DHS’ Cyber Threat Info Sharing Needs to Improve

Wednesday, November 29, 2017 @ 12:11 PM gHale


There is room for improvement in the Department of Homeland Security’s (DHS) efforts to share cyber threat information, a new report said.

The Cybersecurity Information Sharing Act (CISA) that passed in 2015 directed DHS to establish a voluntary process for sharing cyber threat information between federal and private sector entities.

RELATED STORIES
Framework Publishes for Cyber-Physical Systems
Smart Grid Interoperability Test
Utility Execs Fear Grid Attacks: Report
AI to Prevent Grid Failures

In a new report, the DHS Office of Inspector General (OIG) found while DHS has established a process for sharing cyber threat information between the federal government and the private sector, several improvements still need to occur.

In the nearly two years since CISA passed, DHS has developed some capability to share cyber threat information and defensive measures among the various federal, non-federal and private sector organizations. One key element in this capability has been DHS’s implementation of the Automated Indicator Sharing (AIS) program and supporting systems.

Despite progress on several fronts, the IG recommends the National Protection and Programs Directorate (NPPD) address the following needs to support further improvement in its information sharing capability:

Need for quality, not just quantity, of shared cyber threat information: The review found the NPPD emphasizes timeliness, speed, and volume of cyber information sharing, but current DHS systems do not provide the quality, contextual data needed to effectively defend against threats. The AIS cyber threat feed is produced through an automated process, with pre-determined data fields, so the information may not provide sufficient details to be actionable. Given AIS’ limitations, federal and private sector entities rely on other systems or participate in other DHS information sharing programs to obtain quality cyber threat data. According to an NPPD official, DHS plans to implement the next version of AIS, which could provide more quality information, by the fourth quarter of 2018.

Need for cross-domain capabilities and automated tools: The IG notes the National Cybersecurity and Communications Integration Center (NCCIC) does not have an effective cross-domain solution for sharing unclassified and classified cyber threat indicators and defensive measures with federal entities and the private sector. The NCCIC relies on separate unclassified and classified databases which are hosted separately and are not linked to each other for information sharing purposes. With no automated capability to process information from the classified repository to the unclassified database, analysts are unable to compile a complete situational awareness of potential threats. Further, the NCCIC also lacks automated tools needed to query multiple sources to analyze, synthesize and share information in a timely fashion. 

The IG concluded by acquiring a cross-domain solution, DHS can provide more detailed cyber information, improve the quality and usefulness of cyber threat reports, and correlate cyber threat indicators and defensive measures across its unclassified and classified environments. Additional automated analytical tools, data standards, and quality controls across NCCIC cyber threat databases would also help streamline vetting processes and ensure uniformity in data format.

Need for better outreach to federal and private entities: The audit found DHS can enhance its outreach to increase participation and usefulness of the AIS program among participant stakeholders. While the NCCIC and DHS’s Stakeholder Engagement and Cyber Infrastructure Resilience (SECIR) division were conducting outreach such as briefings and industry-sponsored events, efforts were inconsistent and DHS faced challenges in overcoming technical, resource, training, or cultural obstacles to AIS participation among both federal and private sector organizations. The IG concluded through enhanced AIS outreach, DHS can increase awareness and participation in AIS services, including increased bi-directional cyber threat indicator sharing across federal and private sector entities to improve the cyber posture across domains. 

Need for improved security controls for systems used for cyber information sharing: In addition to assessing DHS’s implementation of the Cybersecurity Act and identifying related challenges, the IG found NPPD can improve security controls for the unclassified and classified systems it uses to process and share cyber threat information. Specifically, auditors found NPPD had not implemented all required configuration settings and not applied security patches in a timely manner on workstations and servers deployed in the related Mission Operating Environment (MOE), both classified and unclassified, posing risks to the confidentiality, integrity, and availability of these systems, as well as the sensitive information that these systems store and process.



Leave a Reply

You must be logged in to post a comment.