory authority
necessary, TSA Pipeline Security Division has chosen not to issue
cybersecurity regulations for natural gas utilities in large part
because of the successful security partnership we have collectively
developed.
The Case for Cybersecurity Legislation
Despite our concerns about prescriptive cybersecurity standards,
AGA does believe that there is a role for cybersecurity legislation,
particularly as it relates to improving public-private cybersecurity
information sharing and related liability protections.
Information Sharing. To help counter cyber attacks and protect
networks against future incursions, critical infrastructure needs
government to help them identify, block and/or eliminate cyberthreats
as rapidly and reliably as possible. From a functional perspective,
this will require expediting security clearances for critical
infrastructure personnel as well as streamlining the process by which
actionable threat intelligence is shared with private industry.
Harnessing the cybersecurity capabilities of the government
intelligence community on behalf of private sector networks will go a
long way towards overall network security. The recently introduced H.R.
624, The Cyber Intelligence Sharing and Protection Act (CISPA) begins
to flesh out this process by establishing a cybersecurity partnership
between critical infrastructure and the intelligence community.
However, there is certainly a role the Department of Homeland Security
can play, as a sector specific agency, in distributing cyberthreat
information, interpreting potential threat impacts, and working with
critical infrastructure entities to keep their networks safe. This
would particularly be the case for those industries, like natural gas
utilities, that already have a cybersecurity partnership with TSA.
Liability Protection, SAFETY Act. Another avenue for legislation
surrounds offering liability protection for companies with robust
cybersecurity programs--standards, products, processes, etc. The
Administration's recent executive order (EO) on cybersecurity
underscores this need. The EO directs sector agencies, the intelligence
and law enforcement community to establish a cybersecurity information
sharing partnership; tasks the National Institute of Standards and
Technology with establishing a quasi-regulatory set of cybersecurity
standards (a ``cybersecurity framework''); and orders DHS to
incentivize critical infrastructure to adhere to the NIST standards.
What the EO cannot do is provide liability protections for critical
infrastructure entities that make the effort to participate in a
public-private cybersecurity program, regardless of whether it is
created via EO or some future law.
AGA supports employing the SAFETY Act as an appropriate avenue for
providing companies that participate in a government-private industry
cybersecurity partnership with liability coverage from the impacts of
cyberterrorism. SAFETY Act applicability in this area seems plain:
The SAFETY Act exists in current law, and a related office
at DHS has been reviewing and approving applications for
liability coverage in the event of an act of terrorism or cyber
attack for over a decade. This office utilizes an existing
review and approval process which would allow for immediate
granting of liability protections from cyber attacks.
Because the SAFETY Act can apply to a variety of areas
ranging from cybersecurity standards (cyber best practices,
etc.), to procurement practices and related equipment (SCADA,
software, firewalls, etc.) companies can layer their liability
protection.
We are aware of no other existing statute that offers
similar liability protections. Moreover, we do not see the need
to write new law to address liability protections from cyber
incidents when the SAFETY Act is already applicable.
This said, there are some areas where we believe the SAFETY Act
could be a little stronger as it applies to cyber matters. First, and
foremost, the statute could be expanded to make specific reference to
liability protections from ``cyber'' events (cyber attacks, cyber
terrorism, etc.) and more specific reference to coverage for
cybersecurity equipment, policies, information sharing programs, and
procedures. While there is coverage under the Act currently for cyber
attacks, specifically identifying ``cyber attacks'' as a trigger for
liability protections would strengthen the overall concept.
The Natural Gas Utility Cybersecurity Posture
AGA's policy priorities for cybersecurity include preserving our
current cybersecurity partnership with the Transportation Security
Administration, Pipeline Security Division, enhancing government-
private industry cybersecurity information sharing, opposing burdensome
or counterproductive cybersecurity regulation, and supporting robust
liability protections for entities that are serious about protecting
their networks. If ultimately achieved, these items will only bolster
an already solid industry cybersecurity commitment.
America's natural gas utilities are cognizant of enduring cyber
threats and the continued need for vigilance through cybersecurity
protection, detection, and mitigation mechanisms. Industry operators
apply numerous cyber standards, guidelines, and related regulations in
their cybersecurity portfolios and participate in a variety of
government-sponsored cybersecurity initiatives. There is no single
solution for absolute system protection. However, through a combination
of cybersecurity processes and timely and credible information-sharing
amongst the government intelligence community and industry operators,
America's natural gas delivery system remains protected, safe and
reliable, and will remain so well into the future.
______
Response to Written Question Submitted by Hon. Amy Klobuchar to
Hon. Janet Napolitano
Question. The Executive Order requires agencies to incorporate
privacy and civil liberties safeguards into their activities. Yet the
fact that a Federal Government-private sector cyber information-sharing
program must be streamlined and rapid in order to be effective poses
unique privacy challenges. Can you provide concrete examples of how DHS
and other agencies will implement these safeguards even as they
increase information sharing with the private sector? The Fair
Information Practice Principles of an individual's access to collected
data and the preservation of the integrity of that data would seem to
be particularly difficult to ensure in the pursuit of sophisticated
cyber threats. How will the need for a better flow of information,
sometimes including classified information, be balanced with these
principles? Do you believe that current law adequately protects privacy
rights in cyberspace, particularly if information-sharing between the
government and private sector is increased? Do you believe that cyber
legislation focusing solely on the issue of information sharing that
has been previously proposed in Congress, such as the Cyber Information
Sharing and Protection Act (CISPA), adequately address these privacy
and civil liberties concerns?
Answer. In recognition of the privacy and civil liberties concerns
associated with the efforts called for in Executive Order (EO) 13636,
the Administration directed Departments and Agencies to assess
activities required by EO 13636 for potential privacy and civil
liberties risks. In developing this and other documents, the
Administration sought input from stakeholders of all viewpoints in
industry, government, and the advocacy community. Their input has been
vital in crafting an order that incorporates the best ideas and lessons
learned from public and private sector efforts while ensuring that our
information sharing incorporates rigorous protections for individual
privacy, confidentiality, and civil liberties. Indeed, as we perform
all of our cyber-related work, we are mindful of the need to protect
privacy, and civil liberties. The Department has implemented strong
privacy and civil rights and civil liberties standards into all its
cybersecurity programs and initiatives from the outset.
Rather than simply attempting to balance information sharing with
privacy concerns, Departments and Agencies will use the Fair
Information Practice Principles (FIPPs) as an analytical framework to
assess privacy risks and integrate privacy protections into their
cybersecurity programs. The FIPPs help agencies recognize the
importance of data minimization, that is, that agencies should only
collect information that is relevant and necessary to accomplish agency
missions. Not only does this ensure privacy, but it also facilitates
more effective protection of critical cybersecurity infrastructure. A
concrete example of how DHS implements the FIPPs is by conducting
Privacy Impact Assessments (PIAs) on the Department's cyber systems and
programs. DHS published the Enhanced Cybersecurity Services (ECS) PIA
in January of this year and will continue to update or conduct PIAs on
cyber operations on an ongoing basis. The ECS PIA describes the
operational processes and privacy and security oversight required to
share unclassified and classified cyber threat indicators with
companies that provide internet, network and communications services to
enable those companies to enhance their service to protect U.S.
Critical Infrastructure entities.
In addition, the Federal Government will ensure that privacy and
civil liberties safeguards are incorporated into cyber activities
through the work of the recently formed Assessments Working Group (WG)
under the Integrated Task Force (ITF), which leads the Administration's
implementation efforts of the requirements laid out in the EO and
Presidential Policy Directive-21 (PPD-21). The WG is an interagency
body whose participants represent Senior Agency Officials for Privacy
and Civil Liberties. The WG is responsible for providing support to
Departments and Agencies as they conduct the privacy and civil
liberties assessments required by Section 5 of EO 13636. The WG will
serve as a forum for sharing approaches to conducting these
assessments. Separately, the DHS Privacy Office and Office for Civil
Rights and Civil Liberties (CRCL) will conduct assessments of DHS
activities undertaken pursuant to the EO, and will compile other
Departments' and Agencies' assessments for inclusion in an annual
report. In compiling the report, the Privacy Office and Office for
Civil Rights and Civil Liberties (CRCL) will consult with the Privacy
and Civil Liberties Oversight Board and coordinate with the Office of
Management and Budget, consistent with the requirements set forth in EO
13636.
In addition, the DHS Privacy Office and Office for Civil Rights and
Civil Liberties has hosted a series of five meetings for privacy and
civil liberties advocates that began in April 2013 to provide
additional transparency into the operation of the ITF Working Groups.
It is important to note that the Executive order does not grant new
regulatory or other authority to increase voluntary cooperation with
the private sector or to establish additional incentives for
participation in the Voluntary Critical Infrastructure Cybersecurity
Program established in the EO. New approaches to cybersecurity are
urgently needed, and we are committed to working with Congress for
passage of a comprehensive suite of legislation.
The Administration's legislative priorities for the 113th Congress
build upon the President's 2011 Cybersecurity Legislative Proposal and
take into account two years of public and congressional discourse about
how best to improve the Nation's cybersecurity. Congress should enact
legislation to incorporate privacy and civil liberties safeguards into
all aspects of cybersecurity; strengthen our critical infrastructure's
cybersecurity by further increasing responsible information sharing and
promoting the establishment and adoption of standards for critical
infrastructure; giving law enforcement additional tools to fight crime
in the digital age; and creating a National Data Breach Reporting
requirement.
______
Response to Written Questions Submitted by Hon. Kelly Ayotte to
Hon. Janet Napolitano
Question 1. The issue of cyber security is far too important not to
find common ground and move forward with legislation that would make us
safer today. Some like to blame different associations or trade groups
for the inability to get legislation through both bodies of Congress,
but I would argue that Republicans and Democrats agree on a vast
majority of the issues being debated. Why can't we pass what we all
agree on, such as information sharing and then roll up our sleeves and
see if we can find consensus on the issues where there may not be as
much common ground? Too much is at stake to have an all-or-nothing
mentality.
