Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

NGA Paper

Act and Adjust: A Call to Action for Governors


for Cybersecurity
&\EHUVHFXULW\ UHPDLQV RQH RI WKH PRVW VLJQL¿FDQW ‡ Be Actionable. The goal of the Resource Center
challenges facing the nation. Although implementing is to provide to governors recommendations and
policies and practices that will make state systems and resources that promote actions that reduce risk.
data more secure will be an iterative and lengthy pro-
cess, governors can take a number of actions imme- ‡ Reduce Complexity. Cybersecurity policy is de-
diately that will help detect and defend against cyber signed and implemented in a complex environ-
attacks occurring today and help deter future attacks. ment. The Resource Center aims to reduce that
complexity by looking for common principles and
Those actions include: practices that are effective in that environment.
‡ Establishing a governance and authority struc-
ture for cybersecurity; ‡ Protect Privacy. The recommendations made
‡ Conducting risk assessments and allocating re- through the Resource Center aim to both im-
sources accordingly; prove cybersecurity and protect the privacy,
‡ Implementing continuous vulnerability assess- civil rights, and civil liberties of citizens.
ments and threat mitigation practices;
‡ Ensuring that the state complies with current se- ‡ Employ Technologically Neutral Solutions.
curity methodologies and business disciplines in The recommendations made through the Re-
cybersecurity; and source Center emphasize nonproprietary, open
‡ Creating a culture of risk awareness. standards.

By implementing those recommendations immediate- ‡ Focus on the State as Enterprise. The work
ly, governors can greatly enhance states’ cybersecurity of the Resource Center aims to improve gover-
posture. nors’ understanding of the state as an enterprise
including the interdependencies among state
Guiding Principles agencies; between the public and private sector;
This Call to Action, as well as the work of the NGA and regionally across state boundaries.
Resource Center for State Cybersecurity (Resource
Center), is guided by a set of core principles: ‡ Promote Flexible Federalism. To the extent pos-
VLEOHWKH5HVRXUFH&HQWHUHPSKDVL]HVWKHEHQH¿WV
‡ Support Governors. The work of the Resource RIDQGRSSRUWXQLWLHVIRUÀH[LELOLW\ZLWKLQIHGHUDO
Center is singular in its focus on supporting programs to allow for tailored state solutions.
governors’ efforts to improve cybersecurity. The
5HVRXUFH &HQWHU PDUNV WKH ¿UVW ODUJHVFDOH HI- ‡ Rely on Evidence-Based Practices. The Re-
fort exclusively focused on the role of governors source Center makes recommendations that
in improving cybersecurity. build on evidence-based practices.

444 NORTH CAPITOL STREET, SUITE 267 |WASHINGTON, D.C. 20001-1512 |202-624-5300 | WWW.NGA.ORG/CENTER
National Governors Association

‡ Use and Generate Metrics. The Resource Cen- cies, have only limited responsibility and authority
ter promotes recommendations that use dynamic over statewide cyber networks. CISOs can operate in
performance metrics to manage and improve federated or decentralized environments where tech-
state processes and practices. nology and security resources are dispersed across
various agencies and departments. In addition, the
‡ Promote the Use of Incentives. The Resource sharing of cyber threat information with the private
Center makes recommendations that promote sector and local governments is handled by state
the use of incentives to improve cybersecurity homeland security agencies, further complicating the
practices in a state. overall cybersecurity governance structure.

