The Cybersecurity Implementation Plan has more updates

The NCSIP continues to gain traction with nearing implementation

The long fight to improve cybersecurity fundamentals in the United States continues with the first concrete iteration of the National Cybersecurity Strategy Implementation Plan. The NCSIP saw its initial drafts in early March 2023, signaling various objectives to strengthen personal and private cybersecurity.

The plan covers a variety of topics and offers a range of guidelines and reporting requirements depending on the industry. It also includes plans highlighting ways to combat cybercriminals and ideally destabilize malicious networks.

There are five critical “pillars” governing the approach and goals of the NCSIP:

  • Develop defense for critical infrastructure (utility, power, water)
  • Target threat networks and take steps to dismantle them
  • Encourage and mandate markets to follow cybersecurity guidelines
  • Invest in resilient architecture and cybersecurity practices
  • Strengthen international efforts to fight cybercrime

Action calls for additional cyber experts, as the cybersecurity and IT industry are critically understaffed in various business, local, and federal sectors. You can read the official release here.

Each pillar examined

The plan has five pillars, each covering a variety of areas with long-term goals in mind. Some are vaguer than others, but the primary objective is to broaden and strengthen cybersecurity initiatives where possible.

Critical Infrastructure Cybersecurity

It’s no secret critical infrastructure remains an invaluable target for malicious attackers. Power, utility, and even food production are valuable for threat actors to pursue. The Colonial Pipeline attack remains the go-to cautionary story about what hackers can target and their capabilities. Securing infrastructure from outward attack is crucial, as the real-world consequences are dangerous.

Destabilize Threat Networks

Among one of the plan’s goals is targeting and shutting down threat networks. Ransomware gangs and hackers often operate in groups with a vast chain of dark web resources at their disposal. This can include preemptive lists of vulnerable targets like emails and leaked passwords, to literal malware service models.

It’s been an exhaustive pain point and a hopeful concession for legislators to “push back” against threat networks. Easier said than done, however, as retaliation brings up several questions about what’s legal, what’s allowed, and the actual process of targeting dark web networks.

However, the plan emphasizes collaboration with international entities and partnerships to achieve its goals. Considering hacker networks and resources emerge from vectors all across the world, it’s important to have the support of nation-state resources to effectively thwart hacker campaigns.

Frameworks, Guidelines, and Mandates for Cybersecurity Policy

Another critical component of the NCSIP is providing a framework and foundational guide for building resilient cybersecurity architecture, policies, and budgets. One of the problems with cybersecurity policy was they were, at best, suggestions for requirements and reporting. Now, however, suggestive models have readily proven ineffective for establishing quality cybersecurity hygiene.

That said, the goal is not to burden organizations with a stack of reporting rules and burdensome policies. While it will be required to follow specific rulesets, the aim is to provide useful resources and information so organizations can develop comprehensive cybersecurity policies. CISA and cybersecurity leaders will ideally develop frictionless ways to report threat events (like ransomware breaches) and give enterprises the tools they need to thrive in today’s dangerous digital ecosystem.

The idea is to enforce “resiliency” from the ground up. In other words, create IT systems and policies based on healthy cybersecurity practices.

Resilient Architecture 

By emphasizing resiliency, the Plan hopes to shape future strategies and philosophies for cybersecurity posture. Regardless of an organization’s size, cybersecurity will play a critical role in how it navigates security and establishment of secure protocols.

This also requires investing in the right tools and resources. For example, the Implementation Plan emphasizes the value of cloud and virtualized services. Such services are budget conscious and directly scale with a client’s needs.

Conclusion

The plan is the collective effort of 18 agents and authoritative figures all aimed at strengthening cybersecurity in the United States. Relevant agencies and businesses should take note while preparing their own infrastructure for changes in the coming months and years.

However, even with the best resources at your disposal, prepping for the Cybersecurity Implementation Plan and its requirements is indeed challenging. Therefore, it’s effective to seek assistance. Bytagig is an established MSP with industry-leading IT and cybersecurity experience.

For more information, you can reach out to us today.

Share this post:
No Comments

Sorry, the comment form is closed at this time.