Cyber security bill launches in Senate

Cyber security legislation that would update laws that govern how the federal government secures its information systems as well as help safeguard vital private networks that American society depends on hit the Senate last week.


ISSSourceCyber security legislation that would update laws that govern how the federal government secures its information systems as well as help safeguard vital private networks that American society depends on hit the Senate last week.

Five years in development, the Cybersecurity Act of 2012 is ready to go as threats against government and private IT systems intensify.

“Our nation’s vulnerabilities have already been demonstrated by the daily attempts by nation-states, cybercriminals and hackers to penetrate our systems,” Sen. Susan Collins, R-ME, one of the bill’s sponsors, said in a Senate speech. “The threat is not just to our national security, but also to our economic well-being.”

Collins, ranking member of the Senate Homeland Security and Governmental Affairs Committee joined Committee Chairman Joseph Lieberman, ID-CT; Senate Commerce Committee Chairman Jay Rockefeller, D-WV; and Intelligence Committee Chairwoman Diane Feinstein, D-CA, as chief sponsors of the bill.

The legislation would codify some of the authority the Obama administration has granted the Department of Homeland Security over federal civilian agency IT security and create the National Center for Cybersecurity and Communications within DHS, headed by a Senate-confirmed director, to coordinate federal efforts to battle cyber security threats facing the government and the nation’s critical information infrastructure, the mostly privately owned networks that control the flow of money, energy, food, transportation and other vital resources that the economy needs to function.

The bill would amend the Federal Information Security Management Act to require the government to develop a comprehensive acquisition risk management strategy, moving away from a culture of compliance to one of security by giving DHS the authority to streamline agency reporting requirements and reduce paperwork through continuous monitoring and risk assessment.

Penetration testing through red-team exercises would be an emphasis under the bill’s provisions as well as operational testing of systems to ensure agencies are aware of network vulnerabilities. The bill’s sponsors said the legislation would also ensure agencies make informed decisions when purchasing IT products and services by directing the Office of Management and Budget to develop security requirements and best practices for federal IT contracts.

One of the more contentious parts of the bill is one that would establish a mechanism in which the owners of the national information infrastructure would help develop cyber security standards that they would need to follow.

DHS would assess the risk and vulnerabilities of critical infrastructure systems that threaten the nation’s well-being to determine which networks must meet a set of risk-based security standards. Operators of these systems who believe their systems do not enjoy the proper designation could appeal DHS’s determination.

The bill calls for developing risk-based performance requirements, looking first to existing standards or industry practices. If a sector is sufficiently secure, there would be no need to develop new performance requirements. Under the bill, the owners of a covered system would determine how best to meet the performance requirements and then verify that it was meeting them. A third-party assessor could also verify compliance, or an owner could choose to self-certify compliance. Current industry regulators such as the Securities and Exchange Commission for the banking industry would continue their oversight.

No comments
The Engineers' Choice Awards highlight some of the best new control, instrumentation and automation products as chosen by...
The System Integrator Giants program lists the top 100 system integrators among companies listed in CFE Media's Global System Integrator Database.
The Engineering Leaders Under 40 program identifies and gives recognition to young engineers who...
This eGuide illustrates solutions, applications and benefits of machine vision systems.
Learn how to increase device reliability in harsh environments and decrease unplanned system downtime.
This eGuide contains a series of articles and videos that considers theoretical and practical; immediate needs and a look into the future.
Choosing controllers: PLCs, PACs, IPCs, DCS? What's best for your application?; Wireless trends; Design, integration; Manufacturing Day; Product Exclusive
Variable speed drives: Smooth, efficient, electrically quite motion control; Process control upgrades; Mobile intelligence; Product finalists: Vote now; Product Exclusives
Machine design tips: Pneumatic or electric; Software upgrades; Ethernet advantages; Additive manufacturing; Engineering Leaders; Product exclusives: PLC, HMI, IO
This article collection contains the 5 most referenced articles on improving the use of PID.
Learn how Industry 4.0 adds supply chain efficiency, optimizes pricing, improves quality, and more.

Find and connect with the most suitable service provider for your unique application. Start searching the Global System Integrator Database Now!

Cyber security cost-efficient for industrial control systems; Extracting full value from operational data; Managing cyber security risks
Drilling for Big Data: Managing the flow of information; Big data drilldown series: Challenge and opportunity; OT to IT: Creating a circle of improvement; Industry loses best workers, again
Pipeline vulnerabilities? Securing hydrocarbon transit; Predictive analytics hit the mainstream; Dirty pipelines decrease flow, production—pig your line; Ensuring pipeline physical and cyber security