Comment

How agencies can get in step with the cyber EO

gold shield on top of computer code 

At the end of August, reviews began on the organizational plans submitted by Federal cybersecurity stakeholders, in response to the May 11, 2017 Executive Order for Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure. 

A critical action within EO 13800 was for federal cybersecurity stakeholders to produce target profiles, based on the National Institute for Standards and Technology's Framework for Improving Critical Infrastructure Security, that identify their cybersecurity gaps and plans to mitigate those gaps. Essentially, map a path from cybersecurity "as is" to cybersecurity "to be."

Getting to the bottom of these areas is important from a policy standpoint. The order requires the Office of Management and Budget and the Department of Homeland Security to submit a plan to the President 60 days after agency self-evaluations. The plan must include a review of budget needs, which will be continually reassessed.

Both the gaps and the plans to mitigate those gaps are aligned with the security controls identified in NIST Special Publication 800-53. The path to the “to be” cybersecurity infrastructure in the target profiles is laid with stepping-stones aligned with the NIST 800-53 security control family.

There are three main ways agencies can mitigate gaps in their path of stepping-stones associated with access control, identification and authentication, and system and communications protection security controls. That’s by deploying these types of solutions:

  • Cryptographic key management and encryption applications. These solutions enable agencies to securely partition shared infrastructures and provide access controls through encryption.
  • High assurance authentication. Authentication solutions provide common assured (certificate-based) identities to access converged network and IT.
  • Cross-domain security. Cross-domain solutions facilitate information sharing across shared services and infrastructure.

Let's take a closer look at each. And if this starts sounding too technical -- don’t panic. It’s just an explanation of what kind of technologies an agency needs to ensure compliance, and how they’re used.

Cryptographic Key Management

Cryptographic key management solutions provide the access control and data security foundation to directly address security control gaps several NIST 800-53 controls:

  • Cryptographic Key Establishment and Management,
  • Public Key Infrastructure Certificates, and
  • Protection of Information at Rest

Cryptographic key managers can automate encryption applications for all areas of infrastructure: applications, cloud storage, databases, files, self-encrypting drives, and virtual machines. They also provide organizations deployment flexibility as enterprise implementation of hardware, virtual, and cloud-based appliances or small form factor for tactical or remote bandwidth constrained environments.

Additionally, hardware security modules provide the hardware root of trust and are the trust anchors for the organization’s key management and public key infrastructures. These key management and encryption technologies are used throughout the federal market.

High Assurance Authentication

High assurance authentication solutions provide the identification and authentication foundation for infrastructure access. These technologies directly address security control gaps, for:

  • Identification and Authentication,
  • Authenticator Management,
  • Cryptographic Module Authentication
  • Use of Information Assurance Products

High assurance authentication through PKI-based hardware authenticators (smart cards and tokens) binds the identity certificates established in stakeholder’s key management or public-key infrastructures to authorized individuals. The accompanying middleware enables stakeholder applications to use the authenticators for their organization and mission applications. These authenticators are commonly used throughout the federal government.

Cross-Domain Solutions

Cross-domain transfer systems provide the access control foundation for multi-domain information sharing. These technologies directly address security control gaps, for:

  • Access Enforcement,
  • Information Flow Enforcement,
  • Boundary Protection
  • Use of Information Assurance Products

Cross-domain transfer systems are based on multi-level security for information sharing and content filtering. The MLS-based systems control information flows and release of authorized information between security domains or other sensitive enclaves. Cross-domain transfer systems allow stakeholders adaptability, through APIs, to use different protocols and types of content for information sharing and manage their associated policies. These cross-domain systems are commonly used by defense and intelligence community organizations in the federal market.

The technologies outlined here won’t necessarily ensure that an agency will be immediately compliant with the cybersecurity executive order. But each of these addresses a concern that can make agency assessment easier, and can help establish a baseline budget for IT solutions that will make compliance and continuing re-evaluation much easier.

About the Author

Shawn Campbell is SafeNet Assured Technologies' director of product management.

Featured

  • Defense
    Ryan D. McCarthy being sworn in as Army Secretary Oct. 10, 2019. (Photo credit: Sgt. Dana Clarke/U.S. Army)

    Army wants to spend nearly $1B on cloud, data by 2025

    Army Secretary Ryan McCarthy said lack of funding or a potential delay in the JEDI cloud bid "strikes to the heart of our concern."

  • Congress
    Rep. Jim Langevin (D-R.I.) at the Hack the Capitol conference Sept. 20, 2018

    Jim Langevin's view from the Hill

    As chairman of of the Intelligence and Emerging Threats and Capabilities subcommittee of the House Armed Services Committe and a member of the House Homeland Security Committee, Rhode Island Democrat Jim Langevin is one of the most influential voices on cybersecurity in Congress.

Stay Connected

FCW INSIDER

Sign up for our newsletter.

I agree to this site's Privacy Policy.