Enhancing Readiness for National Cyber Defense through Operational Collaboration - NEW YORK CYBER TASK FORCE
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
Enhancing Readiness for National Cyber Defense through Operational Collaboration NEW YORK CYBER TASK FORCE Enhancing Readiness for National Cyber Defense through Operational Collaboration | 1
2 Columbia | SIPA
CONTENTS Foreword 3 Appendixes 30 Members of the New York Cyber Task Force 4 Appendix 1: Establishing a National Cyber Executive Summary 5 Crisis Contingency Identification Program 31 Introduction 6 Appendix 2: Map of Drivers to Scenarios 33 NYCTF Analytical Approach and Activities 8 Appendix 3: Scenarios 47 Recommendations to Enhance National Cyber Appendix 4: Workshop Findings 49 Response Readiness 11 Appendix 5: Solarium Commission and Recommendation 1: Identify National Cyber NDAA Observations 60 Crisis Contingencies 12 Notes 61 Recommendation 2: Establish a National Cyber Response Network 14 Recommendation 3: Operation of the NCRN 16 Recommendation 4: Assess National Cyber Response Capabilities to Ensure Readiness 17 Recommendation 5: Ensure National Cyber Readiness through Training and Exercises 19 Enabling Operational Readiness 20 Enabling Recommendation 1: Establish Integrated Cyber Crisis Information Networks 20 Enabling Recommendation 2: Address Technology Evolution to Ensure Readiness 21 Enabling Recommendation 3: Remove Legal and Procedural Barriers to Enhance Response 23 Enabling Recommendation 4: Build Trust and Confidence for Cyber Crisis Response 25 Enabling Recommendation 5: Close Resource Gaps to Ensure Readiness 27 Conclusion 29 Enhancing Readiness for National Cyber Defense through Operational Collaboration | 1
2 Columbia | SIPA
FOREWORD Broadband from space, 5G, the Internet of Things, artificial intelligence, and Machine Learning—the information revolution is gaining speed and effect. Our personal lives, businesses, governments, and safety are all becoming increasing- ly dependent on Internet-based connections. Digital growth is only accelerating as COVID-19 increases reliance on the cyber ecosystem. Impressive as these applica- tions are, the cyber threat is proceeding at an even faster pace that does not recognize geographic boundaries, and every beneficial new development brings greater vulnera- bilities. To an increasing extent, malignant cyber activity now threatens not only our convenience but also our wealth and safety. We both were asked to serve as advisers and to participate in the activities of the New York Cyber Task Force on operational collaboration. We commend the Columbia University School of International and Public Affairs for continuing to bring togeth- er private, public, and academic leaders to address the difficult issues. These are the three groups that must integrate their knowledge, plans, and actions to preserve the benefits of the information revolution, while dealing with the threats. The NYCTF report Enhancing Readiness for National Cyber Defense through Operational Collabora- tion provides insights into the challenges and thoughtful, practical recommendations to make progress. Our government and private leadership both have responsibilities, and both must act together along the lines presented in this report to establish a na- tional cyber response network that will both increase the security of information net- works and respond to successful attacks. Today’s fragmented, patchwork defenses are completely inadequate. We must invest now in readiness to secure our digital future. Admiral Dennis C. Blair Admiral Michael S. Rogers Enhancing Readiness for National Cyber Defense through Operational Collaboration | 3
MEMBERS OF THE NEW YORK CYBER TASK FORCE Dmitri Alperovitch – Silverado Policy Accelerator Niloofar Howe – Energy Impact Partners John Bansemer – Georgetown University Merit Janow – Columbia University† Dennis C. Blair – Former U.S. Director of National Kristin Judge – Cybercrime Support Network Intelligence Elsa Kania – Center for New American Security Erica Borghard – Atlantic Council Elena Kvochko – SAP Michael Bradshaw – NBC Universal Joshua Lane – Bank of America Rico Brandenburg – Oliver Wyman David Lashway – Baker Mckenzie Geoff Brown – City of New York Thomas Lind III – BlueVoyant Chris Button – Analysis and Resilience Center for Shawn Lonergan – PricewaterhouseCoopers Systemic Risk Perry Menezes – KPMG Byron Collie – JP Morgan Chase Clint Mixon – New York City Cyber Command John Costello – Cyberpace Solarium Commission Erinmichelle Perri – The New York Times Michael Daniel – Cyber Threat Alliance Neal A. Pollard – UBS Scott DePasquale – Analysis and Resilience Center for Systemic Risk Gregory Rattray – Next Peak‡ Daniel Dobrygowski – World Economic Forum Michael S. Rogers – Former Director of the National Security Agency and U.S. Cyber Command Benjamin Flatgard – JP Morgan Chase Katheryn Rosen – JPMorgan Chase David Forscey – The Aspen Institute Monica Ruiz – Microsoft Thomas Fuhrman – VECTORmv Saleela Salahuddin – Facebook Nathaniel Gleicher – Facebook Adam Segal – Council on Foreign Relations Eric Goldstein – Goldman Sachs Phil Venables – Google Josh Harriman – Rapid 7 Daniel Wallance – McKinsey & Company Jason Healey – Columbia University Matthew Waxman – Columbia University Justin Henck – Facebook Evan Wolff – Crowell & Moring† Trey Herr – Atlantic Council ‡ Executive Director † Co-Chairs 4 Columbia | SIPA
EXECUTIVE SUMMARY The United States must reduce its vulnerability to strategic disruption by adversaries acting through cyberspace. Geopolitical and social forces, growing technological de- pendencies, and inherent advantages for ever more capable cyberattackers raise the risk of a major cyber crisis. Such a crisis could have significant adverse effects on public health and safety, the economy, and national security. Given mounting cyber chal- lenges, the United States must take immediate steps to improve its cyber readiness to withstand such potential attacks. In the spring of 2020, the School of International and Public Affairs (SIPA) recon- vened the New York Cyber Task Force (NYCTF) to develop approaches to enhance cyber readiness through public-private operational collaboration that would enable more effective coordinated responses to cyber crises. The NYCTF assessed future risks to U.S. national security stemming from cyber challenges including political, eco- nomic, and technological developments; changing cyber conflict dynamics; and the COVID-19 pandemic. We then envisioned severe, yet plausible, scenarios projected for 2025 to examine how well the nation could defend itself in cyberspace. By looking to the future, the NYCTF shifted away from yesterday’s issues to focus on longer-term enhanced cyber readiness. Our deliberations consistently identified shortfalls in our current operational collaboration capabilities and effective coordination efforts. In this report, the NYCTF details recommendations to create an effective, whole- of-nation approach to enable enhanced cyber readiness through operational collab- oration. At their core, these recommendations focus on establishing a public-private network of empowered nodes to provide effective crisis response to strategic cyber contingencies. The NYCTF sees the development of this network as a fundamental step in enhancing cyber readiness. We hope to build on the momentum created by the inclusion of key operational collaboration measures in the recent Solarium Com- mission Report and the 2021 National Defense Authorization Act (NDAA), as well as actions taken at the state and municipal levels and by the private sector. The United States must undertake a focused, urgent cyber readiness effort through improved op- erational collaboration now. Enhancing Readiness for National Cyber Defense through Operational Collaboration | 5