Answer. Both sides of the aisle are united in their recognition
that cybersecurity must be strengthened. While the Administration has
taken significant steps to protect against evolving cyber threats, we
must acknowledge that the current threat outpaces current authorities.
In the current landscape, DHS must execute its cybersecurity mission
under an amalgam of existing statutory and executive authorities that
have failed to keep up with the responsibilities. Cybersecurity
activities have made clear that certain laws that govern cybersecurity
activities must be updated.
In February 2013, President Obama issued Executive Order 13636 on
Improving Critical Infrastructure Cybersecurity as well as Presidential
Policy Directive 21 on Critical Infrastructure Security and Resilience,
which will strengthen the security and resilience of critical
infrastructure through an updated and overarching national framework
that acknowledges the increased role of cybersecurity in securing
physical assets. These directives create a foundation for legislative
action by implementing concepts set forth in the President's 2009
Cyberspace Policy Review, and policies drawn from the recommendations
of the House Republican Cybersecurity Task Force and the bipartisan
Commission on Cybersecurity for the 44th Presidency.
It is important to note that the Executive order directs Federal
agencies to work within current authorities and increase voluntary
cooperation with the private sector to provide better protection for
computer systems critical to our national and economic security. It
does not grant new regulatory authority or establish additional
incentives for participation in a voluntary program. New approaches to
cybersecurity are urgently needed, and we are committed to working with
Congress for passage of a comprehensive suite of legislation.
The Administration's legislative priorities for the 113th Congress
build upon the President's 2011 Cybersecurity Legislative Proposal and
take into account two years of public and congressional discourse about
how best to improve the Nation's cybersecurity. Congress should enact
legislation to incorporate privacy, confidentiality, and civil
liberties safeguards into all aspects of cybersecurity; strengthen our
critical infrastructure's cybersecurity by further increasing
information sharing and promoting the establishment and adoption of
standards for critical infrastructure; give law enforcement additional
tools to fight crime in the digital age; and create a National Data
Breach Reporting requirement.
Question 2. If the Federal Government deems a business as covered
critical infrastructure, but that business disputes whether or not it
should be covered, what is the appeal process? Do businesses have any
recourse or is DHS judge and jury in this instance?
Answer. Under Executive Order (EO) 13636, private sector
participation in cybersecurity matters with the Department of Homeland
Security (DHS) is carried out on a voluntary basis and supports more
efficient sharing of cyber threat information. The EO directs the
National Institute of Standards and Technology to develop a
Cybersecurity Framework to identify cybersecurity practices among
critical infrastructure sectors and directs DHS to develop a Voluntary
Program to encourage adoption of the Framework. While the intent of the
EO is to offer additional cybersecurity capabilities to assist owners
and operators of critical infrastructure, with the expectation that
accepting this assistance will be in the firms' best interest, EO 13636
creates no new legal obligation for businesses to adopt any
cybersecurity measures.
Because the vast majority of U.S. critical infrastructure is owned
and operated by private companies, reducing the risk to these vital
systems requires a strong partnership between government and industry.
To implement EO 13636, DHS engaged in a consultative process with
public and private sector partners to identify critical infrastructure
that if impacted by a cybersecurity incident could reasonably cause
catastrophic impacts to our national security, economic security,
public health and safety. Specifically, EO 13636 requires consultation
with the Critical Infrastructure Partnership Advisory Council; Sector
Coordinating Councils; critical infrastructure owners and operators;
Sector Specific Agencies; other relevant agencies; independent
regulatory agencies; state, local, territorial, and tribal governments;
universities; and outside experts.
DHS will confidentially notify owners and operators of critical
infrastructure identified under this process and ensure identified
owners and operators are provided the basis for the determination. The
Department is also required to establish an administrative appeals
process through which owners and operators of critical infrastructure
may submit relevant information and request reconsideration of their
identification as ``critical infrastructure of greatest risk.''
Question 3. Earlier this month in a Senate Armed Services hearing,
Gen. James Mattis, the Commander of U.S. Central Command testified that
with the increasing role of our adversaries in cyberspace, it only adds
more urgency to expand our presence, capabilities and authorities to
maintain an advantage in cyberspace. Threat networks, including those
posed by Iran and China, are adjusting opportunistically. What role do
you envision DHS playing to destabilize cyber activities that lead to,
among other things, transfer of illicit arms, espionage and aid
transferred to support malign actors seeking to undermine our security?
What forums exist and what forums are you considering using to put more
urgency and high level attention into the DHS-CYBERCOM cyber security
dialogue?
Answer. The United States confronts a dangerous combination of
known and unknown vulnerabilities in cyberspace and strong and rapidly
expanding adversary capabilities. Successful response to dynamic cyber
threats requires a whole of government approach leveraging homeland
security, law enforcement, and military authorities and capabilities,
which respectively promote domestic preparedness, criminal deterrence
and investigation, and national defense. While each agency operates
within the parameters of its authorities, the U.S. Government's
response to cyber incidents of consequence is coordinated among the
Department of Homeland Security (DHS), Department of Justice (DOJ), and
the Department of Defense (DOD) such that ``a call to one is a call to
all.''
DHS is responsible for coordinating the Federal Government response
to significant cyber or physical incidents affecting critical
infrastructure, consistent with statutory authorities. The Department
is the largest law enforcement agency in the Federal Government, with
personnel stationed in every state and in more than 75 countries around
the world. To combat cyber crime, DHS relies upon the skills and
resources of the United States Secret Service (USSS), U.S. Immigration
and Customs Enforcement (ICE), U.S. Coast Guard, and U.S. Customs and
Border Protection (CBP) and works in cooperation with partner
organizations, including international partners, to investigate and
prosecute cyber criminals and works in cooperation with partner
organizations, including international partners, to investigate and
prosecute cyber criminals. (Pursuant to section 1030 of the Title 18 of
the United States Code, the Federal Bureau of Investigation has primary
authority to investigate cyber crimes with a national security,
counterintelligence, or espionage nexus.)
Additionally, there are several key ways in which DHS leverages the
capabilities of the DOD. DHS is able to draw upon specific classified
cyber threat intelligence that can be utilized in enhancing the
protection of Federal networks and private critical infrastructure
networks under cooperative partnerships. The DHS-DOD relationship also
includes a Memorandum of Agreement for exchanges of personnel as well
as shared technical expertise. I meet regularly with Director Mueller
and General Alexander to coordinate and align operational strategies.
DHS has administrative security authorities that allow it to defend
government networks, to share and receive threat information with
private, State, local and tribal entities, and to coordinate with our
intelligence community and law enforcement agency partners and to
leverage government cybersecurity expertise and render technical
assistance when needed.
Synchronization among DHS, DOJ, and DOD ensures that all of
government's capabilities are brought to bear against cyber threats and
enhances government's ability to share timely and actionable
cybersecurity information with a variety of partners, especially the
private sector.
Question 4. A new report from the Pentagon's Defense Science Board
on cyber threats has raised some grave concerns. Among its findings,
our cyber capabilities at the Pentagon are ``fragmented'' and the
Defense Department is not prepared to defend against this threat.'' It
goes on to say that the Pentagon cannot be confident that its military
computer systems are not compromised because some use components made
in countries with high-end cyber-capabilities such as China and Russia.
Do you share the concerns of this Pentagon Report?
Answer. The Department of Homeland Security (DHS) has reviewed the
report and values this contribution provided by the Defense Science
Board. We agree that the cyber threat is serious, that public and
private networks in all countries are built on inherently insecure
architectures, and that the United States should lead the way by taking
positive action to increase the security and confidence in the
information technology systems we depend on. We have reviewed the
recommendations and findings of the report and are working to apply
lessons learned to our own mission to protect Federal Civilian
Executive branch networks. Additionally, DHS, along with interagency
partners, is aggressively implementing the National Strategy for Global
Supply Chain Security of January 2012, which seeks to protect the
welfare and interests of the American people and secure our Nation's
economic prosperity by promoting the secure movement of goods and
fostering a resilient supply chain.
Question 5. Do you feel countries like China and Russia are ahead
of the U.S. on the technology scale when it comes to cyber? How
confident are you that the computer systems used by your agency are not
vulnerable since so many are made overseas?
Answer. We would be happy to provide a threat briefing in a
classified setting.
Question 6. What is DHS's working relationship and division of
labor between Cyber Command and DHS?
Answer. Ensuring the Nation's cybersecurity is a shared
responsibility. Successful response to dynamic cyber threats requires a
whole of government approach leveraging homeland security, law
enforcement, and military authorities and capabilities, which
respectively promote domestic preparedness, criminal deterrence and
investigation, and national defense. While each agency operates within
the parameters of its authorities, the U.S. Government's response to
cyber incidents of consequence is coordinated among DHS, the Department
of Justice (DOJ), and Department of Defense (DOD) such that ``a call to
one is a call to all.''
As with all threats to the United States, our allies, and our
interests in other domains, the DOD has the mission to defend the
Nation against foreign attacks. Its national security mission demands
that it defend, deter, and take decisive action in cyberspace to defend
our national interests. DHS is responsible for securing unclassified
Federal civilian government networks and working with owners and
operators of critical infrastructure to secure their networks through
risk assessment, mitigation, and incident response capabilities.
While each department has its own separate role, there is a high
level of cooperation on cybersecurity activities including the U.S.
Cyber Command, DHS/NCCIC, and NSA's Threat Operations Center.
Collaboration between these designated `cyber centers' has been
maturing since the approval of HSPD-23/NSPD-54 in 2007. To further
cooperation between DOD and DHS, a memorandum of agreement was signed
in October 2010 that formalized coordination processes, embeds DOD
cybersecurity analysts within DHS and puts DHS leaders and analysts
inside the National Security Agency to foster operational coordination.
(This agreement was codified in the National Defense Authorization Act
for Fiscal Year 2012, P.L. 112-81, Sec. 1090.) Additionally, I meet
regularly with General Alexander to coordinate and align operational
strategies.
