Last summer, the White House took a significant step toward defining and coordinating a national response to the growing number of cyberattacks on government, businesses, and consumers—and it couldn’t have come at a better time.
Last July, the Obama Administration released Presidential Policy Directive-41 on U.S. Cyber Incident Coordination Policy, which outlines how the government responds to significant cyber incidents. The directive defines these as incidents “that either singularly or as part of a group of related incidents is likely to result in demonstrable harm to the national security interests, foreign relations, or economy of the United States or to the public confidence, civil liberties, or public health and safety of the American people.”
The directive introduces a five-point “incident severity schema” that ranks cyber incidents based on their potential impact and aims to ensure a common framework for assessing cyber incidents and the level of response required. Level 1 or 2 events are unlikely to have a significant public or widespread impact, while a level 3 or higher event would warrant a coordinated federal response effort because these events may involve the denial of an essential service or system, destruction or corruption of data, or physical damage.
Here’s a full breakdown of each schema:
Source: TheWhiteHouse.gov
In an effort towards better coordination, the document outlines how the government will work with affected private sector entities, state and tribal governments, and other nations. It calls for the creation of a Cyber Unified Coordination Group that includes private sector input into the development, prioritization, and execution of cyber incident response efforts.
Critics have said that prior directives had left businesses, government agencies, and other governments unsure of whom to contact in a cyber-incident. This update attempts to simplify the process by designating which federal agencies will take the lead on threat response, asset response, and intelligence support.
The FBI is the lead federal agency for investigating criminal and national security hacks. The Department of Homeland Security will help breached organizations reduce the impact of an event and prevent its spread. The Cyber Threat Intelligence Integration Center will pool intelligence to help identify who directed an intrusion or attack.
The directive, which had been in the works for at least two years, is seen as additive and builds on previous policy statements. It comes amid an avalanche of malicious cyber activity, demonstrating an increasingly complex and alarming threat to American institutions and commerce. Businesses, government agencies and tax payers alike are feeling the burden of recent breaches and their consequences.
And these are just a few examples of the devastating breaches that have occurred in the past few years. According to the Ponemon Institute, the average cost of a data breach in 2015 reached $2.2 million, and in the “2015 Data Breaches Report” by Gemalto Security, 707.5 million data records were compromised in 2015 and the numbers jump to almost 1.4 billion data records compromised in 2016.
The government’s directives are more than welcomed in the healthcare sector, which has been on the defense from past hacks, too. Medical data has high black-market value and is inviting to cybercriminals because it includes patient names, addresses, and social security numbers, policy numbers, diagnosis codes, and billing information. Cybercriminals apparently view these businesses as attractive victims because their cyber security postures can be easily compromised and are likely to pay ransom because their data is hyper-sensitive. Their infrastructure has to be airtight to protect data, as they are subject to intense regulation and possible fines under HIPAA.
Only time will tell how these guidelines will continue to affect our data security landscape. When an incident does occur, there are actionable steps that your organization can take.
Cyber incidents resulting in significant damage are of particular concern to federal agencies. The new policy directive encourages business victims of cyberattacks to report when cyber incidents may:
The policy directive also encourages victims of cyberattacks to report what sort of incident occurred, how and when the incident was initially detected, what response actions have already been taken, and who has been notified.
Businesses are directed to report cyberattacks to the FBI Field Office Cyber Task Forces, Internet Crime Complaint Center (IC3); National Cybersecurity and Communications Integration Center; or the United States Computer Emergency Readiness Team.
Additional Resources on this Topic
White House Cyber Directive: What Does It Mean and What’s Next?
New Presidential Policy Directive Details U.S. Cyber Incident Response
FACT SHEET: Cybersecurity National Action Plan
Photo Credit: Visual Content Flickr via Compfight cc
This post was first published on Onramp.
In this guest contribution from Steve Vonder Haar, Senior Analyst with Wainhouse, a Futurum Group…
In this guest contribution from Craig Durr, Senior Analyst with Wainhouse, a Futurum Group Company,…
Futurum's Daniel Newman dives into the recent announcement coming out of Micron, that they will…
Futurum analyst Michael Diamond recaps the Amazon Devices and Services event and reviews some of…
Futurum senior analyst Steven Dickens provides his take on the latest announcements coming out of…
Futurum’s Ron Westfall and Daniel Newman examine Micron’s financial results for the fourth quarter 2022…