GSA / modernization

Report to the President on IT Modernization
https://itmodernization.cio.gov
59 stars 12 forks source link

Report to the President on Federal IT Modernization #4

Open softwarinc opened 7 years ago

softwarinc commented 7 years ago

I noted that the report did not contain the word "encryption". While there were mentions of using https, tls and other limited web browsing security features, there is nothing at all in the report on any plans to implement encryption to protect and secure Federal systems. This oversight may have been accidental but I somehow doubt that.

The recent Office of Personnel Management (OPM) hack was due in part to weak security and illustrated the poor condition of the US government IT infrastructure. OPM stated that they were unable to prevent the breach because their "legacy" COBOL based system could not be encrypted. However, that assertion is a false excuse since I wrote encryption for the US Army on COBOL based logistics systems in the 1980s. The fact is, they could have secured the data but decided not to.

Massive data breaches at the OPM, the IRS, the EPA, the FBI, the State Department, Veterans Affairs, and the Defense Department have been sprayed all over the headlines in recent months. The rank and utter disregard for the public data has left millions of Americans vulnerable to daily attack and financial damages. National secrets have become headlines and foreign powers are having a field day hacking high ranking individuals. The attacks have assisted our enemies by giving them important data on our global moves and even funded them with our own tax dollars.

A modern state is such a complex and interdependent fabric that it offers a target highly sensitive to a sudden and overwhelming cyber strike. One of the most vulnerable targets would be the U.S. government. Encryption alone does not guarantee America's security, but I believe it best exploits the nation's greatest asset — our technical skill. The move toward using powerful encryption to protect our most important assets, including the data assets of the U.S. government, is both logical and prudent.

I suggest you rewrite the report and forget the ongoing political feud regarding intelligence, law enforcement and other entities on the topic of encryption. We have no time for that. We are in a cyber-war and we must put our best defense - encryption - forward as fast as possible. The alternative is too costly to consider.

aclater commented 6 years ago

Encryption is briefly addressed, though there could be more emphasis:

Reduce the Federal attack surface through enhanced application and data-level protections. Rather than treating Federal networks as trusted entities to be defended at the perimeter, agencies should shift their focus to placing protections closer to data, specifically through improved management and authentication of devices and user access, as well as through encryption of data – both at rest and in transit. This approach curtails an attacker’s likelihood of gaining access to valuable data solely by accessing the network, and it has the potential to better block and isolate malicious activity. As agencies prioritize their modernization efforts, they should implement the capabilities that underpin this model to their high value assets first.

mjemery1 commented 6 years ago

I was looking at that exact same language in the Report to the President. It is a good start to recognize the problem that Federal networks cannot be trusted (even if all the "network" and "cloud" recommendations are implemented). Regulations have existed to encrypt sensitive data as pointed out by the report, but very few agencies have been able to manage the complexities or costs of implementing the point solutions currently available for data at rest and data in transit. Even if it were easy and cheap, the data would still be exposed to an intruder whenever it is un-encrypted as it leave the database, or enters a compute device. The report should require the implementation of "persistent" data protection that is FIPS 104-2 compliant. Technology exists to easily protect data at its point of origination and never have to un-protect it just to transit or be used by the enterprise. Adding to this capability the qualities of "digital rights management" would then provide the meta-data to maange the authorized use of the data and prevent the unauthorized use of the data throughout the lifecyle of the data from creation to eventual archive or destruction. Use of this technology will fulfill the stated requirement to "reduce the Federal attack surface through enhanced application and data-level protections"; in addition it will save the government significant investment dollars in unneeded system upgrades or overspending on ephemeral network and application border protections.