CDM, Einstein aren’t enough, security experts say
Connecting state and local government leaders
To make the next hack of a federal agency less devastating, the Continuous Diagnostics and Mitigation and Einstein programs need complementary data protection tools.
The cyberattack that exposed the personally identifiable information of up to 4 million current and former federal employees has left the Office of Personnel Management reeling and security experts pondering how the damage might have been lessened.
The post-mortem analysis touches on two Department of Homeland Security programs -- known as Continuous Diagnostics and Mitigation (CDM) and Einstein -- that are the cornerstones of federal civilian cyber defense. To make the next hack of a federal agency less devastating, security experts say, these programs need to be complemented with tools such as encryption.
Details of how the hackers breached Office of Personnel Management are still emerging. A DHS spokesman said Einstein, an intrusion-detection program, was involved in the response to the breach, but CDM is a broader program whose direct role in responding to the cyberattack is much more difficult to measure. Nonetheless, security experts are using one of the largest-ever hacks of federal employee data as a teachable moment for cybersecurity policy.
"Cybersecurity must mean more than protecting the system -- it must also include protecting data," said John Cohen, former acting undersecretary for intelligence and analysis at DHS. "If information contained within government and private-sector systems is encrypted, then the harm caused by cyberattacks such as this one would be minimal."
The Einstein system, which DHS began deploying in 2005, focuses on the perimeter of federal networks by installing sensors at web access points and sifting through that data for vulnerabilities. But once hackers are already on the network, that initial line of defense is moot and the focus should be on protecting data inside the network, said Cohen, who is now a professor at Rutgers University.
DHS's Computer Emergency Readiness Team used the Einstein system to discover the recent breach at OPM, according to DHS spokesman S.Y. Lee. After OPM suffered a big breach in March 2014, the agency beefed up its cybersecurity via a "comprehensive network monitoring plan, through which OPM detected new malicious activity" in April 2015, Lee said in a statement.
A DHS official noted that "U.S. CERT reviewed the malware and shared the analysis with the affected agencies and interagency partners, and deployed the signatures to Einstein to protect federal networks."
But to Morgan Wright, a consultant who has worked cybersecurity projects for DHS and the Justice Department, those efforts are insufficient. Einstein "pretty much failed, unless you consider the five months it took to discover the intrusion 'real-time,'" he said. Multiple reports have said that the hackers hit OPM in December but the agency did not detect the intrusion until April.
And Einstein, now in its third iteration, doesn't come cheap. For fiscal 2016, DHS requested $479.8 million for "network security deployment" including Einstein 3.
CDM, meanwhile, focuses on metrics such as endpoint security and identity management. The program offers a system of dashboards that give network managers a clearer view of vulnerabilities and, as the name implies, at least theoretically provides "continuous" monitoring. And it too involves significant agency spending; the blanket purchase agreement for CDM services has a total ceiling of $6 billion.
Chris Cummiskey, who until November was DHS's acting undersecretary for management, said he held out more hope for CDM than Einstein as a remedy for sophisticated breaches because CDM "seems to give us the additional ability to see these bad actors on the networks, once they're already through the perimeter."
The latest cyberattack on OPM hit an agency data center hosted by the Department of the Interior, highlighting the vulnerabilities that come from having interconnected federal civilian networks. One of the biggest challenges in rolling out massive and complementary programs like Einstein and CDM is that they are implemented at different rates across federal agencies, so that security "holes will continue to exist," said Cummiskey.
Lee, the DHS spokesman, declined to comment on the extent to which OPM and Interior had implemented CDM and Einstein. OPM and Interior spokespeople referred those questions back to DHS.
This article originally appeared on FCW, a sister site to GCN.
NEXT STORY: Cyber weapons: 4 defining characteristics