Critical Infrastructure Protection: Comments on the Proposed Cyber Security Information Act of 2000 (Testimony, 06/22/2000, GAO/T-AIMD-00-229). Pursuant to a congressional request, GAO discussed the proposed Cyber Security Information Act of 2000 (H.R. 4246), focusing on how it can enhance critical infrastructure protection and the formidable challenges involved with achieving the goals of the bill. GAO noted that: (1) by removing key barriers that are precluding private industry from sharing information about infrastructure threats and vulnerabilities, H.R. 4246 can help build the meaningful private-public partnerships that are integral to protecting critical infrastructure assets; (2) however, to successfully engage the private sector, the federal government itself must be a model of good information security; (3) currently, it is not; (4) significant computer security weaknesses--ranging from poor controls over access to sensitive systems and data, to poor control over software development and changes, to nonexistent or weak continuity of service plans--pervade virtually every major agency; (5) and, as illustrated by the recent ILOVEYOU computer virus, mechanisms already in place to facilitate information sharing among federal agencies about impeding threats and vulnerabilities have not been working effectively; and (6) moreover, the federal government may not yet have the right tools for identifying, analyzing, coordinating, and disseminating the type of information that H.R. 4246 envisions collecting from the private sector. --------------------------- Indexing Terms ----------------------------- REPORTNUM: T-AIMD-00-229 TITLE: Critical Infrastructure Protection: Comments on the Proposed Cyber Security Information Act of 2000 DATE: 06/22/2000 SUBJECT: Computer security Information systems Data collection Internal controls Proposed legislation Joint ventures Interagency relations Private sector Information resources management IDENTIFIER: ILOVEYOU Computer Virus Y2K NIST Federal Computer Incident Response Capability Program ****************************************************************** ** This file contains an ASCII representation of the text of a ** ** GAO Testimony. ** ** ** ** No attempt has been made to display graphic images, although ** ** figure captions are reproduced. Tables are included, but ** ** may not resemble those in the printed version. ** ** ** ** Please see the PDF (Portable Document Format) file, when ** ** available, for a complete electronic file of the printed ** ** document's contents. ** ** ** ****************************************************************** GAO/T-AIMD-00-229 * For Release on Delivery Expected at 10 a.m. Thursday, June 22, 2000 GAO/T-AIMD-00-229 critical infrastructure protection Comments on the Proposed Cyber Security Information Act of 2000 Statement of Joel C. Willemssen Director, Civil Agencies Information Systems Accounting and Information Management Division Testimony Before the Subcommittee on Government Management, Information and Technology, Committee on Government Reform, House of Representatives United States General Accounting Office GAO Mr. Chairman and Members of the Subcommittee: I am pleased to be here today to discuss the proposed Cyber Security Information Act of 2000 (H.R. 4246), which is intended to remove barriers to information sharing between government and private industry in order to better address threats to the nation's critical infrastructure. The concern over cyber threats is well placed. While the explosive growth in interconnectivity has contributed immeasurably to the nation's economy and well being, it also presents significant risks to our nation's computer systems and to the critical operations and infrastructures they support, including telecommunications, finance, power distribution, emergency services, law enforcement, national defense, and other government services. Accordingly, government officials are increasingly concerned about attacks from individuals and groups with malicious intentions, such as terrorists and nations engaging in information warfare. Nevertheless, because the federal government does not own all of our nation's critical infrastructures, it is limited in what it can do to protect these assets, and solutions must be tailored sector by sector, through partnerships with sector representatives that address threats, vulnerabilities, and possible response strategies. Today, I will discuss how H.R. 4246 can enhance critical infrastructure protection and the formidable challenges involved with achieving the goals of the bill. In short, by removing key barriers that are precluding private industry from sharing information about infrastructure threats and vulnerabilities, H.R. 4246 can help build the meaningful private-public partnerships that are integral to protecting critical infrastructure assets. However, to successfully engage the private sector, the federal government itself must be a model of good information security. Currently, it is not. Significant computer security weaknesses-ranging from poor controls over access to sensitive systems and data, to poor control over software development and changes, to nonexistent or weak continuity of service plans-pervade virtually every major agency. And, as illustrated by the recent ILOVEYOU computer virus, mechanisms already in place to facilitate information sharing among federal agencies about impending threats