The Hill

NIST takes center stage in cyber legislation

capitol dome

In the latest iteration of legislation aimed at strengthening defenses against cyber attacks, a leading role for the National Institute of Standards and Technology in protecting critical infrastructure would be formalized and reinforced, writing into law  what President Obama's executive order directed: NIST's charge to develop a comprehensive cybersecurity framework.

The measure, introduced July 24 by Senate Commerce, Science and Transportation Chairman Jay Rockefeller (D-W.Va.) and backed by ranking member John Thune (R-S.D.), also would include standards, guidelines and best practices for U.S. businesses, including those that oversee operation of critical infrastructure.

NIST's work on the cybersecurity framework already is under way, with an initial version due in October. For the past several months, NIST officials have convened meetings with industry and the general public that will underpin the framework, which relies heavily on private sector participation.


Read the bill

The bill also targets investment in research and development, public awareness and cybersecurity workforce improvement.

"I've always thought this was a great way to emphasize the critical need for a public-private approach when it comes to solving our most pressing cybersecurity issues," Rockefeller said in a statement. "NIST is a jewel of the federal government and it's the right organization to guide this very important work."

At a Commerce Committee hearing July 25, NIST Director Patrick Gallagher outlined some of the agency's background in government standards, technology and collaboration, as well as work done so far on federal cybersecurity efforts.

"There are two roles of NIST. One is the technical depth...that's so important in working with the private sector and remaining neutral," Gallagher said. "But the other role of NIST is coordination of standards in the sense that we're sort of the corporate memory in the government about how to work with the private sector on various standards-setting activities. And [another] role we have is a very natural collaboration role with other federal agencies, and that's been a key part of this effort."

In an effort to speed passage, Rockefeller and Thune left out of their bill a number of provisions that sank previous versions of cybersecurity legislation, including mandatory requirements for industry and incentivization. Rockefeller compared mandatory requirements to seatbelts, in that it's easy enough to develop them, much harder to gain support for requiring their use.

"The question of doing something about it [and] actually finding out the best standard and somehow adhering to that is not inconsequential," he said. "It's not part of what we're doing here, not a part of our bill, but it's something we have to keep in mind."

The bill also does not address formalized or systematic information-sharing between government and industry, but private-sector participation is crucial in both the legislation and NIST's forthcoming framework and ensuing operations.

"Industry leadership is so important because ... the know-how and the capacity are largely in industry, and embracing that is the best way to have an agile process that keeps up with this technology that's evolving very quickly," Gallagher said. "Having an industry-led process vastly increases the chances that the answer is compatible with business. Since the goal here is to put this into use, having a standard on the shelf is not going to help anyone. The more we can align these practices with good business practices, the types of risk management that companies do anyway, the better off this will work."

Gallagher outlined some of what to expect in the forthcoming framework, including a body of best practices emerging from extensive private-sector participation, and a second area with a set of agreed-upon gaps that remain to be addressed.

"The final framework will have a set of best practices and a roadmap for improvement. That's one of the reasons a framework process can't be a once-through," he said, because officials and participants need to be able to go back and see what remains to be improved on. "This can't work if there's not flexibility. The threat environment we're facing and the pace of technological change is [too] rapid and dynamic."

About the Author

Amber Corrin is a former staff writer for FCW and Defense Systems.

Rising Stars

Meet 21 early-career leaders who are doing great things in federal IT.


  • SEC Chairman Jay Clayton

    SEC owns up to 2016 breach

    A key database of financial information was breached in 2016, possibly in support of insider trading, said the Securities and Exchange Commission.

  • Image from

    DOD looks to get aggressive about cloud adoption

    Defense leaders and Congress are looking to encourage more aggressive cloud policies and prod reluctant agencies to embrace experimentation and risk-taking.

  • Shutterstock / Pictofigo

    The next big thing in IT procurement

    Steve Kelman talks to the agencies that have embraced tech demos in their acquisition efforts -- and urges others in government to give it a try.

  • broken lock

    DHS bans Kaspersky from federal systems

    The Department of Homeland Security banned the Russian cybersecurity company Kaspersky Lab’s products from federal agencies in a new binding operational directive.

  • man planning layoffs

    USDA looks to cut CIOs as part of reorg

    The Department of Agriculture is looking to cut down on the number of agency CIOs in the name of efficiency and better communication across mission areas.

  • What's next for agency cyber efforts?

    Ninety days after the Trump administration's executive order, FCW sat down with agency cyber leaders to discuss what’s changing.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group