Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable 博客

订阅

Three U.S. Policy Recommendations to Strengthen OT Cybersecurity

Three U.S. Policy Recommendations to Strengthen OT Cybersecurity

A presidential advisory committee report outlined strategies to improve government asset visibility, procurement and information sharing to enhance operational technology (OT) cybersecurity practices.

On Aug. 23, 2022, the U.S. National Security Telecommunications Advisory Committee (NSTAC) approved a Report to the President, and I had the privilege of contributing to its development. The report focuses on the security challenges that arise from the convergence of information technology (IT) and operational technology (OT) for government departments, agencies and industrial or critical infrastructures.

The report identifies three key recommendations the administration can immediately implement for the United States to maintain a reliable, secure and resilient national communications posture.

1.Direct federal civilian agencies to inventory their OT assets

"The Cybersecurity and Infrastructure Security Agency (CISA) should issue a Binding Operational Directive (BOD) to require executive civilian branch departments and agencies to maintain a real-time, continuous inventory of all OT devices, software, systems and assets within their area of responsibility, including an understanding of any interconnectivity to other systems." (Draft NSTAC Report to the President, pp 1-2).

Briefings and discussions held by NSTAC revealed that many organizations lack visibility into their complete OT environments, including environments where IT and OT systems are converged. The BOD requirement will increase organizational visibility and allow federal agencies to make risk-informed decisions about how to prioritize their cybersecurity budgets to best protect the most crucial assets.

Simply put, you can't protect what you can't see. Visibility and understanding of the devices and data flows in your OT networks are imperatives. I can't count how many times I've been asked, "how big is the OT cybersecurity problem?" I have to answer, "we don't know." Once we get visibility into these mission-critical environments we can begin to understand the scale of the cybersecurity challenges and begin to systematically address the serious risk.

CISA has already taken steps to address this obstacle. On Oct. 3, 2022, CISA issued Binding Operational Directive (BOD) 23-01, which calls on federal civilian departments and agencies to "make measurable progress toward enhancing visibility into agency assets and vulnerabilities." The BOD explicitly states that it applies to both IT and OT networked assets. Two core activities to achieve this visibility are to discover which assets are on federal networks and enumerate the vulnerabilities of those assets.

Achieving this visibility is a significant step forward for federal departments and agencies to protect their critical IT and OT assets against evolving cybersecurity threats.

2.Develop enhanced OT-specific cybersecurity procurement language

"CISA should develop guidance on updating and enhancing IT/OT products and services procurement language to incentivize the inclusion of risk-informed cybersecurity capabilities within delivered products and services; this guidance should also help all organizations understand best practices for bolt-on security for OT devices that are much more difficult or expensive to replace."(Draft NSTAC Report to the President, p. 3).

In 2009, when I was the Director of the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) at the Department of Homeland Security (now part of CISA), the community— including DHS, Department of Energy (DOE) and SysAdmin, Audit, Network and Security (SANS)— worked together to produce procurement language guidance. The guidance helped asset owners specify that cybersecurity be built into products and projects rather than bolted on as an afterthought. The General Services Administration (GSA) and CISA should collaborate to update this language and tailor it specifically for federal procurements. Additionally, the guide can serve as a model for private sector owners and operators, in order to incentivize the inclusion of cybersecurity capabilities in their own OT systems acquisitions. Including cybersecurity in both government and private sector procurement vehicles will significantly enhance the resilience of critical infrastructure systems.

3.Implement standardized, technology-neutral, real-time, interoperable information sharing

"The National Security Council (NSC), CISA, and the Office of the National Cybersecurity Director (ONCD) should prioritize developing and implementing interoperable, technology-neutral, vendor-agnostic information sharing mechanisms to enable the real-time sharing of sensitive collective-defense information between authorized stakeholders involved with securing U.S. critical infrastructure. This should include breaking down the artificial barriers for sharing [controlled, unclassified information] both within the U.S. federal government and between the federal government and other key, cross-sector stakeholders." (Draft NSTAC Report to the President, p. 4).

To break the traditional siloed approach and promote collaboration across agencies, leadership from the ONCD and NSC is crucial to ensure a secure ecosystem.

Cross-agency collaboration is challenging. Each agency protects its sensitive information in different ways. For example, the DOE, CISA and the Transportation Security Agency (TSA) each has its own sensitive information platforms with distinct access requirements, taxonomies and protocols. However, cyberattacks often target multiple critical infrastructure sectors. Therefore, it is critical for these platforms to securely communicate with each other to get the right information to the right person, at the right time, regardless of industry and respective sector risk management agency. It's also vital that these platforms are standards-based and technology neutral, in order to leverage cyberthreat and vulnerability information from the broader critical infrastructure ecosystem.

These systems need to be automated and operate in real time. It is no longer good enough to share PDFs with indicators of compromise over secure email links. Attackers have the ability to move at machine speed to compromise multiple industrial sectors. Our defenses need to match this threat.