______
Response to Written Questions Submitted by Hon. Dan Coats to
Hon. Janet Napolitano
Question 1. The President's Executive Order focuses on threats to
the Nation's critical infrastructure, and yet numerous open source
reports indicate state sponsored industrial and economic espionage
against American businesses is an equal if not greater threat to
America's national and economic security. For example, last year
General Keith Alexander spoke at an AEI event and called industrial
cyberespionage and intellectual property theft ``the greatest transfer
of wealth in our Nation's history.'' He estimated the costs to the
American economy to be $388 billion, and a 2011 report from the Office
of National Counter-Intelligence Executive estimated the costs to the
American economy to be in the $400 billion range, with Chinese actors
as the world's most active perpetrators of industrial cyberespionage.
As you also know, the cybersecurity firm Mandiant released a report
this year documenting the problem of Chinese economic/industrial
espionage, specifically looking at the ``advanced persistent threat''
(APT) from one of the Chinese People's Liberation Army (PLA)
cyberattack units. How would you compare the threat to our economic
interests to the threat to critical infrastructure?
Answer. The Department of Homeland Security (DHS) continues to be
concerned about the effects of cyber-enabled theft of intellectual
property, trade secrets and commercial data, and works daily with
interagency partners and the private sector to address the threat.
Additionally, while the consequences of wide-scale intellectual
property theft may be different than those from a destructive or
disruptive cyber attack to critical infrastructure, techniques that
adversaries may use to steal sensitive business information also expose
vulnerabilities that could be used to destroy or disrupt critical
systems and services. Both are very real threats of potentially high
consequence, and we take them very seriously. In fact the things we
must do to address them both are quite similar.
To combat cyber crime, DHS relies upon the skills and resources of
the United States Secret Service (USSS), U.S. Immigration and Customs
Enforcement (ICE), U.S. Coast Guard (USCG), and U.S. Customs and Border
Protection (CBP) and works in cooperation with partner organizations to
investigate cyber criminals. Since 2009, DHS has prevented $10 billion
in potential losses through cyber crime investigations and arrested
more than 5,000 individuals for their participation in cyber crime
activities. The Department leverages the 31 USSS Electronic Crimes Task
Forces (ECTF), which combine the resources of academia, the private
sector, and local, state and Federal law enforcement agencies to combat
computer-based threats to our financial payment systems and critical
infrastructure. The Department is also a partner in the National Cyber
Investigative Joint Task Force, which serves as the national focal
point for U.S. Government coordination, integration, and sharing of
information relating to all domestic national security cyber
investigations sharing across the interagency. To further these
efforts, the Administration issued its Strategy on Mitigating the Theft
of U.S. Trade Secrets in February of this year. DHS will act vigorously
to support the Strategy's efforts to combat the theft of U.S. trade
secrets--especially in cases where trade secrets are targeted through
illicit cyber activity by criminal hackers.
In addition, DHS works with its interagency partners to distribute
relevant technical threat data to industry partners enabling them to
take action to prevent and mitigate potential network intrusions and
cyber-enabled theft. The DHS Enhanced Cybersecurity Services (ECS)
program is one of many efforts to increase this sharing of technical
threat data. Under ECS, DHS provides classified and sensitive threat
information to qualified cybersecurity providers, who then utilize this
information to offer enhanced cybersecurity services to many businesses
that qualify as critical infrastructure entities. However, just as with
addressing threats to physical critical infrastructure, we must have
two-way and real-time information exchange among government agencies,
network owners and operators, and others in order to more fully
understand what malicious cyber activity is occurring and how to best
address it. We look forward to working with Congress to find ways to
further increase this critical information sharing relationship and
incentivize the adoption of cybersecurity best practices by critical
infrastructure partners.
Question 2. A GAO report released last month found that
cybersecurity incidents at Federal agencies were on the rise. And while
there is an uptick in these incidents, challenges remain in how DHS is
carrying out responsibilities in sharing information among Federal
agencies and key private sector entities such as critical
infrastructure owners. The GAO report also found that DHS is not
``developing a timely analysis and warning capability,'' citing that
the Inspector General at DHS recommended that DHS establish a
``consolidated, multiple-classification-level portal to share incident
response related information'' which DHS says will not be ready until
2018. The report also found that Federal Information Security
Management Act compliance is inadequate, with only 8 of 22 agencies
being in compliance with FISMA standards in 2011 (down from 13 out of
24 agencies in 2010) and that 9 agencies ``had not fully developed
required policies for monitoring security on a continuous basis.''
Since, according to GAO and various agency Inspectors General, the
Federal Government has demonstrated it is unable to meet its
requirements under FISMA, what confidences should we have that it is
prepared to regulate and oversee private sector operations of critical
infrastructure?
Answer. Significant progress has been made in improving information
sharing among the Department of Homeland Security's (DHS) Office of
Cybersecurity and Communication, Federal agencies, and other partners
and constituents. DHS provided documentation of its improved public-
private cybersecurity information sharing activities to Government
Accountability Office (GAO) in August 2011, promptly answered
subsequent questions, and are awaiting GAO's closure of the associated
recommendations under GAO's report on Key Private and Public Cyber
Expectations Need to be Consistently Addressed. Additionally, GAO
closed all ten recommendations under the Cyber Analysis and Warning
report.
Protecting critical infrastructure against growing and evolving
cyber threats requires a layered approach. DHS is committed to ensuring
cyberspace is supported by a secure and resilient infrastructure that
enables open communication, innovation, and prosperity while protecting
privacy, confidentiality, and civil rights and civil liberties. The
Department has operational responsibilities for securing unclassified
Federal civilian government networks and working with owners and
operators of critical infrastructure to secure their networks through
cyber threat analysis, risk assessment, mitigation, and incident
response capabilities. DHS is also responsible for coordinating the
national response to significant cyber incidents and for creating and
maintaining a common operational picture for cyberspace across the
government.
In September 2012, DHS finalized the Strategic National Risk
Assessment (SNSRA) Report for Communications in coordination with
public and private sector partners and is currently working with
industry to develop plans for mitigating risks identified in the SNSRA,
which will determine the path forward in developing outcome-oriented
performance measures for cyber protection activities related to the
Nation's core and access communications networks. In addition, in
February 2013, the President issued Executive Order 13636 on Improving
Critical Infrastructure Cybersecurity as well as Presidential Policy
Directive 21 on Critical Infrastructure Security and Resilience, which
will strengthen the security and resilience of critical infrastructure
through an updated and overarching national framework that acknowledges
the increased role of cybersecurity in securing physical assets.
Executive Order 13636 expands the voluntary DHS Enhanced Cybersecurity
Service program, which promotes cyber threat information sharing
between government and the private sector. This engagement helps
critical infrastructure entities protect themselves against cyber
threats to the systems upon which so many Americans rely.
DHS actively collaborates with public and private sector partners
every day to improve the security and resilience of critical
infrastructure while responding to and mitigating the impacts of
attempted disruptions to the Nation's critical cyber and communications
networks and to reduce adverse impacts on critical network systems.
Such partnerships, combined with existing DHS critical infrastructure
cybersecurity programs, assure that DHS will have the relationships and
expertise to implement an oversight and compliance regime. Examples of
existing programs include the Cyber Information Sharing, and
Collaboration Program, which enables regular and trusted sharing of
actionable cybersecurity threat indicators that those owners and
operators can immediately use for computer network defense activities.
Additionally, DHS has long served as the Sector Specific Agency for
both the Information Technology and Communications sectors. This
trusted partnership has enabled further collaborative initiatives such
as the Information Technology Sector Risk Assessment, the Cybersecurity
Evaluation Program, which conducts voluntary cybersecurity assessments
across all critical infrastructure sectors, and the Critical
Infrastructure-Cyber Security program that leads efforts with public
and private sector partners to promote an assured and resilient U.S.
cyber infrastructure.
DHS also conducts daily operational, information sharing, incident
response, and technical assistance through the National Cybersecurity
and Communications Integration Center (NCCIC) and its components. Every
day, partners from private sector critical infrastructures, Information
Sharing and Analysis Centers, Federal cybersecurity centers, and
international governments collaborate on cybersecurity response and
information sharing through the NCCIC. DHS directly supports Federal
civilian departments and agencies in developing capabilities that will
improve their cybersecurity posture in accordance with the Federal
Information Security Management Act (FISMA). To protect Federal
civilian agency networks, our National Protection and Programs
Directorate (NPPD) is deploying technology to detect and block
intrusions through the National Cybersecurity Protection System and its
EINSTEIN protective capabilities, while providing guidance on what
agencies need to do to protect themselves and measuring implementation
of those efforts. Under current authorities though, DHS can only
monitor, recommend security posture improvements, and report on Federal
agencies' compliance with FISMA. As the GAO report notes, the current
law should be updated to give DHS the statutory authority it needs to
fulfill the responsibilities it has been given.
NPPD is also developing a Continuous Monitoring as a Service
(CMaaS) capability. Through an automated and continuously updated
analytical process, the deployed .gov agency sensors will provide data
to a centralized dashboard. Cyber risk related data will be updated and
displayed daily for management and technical staff review that will
provide insight into network vulnerabilities to more readily prioritize
for the purposes of ongoing mitigation. When combined, the overall
results from Departments and Agencies will contribute toward improving
the agency-specific, as well as the Federal Executive Branch overall
cyber risk posture. This capability will support compliance with
Administration policy, be consistent with guidelines set forth by the
National Institute of Standards and Technology (NIST), and enable
Federal agencies to move from compliance-driven risk management to
data-driven risk management. These activities will provide
organizations with information necessary to support risk response
decisions, security status information, and ongoing insight into
effectiveness of security controls.
DHS partnered with the General Services Administration (GSA) to
award a blanket purchase agreement (BPA) under which CDM tools and
services can be provided to government entities. The BPA, with an
anticipated $6-billion ceiling for the five years (one-year contract
with four one-year options), is open to all Federal civilian and
defense organizations, as well as state and local government entities.
