“We started seeing huge vulnerabilities,” Borg said Wednesday at the GovSec conference in Washington, where the draft document was released. Most of the systems were compliant with current security checklists and best practices. “And portions of those systems were extraordinarily secure. But they were Maginot Lines,” susceptible to being outflanked. The problem is that existing best practices are static lists based on outdated data. “We are way into diminishing returns on our investments in perimeter defense,” he said. “To deal with it now, you have to think of the problem of cybersecurity not from a technical standpoint, but by focusing on what the systems do, what you could do with them and what … the consequences [would] be.”
The list is based on real-world experience and on economic analysis of breaches. Surprisingly, the researchers found that simply shutting a system down is not the biggest threat in most areas of critical infrastructure. “Shutting things down for two or three days is not that costly,” Borg said. The larger threat is disruption of systems in ways that are not immediately evident.
“All of the things we are talking about are already under way,” Borg said, but some of the items in the checklist have no cost-effective commercial solutions. Borg said he hopes industry will step up to the plate to create solutions, and that government will adapt its acquisition policies to create incentives for these developments.
Borg said there is no schedule for final DHS approval of the draft. Additional information about the checklist is available from Borg at mailto:scott.borg@usccu.us.
http://www.gcn.com/online/vol1_no1/40564-1.html