<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2975524&amp;fmt=gif">
BLOG

Executive Order in Place to Boost Cybersecurity

May 30, 2017

If we have learned anything from the massive cyber hack, entitled WannaCry, that hit 150 countries recently, there needs to be more measures taken to upgrade the defense against those that are trying to extort countries for money, or cripple the world through cyber warfare.

President Donald Trump heard the request loud and clear and recently signed an executive order (EO) to beef up the cyber defense in the United States - to help continue the fight against cyber hacking.

The executive order calls for a comprehensive review of government and private sector cybersecurity, and the establishment of a plan for protecting digital networks that store sensitive data.

It includes specific cybersecurity directives for government agencies, including requiring each leader of every agency to adopt a uniform set of standards laid out by the National Institute of Standards and Technology.

How to See Your Baseline Traffic

The order also calls for a study of the threat posed by “botnets,” which hackers use to overwhelm targeted servers, often referred to as
Bad Bots.

The nation’s overall cybersecurity was also addressed in the executive order. Specifically, President Trump highlighted the following areas for improved cybersecurity nationwide:

  • Deterrence and protection
  • International cooperation
  • Workforce development

Basically, what the order does is it puts the focus on the executive-level to be more accountable. It also secures the third-party ecosystem and develops a market-based approach to securing the critical infrastructure. It brings some of the best initiatives from the private sector and applies them to the government.

Skeptics are critical of too much reliance on third-party systems that have foreign sources. This is of particular concern with recent cyber attacks from Russia and China. For example, Russian cyber security company Kaspersky Labs hasn’t done anything wrong that we know of, but it’s not out of the realm of possibilities.

 

Wanna Cry Virus

 

Known but unmitigated vulnerabilities are among the highest cybersecurity risks faced by the executive departments and agencies. Some of the known vulnerabilities include using opening systems or hardware beyond the vendor’s support lifecycle, declining to implement a vendor’s security security patch (ie. WannaCry, picture above), or failing to execute security-specific configuration guidance.

Agency leaders are going to be required to lead integrated teams of senior executives with expertise in IT, security, budgeting, acquisition, law, privacy and human resources.

The big thing about the order is there isn’t much that is actionable yet, with much of it comprising of deadline recommendations. But a lot of analysts appreciate the approach. The order borrows heavily from President Obama’s administration's recommendations, and focuses heavily on the infrastructure and pushes as much as possible to the private cloud.

However, the only way we will truly know the impact is when the policies actually emerge. The EO has a 90 day deadline for each agency in the executive branch to submit a risk management report. It would describe their security measures and what are deemed to be significant risks. It also requests a study to determine whether at least some agencies can realistically adopt consolidated network architectures.

So now we wait and see.

The first line of defense is seeing your baseline traffic. If you want to dig deeper, download our free white paper, How to see your Baseline Trafficand see if your network applications and users are healthy. 

See Everything. Secure Everything.

Contact us now to secure and optimized your network operations

Heartbeats Packets Inside the Bypass TAP

If the inline security tool goes off-line, the TAP will bypass the tool and automatically keep the link flowing. The Bypass TAP does this by sending heartbeat packets to the inline security tool. As long as the inline security tool is on-line, the heartbeat packets will be returned to the TAP, and the link traffic will continue to flow through the inline security tool.

If the heartbeat packets are not returned to the TAP (indicating that the inline security tool has gone off-line), the TAP will automatically 'bypass' the inline security tool and keep the link traffic flowing. The TAP also removes the heartbeat packets before sending the network traffic back onto the critical link.

While the TAP is in bypass mode, it continues to send heartbeat packets out to the inline security tool so that once the tool is back on-line, it will begin returning the heartbeat packets back to the TAP indicating that the tool is ready to go back to work. The TAP will then direct the network traffic back through the inline security tool along with the heartbeat packets placing the tool back inline.

Some of you may have noticed a flaw in the logic behind this solution!  You say, “What if the TAP should fail because it is also in-line? Then the link will also fail!” The TAP would now be considered a point of failure. That is a good catch – but in our blog on Bypass vs. Failsafe, I explained that if a TAP were to fail or lose power, it must provide failsafe protection to the link it is attached to. So our network TAP will go into Failsafe mode keeping the link flowing.

Glossary

  1. Single point of failure: a risk to an IT network if one part of the system brings down a larger part of the entire system.

  2. Heartbeat packet: a soft detection technology that monitors the health of inline appliances. Read the heartbeat packet blog here.

  3. Critical link: the connection between two or more network devices or appliances that if the connection fails then the network is disrupted.

NETWORK MANAGEMENT | THE 101 SERIES