INTRODUCTION The United States faces crucial cyber challenges as a na- ability to deal with severe cyber events by leveraging op- tion. Our security and our economic and social life in- erational collaboration. creasingly rely on the digital realm while adversaries seek Operational collaboration entails deep organizational to take advantage of such reliance. Enhancing readiness partnerships that enable coordinated responses to se- for effective national cyber defense must be a joint pub- verely disruptive cyber crises. We envision these coordi- lic-private endeavor. nated efforts at all levels of government—federal, state, Columbia University’s School of International and Pub- municipal—in full partnership with the private sector. lic Affairs (SIPA) has sponsored the New York Cyber Enhancing national cyber readiness through improved Task Force (NYCTF), which convenes a cross section operational collaboration has risen as a priority in cyber of leading members of business, policy, and academia and national security dialogues, including in the recent to bring a unique perspective to cyber policy issues. In Cyberspace Solarium Commission Report, the 2021 the fall of 2017, under the direction of Senior Research National Defense Authorization Act (NDAA),3 and the Aspen Cybersecurity Group’s recommendations to the incoming Biden Administration.4 At its core, operation- Operational collaboration allows the private al collaboration allows the private and public sectors and public sectors to conduct coordinated to conduct coordinated cyber defense actions through highly synchronized planning and operations, as well as cyber defense actions through highly develop joint cyber capabilities to respond to adverse cy- synchronized operations. ber events. Effective operational collaboration builds on previous progress in public-private information sharing by developing the necessary organizations, authorities, Scholar Jason Healey, the NYCTF issued its first report, integration processes, and capabilities—across all levels “Building a Defensible Cyberspace.”1 That report iden- of government and the private sector—to prepare for tified key leverage points — innovations across technol- and respond to cyber crises. ogy, operations, and policy—that grant the greatest ad- The Task Force identified many challenges related to im- vantage to cyber defenders over attackers at the least cost proving operational collaboration, the most pressing of and greatest scale. Since its release, the report has helped which stemmed from a lack of established, exercised, and focus government and industry efforts. The themes of effective organizations to integrate public and private this report were included in the U.S. Cyberspace Solar- sector cybersecurity planning and response capabilities ium Commission Report.2 One critical leverage point in a time of crisis. identified by the first NYCTF report was the impor- tance of “operational collaboration,” the integrated U.S. adversaries will seek to take advantage of our na- public-private preparation and response to severe cyber tion’s vulnerabilities in cyberspace. Our nation will live crises. In the spring of 2020, the second NYCTF was ever more deeply in the digital environment. The United formed under the direction of Adjunct Senior Research States must prepare to meet future cyber readiness chal- Scholar Gregory Rattray to build on the findings of the lenges today. This preparation must build on an under- first report with a central focus on improving the nation’s 6 Columbia | SIPA
standing of the drivers of future cyber risks and recognize The NYCTF acknowledges that much work has oc- combinations of increasingly sophisticated adversary ac- curred to prepare the nation for cyberattacks. In the tion, vulnerabilities created by our growing technology Federal government, these efforts must build on DHS dependence, and weaknesses in our current response ca- Cybersecurity, as well as efforts of the Federal Bureau pabilities. Leaders must develop plans and capabilities to of Investigation, and in the private sector a rich array of scale readiness to cyber incidents that materially threaten Information Sharing and Analysis Organizations in key the United States. While developing more secure tech- industries and providers of cyber response services also nology and systems is imperative, establishing effective will provide strong foundations. However, the NYCTF cyber operational collaboration processes and effective assesses the nation’s current capabilities do not amount cyber capabilities must be a national security priority. to the integrated response network required to deal with Effective future cyber readiness requires investing the re- the sophisticated cyberattack as posited in our scenarios. sources to establish and strengthen public-private opera- Our recommendations would subsume and build on the tional collaboration and the organizations, relationships, current patchwork of organizations to form a national joint capabilities, and trust that is required. Accordingly, structure for cyber readiness and response. the NYCTF makes the following recommendations to establish enhanced cyber readiness in the United States: The views expressed herein are thought to reflect a broad consensus of the Task Force members, while individual views may differ, of course, on specific points. Recommendation 1 Enabling Recommendation 1 Identify National Cyber Crisis Contingencies Establish Integrated Cyber Crisis Information Networks Recommendation 2 Enabling Recommendation 2 Establish a National Cyber Response Network (NCRN) Address Technology Evolution to Ensure Readiness Recommendation 3 Enabling Recommendation 3 Operation of the NCRN Remove Legal and Procedural Barriers to Enhance Response Recommendation 4 Assess National Cyber Response Capabilities to Ensure Enabling Recommendation 4 Readiness Build Trust and Confidence for Cyber Crisis Response Recommendation 5 Enabling Recommendation 5 Ensure National Cyber Readiness through Training and Close Resource Gaps to Ensure Readiness Exercises Enhancing Readiness for National Cyber Defense through Operational Collaboration | 7
