https://www.captis.com/wp-content/uploads/2021/04/fb_image-1224.jpeg 619 1100 CAPTIS https://www.captis.com/wp-content/uploads/2021/01/captis_full_large.png CAPTIS2021-04-08 15:36:132021-04-08 15:53:48Federal watchdog investigating State Department cybersecurity practices
The Government Accountability Office “does have an ongoing audit of the State Department’s cybersecurity practices,” director for Information Technology and Cybersecurity Vijay A. D’Souza said, adding that he has been in contact with the department and is “optimistic” the investigation will be completed in a timely manner.
The investigation was launched in October 2020 at the request of lawmakers on the Senate Foreign Relations Committee.
In a March 30 letter to Keith Jones, the State Department’s chief information officer, D’Souza described the investigation as being focused on the department’s capacity for managing hacking risks and responding to and recovering from cybersecurity incidents. The letter, a copy of which was obtained by CNN, outlines how the GAO has struggled to obtain what it said were the necessary documents for conducting the assessment.
“While we have received some of the requested documents, in many cases, that production has taken over two months,” D’Souza wrote. “The delays by [the department] in providing the requested information are preventing our carrying out our work for the Congress in a timely manner.”
“The Department is aware of the recent GAO request and is working to respond,” a State Department spokesperson told CNN. Politico was first to report the GAO investigation.
The Biden administration has faced mounting pressure to respond quickly to the hacking risks posed by foreign adversaries, in the wake of high-profile incidents that widely affected the public and private sectors. In December, revelations of a sophisticated hacking campaign set off alarm bells across Washington. That campaign, which US officials later said was likely Russian in origin, compromised nine federal agencies and dozens of private companies through an unwitting software vendor, SolarWinds.
Weeks later, Microsoft said it found evidence of a far-reaching security vulnerability in its on-premises Exchange server software, which affected tens of thousands of systems around the world.
The twin incidents, though unrelated, have prompted a scramble within the US government to assess cybersecurity risks and to develop new policies designed to shore up the country’s cyber defenses. Within weeks, the Biden administration is expected to unveil an executive order that imposes new security requirements on US agencies, such as encryption mandates and the use of multi-factor authentication.
The administration is also expected to establish cybersecurity standards for federal software vendors and use the government’s immense procurement power to reshape the software market to prioritize network security, according to Anne Neuberger, deputy national security adviser and the White House’s top cyber official.
Speaking Wednesday at an event hosted by the Council on Foreign Relations, Neuberger said another idea the White House is considering is a kind of National Transportation Safety Board for cybersecurity. Such an organization could help review major information security incidents and to “make that commitment to say we will learn from each thing that occurs.”
Neuberger added the administration is preparing an initiative to harden the cybersecurity of industrial control systems that govern power, water and other critical infrastructure.
The coming push follows a high-profile attempted cyberattack in February against a water treatment plant in Florida. Though the attack was unsuccessful, it highlighted some of the weaknesses in America’s utilities infrastructure.
“We’re seeking to have visibility on those networks to detect anomalous cyber behavior and to block anomalous cyber behavior,” Neuberger said. “Today, we cannot trust those systems because we don’t have the visibility into those systems. And we need the visibility of those systems because of the significant consequences if they fail or if they degrade.”
This is not a CAPTIS article. Originally, it was published here.