10.07.2015 Views

Kent Bressie and Madeleine Findley Analyze the Impact - Wiltshire ...

Kent Bressie and Madeleine Findley Analyze the Impact - Wiltshire ...

Kent Bressie and Madeleine Findley Analyze the Impact - Wiltshire ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

14fur<strong>the</strong>r underscoring <strong>the</strong>essentially m<strong>and</strong>atory nature of<strong>the</strong> program. Federal law alreadyrequires industry to providecybersecurity information to GSA<strong>and</strong> DOD. The Executive Order,however, is likely to increaseongoing reporting obligationsfor federal contracts <strong>and</strong> to createnew compliance risks. Theserequirements would apply tocapacity sales to U.S. Governmentagencies, including <strong>the</strong> DefenseInformation Systems Agency.• Disparate Burden onInfrastructure Owners. TheExecutive Order createsobligations regarding bothphysical <strong>and</strong> virtual or cyberinfrastructure, but excludesfrom its scope “commercialinformation technology productsor consumer informationtechnology services.” As aresult, <strong>the</strong> Executive Orderclearly reaches physical network<strong>and</strong> infrastructure providers,but may not clearly reachedge, application, <strong>and</strong> over<strong>the</strong>-topproviders. Underseacable owners <strong>and</strong> operatorsmay find <strong>the</strong>mselves subjectto additional regulatorycompliance requirements that donot apply equally to customersor end-users, <strong>and</strong> for which<strong>the</strong>y may be unable to recovercosts. The Executive Order thusmay complicate commercialarrangements between networkor physical infrastructureproviders <strong>and</strong> edge or over<strong>the</strong>-topproviders, <strong>and</strong> createambiguity about cybersecurityobligations <strong>and</strong> accountability.3. Initial Implementation Steps byNIST <strong>and</strong> DHSNIST began preparing forimplementation of <strong>the</strong> ExecutiveOrder <strong>and</strong> PPD long before <strong>the</strong> WhiteHouse issued final versions of thosedocuments, <strong>the</strong>reby underscoring <strong>the</strong>need for early industry engagement.On February 12, 2013, NIST <strong>and</strong>DHS entered into a Memor<strong>and</strong>um ofAgreement (“MOA”) that sets forth <strong>the</strong>ircollaboration plan for cybersecurityissues. Under <strong>the</strong> MOA, NIST agrees,among o<strong>the</strong>r things, to enable DHSparticipation in NIST-led engagementswith industry. DHS agrees to consultwith NIST on <strong>the</strong> metrics it intendsto use to measure <strong>the</strong> effectiveness ofcybersecurity programs.On February 26, 2013, NIST publishedin <strong>the</strong> Federal Register a Request forInformation (“RFI”) 4 to stakeholders,including critical infrastructureowners <strong>and</strong> operators, asking <strong>the</strong>m toshare: (1) current cybersecurity riskmanagement practices; (2) current useof existing cybersecurity st<strong>and</strong>ards<strong>and</strong> best practices; <strong>and</strong> (3) specificindustry practices concerning, amongo<strong>the</strong>r things, encryption <strong>and</strong> keymanagement, asset identification <strong>and</strong>management, <strong>and</strong> security engineeringpractices. Stakeholders may submitresponses to <strong>the</strong> RFI until April 8, 2013.4. Congressional InitiativesCongressional action on cybersecurityremains likely. In <strong>the</strong> immediate4. NIST, Developing a Framework to Improve Critical Infrastructure Cybersecurity,78 Fed. Reg. 13,024 (Feb. 26, 2013).

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!