FCWInsider

Blog archive

More encrypted data storage ahead for feds?

Castle Muiderslot, Holland

Castle Muiderslot in Muiden, Holland, and its moat. (Stock image)

It takes more than a moat to protect a castle, especially if it's made of data.

That's according to Mark Day, acting deputy assistant commissioner of Integrated Technology Services at GSA, who voiced a few interesting sound bites at an Aug. 22 IT procurement forum.

Day, fielding a question about cyber-security at the Lowering the Cost of Government with IT Summit in Washington, D.C., said current cyber efforts are not enough to protect sensitive data across the government.  He suggested all such data be encrypted unless it is in use.

Day referenced Army Pvt. Manning, recently sentenced to 35 years in prison for leaking classified documents to Wikileaks, and Edward Snowden, the National Security Agency contractor who divulged classified surveillance secrets to the Guardian and Washington Post newspapers. Both, he noted, were insiders – people against whom the large "moat" of on-premise cyber-security does little to defend.

"Insider threats have always been and will always be one of our primary issues – can you spell Snowden or Manning?" Day said. "If the moat didn't work, let's look at new models beyond the moat and a stack of paper."

Day questioned why data was ever unencrypted "except when it is used on screen," suggesting it be encrypted at all other times, including when it is essentially "at rest." He hinted there would be problems in such a scenario, though he did not divulge what they would be.

Ultimately, Day said existing cyber-security measures may help keep out the bad guys, but only if those bad guys aren't your guys.

"We're doing a lot of work to build moats," Day said.

And the moats aren't working.

Posted by Frank Konkel on Aug 23, 2013 at 11:36 AM


The Fed 100

Save the date for 28th annual Federal 100 Awards Gala.

Featured

  • Social network, census

    5 predictions for federal IT in 2017

    As the Trump team takes control, here's what the tech community can expect.

  • Rep. Gerald Connolly

    Connolly warns on workforce changes

    The ranking member of the House Oversight Committee's Government Operations panel warns that Congress will look to legislate changes to the federal workforce.

  • President Donald J. Trump delivers his inaugural address

    How will Trump lead on tech?

    The businessman turned reality star turned U.S. president clearly has mastered Twitter, but what will his administration mean for broader technology issues?

  • Login.gov moving ahead

    The bid to establish a single login for accessing government services is moving again on the last full day of the Obama presidency.

  • Shutterstock image (by Jirsak): customer care, relationship management, and leadership concept.

    Obama wraps up security clearance reforms

    In a last-minute executive order, President Obama institutes structural reforms to the security clearance process designed to create a more unified system across government agencies.

  • Shutterstock image: breached lock.

    What cyber can learn from counterterrorism

    The U.S. has to look at its experience in developing post-9/11 counterterrorism policies to inform efforts to formalize cybersecurity policies, says a senior official.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group