and vulnerabilities have not been working effectively. Moreover, the federal government may not yet have the right tools for identifying, analyzing, coordinating, and disseminating the type of information that H.R. 4246 envisions collecting from the private sector. Concerns About Risks to Our Critical Infrastructure Are Growing Before discussing the specifics of H.R. 4246, I would like to provide an overview of the risks of severe disruption facing our nation's critical infrastructure and the steps being taking to address these risks. In particular, the explosive growth in computer interconnectivity over the past 10 years has significantly increased the risk that vulnerabilities exploited within one system will affect other connected systems. Massive computer networks now provide pathways among systems that if not properly secured, can be used to gain unauthorized access to data and operations from remote locations. While the threats or sources of these problems can include natural disasters, such as earthquakes, and system-induced problems, such as the Year 2000 (Y2K) date conversion problem, government officials are increasingly concerned about attacks from individuals and groups with malicious intentions, such as terrorists and nations engaging in information warfare. The resulting damage can vary, depending on the threat. Critical operations can be disrupted or otherwise sabotaged, sensitive data can be read and copied, and data or processes can be tampered with. A significant concern is that terrorists or hostile foreign states could launch computer-based attacks on critical systems, such as those supporting energy distribution, telecommunications, and financial services, to severely damage or disrupt our national defense or other operations, resulting in harm to the public welfare. Understanding these risks to our computer-based infrastructures and determining how best to mitigate them are major information security challenges. The federal government is beginning to take steps to address those challenges. In 1996, the President's Commission on Critical Infrastructure Protection was established to investigate our nation's vulnerability to both cyber and physical threats. In its October 1997 report, Critical Foundations: Protecting America's Infrastructures, the Commission described the potential devastating implications of poor information security from a national perspective. In May 1998, Presidential Decision Directive 63 (PDD 63) was issued in response to this report and recognized that addressing computer-based risks to our nation's critical infrastructures required a new approach that involves coordination and cooperation across federal agencies and among public- and private-sector entities and other nations. PDD 63 created several new entities for developing and implementing a strategy for critical infrastructure protection. In addition, it tasked federal agencies with developing critical infrastructure protection plans and establishing related links with private industry sectors. Since then, a variety of activities have been undertaken, including development and review of individual agency critical infrastructure protection plans, identification and evaluation of information security standards and best practices, and efforts to build communication links with the private sector. In January 2000, the White House released its National Plan for Information Systems Protection as a first major element of a more comprehensive effort to protect the nation's information systems and critical assets from future attacks. This plan focuses largely on federal efforts being undertaken to protect the nation's critical cyber-based infrastructures. Subsequent plans are to address a broader range of concerns, including the specific roles industry and state and local governments will play in protecting physical and cyber-based infrastructures from deliberate attacks as well as international aspects of critical infrastructure protection. The end goal of this process is to develop a comprehensive national strategy for critical infrastructure assurance, as envisioned by PDD 63, and to have this plan fully operational in 2003. The plan proposes achieving its twin goals of making the U.S. government a model of information security and developing public-private partnerships to defend our national infrastructure through 10 programs listed in figure 1. Figure 1: Programs Identified in the National Plan for Information Systems Protection The program involving sharing attack warning and information specifically seeks to bolster information exchange efforts with the private sector. In particular, the program aims to establish a Partnership for Critical Infrastructure Security and a National Infrastructure Assurance Council to increase corporate and government communications about shared threats to critical information systems. It also encourages the creation of Information Sharing and Analysis Centers (ISAC) to facilitate public-private sector information sharing about actual threats and vulnerabilities in individual infrastructure sectors. Two ISACs are already in operation: (1) the Financial Services ISAC, which exclusively serves the banking, securities, and insurance industries, and (2) the National Coordinating Center for Telecommunications, which is a joint industry/government organization. Several more ISACs are expected to be established by the end of the year. H.R. 