Immediate Actions to Protect According to a survey conducted by Deloitte for the


States National Association of State Chief Information Of-
Domestic and international actors are launching a ¿FHUV 1$6&,2 SHUFHQWRIVWDWH&,62VLQGLFDWH
VLJQL¿FDQWQXPEHURIF\EHUDWWDFNVDJDLQVWVWDWHV$O- that they have authority over only their executive
though many of the actions necessary to reduce the EUDQFKDJHQFLHVGHSDUWPHQWVDQGRI¿FHV1 Although
nation’s vulnerabilities to cyberattacks require long- most states have a CISO, if they do not have a vis-
term structural improvements and business redesign, ible agency-level security posture, they can encounter
governors can take actions now that can immediately obstacles to implementing an effective cybersecurity
improve their state’s cybersecurity posture. Imple- program. Among the elements of an effective program
mentation of the actions described below will help to are enforcement mechanisms to ensure compliance
ensure strong governance and oversight, a baseline of ZLWKVHFXULW\SROLFLHVDQGDXGLW¿QGLQJV6WDWHVZLWK-
F\EHUVHFXULW\ FDSDELOLWLHV DQG TXLFNHU LGHQWL¿FDWLRQ out governance structures to build and operate effec-
of attacks and threats; it also will help to improve ba- tive programs will be limited in their ability to identify
sic cybersecurity practices. an ongoing cyber attacks and respond in a coordinated
way.
Establish a governance structure for cybersecurity.
Because state systems and networks are intercon- *RYHUQRUV FDQ JUDQW WKHLU FKLHI LQIRUPDWLRQ RI¿FHUV
nected, developing a robust cybersecurity posture will (CIOs) or CISOs the authority to develop and steer a
require an enterprise-wide approach. To that end, gov- coordinated governance structure (for example, a task
ernors need to ensure that they have a strong state- force, commission, or advisory body) that can greatly
wide governance structure with some degree of cen- improve coordination and awareness across agencies
tral authority that provides a framework to prepare that operate statewide cyber networks. Such an ap-
for, respond to, and prevent cyber attacks. Several proach also helps enable the CIO or CISO to take ac-
recent attacks reveal that states which fail to put in tions to prevent or mitigate damage in the event of a
place a strong governance structure are at a distinct cyber breach.
disadvantage.
Michigan has created a centralized security depart-
)RU PDQ\ VWDWHV FKLHI LQIRUPDWLRQ VHFXULW\ RI¿FHUV PHQWUXQE\DFKLHIVHFXULW\RI¿FHU &62 WKDWEULQJV
(CISOs), who are responsible for developing and car- together both physical security and cybersecurity. Di-
rying out information technology (IT) security poli- rectors, managers, and employees within each agency
_________________________
1
³6WDWH*RYHUQPHQWVDW5LVN$&DOOIRU&ROODERUDWLRQDQG&RPSOLDQFH´'HORLWWHDQGWKH1DWLRQDO$VVRFLDWLRQRI6WDWH&KLHI,QIRUPDWLRQ2I¿FHUV
2FWREHUDFFHVVHG0DUFKKWWSZZZGHORLWWHFRPDVVHWV'FRP8QLWHG6WDWHV/RFDO$VVHWV'RFXPHQWV$(56XVBDHUVBQDV-
FLR&\EHUVHFXULW\6WXG\BSGI

PAGE 2
National Governors Association

coordinate through the centralized governance struc- Conduct risk assessments and allocate resources
ture to focus on each agency’s need for both physical accordingly. Governors and other key state actors
security and cybersecurity. Governance of that type is need a comprehensive understanding of the risk and
especially important during an incident or a disaster. threat landscape to make accurate and timely deci-
The approach allows the CSO and CIO to work close- sions when allocating scarce resources. Without a
ly to manage the state’s cyber networks and infrastruc- comprehensive understanding of the risks, including
ture and to ensure that effective governance practices the interdependencies among critical assets, states are
are in place. vulnerable to interruptions in business operations as
ZHOODV¿QDQFLDODQGGDWDORVVHV7RJDLQWKLVDZDUH-
Although a central authority is essential, it does not ness, states must develop security strategies and busi-
obviate the importance of collaboration among local ness practices by conducting risk assessments that
governments, nongovernmental organizations, and the identify information assets, model different threats to
private sector. Those relationships are essential to un- those assets, and allow for planning to protect against
derstanding the culture, operations, and business prac- those threats.4
tices of various agencies and organizations with cyber
DVVHWV ZLWKLQ WKH VWDWH ,Q 0LFKLJDQ IRU H[DPSOH LQ In addition to establishing sound business practices
addition to dedicated and full-time state employees in and using existing resources, states also must conduct
WKH2I¿FHRI&\EHUVHFXULW\DULVNPDQDJHPHQWWHDP hands-on activities and exercises as a part of their as-
leverages many resources around the state to gather sessments. Those practices include regular penetration
LQIRUPDWLRQDQGUHVROYHDQLQFLGHQWHI¿FLHQWO\DQGHI- testing and vulnerability scanning and should be ref-
fectively. erenced in security policies. States can take advantage
of resources from federal and private entities to con-
Minnesota is another example of a state that adopted duct those activities. Once an independent statewide
a governance framework that stresses teamwork and assessment has been conducted, governors can make
communication between a centralized information necessary decisions on where scarce resources should
technology organization and stakeholders. The state be allocated to prevent the loss of essential informa-
CIO works collaboratively with the governor, the tion and resources and to protect critical infrastructure
Technology Advisory Committee, and other agency and assets. The initial assessment also will help deter-
OHDGHUV0LQQHVRWDDOVRKDVVHYHUDOJRYHUQLQJERGLHV mine the frequency of such assessments in the future,
that have an agency CIO, providing a direct link to the EDVHGRQWKHULVNSUR¿OHRIDJHQFLHV$VDQH[DPSOH
state CIO and operational decisions made at the differ- agencies with sensitive citizen data might require an-
ent agency team levels.2 nual assessments and quarterly follow-up in their cor-
rective action plan.
Recognizing the need to foster collaboration at all
levels of government and with the private sector, Additionally, governors and their senior staff who
California recently created the California Cybersecu- have appropriate security clearances should receive
rity Task Force. The task force focuses on sharing in- UHJXODU FODVVL¿HG F\EHUVHFXULW\ WKUHDW EULH¿QJV 7KH
formation to improve the security of government and Department of Homeland Security (DHS) can assist
private-sector IT assets. VWDWHVLQSODQQLQJWKHVHEULH¿QJV
_________________________

