NIST reports progress on cyber framework

power lines at sunset

The nation's critical infrastructure, including its power grid, is vulnerable to cyber attack. (Stock image)

The cybersecurity executive order President Barack Obama issued in February to fortify U.S. critical infrastructure is approaching a key benchmark, and officials note that while significant progress is being made, it remains an effort that will extend far beyond traditional deadlines.

Among the directives in the executive order was a measure for the National Institute of Standards and Technology to lead the development of cybersecurity framework within a roughly eight-month timeframe that would unify government expectations and requirements for public and private IT networks and systems. Since then, NIST has convened workshops involving both the public and private sectors, and key lessons are reportedly emerging.

"We're keenly aware and sensitive to the fact that we're more than halfway through the 240 days the president gave us, so we're working diligently with our partners at [the Homeland Security Department and White House], and the private sector," said Chuck Romine, director of NIST'S IT Laboratory. Romine, speaking June 12 in Washington, D.C., added that the cooperation is yielding best practices identifying standards that contribute to the overarching goals of the executive order.

Particularly important has been the involvement of the owners of privately run critical infrastructure, such as utilities, Romine said.

"The owners and operators of critical infrastructure really do understand the behavior of our infrastructure better than the federal government can, so working with them on voluntary standards is exactly the right way to go for raising the bar of the baseline of security for the nation's infrastructure," he said.

The development of voluntary standards is critical to federal cybersecurity, Rep. Gerry Connolly (R-Va.) added, highlighting that the time to act is now, before a potentially serious attack.

"If something terrible happens...the public reaction is going to be strong and federal action will be inevitable," Connolly said, noting disappointment that Congress so far has failed to pass cybersecurity legislation. "We won't be talking about voluntary standards."

Outside of regulatory and legislative efforts, other changes are underway -- particularly behind the scenes as some high-level cybersecurity heavyweights push for less-tangible transformation. Such changes mean the government must step away from the traditional border-defense view of security, according to Michael Daniel, White House cybersecurity coordinator.

"Ultimately we need to think about other models," Daniel said. "We could think of it in disaster management terms. Some of our government's main role there is to operate national weather center – they're able to integrate information from the private sector and government and where ever [information] is coming from. Not every storm in the physical world prompts a federal response....that kind of model could be useful to think about how to respond [in cyberspace]."

Another model for federal cybersecurity could be medicine, Daniel added.

"Thinking of it in a public health model approach, if you look at how malware spreads across the internet, it actually mimics the biological system," he said. "Thinking about it in terms of a medical approach... [such as] how much do you need to vaccinate to prevent it from spreading? Those models could be much more effective in how we think about what the federal government's global role and activities in cyberspace should be."

Elsewhere in Washington, NIST officials reported to Congress on the development of cybersecurity standards. In a Capitol Hill hearing on cyber spending, NIST Director Patrick Gallagher spoke to lawmakers about efforts under the executive order before much of the focus of the hearing shifted to National Security Agency surveillance activities.

About the Author

Amber Corrin is a former staff writer for FCW and Defense Systems.

FCW in Print

In the latest issue: Looking back on three decades of big stories in federal IT.


  • Anne Rung -- Commerce Department Photo

    Exit interview with Anne Rung

    The government's departing top acquisition official said she leaves behind a solid foundation on which to build more effective and efficient federal IT.

  • Charles Phalen

    Administration appoints first head of NBIB

    The National Background Investigations Bureau announced the appointment of its first director as the agency prepares to take over processing government background checks.

  • Sen. James Lankford (R-Okla.)

    Senator: Rigid hiring process pushes millennials from federal work

    Sen. James Lankford (R-Okla.) said agencies are missing out on younger workers because of the government's rigidity, particularly its protracted hiring process.

  • FCW @ 30 GPS

    FCW @ 30

    Since 1987, FCW has covered it all -- the major contracts, the disruptive technologies, the picayune scandals and the many, many people who make federal IT function. Here's a look back at six of the most significant stories.

  • Shutterstock image.

    A 'minibus' appropriations package could be in the cards

    A short-term funding bill is expected by Sept. 30 to keep the federal government operating through early December, but after that the options get more complicated.

  • Defense Secretary Ash Carter speaks at the TechCrunch Disrupt conference in San Francisco

    DOD launches new tech hub in Austin

    The DOD is opening a new Defense Innovation Unit Experimental office in Austin, Texas, while Congress debates legislation that could defund DIUx.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group