4246 and Its Potential Benefits for Critical Infrastructure Protection Partnerships such as the ISACs are central to addressing critical infrastructure protection. However, some in the private sector have expressed concerns about voluntarily sharing information with the government. For example, concerns have been raised that industry could potentially face antitrust violations for sharing information with other industry partners, have their information be subject to the Freedom of Information Act (FOIA), or face potential liability concerns for information shared in good faith. H.R. 4246 was introduced on April 12, 2000, with the aim of addressing these concerns and encouraging the secure disclosure and exchange of information about cyber security problems and solutions. In many respects, the bill is modeled after the Year 2000 Information and Readiness Disclosure Act, which provided limited exemptions and protections for the private sector in order to facilitate the sharing on information on Y2K readiness. In particular, H.R. 4246: * protects information being provided by the private sector from disclosure by federal entities under FOIA or disclosure to or by any third party, * prohibits the use of the information by any federal and state organization or any third party in any civil actions, and * enables the President to establish and terminate working groups composed of federal employees for the purposes of engaging outside organizations in discuss to address and share information about cyber security. In essence, the bill seeks to enable the federal government to ask industry questions about events or incidents threatening critical infrastructures, correlate them at a national level in order to build a baseline understanding of infrastructures, and use these baselines to identify anomalies and attacks-something it is not doing now. Addressing similar concerns proved valuable in addressing the Y2K problem. Although Y2K was a unique and finite challenge, it parallels the critical infrastructure challenge in some important respects. Like critical infrastructure protection, for instance, Y2K spanned the entire spectrum of our national, as well as the global, economy. Moreover, given the scores of interdependencies among private sector companies, state and local governments, and the federal government, a single failure in one system could have repercussions on an array of public and private enterprises. As a result, public/private information sharing was absolutely essential to ensuring compliance in supply chain relationships and reducing the amount of Y2K work. Early on, Y2K information bottlenecks were widespread in the private sector. According to the President's Council on Year 2000 Conversion, antitrust issues and a natural tendency to compete for advantage made working together on Y2K difficult, if not inconceivable, for many companies. Moreover, the threat of lawsuits had companies worried that they would be held liable for anything they said about the Y2K compliance of products or devices they used or test processes and results for them. Legal considerations also prevented companies from saying anything about their own readiness for date change. Thus, as noted by the council, their business partners, as well as the general public, may have assumed the worst. According to the council, the Year 2000 Information and Readiness Disclosure Act paved the way for more disclosures about Y2K readiness and experiences with individual products and fixes. Several major telecommunications companies, for example, indicated their willingness to share Y2K information with smaller companies who contacted them. And the leaders of the electric power industry began a series of regional conferences for local distribution companies in which they discussed identified problems and solutions, particularly with embedded chips, as well as testing protocols and contingency planning. Moreover, the act helped facilitate the work of the more than 25 sector-based working groups established by the council and other outreach activities. For example, the council and federal agencies were able to establish partnerships with several private-sector organizations, such as the North American Electric Reliability Council, to gather information critical to the nation's Y2K efforts and to address issues such as contingency planning. Concerned about the lack of information in some key industry areas, the council also convened a series of roundtable meetings in the spring and summer of 1999, which helped to shed light on the status of readiness efforts relating to pharmaceuticals, food, hospital supplies, transit, public safety, the Internet, education, and chemicals. The assessment reports resulting from these and other activities substantially increased the nation's understanding of the Y2K readiness of key industries. Removing barriers to information sharing between government and industry can similarly enhance critical infrastructure protection. Both government and industry are key components of the infrastructure, both are potential targets for cyber threats, and both face significant gaps in effectively dealing with the threats. As such, both must work together to identify threats and vulnerabilities and to develop response strategies. In particular, by combining information concerning the type of incidents and attacks experienced with the information obtained through federal intelligence and