Ausnahme gefangen: SSL certificate problem: certificate is not yet valid ๐Ÿ“Œ How to Interpret the Various Sections of the Cybersecurity Executive Order

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š How to Interpret the Various Sections of the Cybersecurity Executive Order


๐Ÿ’ก Newskategorie: IT Security Nachrichten
๐Ÿ”— Quelle: veracode.com

The Biden administration released a new executive order for cybersecurity on May 12, 2021. Although many know the overarching message of the executive order, itโ€™s also important to know the specific details outlined in each section. As our CEO Sam King remarked, โ€œIt gets really specific about the types of security controls they want organizations to adhere to and government agencies to take into account when theyโ€™re looking to do business with software vendors in particular.โ€ As we go through each section, we will intersperse thoughts from Sam King and Chris Wysopal, co-founder and CTO at Veracode, as well as thoughts and statements from Forrester analysts, Allie Mellen, Jeff Pollard, Steve Turner, and Sandy Carielli, from their recently aired webinar, A Deep Dive Into The Executive Order On Cybersecurity. Section 1 The first section talks about the overarching policy in the executive order, stating: โ€œThe United States faces persistent and increasingly sophisticated malicious cyber campaigns that threaten the public sector, the private sector, and ultimately the American peopleโ€™s security and privacy.ย  The Federal Government must improve its efforts to identify, deter, protect against, detect, and respond to these actions and actors.โ€ It sets the framework for the order, calling โ€œprevention, detection, assessment, and remediation of cyber incidentsโ€ a top priority. And if the Federal Government takes ownership of national cybersecurity, it will not only improve security in the public sector, it should also increase regulations in the private sector. Section 2 Section 2 removes the barriers to sharing threat information. In other words, IT Service Providers can no longer hide information pertaining to breaches โ€“ even due to contractual obligations. And they will have to disclose this information in a timely manner. As Turner expresses in the Forrester webinar, โ€œthis section really opens up the door for all of the further technology improvements and the way that we want to improve security holistically as we go down toward significantly modernizing the way that the federal government does cybersecurity.โ€ Section 3 Speaking of modernizing the way that the federal government handles cybersecurity, section 3 is specifically aimed at addressing todayโ€™s sophisticated cyber threat environment. It sets the groundwork for moving the Federal Government to secure cloud services and a zero-trust architecture. As part of the zero-trust policy, vendors providing IT services to the government will have to deploy multifactor authentication and encryption in a specified time period. Section 4 Section 4 enhances software supply chain security. It sets a new precedent for the development of software sold to the government. Developers will be expected to have increased oversight of their software and they will be required to make security data public. Wysopal found โ€œthe scope of the software supply chain requirements to be the most notable aspectโ€ of the new executive order, stating, โ€œItโ€™s very comprehensive โ€“ all the different aspects of delivering secure software that hasnโ€™t been tampered with by attackers, that has had software assurance practices built into the development pipeline, and notification to the federal government if a vendor has been compromised โ€“ because thereโ€™s a likelihood that the software was the target.โ€ This section also proposes that software be ranked or labeled based on its security. As Carielli explains in the Forrester webinar, the software will be labeled with a ranking โ€“ like energy star of good housekeeping โ€“ proving a vendorโ€™s security standing. Wysopal is a strong proponent of the labeling program, comparing it to programs used in the UK and Singapore on IoT devices. He sees it as a good way to incentivize vendors to secure their products. King agrees, calling the pilot program a great way to increase transparency and accountability.ย  Sections 5 and 6 Despite all of these new steps in place to prevent cyber incidents, itโ€™s still possible for a breach to occur. Thatโ€™s where section 5 comes into play. Section 5 establishes a review board โ€“ similar to the National Transportation Safety Board โ€“ to analyze cyber incidents and propose steps for future avoidance, which Wysopal praises as a welcome addition. There will also be a standard playbook โ€“ outlined in section 6 โ€“ that will provide response tips for cyberattacks. Section 7 Section 7 โ€œimproves the ability to detect malicious cyber activity on federal networks by enabling a government-wide endpoint detection and response system and improved information sharing within the Federal government.โ€ And section 8 improves investigation and remediation by requiring federal agencies to maintain a cybersecurity event log. Sections 8, 9, and 10 The final three sections call for the adoption of the National Security Systems requirements laid out in the Executive Order and provide any outstanding definitions or provisions.ย  Although the Forrester analysts outlined some potential issues with the executive order during their webinar, like the extra budget and resources that will be needed to fund the cybersecurity requirements, they also noted the potential for the executive order to have a positive effect on the private sector. Pollard estimates that the private sector will likely follow suit in requiring IT vendors to release breach data and follow a zero-trust architecture. He also predicts the private sector will require increased security in the software development lifecycle. Wysopal recently stated in his blog New Cybersecurity Executive Order: What You Need to Know, โ€œThe US government wonโ€™t be the last entity demanding more security transparency from software vendors. It's a sign of whatโ€™s to come for any organization creating software in any industry.โ€ What do you think? Will the requirements of the executive order trickle down the private sector? Keep an eye out for our upcoming blog where Chris Wysopal, co-founder and CTO of Veracode, will give his opinions on how the executive order will impact the consumer market. In the meantime, visit the Veracode Executive Order page for additional insight on Bidenโ€™s executive order. ...



