Page 28 - Cyber Defense eMagazine August 2024
P. 28

What CIRCIA Demands

            The rules require covered organizations to report ransomware payments to CISA within 24 hours and all
            covered  cyber incidents  within 72 hours. The  rules apply to a broad  array of entities across  16 critical
            infrastructure  sectors  as  defined  by  CISA,  including  energy,  water,  transportation,  healthcare,  and
            financial services, among others.

            CISA anticipates CIRCIA will affect more than 316,000 entities, result in around 210,525 reports and cost
            critical  infrastructure  providers  an  estimated  $2.6  billion  in  rule  familiarization,  data  and  record
            preservation, and reporting expenses.



            Why Critical Infrastructure


            We have substantial evidence from governments  and private sector threat researchers that nation-state
            threat actors are attempting to compromise  and pre-position  cyber-attack infrastructure  within U.S. and
            allied critical infrastructure systems.

            The Volt Typhoon revelations of the last several months have helped expose the extent of these efforts.
            They also highlight that 85% of U.S. critical infrastructure is run by private sector organizations.

            Any nation-wide  effort  to detect, contain,  and recover  from cyber attacks  on U.S. critical  infrastructure
            would  require  speed  in  situational  awareness  and  greater  visibility  into  the  nature  and  scope  of  an
            adversary's offensive cyber operations.

            Without  visibility into cyber  incidents across  critical infrastructure  sectors, it will be very difficult for the
            government,  private  sector operators,  and the threat research  community  to understand  and pre-empt
            future attacks, let alone coordinate effective responses to minimize impact during major incidents.



            What CIRCIA Means for CISOs

            Every new rule, requirement and guideline initially tends to pose more questions than clarity. Fortunately,
            the  CIRCIA  draft  rules  will  likely  answer  many  CISOs’  questions  around  definitions,  compliance
            requirements,  and  potential  costs  associated  with  them.  The  comprehensive  nature  of  the  rules
            demonstrates how serious the U.S. government is about the information sharing required to protect these
            systems.  It  also  acknowledges  previous  private-sector  concerns  around  reporting  definitions,
            confidentiality, and accountability.

            CISA acknowledged incident reporting concerns raised by the SEC reporting mandates of 2023. In areas
            such  as  the  confidentiality  of  shared  cyber  attack  information,  CISA  commits  to  only  releasing  such
            information  as  anonymized,  aggregated  data  within  quarterly  reports.  The  agency  states  it  will  not
            consider information  shared in good faith early in a cyber incident as false or misleading  if subsequent
            information shows initial disclosures were inaccurate. CISA even commits to working with other agencies
            to harmonize all U.S federal incident reporting requirements, hopefully making the CISO's already difficult
            role of complying with them somewhat easier.




            Cyber Defense eMagazine – August 2024 Edition                                                                                                                                                                                                          28
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   23   24   25   26   27   28   29   30   31   32   33