law enforcement sources, the government can develop and share more informative warnings and advisories. In turn, companies can develop a better understanding of the threats facing their particular infrastructures and be better prepared to take appropriate actions to protect their sectors. Challenges in Building Public/Private Partnerships First, while information sharing is important, the government needs to be sure that it is collecting the right type of information, that it can effectively synthesize and analyze it, and that it can appropriately share its analysis. A significant amount of work still needs to be done just in terms of ensuring that the right type of information is collected. For example, what information is required that will enable the government to detect a nationally significant cyber attack? Will information on intrusions, software anomalies, or reports of significant system failures provide an accurate baseline for making these determinations? Today, officials in the intelligence community do not know with real certainty what constitutes a cyber attack. Further, a 1996 Defense Science Board report stressed that understanding the information warfare process and indications of information warfare attacks will likely require an unprecedented effort to collect, consolidate, and synthesize data from a range of owners of infrastructure assets. The ISACs being established to facilitate public-private sector information sharing can assist in meeting this challenge. However, as noted earlier, only two ISACS are in operation and proposals regarding these centers are presented only in broad terms in the administration's preliminary National Plan for Information Systems Protection. Once the government is sure that it is asking for the right type of information, it will need effective mechanisms for collecting and analyzing it. Building a common operational picture of critical infrastructures and determining if an attack is underway requires the government to develop capabilities to quickly and accurately correlate information from different infrastructures and reports of security incidents. This is a complex and challenging task in itself. Data on possible threats-ranging from viruses, to hoaxes, to random threats, to news events, and computer intrusions-must be continually collected and analyzed from a wide spectrum of globally distributed sources in addition to sector-based groups. Nevertheless, fusing the right information from the public and private sectors in an operational setting is essential to detecting, warning, and responding to information-based attacks. The National Infrastructure Protection Center (NIPC), located in the Federal Bureau of Investigation, is charged with this mission, but it is not clear whether NIPC has the right tools and resources needed to successfully coordinate information collection efforts with the private sector and to effectively correlate and analyze information received. We are currently engaged in an effort to review this capability. In addition to collecting and analyzing data, the federal government needs to be able to effectively share information about infrastructure threats. Again, NIPC is charged with this responsibility and we are also reviewing its capability with respect to this issue. But, already, results in this area have been mixed. In December 1999, NIPC provided early warnings about a rash of denial-of-service attacks prominently on its website-2 months before the attack arrived in full force-and offered a tool that could be downloaded to scan for the presence of the denial of service code. However, as we recently testified, NIPC had less success with the ILOVEYOU virus. NIPC first learned of the virus at 5:45 a.m. EDT from an industry source, yet it did not issue an alert about the virus on its own web page until 11 a.m.-hours after many federal agencies were reportedly hit. This notice was a brief advisory; NIPC did not offer advice on dealing with the virus until 10 p.m. that evening. The lack of a more effective early warning clearly affected most federal agencies. Only 7 of 20 we contacted were spared widespread infection, which resulted in slowing some agency operations and requiring the diversion of technical staff toward stemming the virus' spread and cleaning "infected" computers. Moreover, NIPC did not directly warn the financial services ISAC about the impending threat. The second challenge to realizing the goals of H.R. 4246 is that, to truly engage the private sector, the federal government needs to be a model for computer security. Currently, the federal government is not a model. As emphasized in the National Plan for Information Systems Protection, the federal government specifically needs to be able to demonstrate that it can protect its own critical assets from cyber attack as well as lead research and development and educational efforts in the field of computer security. However, audits conducted by GAO and agency inspectors general show that 22 of the largest federal agencies have significant computer security weaknesses, ranging from poor controls over access to sensitive systems and data, to poor control over software development and changes, to nonexistent or weak continuity of service plans. Importantly, our audits have repeatedly identified serious deficiencies in the most basic controls over access to federal systems. For example, managers often provided overly broad