๐Ÿ“Œ How to Interpret the Various Sections of the Cybersecurity Executive Order


๐Ÿ“ˆ 90.15 Punkte

๐Ÿ“Œ Zero Trust by Executive Order | Best Practices For Zero Trust Security You Can Takeaway From Bidenโ€™s Executive Order


๐Ÿ“ˆ 43.77 Punkte

๐Ÿ“Œ Why is the predefined order of sections in the command manual like this? What is the reason?


๐Ÿ“ˆ 31.45 Punkte

๐Ÿ“Œ Escaping the order, download and review sections to prevent XSS


๐Ÿ“ˆ 31.45 Punkte

๐Ÿ“Œ What Can be Expected in Trump's Cybersecurity Executive Order?


๐Ÿ“ˆ 27.14 Punkte

๐Ÿ“Œ President Trump signs cybersecurity executive order


๐Ÿ“ˆ 27.14 Punkte

๐Ÿ“Œ Trump Signs Cybersecurity Executive Order


๐Ÿ“ˆ 27.14 Punkte

๐Ÿ“Œ Trump's cybersecurity executive order met with mixed reviews


๐Ÿ“ˆ 27.14 Punkte

๐Ÿ“Œ Trump signs executive order on cybersecurity, White House now runs the show


๐Ÿ“ˆ 27.14 Punkte

๐Ÿ“Œ Trump Executive Order Tackles Concerns About Cybersecurity


๐Ÿ“ˆ 27.14 Punkte

๐Ÿ“Œ Trump Signs Executive Order On Cybersecurity


๐Ÿ“ˆ 27.14 Punkte

๐Ÿ“Œ Executive Order: Trump fordert viele Cybersecurity-Berichte an


๐Ÿ“ˆ 27.14 Punkte

๐Ÿ“Œ Executive Order: Trump fordert viele Cybersecurity-Berichte an


๐Ÿ“ˆ 27.14 Punkte

๐Ÿ“Œ Industry Reactions to Trump's Cybersecurity Executive Order


๐Ÿ“ˆ 27.14 Punkte

๐Ÿ“Œ Executive Order: Trump fordert viele Cybersecurity-Berichte an


๐Ÿ“ˆ 27.14 Punkte

๐Ÿ“Œ Trump's Cybersecurity Executive Order a Positive Step, but Just a Start


๐Ÿ“ˆ 27.14 Punkte

๐Ÿ“Œ Building Upon Trumpโ€™s Executive Order on Cybersecurity


๐Ÿ“ˆ 27.14 Punkte

๐Ÿ“Œ Trumpโ€™s Cybersecurity Executive Order Under Fire


๐Ÿ“ˆ 27.14 Punkte

๐Ÿ“Œ Federal Agencies Respond to 2017 Cybersecurity Executive Order


๐Ÿ“ˆ 27.14 Punkte

๐Ÿ“Œ Trump Signs Executive Order to Bolster Cybersecurity Workforce


๐Ÿ“ˆ 27.14 Punkte

๐Ÿ“Œ White House issues Executive Order on cybersecurity, including hacker Hunger Games


๐Ÿ“ˆ 27.14 Punkte

๐Ÿ“Œ White House issues Executive Order on cybersecurity, including hacker Hunger Games


๐Ÿ“ˆ 27.14 Punkte

๐Ÿ“Œ Industry Reactions to Cybersecurity Workforce Executive Order


๐Ÿ“ˆ 27.14 Punkte

๐Ÿ“Œ Executive Order On Americaโ€™s Cybersecurity Workforce


๐Ÿ“ˆ 27.14 Punkte

๐Ÿ“Œ Executive Order Would Strengthen Cybersecurity Requirements for Federal Agencies


๐Ÿ“ˆ 27.14 Punkte

๐Ÿ“Œ Biden issues executive order to increase U.S. cybersecurity defenses


๐Ÿ“ˆ 27.14 Punkte

๐Ÿ“Œ Executive Order on Cybersecurity Is Imminent: Itโ€™s Been a Long Time Coming


๐Ÿ“ˆ 27.14 Punkte

๐Ÿ“Œ U.S. President Signs Disruptive Cybersecurity Executive Order | UpGuard


๐Ÿ“ˆ 27.14 Punkte

๐Ÿ“Œ New Cybersecurity Executive Order: What You Need to Know


๐Ÿ“ˆ 27.14 Punkte

๐Ÿ“Œ Biden issues Executive Order to strengthen nation's cybersecurity networks


๐Ÿ“ˆ 27.14 Punkte

๐Ÿ“Œ Biden's executive order faces challenges trying to beef up US cybersecurity


๐Ÿ“ˆ 27.14 Punkte

๐Ÿ“Œ Software, Incident Response Among Big Focus Areas in Biden's Cybersecurity Executive Order


๐Ÿ“ˆ 27.14 Punkte

๐Ÿ“Œ Expert: Biden's executive order is a good sign and step toward solid cybersecurity


๐Ÿ“ˆ 27.14 Punkte











matomo