The significant size of the CDM contract was designed to compatibly
support not only Federal civilian network protection assigned to DHS,
but the large body of cybersecurity requirements for any Federal custom
and cloud application over the life of the contract which are funded
separately by each department and agency.
Congress provided funding in the DHS Appropriations Act, 2013 (P.L.
113-6) to implement Continuous Diagnostics and Mitigation (CDM) across
civilian Executive Branch agencies in order increase our ability to
identify and track threats, find vulnerabilities, mitigate the worst
issues first and report on progress in doing so. CDM and FISMA
legislative reforms that provide clear statutory authorities for
carrying out the DHS mission would have the following benefits:
Improved security posture leading to improved regulatory
compliance
Standard security configurations across all Federal
Executive Branch civilian department and agency critical
network infrastructure
Improved communication and collaboration methods across
diverse stakeholder groups
Improved situational awareness creates synergy amongst the
Federal cybersecurity workforce and improves communication and
information sharing within the Federal enterprise
Increased efficiency and security posture through
collaboration and streamlining
In addition, DHS works with critical infrastructure stakeholders in
the private sector through the Industrial Control Systems Cyber
Emergency Response Team (ICS-CERT). These relationships are maintained
by ICS-CERT through cybersecurity incident analysis and onsite
assistance, training opportunities in control systems security
development, and the Industrial Control Systems Joint Working Group
(ICSJWG).
Question 3. The Executive Order focuses solely on government-to-
private-sector information sharing. Many believe, and I agree, that
better private-to-government and private-to-private information sharing
protocols need to be implemented, and I question how we can get there
without better liability protections. What is your plan to encourage
better private-to-government and private-to-private information
sharing? How will the Framework incentivize private sector partnership
without these carrots? Is it possible that private companies may
withhold participation in the Framework until such incentives are
provided through legislation?
Answer. While Executive Order (EO) 13636 on Critical Infrastructure
Cybersecurity works to increase information sharing from the government
to the private sector, the Department of Homeland Security (DHS) is
focused on expanding information sharing relationships both within the
government and among the private sector through adherence to three
goals:
Build trust and credibility among critical infrastructure
owners/operators;
Build sharing relationships where no sharing is currently
occurring; and
Incorporate individual owners/operators in the sharing
environment and align their cybersecurity and risk management
requirements with existing and emerging data flows being
developed or optimized.
For example, through the Cyber Information Sharing and
Collaboration Program (CISCP), DHS has entered into Cooperative
Research and Development Agreements with critical infrastructure owners
and operators that enable regular and trusted sharing of actionable
cybersecurity threat indicators that are immediately used for computer
network defense activities. Additionally, DHS has long served as the
Sector Specific Agency for both the Information Technology and
Communications sectors (as well as eight other sectors). This trusted
partnership with private sector and Federal partners has enabled
further collaborative initiatives such as the Information Technology
Sector Risk Assessment, the Cybersecurity Evaluation Program, which
conducts voluntary cybersecurity assessments across all critical
infrastructure sectors, and the Critical Infrastructure-Cyber Security
program that leads efforts with public and private sector partners to
promote an assured and resilient U.S. cyber infrastructure.
The Department also has established close working relationships
with industry through partnerships like the Protected Critical
Infrastructure Information (PCII) Program, which enhances voluntary
information sharing between infrastructure owners and operators and the
government. Furthermore, DHS conducts daily operational, information
sharing, incident response, and technical assistance through the
National Cybersecurity and Communications Integration Center (NCCIC)
and its components: the United States Computer Emergency Readiness
Team, the Industrial Control Systems Cyber Emergency Response Team, and
the National Coordinating Center for Communications. Presently, the DHS
Science and Technology Directorate (S&T) has ongoing or proposed
cooperative activities in the area of cyber security research and
development (R&D) to promote the benefits of networked technology
globally, and a secure, reliable, and interoperable cyberspace.
Information Sharing and Analysis Centers (ISACs) are key partners
in these efforts because they, along with similar not-for-profit and
commercial entities, are able to serve as trusted providers of data
from DHS to their members/customers and to other ISACs and like
organizations. In turn, they serve as aggregators as well as
anonymizers of their relevant member/customer cybersecurity threat data
and provide threat data back to one another without attribution to the
source of the data. DHS is supportive of and regularly coordinates with
these partners as one way to promote private to private information
sharing.
The key incentive for all participants in this type of data flow is
the potential for generating increased, actionable situational
awareness where the individual participants benefit from the
experiences of the whole. The ability to achieve visibility of threats
that are exploiting other sectors or organizations before that
particular threat or a variant of that threat manifests in your
networks or systems is a benefit available to all participants. We
currently have more than 35 companies, ISACs, and like organizations
who are participating in data sharing in this fashion, with more than
50 companies in negotiations to join that program effort, and we do not
feel we need to offer specific incentives to join in these types of
partnerships with the Government.
In response to the EO the DHS and the Departments of Commerce and
Treasury provided recommendations to the President, through the
Assistant to the President for Homeland Security and Counterterrorism
and the Assistant to the President for Economic Affairs, identifying
potential incentives that could be considered as we move forward in
this space. Since the agencies submitted their reports, the White House
has completed the interagency review process and determined a path
forward. Existing programs and authorities are currently under review
to determine how we and other Departments can enable more private-to-
private and private to government information sharing. As mentioned
previously, we have successful models with some ISACs and the CISCP and
are looking to expand on that basis and since Congress has previously
granted authorities that may be able to be utilized to provide
liability protection and address other legal concerns. We do know the
administration is looking at a package of incentives outside
information sharing for companies that adopt the framework; however,
private sector response to development efforts for the framework has
been largely positive, and we anticipate that many companies will adopt
it without an accompanying incentives package.
Question 4. As Secretary of Homeland Security, you were an advocate
for the administration's cybersecurity legislation. And last August,
when the U.S. Senate considered the Cybersecurity Act of 2012, you
urged its passage. I agree with statements you made last year on the
shared responsibility and urgency of improving cyber security. Do you
still agree that cyber security is a shared responsibility that
includes both the public and private sector? What is the role of the
Information Technology (IT) sector in this shared responsibility and
why did you support a carve-out for the IT sector?
Answer. Yes. Cybersecurity is a shared responsibility that includes
efforts from both the public and private sectors. Industry and the
government have a long history of working together to protect the
physical security of many critical assets that reside in private hands,
from airports and seaports to national broadcast systems and nuclear
power plants. There is no reason we cannot work together in the same
way through a shared responsibility to protect critical infrastructure
cyber systems upon which so much of our economic well-being, national
security, and daily lives depend.
The statement in EO 13636 regarding IT products and services
reflects our consistent philosophy that cybersecurity standards must be
technology neutral, and that the government should not dictate what IT
components critical infrastructure owners and operators use in their
systems. Furthermore, classifying any product or service as critical
infrastructure simply because it is used by critical infrastructure
would dilute our efforts to identify the entities whose incapacitation
by cyber incident could cause catastrophic economic or national
security consequences. We are closely engaged with the IT sector to
ensure that critical infrastructure owners and operators across all
sectors have the market choices to secure their systems.
Question 5. Without additional statutory authority and
congressional direction, the information sharing program is little more
than directing executive departments and agencies to expedite the
sharing of existing information. More importantly, the Executive order
focuses only on the sharing of information from the government to the
private sector. How do you intend to increase the sharing of
information from industry to the government, and within and among
industries?
Answer. Through the Critical Infrastructure Information Sharing,
Analysis, and Collaboration Program, DHS has entered into Cooperative
Research and Development Agreements with critical infrastructure owners
and operators that enable regular and trusted sharing of actionable
cybersecurity threat indicators that are immediately used for computer
network defense activities. Additionally, DHS has long served as the
Sector Specific Agency for both the Information Technology and
Communications sectors. This trusted partnership with private sector
and Federal partners has enabled further collaborative initiatives such
as the Information Technology Sector Risk Assessment, the Cybersecurity
Evaluation Program, which conducts voluntary cybersecurity assessments
across all critical infrastructure sectors, and the Critical
Infrastructure-Cyber Security program that leads efforts with public
and private sector partners to promote an assured and resilient U.S.
cyber infrastructure.
It is important to note that the Executive order directs Federal
agencies to work within current authorities and increase voluntary
cooperation with the private sector to provide better protection for
computer systems critical to our national and economic security. It
does not grant new regulatory authority or establish additional
incentives for participation in a voluntary program. We continue to
believe that a suite of legislation is necessary to implement the full
range of steps needed to build a strong public-private partnership, and
we will continue to work with Congress to achieve this.
The Department also has established close working relationships
with industry through partnerships like the Protected Critical
Infrastructure Information (PCII) Program, which enhances voluntary
information sharing between infrastructure owners and operators and the
government. Furthermore, DHS conducts daily operational, information
sharing, incident response, and technical assistance through the
National Cybersecurity and Communications Integration Center (NCCIC)
and its components: the United States Computer Emergency Readiness
Team, the Industrial Control Systems Cyber Emergency Response Team, and
the National Coordinating Center for Communications. Every day partners
from private sector critical infrastructures, Information Sharing and
Analysis Centers, Federal cybersecurity centers, and international
governments collaborate on cybersecurity response and information
sharing through the NCCIC. These activities take place voluntarily, and
in recognition of the fact that DHS' unique positioning as the hub for
cybersecurity and critical infrastructure security and resilience makes
it the most effective and trusted point of coordination and
collaboration for all of those stakeholders.
Additionally, the DHS Science and Technology Directorate (S&T) has
formalized 13 international bilateral agreements that allow for
cooperative activities in the area of cyber security research and
development (R&D) to promote the benefits of networked technology
globally, and a secure, reliable, and interoperable cyberspace.
Question 6. The definition of critical infrastructure in the
President's Executive Order (EO) is very broad: ``systems and assets,
whether physical or virtual, so vital to the U.S. that the incapacity
or destruction of such systems and assets would have a debilitating
impact on security, national economic security, national public health
or safety, or any combination of those matters.'' It is hard to imagine
any industrial sectors that would be excluded from such a definition.
