Pipeline Hack: Biden Issues An Executive Order

President Biden has signed a new US Executive Order following the ransomware attack closed down the main US oils and gas pipeline supplying the East Coast which will alter how companies manage and report cyber security incidents. “Recent cybersecurity incidents such as SolarWinds, Microsoft Exchange, and the Colonial Pipeline incident are a sobering reminder that US public and private sector entities increasingly face sophisticated malicious cyber activity from both nation-state actors and cyber criminals,” the White House said in a statement.

Despite some reports that the operating company has paid an undisclosed ransom to regain control, the pipeline remains closed. 

This Order aims at strengthening US cyber security defenses, a move that follows a series of sweeping cyber attacks on private companies and federal government networks over the past year. “The United States faces persistent and increasingly sophisticated malicious cyber campaigns that threaten the public sector, the private sector, and ultimately the American people’s security and privacy.  The Federal Government must improve its efforts to identify, deter, protect against, detect, and respond to these actions and actors”, says the Executive Order for Improving the US Cyber Security. “We routinely install software with significant vulnerabilities to some of our most critical systems and infrastructure,...systems that are used to deliver our power and our water to help manage traffic,” a senior Biden administration official told the press. 

This Executive Order will change the way businesses communicate with the US government and the public about their cybersecurity position and also compels IT providers share information about network breaches with the government, even when they usually would not do so. It adds new standards for government purchases of federal software and IT services. 

The Biden administration hopes that the new federal requirements, will influence how IT providers make products and services available to the public. If these changes had been implemented earlier it seems likely they would have helped to prevent the SolarWinds attack that has affected multiple US government agencies.   “We use federal buying power to jumpstart the market for secure software,” said the official. 

The order also establishes a new incident review board, modeled after the National Transportation Safety Board, that will have a private sector co-chair to quickly review major cyber incidents and make recommendations on what to do about them. And it puts in place a standard playbook for responding to major cyber incidents. 

 Perhaps its most important feature, it will establish a new rating system to allow the public to judge the security of products and services that they’re buying, similar to the Department of Energy’s Energy Star rating system. That could affect the way consumers buy internet-enabled products and services. For instance, a shopper arbitrating between two baby monitors would be able to immediately see which one had the higher rating. 

The Biden Administration acknowledged that actions of the federal government alone in responding to cyber incidents are not enough, and called on private sector companies “to follow the Federal government’s lead and take ambitious measures to augment and align cybersecurity investments with the goal of minimising future incidents.”

This attack did not appear to involve the kind of highly sophisticated steps that Russia and China's state sponsored hackers are best known for.  Rather than directly try to take over the pipelines, the attackers went after what officials say was poorly protected corporate data, stealing it on such a large scale that it forced the company to close  the pipeline rather than risk the attack spreading further across the USA.

The White House:      DefenseOne:      CNBC:     Spectrum News:     New York Times:    Image: The White House

You Might Also Read:

Running Out Of Cyber Gas:

 

« Careers In Cloud Security
The European Union's Digital Security Plan »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

DLA Piper

DLA Piper

DLA Piper is a global law firm with offices throughout the Americas, Asia Pacific, Europe and the Middle East. Practice areas include Cybersecurity.

DataVantage

DataVantage

DataVantage data masking and data management software helps you prevent data breaches, pass compliance audits and meet regulatory requirements such as HIPAA and PCI DSS.

Lawley Insurance

Lawley Insurance

Lawley is a full-service, independent insurance agency. Specialty insurance products include Cyber Security.

RHEA Group

RHEA Group

RHEA Group offers aerospace and security engineering services and solutions, system development, and technologies including cyber security.

Zymbit

Zymbit

Zymbit provides hardware security modules (HSM) for IoT devices, including Raspberry Pi and other single board computers.

Ampliphae

Ampliphae

Ampliphae gives you an easy-to-deploy, sophisticated and affordable cloud-discovery, security and compliance platform.

CHEQ

CHEQ

CHEQ provides fully autonomous, preemptive technology for brand safety and ad-fraud prevention.

RealCISO

RealCISO

RealCISO is a CISO grade cloud platform to help companies understand, manage, and mitigate their cyber risk.

ITTAS

ITTAS

ITTAS is a multidisciplinary company specializing in information security and software and hardware protection software.

FYEO

FYEO

FYEO is a threat monitoring and identity access management platform for consumers, enterprises and SMBs.

ID North

ID North

ID North is a Nordic service provider offering identity security to its customers by providing world class expertise and best-in-class solutions and services.

ProArch

ProArch

ProArch is a global team of multidisciplinary experts in cloud, infrastructure, data analytics, cybersecurity, compliance, and software development.

BitLyft

BitLyft

BitLyft is a managed detection and response provider that is dedicated to delivering unparalleled protection from cyber attacks for organizations of all sizes.

Galvanick

Galvanick

Galvanick enables your operations and IT teams to protect your industrial systems and networks against digital threats.

NinjaOne

NinjaOne

The NinjaOne Platform was built to help IT and MSP teams efficiently manage, patch, and support all endpoints.

Pango

Pango

Pango is a leading provider of digital consumer security solutions.