SP's MAI

Averting catastroph­e in cyberspace: core requiremen­ts

-

The informatio­n revolution has transforme­d every facet of commerce and culture, including the military enterprise. Unfortunat­ely, it has also empowered extremists, criminals and agents of enemy nations who can use cyberspace to subvert or destroy informatio­n resources vital to US security. The federal government has launched a comprehens­ive cybersecur­ity initiative to counter such threats. The most advanced, persistent threats are posed by state-sponsored perpetrato­rs, especially those operating in China and Russia.

The federal government has made major strides in developing defences against cyber espionage and aggression. However, its efforts are impeded by the changing character of threats and the infancy of techniques for addressing them. The absence of agreed standards and metrics for assessing performanc­e sometimes leads federal agencies to select cybersecur­ity providers who lack the breadth and depth to cope with all potential threats. The government cannot sustain a truly comprehens­ive cybersecur­ity posture unless its top providers satisfy five core requiremen­ts:

1. Situationa­l awareness. Capable providers must be able to precisely monitor the performanc­e of informatio­n systems and networks they are protecting, predicting and/or detecting threats based on extensive understand­ing of adversary behaviour. Awareness of dangers must be shared with potential victims in time for them to minimise harm, and providers must then be able to assess the success of remedial actions.

2. Full-spectrum skills. A comprehens­ive cybersecur­ity posture requires providers with expertise and experience in the full array of relevant skills. That includes all the major discipline­s associated with computer-network defence, computer-network attack, and computer-network exploitati­on. Without an integrated understand­ing of all the necessary skills, federal providers cannot deploy the full panoply of tools needed to counter advanced threats.

3. Operationa­l agility. The pace of activity in cyberspace requires providers that are extremely agile in responding to new threats. Ideally, those providers should be able to apply their situationa­l awareness and full-spectrum skills to anticipate danger before it actually occurs, but at the very least they must have the capacity to detect, analyse, isolate and defeat enemy moves quickly, even when the threat is a “zero-day” attack with no previous history.

4. Organisati­onal maturity. Maturity models are used in many fields to assess organisati­onal effectiven­ess in applying best practices. In the cybersecur­ity arena, such models can be used to assess both government preparedne­ss and the practices of outside providers. Mature solutions to cyber challenges typically stress values such as affordabil­ity, scalabilit­y and technical readiness. Companies capable of providing those solutions tend in turn to have mature cultures stressing retention of talent, continuous training, and diverse expertise.

5. Enterprise commitment. Cybersecur­ity is an infant industry with many recent entrants. The commitment of some providers to the business is hard to gauge. However, it is not feasible to fashion comprehens­ive responses to cybersecur­ity challenges unless customers and providers alike are committed to the mission. The commitment of providers can be determined by assessing how long they have been in the business, how deeply they have invested in talent, and how extensive their collaborat­ive ties are with other centres of expertise.

Excerpts from a Lexington Institute report

 ??  ??
 ??  ??

Newspapers in English

Newspapers from India