NYCTF ANALYTICAL APPROACH AND ACTIVITIES The first New York Cyber Task Force looked at three lev- posed by severely disruptive attacks rather than the con- els of activity that provide defensive advantages to cyber duct of cyber espionage. defenders—policy, operational, and technological. This This second iteration of the NYCTF joined forces with nu- work focuses on the operational level—the level of activ- merous organizations seeking to improve the nation’s un- ity where specific organizations conduct cyberattack and derstanding and response to cyber challenges. We helped defense operations to achieve their objectives. The Task assess the Solarium Commission’s work at their request, Force defines operational collaboration as the functional particularly their efforts around developing operational col- activities and actions that occur between organizations laboration. The Task Force’s report does not address all the to achieve a mutually beneficial result. Applied to U.S. recommendations in the Solarium Commission’s report; national cybersecurity challenges, organizations across however, the NYCTF report does recommend going deeper all levels of government and the private sector must en- in key areas highlighted by the Commission Report. Spe- gage in operational collaboration. The relevant opera- cific Commission recommendations were mapped to cor- responding scenarios in our workshops, and the NYCTF The Task Force chose to focus on politi- provided our findings to the Commission.5 cal, economic, and technological factors Additionally, as the ongoing COVID-19 pandemic and cyberattack and defense dynamics that highlighted the necessity of cross-government collabo- might pose significant cyber challenges in ration for effective crisis response, the NYCTF sought an approach aimed at developing public-private opera- five years’ time. tional collaboration at all levels of government—feder- al, state, and municipal. The Task Force teamed with R tional collaboration activities and measures required to Street Institute in its ongoing work on state and local enhance U.S. cyber readiness to prevent, address, and cyber response. NYC Cyber Command provided advice respond are the identification of national systemic cyber throughout this effort. We worked with the Atlantic risks, identification of strategic adversaries, warning of Council in developing a scenario used in the NYCTF systemic attacks, planning, preparations, and operations deliberations as well as serving as a scenario for the Oc- to respond in the case of cyberattacks that threaten na- tober 2020 Cyber 9/12 competition for future cyber pol- tional security. The Task Force chose to focus on politi- icy makers.6 The Task Force also engaged leaders from a cal, economic, and technological factors and cyberattack wide range of leading think tanks and industry associa- and defense dynamics that might pose significant cyber tions, including the Aspen Cyber Institute, the Council challenges in five years’ time. This focus on potential fu- on Foreign Relations, and World Economic Forum. Key ture risks instead of current problems provides insight private sector leaders across multiple sectors including fi- on specific actions the nation can take now to enhance nance, technology, media, and security as well as key pri- national cyber readiness for the future. The proposed ap- vate sector organizations, the Cyber Threat Alliance and proach to strengthen U.S. national security could serve the Analysis and Resilience Center were engaged. Task as a model for other countries and has the potential to Force efforts have been enhanced and informed by these connect with systems of other countries to enhance glob- intellectual collaboration and ongoing participation in al cyber resilience. We also chose to focus on challenges communicating Task Force findings. 8 Columbia | SIPA
Over the past year, the NYCTF conducted three phases of activity: Driver Identification Phase 1 → → → → → → → → U.S. domestic Cyber Systemic Systemic cyber Global politics Economic Technology ecosystem cyberattack defense COVID-19 politics instability advantages weaknesses Scenario Design Phase 2 Scenario 1 Scenario 2 Scenario 3 Scenario 4 → → → → Workshops Workshops Workshops Workshops → → → → Phase 3 Findings Findings Findings Findings → → → Final Report → Our first step was identifying drivers of cyber challenges to national security. These scenarios covered a range of that may exist in 2025. Seven categories were examined: adversaries, potential attack vectors, and geo-political, global politics, U.S. domestic politics, economic, tech- economic, and technological factors that could combine nology, cyber ecosystem instability, systemic cyberattack to create very stressful cyber crises that might arise in advantages, and systemic cyber defense weaknesses. As 2025.8 This exercise was not an attempt to predict the COVID-19 took hold, an eighth category was identi- future. However, the NYCTF leveraged deep expertise fied to reflect the societal and technological challenges in considering the nature of scenarios worth further de- presented by the pandemic. Once categories were es- liberation. Opinion can and will vary regarding the de- tablished, the group began to forecast specific potential gree to which different drivers might come together and future developments in each of the driver categories to create a potentially severe cyber crisis. A multiplicity of form plausible cyber threat scenarios in 2025. The NYC- potential toxic brews exists. The NYCTF believes that TF believes the identification of these drivers provides a these scenarios serve as strong starting points to illumi- strong foundation for our nation’s understanding which nate reasonable planning contingencies. We established cyber contingencies may prove challenging and how we the following four scenarios: must organize our operational collaboration efforts. We encourage readers to see Appendix 2 for our list of cy- SCENARIO 1 ber challenge drivers. The Task Force made a deliberate Rising tensions in the Middle East lead to an increased choice to focus on challenges rather than on trends that U.S. presence in the region supporting Saudi Arabia and might make cyber defense easier as it is easier to adapt to alarming Iran. The rapid integration of smart technology fortunate than unfortunate circumstances. In addition, in U.S. critical infrastructure creates exploitable vulnera- the Task Force made a conscious decision not to address bilities. Iran uses these vulnerabilities to coerce the U.S. quantum computing in our work.7 by targeting major metropolitan areas with disruptive Next, the Task Force designed a set of four scenarios attacks against the electrical and transportation sectors, that present a series of severe but plausible challenges causing intermittent power outages. Enhancing Readiness for National Cyber Defense through Operational Collaboration | 9