How do you balance security with practicality in implementing this
definition?
Answer. The term ``critical infrastructure'' is statutorily defined
and this language has since been the basis for critical infrastructure
protection activities, including Executive Order (EO) 13636. The
Department of Homeland Security (DHS) has conducted broad engagement
with critical infrastructure owners and operators over the past ten
years that has enhanced the security and resilience of our Nation's
infrastructure.
Under Section 9 of EO 13636, the Department will identify a list of
critical infrastructure whose incapacitation from a cyber incident
would have catastrophic public health and safety, economic or national
security consequences. This is a higher threshold than debilitating
consequences and will focus on a small subset of U.S. infrastructure,
not entire sectors.
This is a criticality-based approach, and will result in limited
Federal resources being focused on critical infrastructure, the failure
of which would pose the greatest hazards.
Question 7. Section 10 of the Executive order directs all sector-
specific agencies to make the Framework mandatory for their respective
sectors of industry. Do you believe that the veiled threat of mandatory
standards with few, if any, strong incentives is the right formula for
a successful public-private partnership?
Answer. With today's physical and cyber infrastructure more
inextricably linked, critical infrastructure and emergency response
functions are inseparable from the information technology systems that
support them. The government's role in this effort is to share
information and encourage enhanced security and resilience, while
identifying and addressing gaps not filled by the market-place. While
some companies have strong cybersecurity policies in place, others
still need to implement improved cybersecurity practices. The framework
will be developed collaboratively with industry and will incorporate
existing international standards, practices, and procedures wherever
possible.
Section 10 of EO 13636 refers to ``Agencies with responsibility for
regulating the security of critical infrastructure,'' which in general
are not sector-specific agencies (SSAs). Not generally having
regulatory authority, the SSAs are better able than regulators to
engage in partnership with industrial sectors. Moreover, EO 13636 only
directs existing regulators under current authorities to examine ways
to increase their sector's cybersecurity; any mandatory participation
here would occur only where regulators already have the authority to
impose security requirements on their respected regulated entities. The
aim is not to compel across-the-board participation, even if such
authorities did exist. Even then, EO 13636 does not dictate a ``one-
size fits all'' approach, but rather promotes collaboration to
encourage innovation and recognize differing needs and challenges
within and among critical infrastructure sectors. Specifically, section
8(d) of the EO requires the Secretaries of Homeland Security, Treasury
and Commerce to each make recommendations on a set of incentives
designed to promote participation in the voluntary cybersecurity
framework. The Department of Homeland Security (DHS) is working
collaboratively with industry as well as staff from Treasury and
Commerce to further develop these recommendations, and the incentives
found in this report will also inform the larger nation-wide
conversation. While DHS can make recommendations, only Congress has the
authority to provide strong incentives and agree with or implement any
recommendations put forward from the three Incentives Reports.
______
Response to Written Questions Submitted by Hon. Ron Johnson to
Hon. Janet Napolitano
Question 1. The Government Accountability Office (GAO) issued a
report in February 2013 entitled, ``National Strategy, Roles, and
Responsibilities Need to be Better Defined and More Effectively
Implemented.'' In this report GAO found that only eight of 22 of
agencies were in compliance with risk management requirements under the
Federal Information Security Management (FISMA) standards in 2011, down
from 13 out of 24 in 2010. Yet the Federal Government reported 782
percent more cyber incidents to the U.S. Computer Emergency Readiness
Team in 2012 than it did in 2006. What is DHS doing to achieve greater
compliance with FISMA standards from Federal agencies? How does the
increase in cyber incidents against the Federal Government, combined
with the decrease in compliance of Federal agencies with FISMA, impact
the cybersecurity posture of the U.S. Government?
Answer. The Department of Homeland Security's (DHS) role in the
implementation of the Federal Information Security Management Act of
2002 (FISMA) is delineated by Office of Management and Budget (OMB)
guidance. Under current authorities, DHS can only monitor, recommend
security posture improvements, and report on Federal agencies'
compliance with FISMA. As the Government Accountability Office (GAO)
report notes, the current law should be updated to give DHS the
statutory authority it needs to fulfill the responsibilities it has
been given. The Administration's May 2011 legislative proposal to
Congress included provisions that would address this issue. The
Administration continues to support legislation that would update
Federal agency network security laws, and codify DHS's cybersecurity
responsibilities.
While FISMA did not envision the scope of today's emerging threats
and cybersecurity challenges, DHS is pursuing a number of initiatives
such as Continuous Diagnostics and Mitigation (CDM), Trusted Internet
Connections, and the Einstein programs to strengthen cyber security
defenses, visibility and situational awareness.
In collaboration with the National Security Staff (NSS) and OMB,
DHS uses its expanded CyberStat program to perform intense, focused
reviews with the 24 Chief Financial Officers Act agencies to identify
and mitigate challenges to agencies' FISMA implementation. This
includes a plan of action and milestones, submitted by the agencies and
accepted by NSS, OMB, and DHS, outlining the approach to correct
identified deficiencies.
Congress provided funding in the DHS Appropriations Act, 2013 (P.L.
113-6) to implement Continuous Diagnostics and Mitigation (CDM) across
civilian Executive Branch agencies in order to increase our ability to
identify and track threats, find vulnerabilities, mitigate issues and
report on progress. Earlier appropriations initiated other DHS security
programs.
DHS continues to encourage Congress to pursue legislation that
would result in:
Improved security posture leading to improved regulatory
compliance;
Standardized security configurations across critical
infrastructure;
Improved communication and collaboration methods across
diverse stakeholder groups;
Improved situational awareness, which creates synergy among
elements of the cybersecurity workforce; improves communication
and facilitates information sharing; and
Increased efficiency and security posture through
collaboration and streamlining.
Question 2. GAO found that DHS is not successfully detecting,
responding to, or mitigating cyber incidents. Specifically, GAO raised
concerns with how DHS shares information among Federal agencies and the
private sector. The DHS OIG recommended that DHS establish a
``consolidated, multiple-classification-level portal to share incident
response related information,'' but DHS will not have this portal ready
until 2018. How will not having this capability until 2018 impact DHS'
role in sharing cyber threat information, as directed in the Executive
order?
Answer. GAO-13-187 highlights important challenges facing Federal
agencies, including DHS, in executing the cyber mission. The report
also highlights the significant and important progress DHS and other
agencies have made in advancing this mission.
As a result of the progress DHS has made in information sharing and
analysis, GAO closed each of the 10 recommendations under its Cyber
Analysis and Warning report. Furthermore, DHS provided GAO with all
documentation requested to close the remaining recommendations under
GAO's report titled Key Private and Public Cyber Expectations Need to
be Consistently Addressed. The National Cybersecurity Protection
System's information-sharing and collaboration environment will address
the recommendation to establish a consolidated multi-classification
information-sharing capability. Funding for this activity is included
in the President's Fiscal Year 2013 budget request. While continuing
the development of a comprehensive information sharing capability is
important, DHS maintains existing capabilities that allow for
information exchange with private sector partners at the classified and
unclassified levels facilitating DHS' role in sharing cyber threat
information, as directed in the Executive order.
The delay in implementation may impact the frequency and timeliness
with which DHS is able to exchange classified cyber information with
partners. Processes leveraged as a workaround until the portal reaches
FOC may be cumbersome to analysts and reduce the amount of time
available to conduct strategic analysis across classified and
unclassified domains. As a result, partners may find other sources for
similar information, which could result in a decrease in their
willingness to engage in the Department's various information sharing
initiatives.
Existing NCPS Information Sharing capabilities will be improved and
new capabilities will be brought online as the Information Sharing
environment matures. The NCPS Information Sharing CONOPs identifies
multiple information sharing capabilities. A capability roadmap has
been developed that identifies dependencies and specifies how these
capabilities will be acquired and implemented. Initial Operating
Capability for this set of capabilities is targeted for FY 2015. Full
Operating Capability, which includes integration of capabilities and
automation of processes across multiple security fabrics, will occur in
FY 2018.
Question 3. GAO found that the Federal Government's strategy for
addressing international cyber security challenges is not sufficient or
outcome oriented. GAO also recommended that the White House
Cybersecurity Coordinator develop an overarching Federal cybersecurity
strategy. GAO indicates that such a strategy would hold Federal
agencies accountable for making improvements in their own house, and
would address international cybersecurity challenges. Do you agree with
the White House that an overarching Federal cybersecurity strategy is
unnecessary? Why or why not?
Answer. The Department of Homeland Security (DHS) executes a whole-
of-government and whole-of-nation approach to cybersecurity. In support
of this, DHS has aligned its cybersecurity goals, initiatives, and
objectives to be consistent with the Administration's priorities for
protecting our Nation's critical information infrastructure and
building a safer and more secure cyber ecosystem. For instance, DHS
worked closely with Federal departments and agencies in developing the
Blueprint for a Secure Cyber Future: The Cybersecurity Strategy for the
Homeland Security Enterprise (Blueprint). The Blueprint leverages the
Comprehensive National Cybersecurity Initiative, the President's 2010
National Security Strategy, the Department of Defense's Strategy for
Operating in Cyberspace, and the President's International Strategy for
Cyberspace. Together, these documents take a whole-of-government
approach and reinforce the need for holistic thinking about the many
opportunities and challenges the Nation faces in cyberspace.
Question 4. In Mr. Gallagher's testimony he pointed out the
difference between ``standards'' and ``regulations.'' Do you agree with
Mr. Gallagher that there is a difference between standards and
regulations?
Answer. Yes, the Department of Homeland Security agrees that there
is a difference between standards and regulations. Regulations are
mandatory and binding on regulated parties as required by a particular
authority. Executive Order (EO) 13636 does not give any Federal entity
new authority to impose regulations or mandates on critical
infrastructure owners and operators. One of the many goals of this EO
and Presidential Policy Directive 21 (PPD 21) is to better streamline
the government's interactions with critical infrastructure owners and
operators and state, local, tribal, and territorial partners.
