Cybersecurity

OPM: CDM will offer baseline security

Shutterstock image (by GlebStock): hacker with graphic user interface.

The latest post mortem of the Office of Personnel Management data breach comes from OPM itself, and involves one of the government’s most touted cybersecurity programs: continuous diagnostics and mitigation.

When all of the security tools enabled by the CDM program are in place, “the government can really have a point in which we can say, yes, we have a firm understanding … everybody’s now on the same page, reporting the exact same thing. We can look at what vulnerabilities exist,” Jeff Wagner, OPM’s director of security operations, told reporters Aug. 19 after his appearance at an FCW-sponsored conference in Washington, D.C.

The CDM program, which is gradually being rolled out, offers a system of dashboards that give network managers a clearer view of vulnerabilities. But CDM’s backers say the program is not a panacea for thwarting big breaches of federal networks, but rather a helpful tool for discovering them.

When asked by FCW if, had all CDM security tools been in place, OPM would have been able to prevent the set of breaches that exposed the information of millions of current and former federal employees, Wagner noted that “access control” – a loss of credentials via a contractor – was a key to the attack. Once all of the CDM tools have been deployed, he said, government officials can outline additional measures to address access control. Security controls laid out by the National Institute of Standards and Technology and the Federal Information Security Management Act, Wagner added, “haven’t really changed a whole lot to encompass … years of change in technology.”

The CDM program, whose acquisition vehicle has a $6 billion ceiling, is divided into three phases. The first gives agencies tools to detect what devices are on their networks. The second phase is focusing on better identifying who is on those networks, with security products for identity management and network boundary protection in the offing. The third phase will delve further into boundary protection and tackle incident response.

The catastrophic breach of OPM, for which Director of National Intelligence James Clapper has named China as the leading suspect, triggered a maelstrom of outrage on Capitol Hill, including questions of what more tools federal IT managers need to combat unrelenting threats. Jim Quinn, lead system engineer for CDM at the Department of Homeland Security, told reporters that officials are considering accelerating the program’s timeline, potentially issuing task orders for Phase 3 next year. Quinn cautioned, however, that it would be unwise to rush deployment and that officials were weighing how best to balance speed and quality control.

For his part, Wagner praised officials at DHS and the General Services Administration for trying to speed up CDM deployment while saying the program can only go so fast. “Congress and everybody like to say: ‘Didn’t you do more?’… How much more can I do?” he said. “It’s one of those things in which, how fast can I go that doesn’t get me an IG [inspector general] flash audit?”

In a related initiative to bolster OPM’s cybersecurity, Wagner said he is in the process of hiring five experts whose job it will be to hunt for risky behavior, from sophisticated threats to sloppy cyber hygiene. One slot is filled, with four to go, Wagner said, adding that he is considering a mix of private-sector and government candidates.

About the Author

Sean Lyngaas is an FCW staff writer covering defense, cybersecurity and intelligence issues. Prior to joining FCW, he was a reporter and editor at Smart Grid Today, where he covered everything from cyber vulnerabilities in the U.S. electric grid to the national energy policies of Britain and Mexico. His reporting on a range of global issues has appeared in publications such as The Atlantic, The Economist, The Washington Diplomat and The Washington Post.

Lyngaas is an active member of the National Press Club, where he served as chairman of the Young Members Committee. He earned his M.A. in international affairs from The Fletcher School of Law and Diplomacy at Tufts University, and his B.A. in public policy from Duke University.

Click here for previous articles by Lyngaas, or connect with him on Twitter: @snlyngaas.


Featured

  • Telecommunications
    Stock photo ID: 658810513 By asharkyu

    GSA extends EIS deadline to 2023

    Agencies are getting up to three more years on existing telecom contracts before having to shift to the $50 billion Enterprise Infrastructure Solutions vehicle.

  • Workforce
    Shutterstock image ID: 569172169 By Zenzen

    OMB looks to retrain feds to fill cyber needs

    The federal government is taking steps to fill high-demand, skills-gap positions in tech by retraining employees already working within agencies without a cyber or IT background.

  • Acquisition
    GSA Headquarters (Photo by Rena Schild/Shutterstock)

    GSA to consolidate multiple award schedules

    The General Services Administration plans to consolidate dozens of its buying schedules across product areas including IT and services to reduce duplication.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.