Cyber security legislation that would update laws that govern how the federal government secures its information systems as well as help safeguard vital private networks that American society depends on hit the Senate last week.
Five years in development, the Cybersecurity Act of 2012 is ready to go as threats against government and private IT systems intensify.
White House: Congress Must Pass Cyber Laws
Cyber Crime Grows More Complex
Cyber Report: Life on Technology Edge
Cyber Security Month: DHS Eval Tool
White House Invests in Smart Grid, Security
“Our nation’s vulnerabilities have already been demonstrated by the daily attempts by nation-states, cybercriminals and hackers to penetrate our systems,” Sen. Susan Collins, R-ME, one of the bill’s sponsors, said in a Senate speech. “The threat is not just to our national security, but also to our economic well-being.”
Collins, ranking member of the Senate Homeland Security and Governmental Affairs Committee joined Committee Chairman Joseph Lieberman, ID-CT; Senate Commerce Committee Chairman Jay Rockefeller, D-WV; and Intelligence Committee Chairwoman Diane Feinstein, D-CA, as chief sponsors of the bill.
The legislation would codify some of the authority the Obama administration has granted the Department of Homeland Security over federal civilian agency IT security and create the National Center for Cybersecurity and Communications within DHS, headed by a Senate-confirmed director, to coordinate federal efforts to battle cyber security threats facing the government and the nation’s critical information infrastructure, the mostly privately owned networks that control the flow of money, energy, food, transportation and other vital resources that the economy needs to function.
The bill would amend the Federal Information Security Management Act to require the government to develop a comprehensive acquisition risk management strategy, moving away from a culture of compliance to one of security by giving DHS the authority to streamline agency reporting requirements and reduce paperwork through continuous monitoring and risk assessment.
Penetration testing through red-team exercises would be an emphasis under the bill’s provisions as well as operational testing of systems to ensure agencies are aware of network vulnerabilities. The bill’s sponsors said the legislation would also ensure agencies make informed decisions when purchasing IT products and services by directing the Office of Management and Budget to develop security requirements and best practices for federal IT contracts.
One of the more contentious parts of the bill is one that would establish a mechanism in which the owners of the national information infrastructure would help develop cyber security standards that they would need to follow.
DHS would assess the risk and vulnerabilities of critical infrastructure systems that threaten the nation’s well-being to determine which networks must meet a set of risk-based security standards. Operators of these systems who believe their systems do not enjoy the proper designation could appeal DHS’s determination.
The bill calls for developing risk-based performance requirements, looking first to existing standards or industry practices. If a sector is sufficiently secure, there would be no need to develop new performance requirements. Under the bill, the owners of a covered system would determine how best to meet the performance requirements and then verify that it was meeting them. A third-party assessor could also verify compliance, or an owner could choose to self-certify compliance. Current industry regulators such as the Securities and Exchange Commission for the banking industry would continue their oversight.