Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Data Breach
  • Last (Executive) Orders Please: Supply Chains, Policy and Modernising Cybersecurity
  • Critical Vulnerability
  • Data Breach
  • Vulnerabilities

Last (Executive) Orders Please: Supply Chains, Policy and Modernising Cybersecurity

5 years ago Tripwire Guest Authors
Last (Executive) Orders Please: Supply Chains, Policy and Modernising Cybersecurity

On May 12th, the President of the USA, Joe Biden, signed an Executive Order (EO) that would bolster the cyber defences of the USA. The EO is intended to protect against “increasingly sophisticated malicious cyber campaigns that threaten the public sector, the private sector, and ultimately the American people’s security and privacy.”

An EO is a written, signed, and published directive from the President that manages operations of the federal government, and although some EO’s require legislative approval, they effectively become law. It comes on the back of several high profile incidents involving Microsoft (Exchange), SolarWinds and the recent Colonial Pipeline incident. It is seen as a much-needed step to modernise and protect federal networks and improve information sharing between the private and US government.

The EO covers a range of topics, and not only are the UK Government considering something similar, but I believe these are key initiatives that we all should carefully consider and implement appropriately. 

Policy

When implementing Information security in the private or public sector, I believe it’s essential to set out your policy. Almost straight out of the gate, the EO from President Biden states that Cybersecurity requires more than government action and calls for a more collaborative approach (from the Private sector) in helping to protect the US from malicious attacks. This call for collaboration is critical. It demonstrates that the US recognises the importance of the private sector and its ability to adapt to the continuously changing threat environment and ensure its products are built and operate securely. 

It states that ‘Incremental improvements will not give [us] the security’ needed, which by inference means the White House recognises that change needs to happen and it needs to happen now. The Federal Government needs to lead by example if the Private sector is to take notice of these changes. I believe that the US Government should lead by example, but they must also be vocal about it if they want people to take notice and succeed in achieving their second objective.

Removing barriers to Sharing Threat Information  

The Federal Government relies heavily on the private sector to support national infrastructure, but how much collaboration and information sharing takes place? How much trust is there when the contracts in place penalise or restrict the free flow of information related to risks, threats, vulnerabilities or incidents, or contracts aren’t clear about the need for such data collection, storage and sharing?  

Modernising Federal Government Cybersecurity 

It is easy to see why the status quo is an acceptable stance in a highly complex environment, but in the increasingly data-driven and dynamic environment we all live in, this can no longer be accepted.  The EO calls for investment in cloud technology, zero-trust architecture, encryption and multi-factor authentication technologies. It states that the Federal Government must look at what the General Data Protection Regulation (GDPR) calls “State of the Art” technologies. 

This focus on modernising the approach to Cybersecurity will be key to protecting the public and private sector and identifying and responding to threats and vulnerabilities.  This is a focus all organisations should have; Not simply updating systems – but modernising the prevention and detection techniques and technologies we employ to increase our security.

Enhancing Software Supply Chain Security

As the saying goes; No man is an island. Just as the Federal Government bolsters its security, it needs to look closely at the security and integrity of “critical software” that it relies upon and performs functions critical to the government. Our reliance on third-party software should be a matter of continual scrutiny and assessment, as we place our trust in these organisations and their ability to support our business operations. This is why it is essential to carry out due diligence on companies you rely upon and ensure they carry appropriate certifications (such as ISO27001, PCI DSS or SOC).

Establishing a Cyber Safety Review Board

An incredibly important aspect of any security programme is leadership. In the EO, President Biden sets out the need to establish a Cyber Safety Review Board, reviewing and assessing cyber incidents, threat activity, vulnerabilities, mitigation activities, and agency responses. 

All too often, we see organisations (public and private) trying to implement security programmes with no clear ownership or input from across the organisation.  It is great to see that the EO outlines the need for federal officials and representatives from the private sector.  When establishing our security programmes, we should also consider involving third parties who can understand both internal and external risks and issues we might face.

Improving Detection of Cybersecurity Vulnerabilities and Incidents on Federal Government Networks.

The EO states that ‘The Federal Government shall employ all appropriate resources and authorities to maximise the early detection of cybersecurity vulnerabilities and incidents on its networks.’ This assessment of vulnerabilities begins with recognising that we are all potentially vulnerable. Therefore we must find these areas of weakness so that they can be effectively addressed. Deploying Endpoint Detection and Response (EDR) tools, such as those within the Tripwire Enterprise solution, or Managed Detection and Response (MDR) technologies and techniques must be considered when looking to improve our overall response to vulnerabilities and incidents.  If we don’t have these tools or processes in place internally, we need to consider outsourcing and bringing in these skills.

Improving the Federal Government’s Investigative and Remediation Capabilities.  

Networks and systems can tell us a lot about what is going on, if we care to look. But I’m often surprised at how little, organisations will monitor and review their log files for suspicious events or activity. But with the EO in place, President Biden is stating that it is a requirement that information from network and system logs on Federal Information Systems is collected and reviewed.

When implementing security programmes, we should be asking what network logging and monitoring tools are available to facilitate better investigations and remediations of breaches that may occur.

Conclusion

The EO from President Biden is a great step forward and is much needed, and although there is more that could be done, and there are things missing, it is a positive move.  But from defining policy and securing a leadership framework to improving risk identification, modernising systems, and looking at the supply chain, these wouldn’t look out of place in an Information Security Management System. Meaning this Executive Order is a great step forward, and although it isn’t calling ‘last orders’ on security incidents, it is something we should raise a glass to.


About the Author: Gary Hibberd is the ‘The Professor of Communicating Cyber’ at Cyberfort and is a Cybersecurity and Data Protection specialist with 35 years in IT. He is a published author, regular blogger, and international speaker on everything from the Dark Web to Cybercrime and Cyber Psychology.

You can follow Gary on Twitter here: @AgenciGary

Editor’s Note: The opinions expressed in this guest author article are solely those of the contributor, and do not necessarily reflect those of Tripwire, Inc.

The post ” Last (Executive) Orders Please: Supply Chains, Policy and Modernising Cybersecurity” appeared first on TripWire

Source:TripWire – Tripwire Guest Authors

Tags: Cloud, Compliance, Critical Severity, Encryption, Finance, Goverment, High Severity, Medium Severity, Microsoft, Privacy, TripWire

Continue Reading

Previous What’s Next for REvil’s Victims? 
Next US and Global Allies Accuse China of Massive Microsoft Exchange Attack

More Stories

  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery

12 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk

13 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities

15 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

How Samsung Knox Helps Stop Your Network Security Breach

17 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

19 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Data Breach
  • Vulnerabilities

Claude Opus 4.6 Finds 500+ High-Severity Flaws Across Major Open-Source Libraries

21 hours ago [email protected] (The Hacker News)

Recent Posts

  • China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery
  • CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk
  • Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities
  • How Samsung Knox Helps Stop Your Network Security Breach
  • Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT