Obama’s Power To Set Cybersecurity Standards Is Limited

Analysts at the National Cybersecurity & Communications Integration Center prepare for an exercise

J. Scott Applewhite/AP

AA Font size + Print

Analysts at the National Cybersecurity & Communications Integration Center prepare for an exercise

For the last three years, President Obama has been unable to get a cybersecurity bill through Congress. By Matthew Cooper

As President Obama readies to strike the Syrian regime, it’s worth thinking about that other defense problem—cybersecurity—and what it says about Washington in the Obama era.

On Wednesday, the capital will be consumed by the March on Washington, as well it ought, and the looming battle with Syria—although not at the same time, for surely the missiles won’t fly at the very moment Obama salutes nonviolence.

But the country’s efforts to beef up cybersecurity are stymied, even after thefts at the National Security Agency and the Army have made Edward Snowden and Chelsea (nee Bradley) Manning emblems of computer vulnerability. This week shows why.

On Wednesday, while the marchers march and the Pentagon plans, a federal agency in Maryland called theNational Institute for Standards and Technology will be issuing a draft report for cybersecurity standards—basically a list of best practices for businesses and other institutions to follow as they try to protect their networks.

NIST, as it’s called, is the much-admired scientific agency that runs the atomic clock and comes up with standards for everything from weights and measures to medical devices. It doesn’t regulate, but it’s been around in some form since the early days of the Republic and its word is listened to closely by industry and government.

For the last three years, Congress has been unable to come up with a cybersecurity bill that the president could sign. And to be fair, it’s been over honest disagreements rather than raw obstructionism, such as filibuster abuse. The House has passed a bill with overwhelming GOP support and a considerable number of Democrats that would enable information sharing between companies and the government in an effort to shut down hackers. Opponents on the left and right have offered up civil-liberties arguments, saying that’s a license to abuse private data. Throw in some classic questions about corporate liability and you have a stalemate—but at least the old-fashioned kind built around ideas (and lobbying of course), rather than gun-to-the-head threats like the debt ceiling.

The cyber stalement is why the president issued an executive order earlier this year asking NIST to come up with a voluntary framework for reducing cyber risks to critical infrastructure. (His order also opened up more information sharing in the government.) And so the agency’s worked diligently on it and will issue best practices tomorrow. But while they would certainly improve security if acted on, none of them are likely to provide the degree of protection that can only be afforded by legislative action, nor does anyone expect them to. One insider calls them “no brainers,” likening them to use-a-secure-password bromides. (You can read more about where NIST is planning here and about the legislative stalemate here.) Whether you believe in the House bill’s information-sharing approach or a heavier regulatory regime, everyone’s pretty much agreed that NIST isn’t enough.

And this is where it comes back to Obama. For those who think a president has extraordinary executive powers to lead, here’s a case where he’s pretty much tapped out. The problem is grave enough that Congress may eventually give the president something that he’s willing to sign. Until then this is about the best he can do—a conspicuous limitation of presidential power in a week where he’s likely to flex his strongest muscles by making speeches and making war.

Close [ x ] More from DefenseOne
 
 

Thank you for subscribing to newsletters from DefenseOne.com.
We think these reports might interest you:

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • GBC Issue Brief: Supply Chain Insecurity

    Federal organizations rely on state-of-the-art IT tools and systems to deliver services efficiently and effectively, and it takes a vast ecosystem of organizations, individuals, information, and resources to successfully deliver these products. This issue brief discusses the current threats to the vulnerable supply chain - and how agencies can prevent these threats to produce a more secure IT supply chain process.

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Information Operations: Retaking the High Ground

    Today's threats are fluent in rapidly evolving areas of the Internet, especially social media. Learn how military organizations can secure an advantage in this developing arena.

    Download

When you download a report, your information may be shared with the underwriters of that document.