The EO directs the National Institute of Standards and Technology
(NIST) to work with stakeholders to develop a voluntary framework for
reducing cyber risks to critical infrastructure. The Framework will be
created using standards, guidelines, and best practices that promote
the protection of information and information systems supporting
critical infrastructure operations. Standards are voluntary
recommendations established by consensus and are recognized by a
standardization body. NIST will ask stakeholders to identify existing
cybersecurity standards, guidelines, frameworks, and best practices
that are applicable to increase the security of critical infrastructure
sectors and other interested entities. Regulators of critical
infrastructure operations are encouraged to share their insight and
help identify existing standards already developed by industry through
consensus. Those activities would support the development of the
framework and prove useful in identifying any gaps in current practices
given the current and projected cyber risks. Entities that are
unregulated--or where regulators determine that they do not have the
ability under existing law to regulate for cybersecurity--will be
encouraged to voluntarily adopt the framework.
Question 5. Mr. Gallagher stated in his that any approach to
cybersecurity should not ``dictate solutions to industry, but rather
facilitate(s) industry coming together to develop solutions.'' Do you
agree that any approach to a Cybersecurity Framework should not
``dictate'' solutions to industry but rather ``facilitate industry
coming together to develop solutions?'' What potential disadvantage
would there be to government dictating a solution to industry rather
than facilitating it?
Answer. Yes, the Department agrees that any approach to the
Cybersecurity Framework should ``facilitate industry coming together to
develop solutions.''
The Framework will not dictate ``one-size fits all'' technological
solutions. Instead, it will promote a collaborative approach to
encourage innovation and recognize differing needs and challenges
within and among critical infrastructure sectors. The Government
believes that companies driving cybersecurity innovations can help
shape best practices across critical infrastructure, in part because of
the changing nature and dynamic of risk across cyber and critical
infrastructure. Companies looking to strengthen their security would
have the flexibility to decide how best to do so using innovative
products and services available in the marketplace and choosing which
components of the Framework would apply to their business. Companies
that are cyber leaders will be looked to as models for implementing
best practices and driving the creation and implementation of a
Cybersecurity Framework itself.
Question 6. GAO found that Federal cyber strategies lack clear
goals, performance measures, defined costs and resources, established
roles and responsibilities, and do not coordinate with other national
strategies. Yet the EO directs DHS to use a ``risk-based'' approach to
identify ``critical infrastructure'' within 150 days. The EO also
directs DHS to develop performance measures associated with the
Cybersecurity Framework NIST is charged with developing. If Federal
cyber strategies lack goals and performance measures, what experience
does it have to draw on to develop performance measures for the private
sector, as directed in the EO?
Answer. The Department's Blueprint for a Secure Cyber Future has
specific goals and performance measures associated with it. That said,
Section 7(d) of Executive Order (EO) 13636 directs the Department of
Homeland Security (DHS) to provide ``performance goals''--not
performance measures--in connection with the Cybersecurity Framework
that is being prepared by the National Institute of Standards and
Technology (NIST). Critical infrastructure owners and operators that
adopt the goals would then develop their own measures and targets since
each sector and sub-sector has unique characteristics and each owner/
operator is in the best position to tailor the performance goals to its
business model. Separately, NIST's Cybersecurity Framework will include
guidance for measuring the performance of an entity as it implements
the framework. NIST has considerable experience developing similar
guidance through its special publications, and the draft Framework is
being developed through extensive consultation with industry. Further,
they are able to influence the effort through their direct engagement
and input.
Question 7. Why do you believe Federal cyber strategies have failed
to include clear goals, performance measures, defined costs and
resources, established roles and responsibilities, and to coordinate
with other national strategies?
Answer. Legacy Federal cyber strategies were developed by different
agencies at different points in time. However, beginning with the
Comprehensive National Cybersecurity Initiative in 2008, which was
followed by the Administration's Cyberspace Policy Review in 2009,
Federal cyber strategies have increasingly been developed through
interagency processes and with the attributes identified above. For
example, DHS helped lead development of ``Trustworthy Cyberspace:
Strategic Plan for the Federal Cybersecurity Research and Development
Program.'' In another example, DHS's Blueprint for a Secure Cyber
Future contains goals against which the Department's cybersecurity
programs align performance measures, milestones, resources, roles and
responsibilities. Future year budget requests and performance measures
for emerging programs are developed in alignment with the Blueprint. In
addition to the Blueprint, the Administration's international cyber
strategy, and the Department of Defense's cybersecurity strategy
provide the architecture of ongoing initiatives upon which EO 13636 and
Presidential Policy Directive (PPD) 21 are being implemented. With the
issuance of EO 13636 and PPD-21, the Administration is providing an
opportunity for the Department, other Federal, state and local
agencies, and the private sector to discuss and prioritize
cybersecurity measures to improve critical infrastructure cybersecurity
and ensure overall critical infrastructure security and resilience.
These actions direct the Department to create performance goals,
consider resourcing, and work with and update national strategies,
which will also outline roles and responsibilities for these efforts.
______
Response to Written Question Submitted by Hon. Kelly Ayotte to
Hon. Patrick D. Gallagher
Question. I've recently read that some CIOs would have higher
comfort levels managing cyber security with cloud computing because
vendors such as Google and salesforce.com have vastly more resources to
protect against cyber threats than smaller companies do. Do you believe
and Executive Order or a cyber bill would limit a company's ability to
farm out their cyber security needs? Can you address in more detail
your thoughts on cloud computing as it relates to cybersecurity?
Answer. Cloud computing is a powerful option that, when implemented
correctly, allows businesses to use information technology services to
meet their business needs while protecting their assets. Cloud
computing can provide cybersecurity capabilities that organizations
might find more cost-effective and often allow more resources to
provide cybersecurity than the organizations might be able to provide
themselves. This is generally a measurement of each side's
cybersecurity capability, the services offered by the Cloud provider,
the cost to provide those services, and the level of needed assurance
and visibility of those services by the customer.
The Executive Order requires that ``the Cybersecurity Framework
will provide guidance that is technology neutral''. As such, the
Framework will not limit or put constraints on a company's ability to
use a Cloud service provider to meet their needs. The Framework will
not require or limit a specific architecture or implementation model.
Under its responsibilities in the Federal Information Security
Management Act (FISMA), NIST has published several public cybersecurity
guides and recommendations on the cybersecurity capabilities of cloud
technologies, as well as guidance on cybersecurity considerations when
using cloud service providers. NIST also works jointly with other
agencies in the Federal Risk and Authorization Management Program
(FedRAMP), a government-wide program that provides a standardized
approach to security assessment, authorization, and continuous
monitoring for cloud products and services.
More detailed information on the NIST work in cloud computing and
cybersecurity can be found at the below links:
www.fedramp.gov
www.nist.gov/itl/cloud/
http://www.nist.gov/itl/cloud/publications.cfm
______
Response to Written Question Submitted by Hon. Dan Coats to
Hon. Patrick D. Gallagher
Question. NIST is tasked with developing the framework outlined in
the EO, which I think is appropriate given NIST's technical expertise.
Does NIST have the capacity to develop this framework utilizing its
existing resources?
Answer. Yes. Given that NIST's philosophy is that industry should
lead the development of the Framework, NIST's role with the Framework
will be primarily to convene and provide technical expertise, instead
of developing new standards and solutions. This ``bottom-up'' approach
allows NIST to leverage existing resources, and is similar to its work
with industry to address national priorities in a range of topics,
ranging from smart grid and electronic health records to atomic clocks,
advanced nanomaterials, and computer chips.
Going forward, our process will continue to be an open one--using
an approach to enhance cybersecurity across the sectors through
industry consensus. NIST's process will be focused on developing the
Framework in such a manner that the standards and practices can apply
to the range of sectors, with a full range of operational and business
needs. That will allow for increased engagement and flexibility, both
for the standards and practices that comprise the framework and for the
evolving nature of the threat.
In addition to existing resources, in the Administration's FY14
Budget request NIST has an increase of $2M for cybersecurity standards
that will support the framework being developed under the Executive
Order on Improving Critical Infrastructure Cybersecurity.
______
Response to Written Questions Submitted by Hon. Ron Johnson to
Hon. Patrick D. Gallagher
Question 1. I was pleased to read in your testimony that the
Cybersecurity Framework NIST is charged with developing will be ``NIST-
coordinated and industry-led.'' How can we ensure that the best
practices and standards industry already has and is developing are
utilized in this Framework?
Answer. Through a request for information (RFI), NIST asked
stakeholders a series of questions about existing standards, practices,
and frameworks. NIST received 244 responses to the RFI including
responses from individuals, industry groups and associations (to show
consensus) and organizations (to be able to provide additional detail
on particular responses). NIST will also be hosting a series of
workshops to gather more information and develop the Framework, to
ensure that those existing standards and best practices are
incorporated, and where potential gaps might exist. The first will be
held at Carnegie Mellon Campus in Pittsburgh on May 29-31, followed by
additional workshops around the country on the weeks of July 15 and
September 9. The draft Framework will also be posted for another round
of comment by October 10. In between each workshop NIST will publically
present findings to ensure additional collaboration.
Question 2. What can be done to ensure that the voluntary program
DHS is charged with developing for participation in this Framework does
not turn into a mandatory regulatory structure?
Answer. The Executive Order (E.O. 13636--Improving Critical
Infrastructure Cybersecurity) states that the program established by
the Department of Homeland Security in coordination with Sector-
Specific Agencies shall be voluntary. NIST plans on discussing issues
relating to long-term public-private governance to ensure that the
framework stays flexible and effective in the dynamic environment of
threats and new technologies. The EO encourages voluntary participation
and adoption and provides for harmonization among existing regulatory
requirements.
