NIST Cybersecurity Framework: Is It Going Off The Rails?

by Reed Smith
Contact

In Executive Order 13636, President Obama directed the Secretary of Commerce and the National Institute of Standards and Technology (NIST) “to lead the development of a framework to reduce cyber risks to critical infrastructure…” While an executive order is directed only to agencies and offices within the executive branch, the purpose of the framework is “to help owners and operators of critical infrastructure identify, assess, and manage cyber risk.” These “owners and operators” are primarily private sector companies that form the critical infrastructure and provide financial, energy, telecommunications, water, public health and other services to the nation. The order was necessary because of the inability of Congress to pass legislation relating to critical infrastructure and cybersecurity. The principal areas of contention were the nature and extent of public-private information sharing, appropriate privacy protections for any information that is shared, and liability protections for those companies that share information with the government.

NIST published the “Preliminary Cybersecurity Framework” October 29 of this year after a series of conferences, workshops, meetings and general industry outreach. The Framework is comprised of a Core, a Profile, and Information Tiers. The Core contains standards and best practices that are common across all sectors and industries. The standards are divided into five functions: Identify, Protect, Detect, Respond and Recover, which are generally consistent with industry and international information security standards such as ISO 27001. The Profile section is intended to be a tool for a company to map its “Current” alignment with the standards against a “Target” profile that will address identified cybersecurity risk. The Framework provides the concept of a profile but does not specify templates for creating one. Rather, a company or sector might use the elements of the Core to construct its own Current and Target profiles. The four Implementation Tiers describe increasingly rigorous and mature states of cybersecurity, from “Partial” (ad hoc) to “Adaptive” (cybersecurity Nirvana), against which an organization can conduct a self-evaluation based on risk, resource and regulatory considerations. The Framework is a rigorous set of standards and methodologies that one would expect of NIST, given its existing expertise in the field of cybersecurity.

The comment period ran through December 13 and NIST has received significant input from many industries, sectors and organizations. While there is general industry support for the purpose, content, and collaborative development of the Framework, there is less certainty around its eventual effect and implementation. The introduction to the Framework contains the following statement: “Because each organization’s risk is unique, along with its use of IT and ICS [industrial control systems], the implementation of the Framework will vary.” It remains to be seen whether the Framework is truly voluntary and tailorable to the needs of a given organization.

Another area of focus for many commenters is the reference to the Fair Information Practice Principles (FIPPs) in Appendix B of the Framework and its treatment of privacy and civil liberties. A discussion draft that was circulated to industry in August did not have an explicit reference to FIPPs in Appendix B, and its inclusion in the Preliminary Framework is concerning. FIPPs was first articulated in the early 1970s and provides the conceptual basis for the Privacy Act of 1974, which guides how the government obtains, retains and uses information about citizens. It is referenced in section 5 of the Executive Order but only in the context of agency activities. While government agencies may have developed policies around FIPPs, a private entity would be less likely to have. In fact, many statutory and regulatory regimes apply directly to companies that collect, process, store and share personal information of their employees, customers and others. Financial institutions are regulated under the privacy and security provisions of the Gramm-Leach-Bliley Act, health care organizations are subject to the privacy and security rules under HIPAA, telecommunications companies know how to protect Customer Proprietary Network Information, energy companies are familiar with the treatment of Customer Energy Usage Data, and the Federal Trade Commission has been very active in protecting personal privacy online.

More importantly, the Cybersecurity Framework may be directed away from its principal function if undue emphasis is placed on rules governing the treatment of personal information, thereby frustrating its purpose. The Executive Order defines critical Infrastructure as “systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety…” In testimony before the House Permanent Select Committee on Intelligence earlier this year, witnesses emphasized that most of the information that is processed in these critical infrastructure systems contains little or no personal data. If the presence of personal information in these systems is limited, if there are existing regulatory schemes for protecting such information, and if the purpose of the Framework is to protect all data in these systems, then implementation of a consensus Framework should be attainable. We have seen how striking the balance between privacy and security continues to elude attempts at information-sharing legislation. Will that same elusiveness derail the development of a “prioritized, flexible, repeatable, performance-based, and cost-effective approach” to reducing cyber risks? Should it?