SCENARIO 2 In the summer of 2020, the Task Force decided to adapt a scenario to focus on the possibility of domestic extrem- China continues its rise as a competitive global player. ist groups conducting cyber disruption. Understanding China’s rise as a global tech competitor enabled penetra- how to reduce such risks must be included in national tion of Internet of Things (IoT) devices and Artificial In- cyber defense planning. To conduct such planning, sce- telligence (AI) databases, enabling for IoT- and AI based narios serve as guides, not predictions. The development attacks on U.S. infrastructure in under-regulated criti- and consideration of scenarios was viewed as a means cal industries. As tensions mount in the APAC region, to encourage the identification of potential cyber cri- China mounts a major disruptive attack against logistics, ses worthy of focused attention to assist in contingency shipping, and healthcare, limiting the ability to marshal planning efforts the NYCTF recommends. Detailed sce- a response. nario descriptions are provided in Appendix 3. SCENARIO 3 Using the scenarios as starting points, we conducted workshops where Task Force members worked through North Korea, seeking to launder funds to enable nucle- the scenarios to identify the nature of operational col- ar weapons development, leans on cryptocurrency and laboration activities that would be required, challenges cybercrime to funnel funds. As the digital underground to conducting these activities, and recommendations for thrives with North Korean sponsorship, criminal capa- overcoming those challenges. Each workshop had two bilities rapidly evolve. When tensions on the Korean phases. The first phase placed participants in the year peninsula eventually erupt, North Korea uses advanced 2025 during the crisis posed by a given scenario and fo- cloud exploits to penetrate the financial system and wipe cused on identifying likely gaps in our operational col- data, disrupting financial services. Attacks are amplified laboration capabilities, processes, and organizations. The by cybercriminal actors using North Korean provided second phase brought participants back to the present tools. to determine the short-term organizational and legisla- tive actions necessary to enhance operational readiness SCENARIO 4 for the future.9 In Appendix 4, we provide sets of chal- As wealth disparities increase, driven by ever larger lenges and findings that emerged in our workshop de- technology conglomorates, the nation moves to cloud- liberations. The NYCTF believes using scenarios for a based, IoT-driven smart cities. Domestic political events structured deliberation is one of the most effective ways and declining levels of public trust give rise to domestic to identify and understand the key operational collab- extremist groups motivated by growing wealth divides. oration challenges the U.S. must address. The NYCTF As public opinion drops to an all-time low, domestic has synthesized our findings to focus on the most im- extremist groups exploit the growth in IoT devices to portant drivers as a basis for making recommendations launch amplified DDoS attacks, disrupting smart tech- to enhance readiness for U.S. national cyber defense. nology dependent emergency services and the media, causing disrupted responses and jammed lines of com- munication, while exasperating civil unrest with divisive messaging. 10 Columbia | SIPA
RECOMMENDATIONS TO ENHANCE NATIONAL CYBER RESPONSE READINESS Effective national cyber crisis response requires a wide As others have considered U.S. cyber defense at the lev- range of organizations to conduct complex technical and el of national security challenges, findings and recom- operational activities rapidly and in synchronized fash- mendations—dating back to the 1998 President’s Com- ion across a variety of geographies and technical systems. mission on Critical Infrastructure—focus dominantly Because the public and private sectors each have distinct on the role of the Federal government. The NYCTF comparative advantages in cyberspace, effective cyber certainly acknowledges the central role both the Exec- crisis response will require both sectors to provide their utive Branch and the Congress will play. The NYCTF unique capabilities. Thus, the nation’s cyber readiness consciously decided not to analyze missions and recom- depends on the coordination of capabilities across the mend specific roles and responsibilities within the Fed- full spectrum of organizations at all levels of government eral Executive Branch. Instead, we focused on providing and the private sector. recommendations with a whole-of-nation perspective. The NYCTF does strongly support the establishment of Effective national cyber crisis response a National Cyber Director and corresponding Office of the National Cyber Director (ONCD)—mandated in requires a wide range of organizations to the 2021 National Defense Authorization Act—and we conduct complex technical and operation- see the ONCD as the enabling organization for some of al activities rapidly and in synchronized our recommendations. fashion across a variety of geographies and The NYCTF further feels that state and local govern- technical systems. ment leaders must also play key roles in responding to the types of contingencies we have identified that chal- The NYCTF inherently views national cyber defense lenge the nation’s security. Further, the private sector as readiness as a whole-of-nation mission involving the the driver and supplier of technological foundations, as private sector and all levels of government. As outlined operator of critical systems and infrastructure, as the lo- below, much work needs to be done. Increasingly, in the cus for attacks on national economic functions, and as digital realm, national security challenges and conflicts providers of crucial cyber security response capabilities play out in networks and systems used and operated must be fully engaged. The NYCTF encourages private by the private sector. Our adversaries can reach down sector leadership focus on secure technological foun- to the state and local level when seeking to conduct cy- dations and investing in cyber readiness capabilities to berattacks, as well as across multiple jurisdictions within appropriately participate in the nation’s defense. Our na- the U.S. simultaneously. Many stakeholders across the tion’s security and future in cyberspace will require many nation will need to collaborate to enhance our nation’s to shoulder burdens and collaborate in order to reap the cyber readiness. Corporate and government leaders both gains that the digital realm provides. must examine their risks and responsibilities to enable The NYCTF also recognizes that while we focused on the investment of effort and resources the U.S. requires U.S. national security challenges in the area of opera- to enhance readiness for the challenges we have identi- tional collaboration, we believe our recommendations fied. must work within a global political, economic, and Enhancing Readiness for National Cyber Defense through Operational Collaboration | 11
