Biden's cyber EO moves past the 'castle and moat' strategy

President Biden's May 2021 executive order on cybersecurity is pushing agencies to move past a castle and moat security posture. Here's what you need to know to drive that conversation.

With some deadlines already having arrived and others looming, the May 2021 “Executive Order on Improving the Nation’s Cybersecurity” has IT professionals taking a hard look at security measures ranging from Zero Trust to multi-factor authentication. For many agencies, however, the EO is not a call to action. Instead it offers support at the highest levels for agencies to continue creating the systems that will protect the federal infrastructure and its data – work that these agencies have been doing all along.

It also underscores a change in the federal sector from a “castle and moat” approach to cybersecurity to one in which cybersecurity is intended to work across agencies.

Last month, I was fortunate to take part in a panel discussion with security experts in some of the largest federal agencies. Questions shared with the panelists showed that issues like Zero Trust architecture and multi-factor authentication are nothing new for these experts.

When asked his opinion of whether agencies were able to adopt the Zero Trust architectures within the 60 day window provided by the EO, Paul Cunningham, the Veterans Administration Chief Information Security Officer, gave his colleagues the benefit of the doubt.

“I'm confident that all of the agencies have responded back in a timely manner,” Cunningham said. The EO, he noted, provides a “joining factor” across all federal agencies. The truth about agency performance in the Zero Trust aspect of the order will come out as agencies find ways to “share (information) collectively to improve our networks.”

For Steve Hernandez, chief information security officer at the U.S. Department of Education, the order has served to formalize work already being done across agencies, especially in areas such as multi-factor authentication.

“There has always been a considerable amount of conversation and push to make sure we're getting through and crossing the finish line with multi-factor,” Hernandez said. Noting that his agency reports on multi-factor authentication “every year,” Hernandez said the EO provides some additional incentive for agencies to continue down the road they’ve already taken.

“If you need that extra push to get over the finish line,” Hernandez said, that’s where the EO comes in.

He added, however, that the order’s emphasis on “low-impact systems” offers benefits that were not necessary considered when multi-factor authentication was focused on systems with “high asset value.” Having such protections on low-impact systems as well, offers “a better user experience, and adds more protection than the single sign-on methods typically employed in such systems, Hernandez said.

Asked about the importance of Zero Trust architecture, Hernandez acknowledged that there is in some cases a “disconnect between account provisioning, account maintenance, and account termination” and who has access to systems. “We need to pull back some of the rights,” he said. “With Zero Trust, we're going to see attribute security come into play,” with some roles being taken away and others added.

Improving authentication for “Internet of Things” devices is also increasingly important for federal networks, said Garo Nalbandian, acting CISO for the U.S. Nuclear Regulatory Commission. The “convergence” of personal and business devices that came about during the pandemic has increased cyber attack footprints. His agency has begun to “utilize micro zones to isolate IoT devices from the rest of the network” to address this new threat vector, Nalbandian said.

“We employ next generation firewalls,” he said, as well as “preventive measures to keep devices from getting access. I think collectively with our broader cyber training program, it helps us to protect us against malicious activity,” he explained.

The panel members in general agreed that the $1 billion allocated by Congress for the Technology Modernization Fund will be helpful in enabling federal agencies to meet the mandates of the EO. Cunningham noted that the funding puts to rest questions about how to continually implement solutions. Calling the move in Congress “absolutely brilliant,” he added that it “changes the way we discuss priorities.”

So how should that discussion move forward with agency leadership? I was asked to offer advice regarding cybersecurity protections for IT infrastructure and data security.

My main advice is to remember that security is a process, and it needs to be very purposeful. Agencies should not jump to a solution like the cloud because a vendor says it will solve a problem, unless that problem actually exists in the organization. There needs to be an analysis of areas of concern like Zero Day attacks and technologies such as Zero Trust access, and some implementations do need to be proactive.

Still, an analysis will provide an understanding of priorities. Which systems are critical to continuity? Which data systems are important, and where are they located? How do users access them? Until that type of analysis is done, it’s difficult to arrive at a solid solution.

Certainly, organizations need to start thinking proactively about Zero Day attacks, and acknowledge that a breach will happen. That means creating a plan on how to mitigate and recover from that type of attack, along with backup strategies and how to quickly reimage a system, should it be compromised.

Finally, security needs to be seen as an end-to-end issue. Organizations need to get away from security models that look only at choke points, where firewalls might block ingress and egress.

It’s time to throw out “moat and castle” security strategy, because the moat keeps changing. Security perimeters are getting fuzzy, with more people working from home, and data located not only on premise but in the cloud as well. It’s becoming nearly impossible to know where to put the moat – or even what the moat needs to be when defending the castle from attack.

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.