After countless headlines, government alerts, and warnings from experts, the message could not be any clearer: Cybersecurity events continue to grow in number and sophistication. As the number of threats grows, so does the boldness of cyber criminals. The White House released an Executive Order on Improving the Nation’s Cybersecurity that underscores the federal government’s laser-like focus on tackling cybersecurity issues.
The Executive Order aims to help federal government agencies:
- Remove barriers to sharing threat information
- Modernize federal cybersecurity
- Enhance software supply chain security
- Establish a cyber safety review board
- Standardize the government playbook for responding to vulnerabilities and incidents
- Improve detection of vulnerabilities and incidents on federal networks
- Improve the government’s investigative and remediation capabilities
The order urges agencies to move toward a Zero Trust Security Model, which requires continuous verification of the operational picture through real-time information from multiple sources to control technology access and other system responses.
Zero Trust is gaining usage in private industry to help thwart increasingly sophisticated attacks by eliminating implicit trust in any one element, node, or service. Federal agencies must step up their security games, complying with both existing and emerging regulations related to information security.
This guide offers a maturity matrix to help agencies determine the health of their IT security infrastructure and outlines infrastructure protection focus areas that can help proactively achieve and exceed compliance.
What is Your Level of Security Maturity?
Attaining compliance with federal security guidelines can often feel like boiling the ocean — a Herculean task. Any effort must start with an honest assessment of an organization, its IT team, and security protocols to discover the logical next steps to reach a higher maturity level. It’s important to evaluate the security maturity level of your federal agency to ensure you get maximum value from your efforts. The matrix below will help you determine what phase your organization falls into and recommended areas to focus your efforts.
| Early | Maturing | Mature | |
|---|---|---|---|
|
Team Attributes
|
• Small team, part of larger IT organization |
• Small- to mid-sized team |
• Large team |
|
Agency Attributes
|
• Limited security awareness from leaders |
• Security team developing influence
within agency |
• Risk awareness is pervasive |
|
Team Member Specialization
|
• Generalists managing IT and
security |
• Starting to specialize on areas of security (i.e., network-only security admin) |
• Specialists, highly skilled individuals in key roles (SIEM admin, pen testers, Red Teamers, etc.) |
| Early | Maturing | Mature | |
|---|---|---|---|
|
Types of Solutions in Place
|
• Firewall / Antivirus |
• Log management |
• Covering most if not all the Top-10 critical controls |
|
Retained Services
|
• Managed application security |
• MSSP |
• Cyber Maturity Assessment |
|
Recommended Areas of Focus
|
• Vulnerability Scanning |
Same as early +
• Penetration Testing Software |
Same as maturing +
• Adversary Simulation |
No matter where your federal agency falls on the table above, there will always be a need to proactively fine tune your security program to stay ahead of attackers. The following includes important considerations for each maturity level to help you pinpoint the next best step for your team.
Early: Vulnerability Management Best Practices
Security vulnerabilities are an endemic part of technology that the entire sector must constantly battle. According to the National Vulnerability Database (NVD), over 19,000 vulnerabilities were discovered in 2020, and over 20,000 were found in 2021. The goal of cybersecurity is no longer eradicating vulnerabilities but managing vulnerabilities effectively to minimize potential attack surfaces. Vulnerability management, which focuses on uncovering these security weaknesses, is critical for the creation of a sturdy foundation for any cybersecurity program.
For example, application developers commonly use Dynamic Application Security Testing (DAST) tools, like beSTORM, to perform black box fuzzing, which can uncover bugs through random data injection. They may also use Static Application Security Test (SAST) tools, like beSOURCE, to examine their application’s implementation (the source code). This analysis includes a full source code audit (also referred to as a code review). Agencies also need the right antivirus tools for their IT environments.
Many agencies run some combination of Windows, Linux, AIX, or IBM i. But most antivirus software solutions are designed just for Windows, which can leave other environments susceptible to worms and malware threats. Powertech Antivirus provides the only commercially available server-level antivirus solution, with native scanning for IBM Power OS Systems, including IBM i, AIX, Linux on Power, and LinuxOne.
Maturing: Penetration Testing Best Practices
Penetration tests use the same techniques as an attacker to uncover and safely exploit vulnerabilities to determine whether a threat actor could use a security weakness to successfully breach an environment or gain access to other parts of the system through privilege escalation or other means.
Pen tests measure the feasibility of systems or end-user compromise and evaluate any related consequences such incidents may have on the involved resources or operations. Once a penetration test has been completed, a report is created that details the level of risk vulnerabilities pose based on how effectively testers were able to exploit them.
These reports help to demonstrate the efficacy of defensive mechanisms and end-user adherence to security policies. Additionally, this gives federal agencies a path forward for remediation. Though they are often mistaken as synonymous processes, penetration tests and vulnerability scans have several marked differences.
Penetration testing builds on the work of vulnerability management, taking the next steps to evaluate the security of an IT environment and further prioritize risk.
Mature: Red Teaming Best Practices
Red Teaming is an offensive exercise that tests an organization’s defenses by fully simulating a cyber-attack scenario. The concept of Red Teaming traces its roots to military planning, as leaders realized there were circumstances not considered in the original planning that could jeopardize their success.
Confronting the intended approach with unpredictable events is now a recognized method of critical testing. Red Teams translate perfectly to the cybersecurity realm and are used to challenge the strength of cybersecurity programs, particularly their defensive assumptions.
Adopt a Layered Approach to Cybersecurity
While individual infrastructure protection solutions are valuable, they are even more effective when used in tandem. Together, they cover every layer of complexity to create a mature security program and ensure a federal organization can overcome cybersecurity challenges. For a security operations team to be successful, they must not only reduce the attack surface through preventative controls but be able to detect and respond to threat activity before serious impact is felt.
A proactive approach serves as the first line of defense, providing significant obstacles that make breaking in so labor intensive that the vast majority of attackers, who always look for the easiest wins, won’t even attempt it.
Ultimately, a well-rounded program of prevention, detection, and response separates federal agencies that are pushed around by threats from those that push back against threats.