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© Reed Smith | Attorney Advertising

Written by:

Reed Smith
Contact
more
less

Reed Smith on:

Readers' Choice 2017
Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Privacy Policy (Updated: October 8, 2015):
hide

JD Supra provides users with access to its legal industry publishing services (the "Service") through its website (the "Website") as well as through other sources. Our policies with regard to data collection and use of personal information of users of the Service, regardless of the manner in which users access the Service, and visitors to the Website are set forth in this statement ("Policy"). By using the Service, you signify your acceptance of this Policy.

Information Collection and Use by JD Supra

JD Supra collects users' names, companies, titles, e-mail address and industry. JD Supra also tracks the pages that users visit, logs IP addresses and aggregates non-personally identifiable user data and browser type. This data is gathered using cookies and other technologies.

The information and data collected is used to authenticate users and to send notifications relating to the Service, including email alerts to which users have subscribed; to manage the Service and Website, to improve the Service and to customize the user's experience. This information is also provided to the authors of the content to give them insight into their readership and help them to improve their content, so that it is most useful for our users.

JD Supra does not sell, rent or otherwise provide your details to third parties, other than to the authors of the content on JD Supra.

If you prefer not to enable cookies, you may change your browser settings to disable cookies; however, please note that rejecting cookies while visiting the Website may result in certain parts of the Website not operating correctly or as efficiently as if cookies were allowed.

Email Choice/Opt-out

Users who opt in to receive emails may choose to no longer receive e-mail updates and newsletters by selecting the "opt-out of future email" option in the email they receive from JD Supra or in their JD Supra account management screen.

Security

JD Supra takes reasonable precautions to insure that user information is kept private. We restrict access to user information to those individuals who reasonably need access to perform their job functions, such as our third party email service, customer service personnel and technical staff. However, please note that no method of transmitting or storing data is completely secure and we cannot guarantee the security of user information. Unauthorized entry or use, hardware or software failure, and other factors may compromise the security of user information at any time.

If you have reason to believe that your interaction with us is no longer secure, you must immediately notify us of the problem by contacting us at info@jdsupra.com. In the unlikely event that we believe that the security of your user information in our possession or control may have been compromised, we may seek to notify you of that development and, if so, will endeavor to do so as promptly as practicable under the circumstances.

Sharing and Disclosure of Information JD Supra Collects

Except as otherwise described in this privacy statement, JD Supra will not disclose personal information to any third party unless we believe that disclosure is necessary to: (1) comply with applicable laws; (2) respond to governmental inquiries or requests; (3) comply with valid legal process; (4) protect the rights, privacy, safety or property of JD Supra, users of the Service, Website visitors or the public; (5) permit us to pursue available remedies or limit the damages that we may sustain; and (6) enforce our Terms & Conditions of Use.

In the event there is a change in the corporate structure of JD Supra such as, but not limited to, merger, consolidation, sale, liquidation or transfer of substantial assets, JD Supra may, in its sole discretion, transfer, sell or assign information collected on and through the Service to one or more affiliated or unaffiliated third parties.

Links to Other Websites

This Website and the Service may contain links to other websites. The operator of such other websites may collect information about you, including through cookies or other technologies. If you are using the Service through the Website and link to another site, you will leave the Website and this Policy will not apply to your use of and activity on those other sites. We encourage you to read the legal notices posted on those sites, including their privacy policies. We shall have no responsibility or liability for your visitation to, and the data collection and use practices of, such other sites. This Policy applies solely to the information collected in connection with your use of this Website and does not apply to any practices conducted offline or in connection with any other websites.

Changes in Our Privacy Policy

We reserve the right to change this Policy at any time. Please refer to the date at the top of this page to determine when this Policy was last revised. Any changes to our privacy policy will become effective upon posting of the revised policy on the Website. By continuing to use the Service or Website following such changes, you will be deemed to have agreed to such changes. If you do not agree with the terms of this Policy, as it may be amended from time to time, in whole or part, please do not continue using the Service or the Website.

Contacting JD Supra

If you have any questions about this privacy statement, the practices of this site, your dealings with this Web site, or if you would like to change any of the information you have provided to us, please contact us at: info@jdsupra.com.

- hide
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.