Moving Forward

NSTAC's goal is to provide the president recommendations on actions that can be taken at the federal level to help secure government and critical infrastructure networks. However, many of the recommendations included in the report are not exclusive to the U.S. federal government. They can also be applied by state, local, tribal and territorial (SLTT) governments, other global governments and commercial sector infrastructure owners and operators. The broader infrastructure ecosystem benefits when all stakeholders have stronger cyber defenses. Tenable looks forward to working with our government and industry customers and partners to implement these recommendations and help secure our crucial infrastructure.

了解详情:

相关文章

您是否易受最新漏洞利用的攻击?

输入您的电子邮件以在收件箱中接收最新的 Cyber Exposure 警报。

tenable.io

可全面访问基于云的现代化漏洞管理平台,从而以无可比拟的精确度发现并追踪所有资产。

Tenable.io Vulnerability Management 试用版还包括 Tenable Lumin、Tenable.io Web Application Scanning 和 Tenable.cs Cloud Security。

tenable.io 购买

可全面访问基于云的现代化漏洞管理平台,从而以无可比拟的精确度发现并追踪所有资产。 立即购买年度订阅。

65 项资产

选择您的订阅选项:

立即购买

免费试用 Nessus Professional

免费试用 7 天

Nessus® 是当今市场上功能最全面的漏洞扫描器。Nessus Professional 可帮助自动化漏洞扫描流程、节省合规周期的时间,并让您调动起 IT 团队的积极性。

购买 Nessus Professional

Nessus® 是当今市场上功能最全面的漏洞扫描器。Nessus Professional 可帮助自动化漏洞扫描流程、节省合规周期的时间,并让您调动起 IT 团队的积极性。

购买多年期许可,即享优惠价格添加高级支持功能,获取一年 365 天、一天 24 小时的电话、社区和聊天支持。

选择您的许可证

购买多年期许可,即享优惠价格

添加支持和培训

Tenable.io

可全面访问基于云的现代化漏洞管理平台,从而以无可比拟的精确度发现并追踪所有资产。

Tenable.io Vulnerability Management 试用版还包括 Tenable Lumin、Tenable.io Web Application Scanning 和 Tenable.cs Cloud Security。

Tenable.io 购买

可全面访问基于云的现代化漏洞管理平台,从而以无可比拟的精确度发现并追踪所有资产。 立即购买年度订阅。

65 项资产

选择您的订阅选项:

立即购买

试用 Tenable.io Web Application Scanning

完整享有专为现代化应用程序而设、属于 Tenable.io 平台组成部分的最新 Web 应用程序扫描功能。可安全扫描全部在线资产组合的漏洞,具有高度准确性,而且无需繁重的手动操作或中断关键的 Web 应用程序。 立即注册。

Tenable Web Application Scanning 试用版还包括 Tenable.io Vulnerability Management、Tenable Lumin 和 Tenable.cs Cloud Security。

购买 Tenable.io Web Application Scanning

可全面访问基于云的现代化漏洞管理平台,从而以无可比拟的精确度发现并追踪所有资产。 立即购买年度订阅。

5 个 FQDN

$3,578

立即购买

试用 Tenable.io Container Security

完整获得已集成至漏洞管理平台之唯一容器安全产品的功能。监控容器映像中的漏洞、恶意软件和策略违规。与持续集成和持续部署 (CI/CD) 系统进行整合,以支持 DevOps 实践、增强安全性并支持企业政策合规。

购买 Tenable.io Container Security

Tenable.io Container Security 经由与构建流程的集成,可供全面了解容器映像的安全性,包括漏洞、恶意软件和策略违规,借以无缝且安全地启用 DevOps 流程。

试用 Tenable Lumin

通过 Tenable Lumin 直观呈现及探索 Cyber Exposure,长期追踪风险降低状况,并比照同行业者进行基准度量。

Tenable Lumin 试用版还包括 Tenable.io Vulnerability Management、Tenable.io Web Application Scanning 和 Tenable.cs Cloud Security。

购买 Tenable Lumin

联系销售代表,了解 Lumin 如何帮助获取整个企业的洞见并管理网络安全风险。

试用 Tenable.cs

获取检测和修复云基础设施错误配置以及查看运行时漏洞的完全访问权限。立即注册,免费试用。

Tenable.cs Cloud Security 试用版还包括 Tenable.io Vulnerability Management、Tenable Lumin 和 Tenable.io Web Application Scanning。

联系销售代表购买 Tenable.cs

联系销售代表,了解有关 Tenable.cs 云安全的更多信息,并了解如何轻松加入您的云帐户,并在几分钟内获得云错误配置和漏洞的可见性。

免费试用 Nessus Expert

免费试用 7 天

Nessus Expert 针对现代攻击面而量身打造,可以查看更多信息,保护企业免遭从 IT 到云中漏洞的攻击。

已经有 Nessus Professional?
免费升级到 Nessus Expert 7 天。

购买 Nessus Expert

Nessus Expert 针对现代攻击面而量身打造,可以查看更多信息,保护企业免遭从 IT 到云中漏洞的攻击。

选择您的许可证

促销价格已延长到 2 月 28 日。
购买多年许可证,节省幅度更大。

添加支持和培训