Question 3. Your testimony states that any approach to
cybersecurity should not ``dictate solutions to industry, but rather
facilitate(s) industry coming together to develop solutions.'' Do you
believe that mandatory regulations in a future Cybersecurity Framework
equate to the government dictating a solution to industry?
Answer. Some sectors--but not all--of our most critical
infrastructure already fall under cybersecurity regulation. The RFI
issued by NIST asked a variety of questions about those regulated
sectors, to ensure that the Framework would be applicable for parts of
industry. In addition, the executive order itself calls for a review of
existing cybersecurity regulation. For those sectors, regulatory
agencies will use the Cybersecurity Framework to assess whether
existing requirements are sufficient to protect against cyber attack.
If existing regulations are insufficient or ineffective, then agencies
must propose new, cost-effective actions based upon the Cybersecurity
Framework. Regulatory agencies will use their existing process to
consult with their regulated companies to develop and propose any new
regulations, allowing for a collaborative process.
Question 4. You state in your testimony that standards are
``agreed-upon best practices against which we can benchmark
performance. Thus, these are NOT regulations.'' Can you tell us more
about the difference between standards and regulations? Why do you make
such a point of clarifying that standards are NOT regulations?
Answer. Standards are developed in a consensus process with
stakeholders and are voluntary. Technical regulations are set by an
authority and are mandatory. My testimony makes that distinction in
order to specify that the process under the Executive order will build
on the existing solutions that are already used throughout industry,
instead of generating regulations. The Executive Order specifies that
the Framework must meet the requirements of the National Institute of
Standards and Technology Act, as amended (15 U.S.C. 271 et seq.), the
National Technology Transfer and Advancement Act of 1995 (Public Law
104-113), and OMB Circular A-119, as revised--all laws and policy that
dictate how the Federal Government uses standards and participates in
standards development.
Question 5. What downside is there to turning industry standards
into mandatory regulations in a Cybersecurity Framework?
Answer. Having industry standards as a part of the Cybersecurity
Framework would not turn them into mandatory regulations. The
development of the Framework will be done in such a way to encourage
adoption of existing standards--focusing on practices that will enhance
the security of organizations that easily fit in their current business
practices. We expect the Framework to have tools that will satisfy
different regulatory and legal requirements with an ``implement once,
comply many'' mentality. This would lower regulatory compliance costs
while allowing organization to focus on risk management.
Question 6. Given your experience, how can the International
Organization for Standardization be leveraged to develop voluntary
standards for what will be deemed cyber critical infrastructure?
Answer. The International Organization for Standardization is one
of many industry led, consensus based, transparent Standards
Development Organizations (SDOs) that operation in a multinational
environment. This type of SDO is essential for large scale, global
adoption where both our critical infrastructures and those that supply
them with critical IT and equipment operate in a global market.
NIST will work with the stakeholders in a public-private
partnership on the development of the framework and will identify both
when and where the framework or components of the framework are ready
for further development as international standards.
______
Response to Written Questions Submitted by Hon. Amy Klobuchar to
David E. Kepler
Question 1. I think it's important to recognize the proactive steps
industry has undertaken to invest in cyber security and independently
develop programs and best practices to protect their networks,
operations and customers. Do you believe privately-held critical
infrastructure companies have a responsibility to secure themselves and
their customers from cyber threats to the maximum extent possible?
Answer. Yes, cybersecurity risk is important and should be managed
by all companies. Companies are limited by the amount of cyber
intelligence that government shares, quality and security of IT
products, and services provided by the telecommunication sector. These
should be an area of emphasis for any new cyber security legislation.
Question 2. I appreciate the efforts Dow and the American Chemistry
Council have made. Are other major critical infrastructure sectors and
companies making similar investments in implementing cyber security
procedures and promoting best practices among their employees?
Answer. We do not have direct exposure to the initiatives of other
sectors.
Question 3. Dow Chemical is, of course, a major company with
substantial resources to devote to this problem. Do all critical
infrastructure sectors and companies have the same level of resources
to devote to cyber security?
Answer. We are unable to comment on this.
Question 4. Do all critical infrastructure sectors and companies
share the same deep knowledge and appreciation of the seriousness of
cyber security threats as you and your company?
Answer. We have participated in some industry forums where other
sectors have shared their approach to address cyber security. It seems
to be an important risk for American companies.
Question 5. If not all critical infrastructure sectors and
companies share the same will and capability to address this threat,
does the Federal Government have a responsibility to do something to
direct or assist measures to protect that critical infrastructure?
Answer. We do support legislation that promotes information sharing
and provides liability protection. In addition to that, legislation
should address the accountability of IT and telecommunication suppliers
to produce secure products and be unified in providing services that
companies can rely on for threat response. Government, IT industry and
telecommunications are the backbone of the internet.
Question 6. Are there inter-sector efforts among private critical
infrastructure providers to help one another develop cyber security
procedures and best practices? It would seem that all sectors and
companies ought to be able to agree on some investments in this area
that are necessary and wise.
Answer. ACC has been promoting information sharing among chemical
companies and has defined cyber security expectations for companies
that are part of ACC and the Responsible Care program. We do not
actively collaborate with other sectors.
______
Response to Written Questions Submitted by Hon. Dan Coats to
David E. Kepler
Question 1. The EO, as I read it, focuses solely on government-to-
private-sector information sharing. My sense is that better private-to-
government and private-to-private information sharing protocols need to
be implemented, and I question how we can get there without better
liability protections. What would you need for better private-to-
government and private-to-private information sharing?
Answer. Experience would indicate that most of the critical
infrastructure sectors have good private-to-private information sharing
protocols that have been developed in their industry groups. However,
cross industry, regional and national private-to-private information
sharing could be improved. The following capabilities would help
improve information sharing:
A well-established protocol on how information will be
recorded and stored.
Clarity on which individuals can receive information.
Relief from liability for information sharing, provided a
proper management system is in place, and liability protection
for the private sector as a result of a cyber-attack, as
afforded under the Support Anti-terrorism by Fostering
Effective Technologies (SAFETY) Act of 2002.
Protocol on managing anti-trust and FOIA requests.
Question 2. Expertise in cybersecurity is a formula (expertise =
technical capability + cyber threat information). Where do you turn for
expertise now and how might that change under the President's Executive
Order? Do you feel private sector cybersecurity is lacking technical
capability or cyber threat information?
Answer. There has been significant investment in technical skills,
expertise and technologies in the chemical industry and at Dow,
specifically. We find this to be true in most large companies and
critical infrastructure industries. There has also been strong
engagement in standard setting. We benchmark and share information with
our industry, across industries, with government agencies and with IT
and security suppliers. It is not clear to us that this is changing
with the Executive order.
The one area we think the Executive order falls short is how it
will address the information technology community. Effective cyber
information sharing policy should be comprehensive in its coverage of
all relevant industry parties including the IT sector.
______
Response to Written Questions Submitted by Hon. Marco Rubio to
David E. Kepler
Question 1. The National Infrastructure Advisory Council (NIAC)
provides the President and Secretary Napolitano with advice on the
security of the critical infrastructure sectors and their information
systems. Based on your experience at the council, are you aware of
current programs or efforts that could be leveraged to combat cyber
threats, rather than setting up a completely new framework and set of
standards?
Answer. Cybersecurity policies were set back in 2003 for the
nation, with the National Strategy to Secure Cyberspace, and many
programs such as NIPP and CFATS in the chemical sector to address
cybersecurity. In addition, there are standards already in place that
industry is engaged in and implementing, such as ISO 27002 and ISA/IEC
62443 for industrial automation. We would encourage the Administration
to engage with industry sectors to build on the systems in place rather
than starting from scratch.
Question 2. Dow is one of the largest manufacturers of chemicals in
the world and a multinational corporation that has its own
cybersecurity standards and protections in place. Dow has also invested
significantly in its own infrastructure to combat cyber threats. Now
the Federal Government is setting up a framework with standards and
best practices. This is after there was legislation in the last
Congress that would have taken the role of government a step further.
As a company with cybersecurity protections in place, with a vested
interest in protecting your networks and assets, what do you feel is
the proper role of government with regards to cybersecurity?
Answer. The role of government is to set effective national
security policy. The focus of an Executive Order or legislation should
be:
Manage government networks according to its own standards.
Ensure that the information technology suppliers are working
with the communication suppliers and government to harden basic
Internet security.
Create an environment to safely share information between
the government and private sector.
Aggressive pursuit and prosecution of cyber criminals
(including international crime).
Question 3. Your testimony states that Dow has concerns with the
Executive order's current approach of a voluntary program for critical
infrastructure industries to adopt cybersecurity standards. Is there a
concern that government defined standards or selected standards could
miss the specific challenges faced by the chemical industry? Dow
operates in a dynamic environment and cyber threats are always changing
and take on different forms. Why it is important for the voluntary
standards to be flexible? Could a static government requirement inhibit
your ability to respond to threats?
Answer. The industry already works under standards and protocols,
such as ISO 27002 and ISA/IEC 62443 for industrial automation, as well
as the Responsible Care Security Code, that are not only voluntary but
are required to maintain membership in the American Chemistry Council.
There is a concern that there will be documentation and publication
of any industry or company within critical infrastructure if they
choose not to volunteer to a standard. There will be legitimate debate
on specific risks and why a variance should be applied or how it should
be applied. For example, cyber standards without imbedding and
understanding the physical standards and other mitigations do not show
the complete mitigation effort.
Effectively, setting pseudo regulations may stifle superior
cybersecurity systems by impeding quick response or system specific
security.
Question 4. There has been criticism in Congress directed at the
private sector for not doing enough to combat cyber threats. Yet the
GAO just found a disturbing trend that Federal agencies are failing to
comply with Federal Information Security Management standards, and that
DHS has not adequately met its responsibilities. Is Dow alarmed that
some of the very agencies that may require more of the company with
respect to cybersecurity have been found to be lacking in their own
cyber standards and practices?
Answer. Yes, a key point is that government should play a more
constructive role in setting an example of securing their own networks,
sharing information, as well as setting standards for the IT suppliers
to help them rather than revisiting critical infrastructure compliance.