2
³6WDWHRI0LQQHVRWD,7*RYHUQDQFH)UDPHZRUN´KWWSPQJRYRHWLPDJHV6WDWHRI0LQQHVRWD,7*RYHUQDQFH)UDPHZRUNSGI -XQH

“California Launches Cybersecurity Task Force,” http://www.govtech.com/security/California-Launches-Cybersecurity-Task-Force.html 0D\
 
4
³6WHSVWR&\EHUVHFXULW\5LVN$VVHVVPHQW´KWWSZZZJRYWHFKFRPVHFXULW\6WHSVWR&\EHU6HFXULW\KWPO"SDJH  -XQH

PAGE 3
National Governors Association

Implement continuous vulnerability assessments ¿UHZDOOVIRULQWUXVLRQV


and threat mitigation practices. Consistently moni-
toring threats and vulnerabilities will help governors Another related resource available to state and local
proactively defend cyber networks. Every day, states governments is DHS’s newly launched Continuous Di-
are exposed to phishing scams, malware, denial-of- DJQRVWLFVDQG0LWLJDWLRQ &'0 SURJUDP7KH&'0
service attacks, and other common tactics employed program at the federal level works by expanding de-
by cyber attackers. Governors must ensure that mis- ployment of automated network sensors that feed data
sion-critical systems are equipped with technologies about an agency’s cybersecurity vulnerabilities into
and have implemented business practices that will a continuously updated dashboard. To support states
identify potential threats, track all stages of cyber at- in improving their capabilities to prevent and detect
tacks in real time, and offer mitigation techniques and LQWUXVLRQVWKH&'0KDVDEODQNHWSXUFKDVLQJDJUHH-
options for any resulting loss or damage. ment that reduces the cost to states of purchasing tools
and services that enhance their cybersecurity. It is im-
Maryland leverages the cybersecurity capabilities portant to note that such purchases are most effective
RI WKH 0DU\ODQG $LU 1DWLRQDO *XDUG th Network ZKHQFRRUGLQDWHGZLWK06,6$&¶VPDQDJHGVHFXULW\
Warfare Squadron to support its cybersecurity assess- services so as to maintain collective situational aware-
ments. State agencies participate in collaborative Web ness across state and local governments.
SHQHWUDWLRQ WUDLQLQJ H[HUFLVHV ZLWK WKH 0DU\ODQG$LU
Guard Squadron. The exercises that feature simulated Ensure that your state complies with current secu-
attacks from malicious outsiders or insidious insid- rity methodologies and business disciplines in cy-
ers are useful in evaluating the security of selected bersecurity. States can turn to two industry standards
state websites and portals. Security issues uncov- for a baseline of effective cybersecurity practices.
ered through the penetration tests lead to technical First, the Council on CyberSecurity’s Critical Con-
and procedural countermeasures to reduce risks. The trols for Effective Cyber Defense is an industry stan-
Guard also provides network vulnerability assessment dard that provides states with a security framework
services to various state agencies while, in return, it that can strengthen their cyber defenses and ultimately
UHFHLYHV EHQH¿FLDO WUDLQLQJ IRU WKH VTXDGURQ¶V PHP- protect information, infrastructure, and critical assets.
bers. A number of other states have similar practices Compliance with that standard will provide a baseline
in place. RIGHIHQVHGHWHUDVLJQL¿FDQWQXPEHURIDWWDFNVDQG
help minimize compromises, recovery, and costs. The
7KH 0XOWL6WDWH ,QIRUPDWLRQ 6KDULQJ DQG $QDO\VLV FRQWUROVDUHEDVHGXSRQ¿YHJXLGLQJSULQFLSOHVXVLQJ
&HQWHU 06,6$& KDVEHHQGHVLJQDWHGE\'+6DVD evidence-based practices to build effective defenses,
key resource for cyber threat prevention, protection, assigning priorities risk reduction and protection ac-
response, and recovery for the nation’s state, local, ter- tions, establishing a common language that measures
ritorial, and tribal governments. Through its state-of- the effectiveness of security, continuous monitoring,
the-art Security Operations Center, available 24 hours and automating defenses. The controls also identify
D GD\ VHYHQ GD\V D ZHHN WKH 06,6$& VHUYHV DV D key network components and how to secure them.
central resource for situational awareness and incident
UHVSRQVH 7KH 06,6$& DOVR SURYLGHV VWDWH ORFDO The second standard is the Information Technology
tribal, and territorial governments with managed se- Infrastructure Library (ITIL). An ITIL is a set of prac-