access privileges to very large groups of users, affording far more individuals than necessary the ability to browse, and sometimes modify or delete, sensitive or critical information. In addition, access was often not appropriately authorized or documented; users often shared accounts and passwords or posted passwords in plain view; software access controls were improperly implemented; and user activity was not adequately monitored to deter and identify inappropriate actions. While a number of factors have contributed to weak federal information security, such as insufficient understanding of risks, technical staff shortages, and a lack of system and security architectures, the fundamental underlying problem is poor security program management. Agencies have not established the basic management framework needed to effectively protect their systems. Based on our 1998 study of organizations with superior security programs, this involves managing information security risks through a cycle of risk management activities that include (1) assessing risk and determining protection needs, (2) selecting and implementing cost-effective policies and controls to meet these needs, (3) promoting awareness of policies and controls and of the risks that prompted their adoption, and (4) implementing a program of routine tests and examinations for evaluating the effectiveness of policies and related controls. Additionally, a strong central focal point can help ensure that the major elements of the risk management cycle are carried out and can serve as a communications link among organizational units. I would also like to emphasize that while individual agencies bear primary responsibility for the information security associated with their own operations and assets, there are several areas where governmentwide criteria and requirements also need to be strengthened. Specifically, there is a need for routine periodic independent audits of agency security programs to provide a basis for measuring agency performance and information for strengthened oversight. As we recently testified, a bill has been introduced in the Senate this year-the Proposed Government Information Security Act (S. 1993)-which provides a requirement for such audits. There is also a need for * more prescriptive guidance regarding the level of protection that is appropriate for their systems, * strengthened central leadership and coordination of information security-related activities across government, * strengthened incident detection and response capabilities, and * adequate technical expertise and funding. For example, central leadership and coordination of information security-related activities across government is lacking. Under current law, responsibility for guidance and oversight of agency information security is divided among a number of agencies, including * the Office of Management and Budget (OMB), which is responsible for developing information security policies and overseeing agency practices; * the National Institute of Standards and Technology, which is charged with developing technical standards and providing related guidance for sensitive data; and * the National Security Agency, which is responsible for setting information security standards for national security agencies. Other organizations are also becoming involved through the administration's critical infrastructure protection initiative, including NIPC; the Critical Infrastructure Assurance Office, which is working to foster private-public relationships; and the Federal Computer Incident Response Capability (FedCIRC), which is the central coordination and analysis facility dealing with computer security-related issues affecting the civilian agencies and departments across the federal government. While some coordination is occurring, overall, this has resulted in a proliferation of organizations with overlapping oversight and assistance responsibilities. Absent is a strong voice of leadership and a clear understanding of roles and responsibilities. As we recently testified, having strong, centralized leadership has been critical to addressing other governmentwide management challenges. For example, vigorous support from officials at the highest levels of government was necessary to prompt attention and action to resolving the Y2K problem. Similarly, forceful, centralized leadership was essential to pressing agencies to invest in and accomplish basic management reforms mandated by the Chief Financial Officers Act. To achieve similar results for critical infrastructure protection, the federal government must have the support of top leaders and more clearly defined roles for those organizations that support governmentwide initiatives. Mr. Chairman, this concludes my statement. I would be happy to answer any questions you or other Members of the Subcommittee may have. Contacts and Acknowledgments For questions regarding this testimony, please contact Jack L. Brock, Jr. at (202) 512-6240. Individuals making key contributions included Cristina Chaplain, Michael Gilmore, and Paul Nicholas. (512009) Orders by Internet For information on how to access GAO reports on the Internet, send an e-mail message with "info" in the body to: Info@www.gao.gov or visit GAO's World Wide Web home page at: http://www.gao.gov Web site: http://www.gao.gov/fraudnet/fraudnet.htm E-mail: fraudnet@gao.gov 1-800-424-5454 (automated answering system) *** End of document. ***