______
Response to Written Questions Submitted by Hon. Ron Johnson to
David E. Kepler
Question 1. How is Dow Chemical, and the chemical industry in
general, currently hampered from sharing information among peers and
with the government?
Answer. We need legislation that covers liability protection for
sharing threat or attack information with the government and antitrust
relief to share with industry peers.
Question 2. How important is it to your industry for Congress to
pass information sharing legislation?
Answer. It is very important for the industry that government
shares more information on cyber security threats and best practices.
We fully rely on the government's capabilities. The private sector does
not have the resources or expertise to support cyber intelligence
activities.
Question 3. Would you prefer for Congress to attempt to pass a
comprehensive piece of cybersecurity legislation or to attempt to
address the low-hanging fruit in a piecemeal fashion?
Answer. We do support a ``piecemeal, low-hang fruit approach'' like
addressing information sharing. In addition to that, legislation should
address the accountability of IT and telecommunication suppliers to
produce secure products and be unified in providing services that
companies can rely on for threat response. Government, IT industry and
telecommunications are the backbone of the internet.
Question 4. Mr. Gallagher's testimony stated that any approach to
cybersecurity should not ``dictate solutions to industry, but rather
facilitate(s) industry coming together to develop solutions.'' Do you
believe that mandatory regulations would equate to the government
dictating a solution to industry?
Answer. Yes, the industry sector does not need prescriptive
solutions. All solutions should be risk-based considering the
characteristics and the dynamics of different industries. We agree that
any approach to cyber security should create an environment where
government, IT industry, the telecommunications sector and other
industries can collaborate to elevate the overall security of the
country.
Question 5. You stated in your testimony that Dow adheres to a set
of policies and standards from organizations including NIST and
established industry standards set forth by the International
Organization for Standardization (ISO). Given your experience, how can
the ISO be leveraged to develop voluntary standards for what will be
deemed cyber critical infrastructure?
Answer. We believe that companies, especially critical
infrastructure companies, should implement cyber security programs that
comply with accepted industry practices like ISO 27001. Some of the
companies are multinational, and ISO 27001 standards allow global
implementations.
______
Response to Written Questions Submitted by Hon. Ron Johnson to
Gregory C. Wilshusen
Question 1. The Government Accountability Office (GAO) issued a
report in February 2013 entitled, ``National Strategy, Roles, and
Responsibilities Need to be Better Defined and More Effectively
Implemented.'' In this report GAO found that only eight of 22 of
agencies were in compliance with risk management requirements under the
Federal Information Security Management (FISMA) standards in 2011, down
from 13 out of 24 in 2010. Yet the Federal Government reported 782
percent more cyber incidents to the U.S. Computer Emergency Readiness
Team in 2012 than it did in 2006. How does the increase in cyber
incidents against the Federal Government, combined with the decrease in
compliance of Federal agencies with FISMA, impact the cybersecurity
posture of the U.S. Government?
Answer. Threats to systems supporting critical infrastructure and
Federal operations are evolving and growing, and the increasing risks
are demonstrated by the dramatic increase in reports of security
incidents. However, several factors make it difficult to directly
correlate the number of reported incidents with the overall
cybersecurity posture of the U.S. Government. For example, according to
the United States computer emergency readiness team (US-CERT), the
growth in the total number of reported incidents is attributable, at
least in part, to agencies improving their detection and reporting of
security incidents on their networks. Further, having better detected
incidents, it is possible that agencies are also better implementing
appropriate responsive and preventative countermeasures. We have
ongoing work to assess agencies' incident response and handling
procedures. As we reported, agencies are still challenged in
implementing several aspects of their information security programs,
including risk management. To help address shortcomings in risk
management, the administration has set a cross-agency priority goal to
improve continuous monitoring. Continuous monitoring is the process of
maintaining an ongoing awareness of information security,
vulnerabilities, and threats to support organizational risk management
decisions. Federal agencies are to achieve 95 percent implementation of
a continuous monitoring program by 2014. According to the Office of
Management and Budget (OMB), in Fiscal Year 2011, implementation of
automated continuous monitoring capabilities rose from 56 percent of
total assets in Fiscal Year 2010 to 78 percent of total assets in
Fiscal Year 2011, although, as we reported, agency inspectors general
cited weaknesses in continuous monitoring at a number of agencies.
While the mixed results of agency FISMA implementation statistics do
not clearly indicate whether the government's cybersecurity posture is
deteriorating as a result of an increase in reported incidents, the
overall need for agencies to improve their cybersecurity programs is
clear.
Question 2. On February 12, 2013, the White House issued an
Executive Order (EO) entitled ``Improving Critical Infrastructure
Cybersecurity.'' In this EO, the White House directs the National
Institute for Standards and Technology to develop a Framework to reduce
cyber risks to critical infrastructure. At the March 7 hearing, Mr.
Gallagher stated that any such framework will be NIST-coordinated but
industry-led in order to draw on standards and best practices from
industry. He went on to say that any approach should not dictate
solutions to industry but rather facilitate industry identifying
solutions. How important is it for the development of the Cybersecurity
Framework to be ``industry-led?'' Why?
Answer. The Executive Order states that the Director of the
National Institute of Standards and Technology (NIST) will lead the
development of the Cybersecurity Framework, and the NIST Director is
accountable for publishing a final version of the framework by February
12, 2014. However, Mr. Gallagher, as noted, interpreted NIST's role to
be one of coordinating an industry-led effort. This interpretation is
consistent with the executive order's direction that the cybersecurity
framework incorporate voluntary consensus standards and industry best
practices to the fullest extent possible and employ a consultative
process whereby the advice of critical infrastructure owners, among
others, is considered. We believe the extent to which industry
participates in developing the framework will likely influence the
extent to which the framework is adopted by infrastructure owners and
operators and has a positive effect in enhancing the security of the
Nation's critical infrastructure.
Question 3. What are potential downfalls of having a solution be
dictated from the government to industry?
Answer. Collaboration and the use of a consultative process are
critical to the success of the effort to develop and facilitate
adoption of the Cybersecurity Framework by critical infrastructure
owners and operators. A solution dictated from the government to
industry could pose risks that burdensome implementation costs could be
imposed on industry, the technical aspects of the solution might be
less practical or effective than other options, and industry would be
reluctant to implement the framework. For these reasons, the standards-
setting process in the United States, as elsewhere in the world, relies
on principles of consensus, transparency, balance, due process, and
openness to ensure that any framework of standards is as inclusive as
possible.
Question 4. What issues, both generally and specifically, in your
view should Congress perform oversight of over the next year as this
Framework is developed?
Answer. The executive order specifies several activities that can
provide a basis for overseeing the development and implementation of
the framework. Within the next year, the emphasis will be on developing
the framework. Congress can focus on overseeing NIST's implementation
of the consultative process to ensure that industry is heavily
involved. This oversight could include reviewing the preliminary
version of the framework, which is due 240 days after the order was
issued. In addition, recommendations regarding a set of incentives for
promoting participation in the program are to be made within 120 days
of the order's issuance. Further, within 150 days, the Secretary of
Homeland Security is to identify critical infrastructure at greatest
risk, using a consultative approach. Congressional oversight can
include reviewing these activities to ensure that the requirements
specified in the order are met.
Question 5. GAO found that Federal cyber strategies lack clear
goals, performance measures, defined costs and resources, established
roles and responsibilities, and do not coordinate with other national
strategies. This failure to coordinate strategies raises concerns over
how effective the Administration can be in implementing the new
responsibilities laid out in the Executive order. The EO directs DHS to
use a ``risk-based'' approach to identify ``critical infrastructure''
within 150 days. The EO also directs DHS to develop performance
measures associated with the Cybersecurity Framework NIST is charged
with developing. If the government is having a hard time developing
performance measures for itself, how will this impact the government's
ability to develop performance measures for the private security? How
involved should industry be in this process?
Answer. Without a proven track record for developing performance
measures, the Federal Government will need to engage the private sector
to help develop private sector performance measures. While the
government has generally not included performance metrics in its
national strategy documents, it has developed metrics for measuring the
implementation of security controls by Federal agencies. For example,
the Department of Homeland Security (DHS) has developed the metrics
used in the Cyberscope reporting tool, which captures data on security
control implementation at agencies, although it generally did not
include a metric that addresses performance targets which would allow
agencies to track progress over time. Our report on information
security performance measures demonstrated that leading organizations
used compliance, effectiveness of controls, and program impact
performance metrics for monitoring their information security
posture.\1\
---------------------------------------------------------------------------
\1\ GAO, Information Security: Concerted Effort Needed to Improve
Federal Performance Measures, GAO-09-617 (Washington, D.C.: Sept. 14,
2009).
---------------------------------------------------------------------------
Developing useful performance measures for the private sector's
implementation of the Cybersecurity Framework, like the development of
the framework itself, relies on collaboration with the private sector.
Federal policy, including Presidential Policy Directive 21, Executive
Order 13636, and the National Infrastructure Protection Plan (NIPP),
establishes a cyber protection approach for the Nation's critical
infrastructure sectors that focuses on the development of public-
private partnerships. The NIPP sets forth a risk management framework
and details the roles and responsibilities of DHS, sector-specific
agencies, and other federal, state, regional, local, tribal,
territorial, and private sector partners, including how they should use
risk management principles to prioritize protection activities within
and across sectors.\2\ Further, the NIPP recommends that outcome-
oriented metrics be established that are specific and clear as to what
they are measuring, practical or feasible in that needed data are
available, built on objectively measureable data, and aligned with
sector priorities. Direct input from the private sector will be
critically important in ensuring that these criteria are met.
---------------------------------------------------------------------------
\2\ Presidential Policy Directive 21 directed the Secretary of
Homeland Security to update the National Infrastructure Protection Plan
by October 2013.
---------------------------------------------------------------------------
NEWSLETTER
|
Join the GlobalSecurity.org mailing list
|
|