curity services, which are outsourced security opera- tices for information technology service management
tions that include ongoing monitoring of networks and ,760 WKDWDUHGHVLJQHGWRDOLJQLQIRUPDWLRQWHFKQRO-
_________________________

³&6,6&ULWLFDO6HFXULW\&RQWUROV´http://www.sans.org/critical-security-controls/guidelines.php


PAGE 4
National Governors Association

ogy (IT) with core business requirements. The latest sentations for elementary school students to reinforce
HGLWLRQVRI,7,/ZKLFKZHUHSXEOLVKHGLQ-XO\ the importance of Internet safety practices. The state
form the core guidance of best management practices also hosts video and poster contests that encourage the
and can greatly strengthen states’ IT practices. The public to create materials that promote cybersecurity
ITIL has been adopted by companies in many private- awareness.
sector industries, including banking, retail services,
technology, and entertainment. For states, an ITIL will Effective awareness training and education for end-
help ensure that states’ IT assets correlate with their users is recognized as the single most effective factor
critical assets. in preventing security breaches and data losses. States
such as Michigan have launched security awareness
Create a culture of risk awareness. 7KH EHVW ¿UH- training for all state employees and have posted online
walls and most advanced antivirus software cannot guides that are available to the public with the goal of
deter a cyber attack if the individuals using a network reducing risk.8 0RUH WKDQ  XVHUV DQG SDUWQHUV
are either careless or inattentive to basic security prac- DUHFXUUHQWO\HQUROOHGLQ0LFKLJDQ¶VWUDLQLQJSURJUDP
tices. The strongest door and most secure lock will not an online interactive program consisting of a dozen
keep a burglar out if the door is left open or unlocked. PLQXWH OHVVRQV 2WKHU RUJDQL]DWLRQV VXFK DV WKH
06,6$&DOVRRIIHUWUDLQLQJUHVRXUFHVWKDWDUHUHDG-
Governors have the opportunity to promote a culture ily available online.
of cybersecurity awareness that will help to minimize
the likelihood of a successful cyber attack. Building a 0LFKLJDQDOVRKDVUHFHQWO\ODXQFKHGDUHVHDUFKWHVW
strong cybersecurity culture means making individu- training, and evaluation facility for cybersecurity and
als aware of the many risks and ongoing threats fac- cyberdefense. In partnership with state universities,
ing their networks. Those individuals must understand the private sector, and state and local governments,
the potential negative implications of their activities 0HULW 1HWZRUN ,QF D  F   QRQSUR¿W RUJDQL]D-
or inattentiveness. To develop a strong cybersecurity tion, built and developed the state-of-the-art center
culture, focus should be put on increasing awareness, WRIXUWKHUDGYDQFHF\EHUVHFXULW\WUDLQLQJLQ0LFKLJDQ
VHWWLQJDSSURSULDWHH[SHFWDWLRQVDQGLQÀXHQFLQJGD\ $ZLGHYDULHW\RIFRXUVHRIIHULQJVLQFOXGHVFHUWL¿FD-
to-day security practices of end users. Awareness can tions in incident handling, disaster recovery, forensics,
be created by including relevant training and content and wireless security. Dozens of technical staff have
in the orientation process of new staff as well as an- DOUHDG\FRPSOHWHGWUDLQLQJDQGUHFHLYHGFHUWL¿FDWLRQV
nual review of current staff. Expectations about us-
ers’ behaviors can also be set by adding cybersecurity In addition to offering training, states like Maryland
components to job responsibilities. conduct tabletop exercises to raise the awareness and
UHVSRQVH FDSDELOLWLHV RI NH\ VWDWH DFWRUV 0DU\ODQG
However, creating a culture of awareness will be an WKURXJKWKHVWDWH¶V(PHUJHQF\0DQDJHPHQW$GPLQLVWUD-
ongoing process that will require constant attention WLRQ 0(0$ IDFLOLWDWHGDQLQLWLDOFDELQHWOHYHOWDEOHWRS
and ongoing training. Governors have the opportu- exercise in which cybersecurity and continuity of opera-
nity to use the bully pulpit to make cybersecurity the tions awareness and readiness were assessed. In addition
responsibility of all, including ordinary citizens. In WR0(0$'+6DQGWKH1DWLRQDO6HFXULW\$JHQF\&\-
Delaware, state employees conduct cybersecurity pre- ber Command assisted in hosting this exercise.
_________________________