technical environment. The NYCTF believes that col- • Provide criteria for assessing the readiness of the laborative efforts to achieve cyber security and resilien- NCRN cy must extend beyond national borders and hopes that • Establish a program to ensure the NCCCs are up to U.S. efforts will contribute greatly in light of global chal- date and that findings from assessments are used to lenges in this realm as well. drive operational and budgeting priorities • Provide the basis for exercises of the NCRN Recommendation 1 Identify National Cyber Crisis Contingencies Identifying National Cyber Crisis Contingencies Recommendation 2 Establish a National Cyber Response Network (NCRN) Drivers Supply Great Power Global Chain Recommendation 3 Competition Recession Dependencies Operation of the NCRN Artificial Intelligence Offense Remote Recommendation 4 Decline of Dominance in Work Cyberspace Assess National Cyber Response Capabilities to Ensure Globalization Readiness Recommendation 5 Distilled into Ensure National Cyber Readiness through Training and Exercises Recommendation 1: Identify National Cyber Crisis Contingencies National Cyber Crisis Constingencies To assess our readiness, identify deficiencies, and rec- (NCCCs) ommend improvements, our nation must identify the Adversary(ies) key national security challenges that will confront our • Intent • Capabilities collaborative cyber defense effort. The NYCTF recom- Severity mends that the Office of the National Cyber Director • Scale work with all stakeholders at Federal, state, and local • Duration levels and including the private sector to establish a pro- Impacted Targets gram to identify a prioritized set of national cyber crisis • National Functions contingencies (NCCCs) to: • Technology/Data • Guide selection of the organizations, communica- tions, and responsibilities within the National Cyber Response Network (NCRN) Organizations in the U.S. government already use sce- narios to establish, exercise, and improve capabilities for • Establish criteria for situational awareness by the national security challenges. Identifying NCCCs con- NCRN in event of these NCCCs, based on potential tributes to readiness by identifying strategic adversar- impacts and risks, including the effect of an attack’s ies. The Department of Defense (DOD) uses scenarios scale, duration, and severity based on the capabilities of both current and potential • Focus of planning and exercise activities by the future adversaries and conflicts. The Federal Emergency NCRN and the associated NCRN nodes leveraging Management Agency (FEMA) seeks to be ready to re- public and private sources of information regarding spond to a wide range of natural disasters. Neither DoD adversary intentions and capabilities nor FEMA aims to predict the future. Both recognize that developing, exercising responses, and drawing les- 12 Columbia | SIPA
sons from plausible and challenging contingencies pro- We also recognize that publicly developed and widely vide the intellectual preparation, the coordinated skills, shared NCCCs will pose challenges to traditional pro- and the improving capabilities to deal with the crises that cesses and boundaries regarding national security infor- will actually occur. National readiness is dependent on mation and process. However, without active private having established and assessed the capabilities to meet sector involvement in the process and use of the NCCCs identified challenges. Sometimes, the nation is ready and to guide establishment of response plans and capabili- responds well to these challenges. Other times, our na- ties, the U.S. will not be ready to defend itself in cyber- tional response capabilities are lacking. However, with- space. Neither the government nor the private sector can out systematically identifying the challenges and their achieve their aims if they seek to conduct such an activity scale, the nation will lack the drive to expend the time alone or leave the task to others to accomplish. and treasure to establish capabilities and sustain them. The NYCTF recognizes establishing the recommend- The U.S. has been fortunate to date and not surprisingly ed program will take time, resources, and substantial lacks experience in identifying the requirements and scal- commitment. Currently, analysis to guide the NCCCs ing operational cyber responses in the event of a severe will have to rely heavily on expert opinion The NYC- cross-jurisdictional attack that impacts multiple organi- TF believes that the nation needs to work to establish zations, national critical functions, and societal functions for extended periods of time. While forecasting the scale To assess our readiness, identify deficien- and depth of potential adversary actions is difficult, such an assessment is necessary in terms of planning national cies, and recommend improvements, our cyber responses and the requisite operational collabora- nation must identify the key national tion capabilities. Identifying a set of clearly defined NC- CCs to scope the potential dimensions of a crisis allow security challenges that will confront our us to assess the adequacy of current response capabilities; collaborative cyber defense effort. identify key conflicts that might arise; and estimate the level of capabilities, resources, and manpower necessary to draw the crisis to an acceptable close in a given time- modeling and simulation capabilities similar to those frame. A program to identify NCCCs would codify this used to guide national response planning, including nu- assessment and allow for planning processes to produce clear and conventional military conflicts, pandemics, and actionable findings for leaders to use in prioritizing oper- severe weather outbreaks. Appropriately identifying the ational and financial resources going forward. contingencies that guide military, FEMA, and corporate planning exercises and capabilities assessment also require The program to identify NCCCs will need to align judgement and investment. The nation undertakes these with and provide input to numerous programs and efforts today to limit our risks. The U.S. must also do so planning constructs in the Federal government includ- as a whole-of-nation in the digital realm. ing DOD, the National Guard, DHS, the Intelligence Community, and others. The program must leverage The scenarios used in the NYCTF workshops are not knowledge and capabilities present in organizations the most challenging possible types of disruptive cyber- such as the NSA Cybersecurity Directorate, DHS attacks that could be pursued by advanced adversaries National Risk Management Center (NRMC), FEMA, facing the United States. Even so, we found operational and the private sector Analysis and Resilience Center collaboration capabilities sorely lacking across all levels (ARC), along with many others. State and municipal of government and the private sector. The lack of fore- organizations such as state-level fusion centers and sight guiding current planning efforts as understood by organizations like NYC Cyber Command must be the NYCTF was a recurring challenge throughout our involved. While analyzing specific intersections and scenarios. For example, Scenario One illuminated that process linkages required is beyond the scope of this the lack of informed planning will likely create challeng- NYCTF report, we recognize the complexity involved es when mustering capabilities across just three munic- in establishing a whole-of-nation NCCC identification ipalities, as stakeholders are not prepared to scale capa- program. bilities. The ONCD should use its authority to define, Enhancing Readiness for National Cyber Defense through Operational Collaboration | 13
