COMMENTARY

NextGen protection: The new federal cybersecurity challenge

Partnerships between the U.S. government and America’s vibrant private sector have always been a key part of keeping the world safe, but the same independence that allows vendors and contractors to provide innovative new solutions also poses a risk to government data and programs.

As defense and federal civilian agencies empower their workforces to increase the speed of acquisition and deliver better, more innovative solutions -- a paradigm shift that Undersecretary of Defense for Acquisition and Sustainment Ellen Lord called “the most transformational acquisition policy change we’ve seen in decades” -- we must balance the promise of speed and innovation that it brings with critical advancement in program protection.

The federal government’s lack of full visibility and control over its vendors’ cybersecurity practices creates an inherent “trust but verify” framework for vendors entrusted with the most sensitive projects in aerospace and defense, vaccine development, nuclear energy and other sensitive areas. This is especially critical in the emerging fields of artificial intelligence and machine learning, where an increasing number of vendors find themselves delivering not completed parts or schematics, but lines of code and datasets that will power the next generation of defense and intelligence systems.

The introduction of the Defense Department’s Cybersecurity Maturity Model Certification and other cybersecurity standards acknowledges the importance of these vendors’ work. CMMC also attempts to nullify the unfortunate cyber mindset of “assume breach” that treats all applications, network and users as compromised. In order to be effective and comprehensive, a program protection model should start where an attacker would first begin to surveil a vendor in cyberspace: in its exposed internet presence, such as websites, file transfer services and remote access protocols. This is where all adversaries -- whether criminal hackers or nation-state actors -- start.

Based on extensive work with U.S. government and aerospace and defense clients, I believe that the primary cyber risks to vendors occur across three categories: adversarial access, perimeter hygiene and identity security.

Adversarial access

Assessing the risks associated with a vendor requires first assessing the degree to which an adversary may have physical or technical access to its systems. This access can take place via physical surveillance of infrastructure located in adversary countries -- both in vendor-owned premises and in low-cost, adversary country-run cloud providers. It can also take place via backdoors embedded in technology, as acknowledged by federal prohibitions against hardware made by Huawei, ZTE, Hikvision and others, and software made by Kaspersky. For example, the proscription against Kaspersky software in vendor networks derives from DOD and intelligence community concerns that adoption of Kaspersky would put give privileged access to vendors’ computers to a company that one former CIA officer said “could be, if it’s not already, under the control of Putin.”

Perimeter hygiene

The perimeter security of a vendor’s virtual presence is as important as securing the perimeter of its physical premises. As acknowledged by the CMMC’s inclusion of domains like “access control” and “asset management,” program offices and primes should have a robust view into the entirety of their vendors’ internet-facing assets and confidence in their control over access into those services. As further documented in the “risk management” and “security assessment” domains, vendor managers should also be assured that their vendors are consistently evaluating and making informed decisions on the risks present on their perimeter. The EternalBlue exploit and the WannaCry ransomware attacks that it powered -- an attack that was estimated to have caused almost $4 billion in damage -- were based on a perimeter security vulnerability in Microsoft’s SMB protocol.

Identity security

The final pillar of maintaining a trusted risk relationship with vendors is digital identity security. Digital certificates have long been the backbone of data security and integrity on the internet, but they are vulnerable to misconfiguration and insecurity due to neglect or a focus on expediency in setting up network standards. At best, neglecting certificates can foster bad cybersecurity practices in a vendor’s workforce; at worst, it can lead to actual cryptographic insecurities that could put the vendor’s or the government’s data at risk. Although the risk associated with these cryptographic insecurities requires an extremely sophisticated attacker to exploit, the public exposure of Flame malware provides one example of an attack that could be mounted by exploiting insecure cryptographic algorithms.

Monitoring and managing these three dimensions of risks across vendors is non-trivial, and it requires the capability to identify, analyze and operationalize large amounts of data in an appropriate time frame. Understanding of a vendor’s cyber risk posture requires identifying its entire perimeter -- not just its advertised and declared websites and services. Active or inactive development servers, undocumented network infrastructure and shadow IT from mergers and acquisitions or rogue employees can all provide points of access and/or potential data exfiltration from a vendor’s network.

Perimeter visibility becomes increasingly difficult as vendors -- particularly in high-tech industries -- migrate to more cloud-based or even cloud-native infrastructures. The constantly shifting network perimeter created in a cloud environment means programs and primes will need agile collection and analytic capabilities that scale and maintain visibility at a global level, regardless of vendor size.

Keeping an up-to-date, actionable picture of vendor cyber risk demands high-speed analysis and collection capabilities. Risk assessors and cybersecurity experts must be able to keep up with not only the changing nature of vendor networks, but also the ever-changing services and connections emerging from their network perimeter.

Finally, operationalizing this data requires program offices and primes to provide context and risk counseling across a large number of vendors. While a small number of risk factors, such as Kaspersky and 889(b)-banned equipment, are proscribed by law and regulations, most program protection offices and primes must rely on influence rather than authority to drive change in vendor cybersecurity processes.

About the Author

Matt Kraning is the co-founder and chief technology officer of Expanse.

Reader Comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above.

What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Washington Technology Daily

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.

Trending

contracts DB