“ITIL: The Basics, ”http://www.best-management-practice.com/gempdf/ITIL_The_Basics.pdf

See http://www.dti.delaware.gov/information/cybersecurity.shtml
8
6HH6WDWHRI0LFKLJDQ6HFXULW\2I¿FHZHEVLWH

PAGE 5
National Governors Association

The Path Forward In addition to the work of the Resource Center, NGA
7KH DFWLRQV GHVFULEHG DERYH DUH D ¿UVW VWHS IRU JRY- also is leading efforts through the Council of Gover-
ernors to improve cybersecurity for state-owned and nors to collaborate with the Departments of Defense
operated systems. However, a secure cybersecurity and Homeland Security on how the National Guard
fabric will require an enterprise-wide approach that could be used to better protect both state and federal
includes coordination and partnerships with critical networks. The National Guard’s unique role serving
infrastructure owners and operators, private industry, governors and the President, combined with its abil-
and the public. ity to attract and retain individuals who have full-time
HPSOR\PHQWLQ,7DQGUHODWHG¿HOGVPDNHLWDQLGHDO
Over the course of the next year, the NGA Resource solution to help address the shortage of highly skilled
Center for State Cybersecurity will issue a series of personnel necessary to protect critical networks and
reports focusing on critical areas for mid- to long- systems.
term actions governors can take to strengthen their
states’ cyber posture. Those areas include improving Across the country, several states have established Na-
coordination between state and federal governments, tional Guard cyber capabilities that are closely aligned
leveraging state fusion centers to respond to cyber with civilian agencies and coordinate regularly with
threats, enhancing the cybersecurity of critical energy public utility commissions, owners and operators of
systems and infrastructure, and developing a skilled critical infrastructure, and other public and private
cybersecurity workforce. sector partners.

Thomas MacLellan
Division Director
Homeland Security & Public Safety Division
NGA Center for Best Practices
202-624-5427

September 2013

The NGA Resource Center for State Cybersecurity is made possible through the generous support from our grant makers, including the American
Gas Association, Citi, Deloitte, Edison Electric Institute, Good Technology, Hewlett-Packard, IBM, Northrop Grumman, Nuclear Energy Institute,
Symantec, and VMware.

PAGE 6

You might also like