evaluate, plan for, and prioritize key national cyber crisis (ISAOs), network operations centers (NOCs), and cyber contingencies. This effort must leverage resources across response teams in the government and the private sec- the government and the private sector to look forward tor, especially those response responsibilities for national in identifying emerging drivers and scale of cyber risks critical functions. The NYCTF recommends the new to the nation as our adversaries, technology, our econ- National Cyber Director designate a Federal government omy, and society evolve. As recommended above, these agency to lead a national effort to establish a National national contingencies must drive requirements, capabil- Cyber Response Network (NCRN). ities, and assessments across all levels of government and the private sector. • The NCRN organizations would connect a wide range of existing and potentially new organizations across all levels of government and in collaboration Recommendation 2: Establish a National with the private sector. Cyber Response Network • The NCRN organizations must be empowered in Our nation should approach cyber readiness through es- advance to orchestrate specific response actions for tablishing a collaborative, coherent network leveraging cyber defense during severe cyberattacks. existing information sharing and analysis organizations National Cyber Response Network Finance Industry Group Critical Nodes Infrastructure ARC Nodes Water State Nodes WA Digital Service AT&T Provider Nodes Energy Health MI AWS NY ISAC/ Federal Nodes Google ISAOs CTA CA MIcrosoft TX Cyber Threat LA FBI DHS Intellegence NYC3 Firm ISOC CISA MSSPs NSA Cyber Com Cybersecurity Nodes Municipal Nodes 14 Columbia | SIPA
Activated Nodes in a Crisis—an example based on NYCTF Scenario Three Finance Industry Group Critical Nodes Infrastructure Nodes ARC State Nodes Digital Service Provider Nodes NY Federal Nodes CTA MIcrosoft FBI DHS NYC3 CISA MSSPs NSA Cyber Com Cybersecurity Nodes Municipal Nodes The establishment of an NCRN is an important step, map, and coordinate Federal, state, local, and private re- but authorities, responsibilities, and procedures must be sponse capabilities and could also serve as the hub for established for dealing with attacks. The Task Force dis- exercises and training. Routine exercises and training not cussed how the continuing lack of a coherent approach only provide disparate response teams with a common to coordinating the array of public-private response ca- understanding of what to do in a crisis; these activities pabilities has remained a recurring challenge. As a re- can also serve as important relationship-building mecha- sult, stakeholders affected by a major cyberattack on the nisms and foster trust between teams. U.S. as depicted in our scenarios would likely lack the ability to coordinate, communicate, and collaborate for The Task Force envisions an NCRN comprised of invited an effective response. This challenge was illuminated in ISAOs, NOCs, cyber response teams, and related orga- our workshop for Scenario Four. Task Force members nizations from key private and public organizations able doubted the ability for cross jurisdictional and private to collaboratively provide a collective NCCC response sector response teams to rapidly integrate and respond capability. Each organization in the network would pro- to disruptive attacks for the simple reason that current vide cyber response capabilities based on its roles and response teams are not designed or trained to do so. Task mission within the government and private sector, com- Force members also identified a similar integration chal- bining with the expertise and talent to address different lenge in their assessment that cities may not know how aspects of NCCCs. They would cooperate within the to properly use National Guard units deployed to help network using operational concepts and procedures es- them in a crisis, due to a lack of knowledge of National tablished in collaboratively developed playbooks. This Guard capabilities and organizational structure. For the common operational language would extend the reach capabilities and expertise of potential response forces, of the system, as a whole, across geographic jurisdictions like the National Guard, to be deployed to the greatest as well as across critical sectors like electric power or core advantage in a cyber crisis, these capabilities and integra- cloud services. In response to cyber crises, organizations tion process must be understood, mapped, and practiced in the network will have the legal and structural permis- well in advance. A widely accepted and inclusive Nation- sions to activate planned public-private partnered crisis al Cyber Response Network would be able to evaluate, response cells made up of law enforcement agencies, Enhancing Readiness for National Cyber Defense through Operational Collaboration | 15
digital services, cybersecurity providers, and representa- • The federal lead agency would establish a common tives of national critical functions. concept of operations for the NCRN in consultation with operators of the designated NCRN nodes. Types of organizations that would be part of the network include Federal agencies like the Cybersecurity and Infra- • The federal lead agency would enable situational structure Security Agency (CISA) and United States Cy- awareness across the NCRN through establishment of ber Command (CYBERCOM), state and municipal gov- a common operating picture for use during National ernment agencies housing Cyber Response Teams (CRT), Cyber Crisis Contingencies (NCCCs). The common critical infrastructure information sharing and analysis operating picture must be developed in consultation centers (ISACs), as well as other industry associations and with operators of the designated NCRN nodes. alliances with an operational focus. The network model • Designated NCRN nodes would use the common will enable shared infrastructure, operational procedures, concept of operations. These nodes would be respon- increased operational efficiency, and strategic dialogue be- sible for developing the required integrative capabil- tween stakeholders. The Financial Services Information ities to leverage the common operating picture and Sharing and Analysis Center (FS-ISAC) and Analysis and participate in exercise and training to ensure readi- Resilience Center (ARC—formerly the FSARC) serve ness. as two prominent examples of private sector capabilities that can engage the node network as critical hubs.10 The FS-ISAC aims to reduce cyber risk by serving as a hub NCRN Operational Concept for sharing cyber threat information and defensive best practices with global financial institutions, and ISACs ex- ist across many industries as well as supporting state-level ▶ Critical Infra- Federal Nodes government. The ARC serves as an operational resiliency structure & Digital Service hub, conducting analysis of systemically important assets, ▶ ▶ Provider providing warning of attacks on those assets, and devel- Nodes oping resiliency measures. The private sector–led ARC ▶ collaborates with member companies, sector partners, Situational Awareness ▶ and U.S. national security organizations. As private sec- tor partners are identified and invited, similarly modeled ▶ ▶ organizations can be formed and integrated into the node State & Cybersecurity & network, improving public-private operational collabora- Industry Group tion. The difference with today’s collaboration approach Municipal Nodes ▶ Nodes would be an expansion of this model into multiple other sectors, as well as the establishment of a common set of cyber crisis response capabilities and processes to enable Nodes feed: Nodes receive: effective integration in national security–level contingen- • Attacks and Impacts • Intelligence cy response. • Responder Status • Common Operating • Current Actions Picture • Missions • Cyber Defense Recommendation 3: Operation of the NCRN • Objectives Actions • Desired State & Com- • Planned Proactive To leverage a collaborative NCRN, our nation must munications Defense Measures • Desired State & establish the capability to coordinate activity and share Communications situational awareness among key governmental and pri- vate sector players engaged in national-level cyber crisis Designated operational response teams will require a response. common concept of operations and operational picture • The federal lead agency would conduct overall coor- for effective coordination. Creating a common opera- dination and enable readiness of designated NCRN tional picture that compiles and organizes information nodes. available regarding friendly and adversary status, activity, 16 Columbia | SIPA
