Free Republic
Browse · Search
News/Activism
Topics · Post Article

President Trump has signed an Executive Order to require All Federal agency IT systems and networks to comply with Cybersecurity NIST security controls starting within 90 days.

The previous adminstration's Cybersecurity EO applied to the private sector and as expected, exempted federal government IT systems and personnel.

DJT's signed this just in the nick of time, ie: one day before today's Massive Ransomware attack on EU contries government IT systems.

1 posted on 05/12/2017 11:26:51 AM PDT by MarchonDC09122009
[ Post Reply | Private Reply | View Replies ]


To: MarchonDC09122009

I doubt many agencies can meet this, however holding them to a standard is a good thing.


2 posted on 05/12/2017 11:32:27 AM PDT by KC_Conspirator
[ Post Reply | Private Reply | To 1 | View Replies ]

To: MarchonDC09122009

Related from today’s news:Ransomware infections reported worldwide - BBC News

http://www.bbc.com/news/technology-39901382

Technology
Ransomware infections reported worldwide
By Chris Baraniuk Technology reporter

    2 hours ago
    From the section Technology

The ransomware has been identifed as WannaCry - here shown in a safe environment on a security researcher’s computer

A massive ransomware campaign appears to have infected a number of organisations around the world.

Computers in thousands of locations have apparently been locked by a program that demands $300 (£230) in Bitcoin.

There have been reports of infections in as many as 74 countries, including the UK, US, China, Russia, Spain, Italy and Taiwan.

Many security researchers are linking the incidents together.

One cyber-security researcher tweeted that he had detected many thousands of cases of the ransomware, known as WannaCry and variants of that name.
Advertisement

“This is huge,” said Jakub Kroustek at Avast.

Another, at cyber-security firm Kaspersky, said that the ransomware had been spotted cropping up in 74 countries and that the number was still growing.

Several experts monitoring the situation have linked the infections to vulnerabilities released by a group known as The Shadow Brokers, which recently claimed to have dumped hacking tools stolen from the US National Security Agency (NSA).

A patch for the vulnerability was released by Microsoft in March, but many systems may not have had the update installed.

Some security researchers have pointed out that the infections seem to be deployed via a worm - a program that spreads by itself between computers.

The UK’s National Health Service (NHS) was also hit by a ransomware outbreak on the same day and screenshots of the WannaCry program were shared by NHS staff.
Media captionWhat is ransomware?

A number of Spanish firms were among the apparent victims elsewhere in Europe.

Telecoms giant Telefonica said in a statement that it was aware of a “cybersecurity incident” but that clients and services had not been affected.

Power firm Iberdrola and utility provider Gas Natural were also reported to have suffered from the outbreak.

There were reports that staff at the firms were told to turn off their computers.

Screenshots of WannaCry with text in Spanish were also shared online.

In Italy, one user shared images appearing to show a university computer lab with machines locked by the same program.

Bitcoin wallets seemingly associated with the ransomware were reported to have already started filling up with cash.
‘Spreading fast’

Another firm that confirmed it had been caught out was delivery company FedEx, though it did not clarify in which territories it had been hit.

“Like many other companies, FedEx is experiencing interference with some of our Windows-based systems caused by malware,” it said in a statement.

“We are implementing remediation steps as quickly as possible.”

And Portugal Telecom also confirmed it was struck: “But none of our services were affected,” a spokeswoman told the Reuters news agency.

“This is a major cyber attack, impacting organisations across Europe at a scale I’ve never seen before,” said security architect Kevin Beaumont.

According to security firm Check Point, the version of the ransomware that appeared today is a new variant.

“Even so, it’s spreading fast,” said Aatish Pattni, head of threat prevention for northern Europe.

More to follow


3 posted on 05/12/2017 11:35:43 AM PDT by MarchonDC09122009 (When is our next march on DC? When have we had enough?)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: MarchonDC09122009

Related:

The Information Security control standard for US government and private sector IT systems:

https://nvd.nist.gov/800-53/Rev4/

    800-53/800-53A Rev4

NIST Special Publication 800-53 (Rev. 4)

Security Controls and Assessment Procedures for Federal Information Systems and Organizations
Control Families

AC - Access Control
AU - Audit and Accountability
AT - Awareness and Training
CM - Configuration Management
CP - Contingency Planning
IA - Identification and Authentication
IR - Incident Response
MA - Maintenance
MP - Media Protection
PS - Personnel Security
PE - Physical and Environmental Protection
PL - Planning
PM - Program Management
RA - Risk Assessment
CA - Security Assessment and Authorization
SC - System and Communications Protection
SI - System and Information Integrity
SA - System and Services Acquisition
Minimum Security Controls

High-Impact Baseline
Moderate-Impact Baseline
Low-Impact Baseline
800-53 (Rev. 4)

Security Controls
    Low-Impact
    Moderate-Impact
    High-Impact
Other Links
    Families
    Search

Incident Response Assistance and Non-NVD Related Technical Cyber Security Questions:

US-CERT Security Operations Center
Email: soc@us-cert.gov
Phone: 1-888-282-0870

Sponsored by
DHS/NCCIC/US-CERT


4 posted on 05/12/2017 11:40:20 AM PDT by MarchonDC09122009 (When is our next march on DC? When have we had enough?)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: MarchonDC09122009

Any web operator of any sort has experienced dozens, hundreds, if not thousands of Chinese-sourced attacks since freaking 1995. That would be DAILY. It’s only taken 20+ years to get on this. No doubt, all these items in the EO will take until 2019 to implement.


5 posted on 05/12/2017 11:46:14 AM PDT by Attention Surplus Disorder (Apoplectic is where we want them!)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: MarchonDC09122009
The emphasis on environments that will receive copies of “potentially infected” documents concerns me.

Antivirus and cloud environments get off-site copies of sensitive data.

I understand the intention, but the details are a problem.

6 posted on 05/12/2017 12:13:52 PM PDT by ConservativeMind (Trump: Befuddling Democrats, Republicans, and the Media for the benefit of the US and all mankind.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: MarchonDC09122009

You know, if this policy were put in place in the first 150 days of the Obama presidency and followed, Hillary would be president now...


8 posted on 05/12/2017 1:59:14 PM PDT by jz638
[ Post Reply | Private Reply | To 1 | View Replies ]

To: MarchonDC09122009
I was going to comment on this earlier but since I work on a military installation I decided to wait until I got home.

But geez, come on, we have enough security on our computers now that is makes doing our job almost impossible. Software doesn't run correctly, websites and network backbone aren't Windows 10 compatible, and now they want to INCREASE the amount of security? We won't be able to do squat if the gubermint enacts even more security measures.

11 posted on 05/12/2017 5:35:25 PM PDT by ducttape45 (Every Saint has a past, Every Sinner has a Future!)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: MarchonDC09122009

This is racist and unconstitutional, and will be blocked by the 9th Circus./s


13 posted on 05/13/2017 1:29:12 PM PDT by Eleutheria5 (“If you are not prepared to use force to defend civilization, then be prepared to accept barbarism.)
[ Post Reply | Private Reply | To 1 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson