Trustwave and Cybereason Merge to Form Global MDR Powerhouse for Unparalleled Cybersecurity Value. Learn More

Trustwave and Cybereason Merge to Form Global MDR Powerhouse for Unparalleled Cybersecurity Value. Learn More

Services
Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

Database Security

Prevent unauthorized access and exceed compliance requirements.

Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Solutions
BY TOPIC
Microsoft Security
Unlock the full power of Microsoft Security
Offensive Security
Solutions to maximize your security ROI
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Partners
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats

Executive Order on Improving the Nation’s Cybersecurity: One Year Later

In May 2021, President Joe Biden signed the 30 - page Executive Order (EO) on Improving the Nation’s Cybersecurity covering a host of cybersecurity issues. It mandates that Executive branch agencies deploy multifactor authentication, endpoint detection and response, and encryption.  It also describes how government agencies should evaluate the software they buy and calls for these agencies to adopt "zero trust" architectures and more secure cloud services.

Some of the Executive Order’s focused efforts include:

  • Mandating that executive branch federal agencies create "zero trust" environments
  • Addressing supply chain risks by implementing extensive new guidelines for how federal agencies must evaluate software needed for their IT infrastructures
  • Creating a “Cyber Incident Review Board" modeled on the National Transportation Safety Board. This organization will investigate cybersecurity incidents and make recommendations for improving security
  • Removing some of the contractual barriers that hamper the sharing of threat intelligence between government agencies, such as the FBI and CISA, and companies.

With implementation of the Executive Order well underway in the federal government, we sat down with Kevin Kerr, Lead Security Principal Consultant at Trustwave and former Chief Information Security Officer Oak Ridge National Laboratory, to take a look at the EO’s impact and progress to date.

  1. The Executive Order was signed by President Joe Biden just over a year ago, generally speaking has the order had a positive effect on the Federal government’s cybersecurity posture?

Kerr: The EO has brought around a refocusing of the cyber community. The EO has undertaken numerous initiatives many of which are meant to enable collaboration across the public and private sectors with respect to contracts with the government, incident response and reporting, software security, etc. This is all good. There is also a lot in the EO that requires the government to establish requirements that need to be developed and implemented, and this will take some time to come to fruition. Once this is completed there will significant additional work and changes will have to be made. While I am hopeful that this will move the needle forward, I am cautious because in 2012 the Continuous Diagnostics and Monitoring (CDM) program was kicked off and is still being worked through if that gives you any indication of the difficulties’ of implementing this type of ambitious program.   

This being said, a key point within the EO is Zero Trust. The main concept of Zero Trust, least privilege and know what is doing what to what (technically speaking), have been around for a long time; however, many organizations have struggled with this and have yet to fully implement it successfully. Specifically, federal agencies are redirecting their focus on explicit trust of identities and assets. 

Some parts have had moderate success with tools like multifactor authentication (MFA), but we must keep in mind that Zero Trust is not a tool, but a collection of concepts and ideas to enforce least privileged access for users, services, etc. only to what is needed. I have seen marginal improvements in organizations with large budgets and cyber staff. These are typically within organizations that have oversight from external organizations such as financial institutions and some government entities, and in cases where they may be life or safety concerns. I think many organizations are in and wait and see mode, so they do not have to things multiple times.

18899_cmmc-what-you-need-to-know

Q: From your perspective are Federal agencies moving along and making the changes required in the EO at a good pace, are they ahead of the game or behind?

Kerr: It is hard to say if the changes are taking place at a good pace, it really depends on your point of view. Federal agencies were given a deadline of 2024 (OMB Memorandum M-22-09) and getting the money for all this, changing architectural design of systems and networks, hardening the infrastructure, and getting the right people and processes in place to do all this by then will not be easy. In addition, the Cybersecurity and Infrastructure Security Agency (CISA) has to create all the governance around this quickly to allow organizations to manage towards a defined ‘end state.’

As long as bad actors can still do damage, many would say we are not ahead of the game but at least we are moving at good pace and in the right direction. Efforts taken by organizations associated with zero trust (e.g., MFA, architectural/information segmentation) and to enhance monitoring/detection/alerting/sharing to address the order have helped these organizations harden their environment. As such, attackers redirect their attacks to target softer environments. This redirection has increased attacks on the softer targets, (e.g., small businesses, shared resources) which in turn has increased the threat from the supply chain. Getting ahead of the game is a difficult task with today’s threat environment. It is all about managing the risk and where to apply limited resources.

Q: What are several of the most important steps that have been implemented so far as required by the EO?

Kerr: This question, at this time, is hard to answer since there are no required metrics currently in place by the Federal government of what specifically to do and how to verify and validate what is done. 

Personally, I have seen an increase in partnerships between the vendors and users to collaborate, share information, and work together to solve issues and start to reduce technology sprawl and establish some semblance of an ‘end state.’ 

Some new regulatory requirements are being implemented that in the long run will have a positive impact; however, today these requirements are coming through so fast the cybersecurity staffs are unable to properly processes them nor can the technology respond to the threats. This situation is causing unwanted redirection of limited resources especially when compared to the nation state threats and all the other miscreants that are attacking. 

Q: Are there any requirements that have not yet been completed that you feel are important and should be expedited in the coming months? Please name them.

Another key component to the EO was an increase in information sharing from the private sector to the federal government through updates to Federal Acquisition Regulation (FAR) and Defense Federal Acquisition Regulation Supplement (DFARS). Unfortunately, this is still behind especially when it comes to reporting incidents. In this vacuum, I have seen many states establish rules and regulations that lead to many different requirements that may create confusion. Another area that is lacking is the establishment of software requirements for defining critical software and software development frameworks. There are also some shortfalls when it comes to Internet of Things (IoT) in that these measures are still being developed and the ability to manage IoT and the converged environment of information technology (IT) and operational technology (OT)/IoT is not sufficiently robust or fully integrated in daily operations.

Q: Is the EO as it now stands sufficient to keep the federal government on the right track when it comes to cybersecurity or does it need to be updated in the near future? If so, what needs to be added to the EO?

Kerr: I think this is a good start and gives enough direction for action. I was glad to see that it did not tell the cyber community how to do things as that never really works and would have stifled creativity and workable solutions by those in the trenches. The cyber threats, risks, and impacts are in constant change and no document can keep up with it. We should constantly strive to improve beyond this. I think that some of the processes and organizations being established for sharing information will help everyone keep up with the constant changes of the threat landscape. 

About the Author

Kevin Kerr is Lead Security Principal Consultant at Trustwave for the Americas with over 39 years of public and private sector leadership experience with the U.S. Department of Energy and as CISO of Oak Ridge National Laboratory. Follow Kevin on LinkedIn.

ABOUT TRUSTWAVE

Trustwave is a globally recognized cybersecurity leader that reduces cyber risk and fortifies organizations against disruptive and damaging cyber threats. Our comprehensive offensive and defensive cybersecurity portfolio detects what others cannot, responds with greater speed and effectiveness, optimizes client investment, and improves security resilience. Learn more about us.

Latest Intelligence

Discover how our specialists can tailor a security program to fit the needs of
your organization.

Request a Demo