and predicted actions for shared situational awareness collaboration with the participants in the NCRN. The is a fundamental necessity for crisis responders. An ef- NCRN will clearly outline the nature of cyber response fective common operational picture must be ready and capabilities necessary to respond effectively to the NC- available before a crisis occurs. This picture must be con- CCs, seeking to establish minimum requirements and tinuously updated for the duration of the crisis response. identify capacity gaps across private and public stake- Situational awareness enables warning of systemic cy- holders. The federal lead agency for the NCRN should berattacks and enables coordination of operations. This use this framework to conduct annual assessments in necessity was made evident in workshops on Scenario conjunction with the designated nodes to assess read- Three. Task Force members found that in the finan- iness for the identified NCCCs. This cyber readiness cial sector, institutions of different sizes and capabilities framework should: would likely have different views of what was happening • S et standardized definitions for capabilities and re- in the situation, leading to differing, uncoordinated re- sources sponses. Medium and small sized financial institutions would probably have little situational awareness due to •E stablish minimum readiness and capacity require- differences in capabilities and posture. Managed Secu- ments for response to identified NCCCs rity Service Providers, the initial vector for the ransom- ware attack in this scenario, were expected to play a very ◊ Minimum core capacity levels will account for limited role in response and remediation once the attack the diversification of capabilities across juris- occurred, complicating response measures. Task Force dictions and sectors members believed it likely that government response would not have the adequate authority, processes, or ◊ Readiness requirements should account for tools to coordinate these actors. More unified situation- the possible need to leverage national organi- al awareness through a standing coordinated set of data zations for high value/low density (HV/LD) flows, information processes, and communications and assets that cannot be feasibly distributed across display tools, often referred to as a common operating different levels of government and/or estab- picture, can enable greater coordination of response lished within the private sector capabilities. The designated federal lead agency would ◊ R eadiness requirement should include cyber design a common operating picture process and support- training and exercise program participation by ing tools that participating partner nodes can contrib- designated NCRN nodes responsible for col- ute to as well as receive information from. The unified laborative response for those assets approach can be modeled on operational centers used to manage complex contingencies ranging from military ◊ The readiness and capacity requirements operations and emergency responses to terrorist events should be created in consultation with state, and natural disasters. local, and private partners • Enable shared understanding of necessary capabilities, Recommendation 4: Assess National Cyber facilitating investment decisions and expectations of Response Capabilities to Ensure Readiness deployment of key HV/LD capabilities across public and private sectors The NYCTF believes the United States is insufficient- ly prepared for the types of contingencies considered in • Direct ongoing capability and gap assessments for all the scenarios. Assessing the readiness of U.S. cyber re- participants in light of the NCCCs identified by the sponse capabilities is essential to guiding actions and in- ONCD vestment. Assessment efforts should recognize both the challenges and the opportunities that stem from the dis- tributed nature of U.S. capabilities that reside in many organizations in the private and public sectors. The NYCTF recommends the ONCD should be responsible for establishing a national cyber readiness framework in Enhancing Readiness for National Cyber Defense through Operational Collaboration | 17
Creating a National Cyber Readiness Framework can help local responders plug into the NCRN. Deep- er understanding of the appropriate types and scale of national pools of cyber response HV/LD assets is need- ed. Conducting assessment across the NCRN regarding ▶ TEXAS what can be done with local response capabilities and CTA ▶ DHS when and what augmentation might be necessary will ▶ help clarify HV/LD requirements. Having such a frame- ▶ ▶ ▶ work will also help clarify for cyber response coordina- ▶ ONCD tors at NCRN organizations what capabilities are at their ▶ disposal at any given point in time. ▶ ARC ▶ NYC3 As discussed across all the scenarios, the nation lacks the ▶ capacity for assessing and coordinating the full range of TECH public and private sector capabilities in the event of a ▶ PROVIDER multi-jurisdictional cyberattack. Creating an assessment framework enhances readiness by contributing to the planning and preparations necessary for effective response Nodes receive: activity. In general, Task Force members agreed that most Nodes feed: • Readiness Data • Standardized Defi- cyber response organizations do not feel individually re- • Framework Feedback nitions sponsible for assessing potential shortfalls in capabilities • HV/LD Requirements • Minimum Core Ca- needed to address severe cyber crises. Establishing a com- pacity • HV/LD Construct mon assessment framework of required cyber response • Minimum Thresholds capabilities is critical in effectively enhancing our opera- tional cyber capacity. Without such an assessment frame- Note: Recommended annual assessments will be self-con- work, the nation will not be able to assesses the maturi- ducted and signed off on by both the node being assessed and ty, depth, and adequacy of capabilities of response teams the designated lead agency aiding in the assessment. across private and public stakeholders. In the Scenario The capability assessment framework should assess two One workshop, participants were of the view that there categories: capabilities to integrate into the NCRN and are likely major differences in composition and strengths operational response capabilities. Integrative