The EO claims to make a significant contribution towards modernizing cybersecurity defenses by protecting federal networks, improving information-sharing between the government and private sector and strengthening the nation’s ability to respond to incidents. Influenced by several high profile cyber incidents including the Colonial Pipeline and SolarWinds, the EO targets several cyber initiatives including:
Remove Barriers to Threat Information Sharing Between Government and the Private Sector.
The Executive Order ensures that IT Service Providers are able to share information with the government and requires them to share certain breach information.
Modernize and Implement Stronger Cybersecurity Standards in the Federal Government.
The EO helps move the Federal government to secure cloud services and a zero-trust architecture, and mandates deployment of multifactor authentication and encryption with a specific time period.
Improve Software Supply Chain Security.
The EO will improve the security of software by establishing baseline security standards for development of software sold to the government, including requiring developers to maintain greater visibility into their software and making security data publicly available.
Establish a Cybersecurity Safety Review Board.
The EO establishes a Cybersecurity Safety Review Board, co-chaired by government and private sector leads that may convene following a significant cyber incident to analyze what happened and make concrete recommendations for improving cybersecurity.
Create a Standard Playbook for Responding to Cyber Incidents.
The EO creates a standardized playbook and set of definitions for cyber incident response by federal departments and agencies. The playbook will ensure all Federal agencies meet a certain threshold and are prepared to take uniform steps to identify and mitigate a threat. The playbook will also provide the private sector with a template for its response efforts.
Improve Detection of Cybersecurity Incidents on Federal Government Networks.
The EO improves the ability to detect malicious cyber activity on federal networks by enabling a government-wide endpoint detection and response system and improved information sharing within the Federal government. The Federal government should lead in cybersecurity, and strong, Government-wide Endpoint Detection and Response (EDR) deployment coupled with robust intra-governmental information sharing are essential.
Improve Investigative and Remediation Capabilities.
The EO creates cybersecurity event log requirements for federal departments and agencies. Poor logging hampers an organization’s ability to detect intrusions, mitigate those in progress, and determine the extent of an incident after the fact.
While the consensus is that the intentions of the EO is in the right place, industry experts debate if good intentions will have an immediate impact on the rampant cybersecurity attacks impacting the federal and private sectors. It is important to remember that an EO are not statutes, rather formal documentation of policy directives and expressions of a president’s opinion – and without congress’s support, are not enforceable on the private sector.
The Schneider Downs cybersecurity practice consists of experts offering a comprehensive set of information technology security services, including penetration testing, intrusion prevention/detection review, ransomware security, vulnerability assessments and a robust digital forensics and incident response team. For more information, visit www.schneiderdowns.com/cybersecurity or contact the team at [email protected].
You’ve heard our thoughts… We’d like to hear yours
The Schneider Downs Our Thoughts On blog exists to create a dialogue on issues that are important to organizations and individuals. While we enjoy sharing our ideas and insights, we’re especially interested in what you may have to say. If you have a question or a comment about this article – or any article from the Our Thoughts On blog – we hope you’ll share it with us. After all, a dialogue is an exchange of ideas, and we’d like to hear from you. Email us at [email protected].
Material discussed is meant for informational purposes only, and it is not to be construed as investment, tax, or legal advice. Please note that individual situations can vary. Therefore, this information should be relied upon when coordinated with individual professional advice.