News
CISA Outlines 3-Year Plan To Address Cybersecurity Issues
The plan encourages technology providers to ensure their products are secure at release.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday announced the publication of its "Strategic Plan" for the next three years.
The plan generally stressed taking a broad collaborative approach to address the current, as well as future, cybersecurity problems. While CISA advises federal government agencies, its plan extends to the software industry and "technology providers" more generally.
The implications for technology providers are most clearly expressed in the document's "Goal 3" section. Here, CISA reiterated its general exhortations that technology products need to be secure upon product release.
As a society, we can no longer accept a model where every technology product is vulnerable the moment it is released and where the overwhelming burden for security lies with individual organizations and users. Technology should be designed, developed, and tested to minimize the number of exploitable flaws before they are introduced to the market.
Technology providers need to "build security into products throughout their lifecycle, ship products with secure defaults, and foster radical transparency when known weaknesses are present in software, hardware, systems, and supply chains," the document added.
Goals for Technology Providers
CISA's document appears to lay out as steps for software and device makers to implement in its "Goal 3" section.
Per a "measurement of effectiveness" segment (p. 21), CISA wants technology providers to:
- Publish "detailed threat models" showing where product protections are needed.
- Attest that they are meeting the controls specified in NIST's Secure Software Development Framework (SSDF).
- Publicize that their product's common vulnerabilities and exposures (CVEs) "entries are correct and complete."
- Publish "secure-by-design" roadmaps, "including how the provider is making changes to their software development processes, measuring defect rates, and setting goals for improvement, and transitioning to memory-safe programming languages."
- Publish "security-relevant statistics and trends, such as MFA [multifactor authentication] adoption, use of unsafe legacy protocols, and the percentage of customers using unsupported product versions."
Voluntary Reporting, for Now
CISA's "Strategic Plan" document stressed "shared efforts" toward shoring up cybersecurity. CISA wants technology providers to publish security-relevant statistics so that it can take a "data-driven approach" toward identifying practices that are subject to attacks.
However, CISA also added that it will "take steps to advance transparency, including through adoption of Software Bills of Materials and rigorous vulnerability disclosure practices."
One effort to advance transparency is the Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA), which was passed last year by the Biden administration, per this CISA document. It currently encourages voluntary reporting by organizations about cybersecurity incidents, but it will be "supplemented by mandatory reporting" in future years. The mandatory reporting will take effect when a Final Rule is implemented. The timing for that implementation is vague as CISA must first issue a Notice of Proposed Rulemaking, according to the document.
CISA isn't planning to supplant or duplicate commercial cybersecurity capabilities, but it will provide capabilities for federal civilian executive branch agencies and resource-poor targeted organizations. It plans to assess cybersecurity generally using "commercial Attack Surface Management and similar capabilities."
CISA added that "only when no viable capabilities exist in the commercial market will we consider developing an in-house capability."
Top Vulnerabilities
Also this week, CISA announced publication of the "2022 Top Routinely Exploited Vulnerabilities," in conjunction with other international cybersecurity agencies. This publication has recommendations for "vendors, designers, developers, and end-user organizations" to implement, including SSDF and secure-by-design principles.
CISA's top 2022 list was based on the CVEs that were "routinely and frequently exploited by malicious cyber actors in 2022." It included vulnerabilities found in software by Fortinet, Microsoft, Zoho, Atlassian, VMware, F5 and more.
However, Microsoft appeared to be the vendor that was most frequently found to have its software vulnerabilities exploited in 2022, per CISA's list.
About the Author
Kurt Mackie is senior news producer for 1105 Media's Converge360 group.