capabilities of different local, state, and federal response units as well are measured by the ability to coordinate with other re- as private sector response teams, especially across indus- sponse teams, i.e., the ability to support an organization tries. For example, different National Guard units are like- under attack with additional capacity and integrate with ly to possess different cyber strengths, and the rail sector’s a common operational picture. Operational response ca- response requirements and capabilities are likely to be dif- pabilities will be focused on local response capabilities ferent to that of the electricity sector. To account for these necessary to assess, respond to, and recover from an at- differences, the framework should define the capabilities tack, i.e., digital forensics, system and network rebuild, of available response capabilities and measure that capa- and administration. The cyber assessment framework bility across government and private sector NCRN nodes must also map high value/low density (HV/LD) assets to understand available expertise and capacity. that are sustained by NCRN members with deeper re- The NYCTF recommends that the newly established sources and missions to provide these assets. The concept ONCD and designated federal lead agency for the of HV/LD density assets underpins national security and NCRN design the assessment framework. The designat- emergency response operations in other realms. The na- ed federal lead agency should work closely with each par- tion can afford only a limited number of aircraft carriers, ticipant in the NCRN on tailored assessment criteria for airborne command posts, or nuclear hazmat teams. In that participant, according to the defined criteria across the cyber realm, response capabilities in limited supply key NCCCs for a given NCRN node. The designated would include personnel with advanced technical skill federal lead agency should also work with state and lo- sets such as malware analysis and skilled personnel and cal governments to establish their frameworks, and work infrastructure like deployable command centers that with providers of national critical functions and other 18 Columbia | SIPA
private sector entities through relevant ISAOs, ARCs, sent across all the scenarios we considered. For example, and other private sector nodes. Creating the assessments in Scenario Three, Task Force members highlighted the in consultation with the full set of NCRN organizations existence of partnerships between the financial sector and will enable the private sector to play a role in guiding key national security players in government as a positive appropriate capability requirements for investment rath- indicator. However, as Task Force members explored the er than requirements established by Federal mandate, current partnership, major limitations became apparent. which might disincentivize participation. Task Force While these partnerships provide cooperation on infor- members assessed that this more inclusive co-creation mation sharing and even collaborative attack warnings, process will simultaneously foster cooperation and trust potential mitigation measures are hamstrung by a lack between parties and aid stakeholder engagement in es- of public-private response planning, exercises, and train- tablishing the node network. ing. In the event of a major crisis, response teams from government and private sector stakeholders would likely Recommendation 5: Ensure National Cyber spend critical time at the initial phase of a crisis integrat- Readiness through Training and Exercises ing their processes, tools, and teams. The United States needs to ensure the availability of the Regular collaborative training and exercises based on right skilled personnel and exercise its ability to respond common playbooks involving NCRN teams would sig- to NCCCs in a vigorous, structured fashion to under- nificantly reduce the time needed to integrate capabili- stand our readiness and potential weaknesses. The desig- ties during an actual crisis. The federal lead agency can nated federal lead agency for the NCRN should cooper- assist in coordination of regular large-scale exercises and ate with participants in the network to establish ongoing training programs for multiple NDCN nodes. Exercises public-private training and exercise programs that will should include as many stakeholders as is feasible to help build proficiency in managing cyber crisis response oper- ensure that different nodes in the network understand ations. Exercises should be mapped to the NCCCs. The the potential downstream effects if one sector comes un- assigned federal lead agency should: der attack, while also learning how to provide support during such an event. Exercises should be mapped to the •C oordinate with NCRN participants in the conduct NCCCs. After-action reports and lessons-learned from of an ongoing collaborative training and exercises collaborative training and exercises serve three important program linked to key National Cyber Crisis Contin- purposes. First, they identify shortcomings in the perfor- gencies (NCCCs) mance of the various organizations in the NCRN; sec- • Establish playbooks in consultation with the NCRN ond, they identify shortfalls in the overall performance participants for national crisis response focused on of the NCRN due to unclear procedures, authorities, the key NCCCs and responsibilities; third, they identify software and hardware shortfalls both within individual organizations • Over time, establish a national cyber training and ex- and in the network as a whole that need to be upgraded. ercise range to ensure command, control, and com- These observations can then be used to create and con- munications systems are adequately tested and func- tinuously enhance public-private response playbooks, tional in the case of a cyber crisis supporting tools, and infrastructure. Establishing pub- lic-private training programs, exercises, and playbooks Establishing collaborative training, exercises, and play- will increase the interoperability between stakeholders books underpin an effective national cyber crisis response and response teams, enhance synergies in a time of crisis, capability and contributes to readiness by enhancing and enhance trust and confidence between stakeholders. preparation and planning. Without shoulder-to-shoul- der training, drills, and exercises, operators will lack the The NYCTF believes the five recommendations detailed familiarity of working together. While standardized play- above can provide the foundation for U.S. national cyber books and response plans are necessary for aligning oper- readiness to deal with national security level challeng- ational teams, routinely practicing these response plans es. All levels of government and the private sector must is critical to maintaining efficient response capabilities. work together to establish these operational collabora- The NYCTF assessed that the necessary level of collab- tion capabilities and defend the nation in a coordinated orative training, exercising, and planning was largely ab- manner during a major cyber crisis. Enhancing Readiness for National Cyber Defense through Operational Collaboration | 19
You can also read