{"id":4561,"date":"2022-03-25T09:00:04","date_gmt":"2022-03-25T14:00:04","guid":{"rendered":"https:\/\/blogs.luc.edu\/compliance\/?p=4561"},"modified":"2022-03-25T09:00:04","modified_gmt":"2022-03-25T14:00:04","slug":"critical-infrastructure-and-cybersecurity-legislation-americas-cybersecurity-problem","status":"publish","type":"post","link":"https:\/\/blogs.luc.edu\/compliance\/?p=4561","title":{"rendered":"Critical Infrastructure and Cybersecurity Legislation: America\u2019s Cybersecurity Problem"},"content":{"rendered":"<p><em>Marisa Polowitz<\/em><\/p>\n<p><em>Associate Editor<\/em><\/p>\n<p><em>Loyola University Chicago School of Law, JD 2023<\/em><\/p>\n<p>Long gone are the days when cybersecurity concerns existed solely in the domain of technology teams. Various organizations, from <a href=\"https:\/\/www.edweek.org\/technology\/thousands-of-school-websites-went-down-in-a-cyberattack-itll-happen-again-experts-say\/2022\/01\">schools<\/a> to <a href=\"https:\/\/www.securitymagazine.com\/articles\/95941-us-state-department-suffers-cyberattack\">government entities<\/a> (at every level), to <a href=\"http:\/\/blogs.luc.edu\/compliance\/?p=4041\">private companies<\/a> alike have fallen prey to cyberattacks. May 2021\u2019s <a href=\"https:\/\/www.axios.com\/colonial-pipeline-cyberattack-oil-what-know-9b7cd4ac-a6b8-41dc-b081-e57fde475a41.html\">Colonial Pipeline attack<\/a> caused chaos and a temporary gas frenzy that brought awareness of the vulnerabilities of the technology we rely on to even the least technically minded American. Cybersecurity, and more specifically, the security of critical infrastructure immediately became an issue that the <a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/statements-releases\/2022\/01\/19\/fact-sheet-president-biden-signs-national-security-memorandum-to-improve-the-cybersecurity-of-national-security-department-of-defense-and-intelligence-community-systems\/\">U.S. Government<\/a> is taking very seriously. <!--more--><\/p>\n<p><strong>The worsening threat landscape<\/strong><\/p>\n<p>The Cybersecurity &amp; Infrastructure Security Agency (\u201cCISA\u201d) stated in February that cybersecurity authorities in the U.S., Australian, and the United Kingdom agreed that <a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa22-040a\">sophistication of ransomware threat actors<\/a> was increasing. <a href=\"https:\/\/www.cisa.gov\/about-cisa\">CISA<\/a> is the organization charged with leading national efforts to coordinate cybersecurity between government and private industry. CISA is also responsible for the coordination of national critical infrastructure security. In February 2022, CISA issued an alert warning that within the U.S., fourteen of the sixteen U.S. critical infrastructure sectors were targets of \u201c<a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa22-040a\">incidents involving ransomware<\/a>\u201d in 2021. Information Technology, Emergency Services, Food and Agriculture, Government Facilities, and the Defense Industrial Base (\u201cDIB\u201d) were amongst those critical infrastructure sectors listed.\u00a0 The U.K. specifically identified ransomware as the \u201c<a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa22-040a\">biggest cyber threat<\/a>\u201d it faces.<\/p>\n<p>As Russia\u2019s invasion of Ukraine continues, there is a growing <a href=\"https:\/\/www.securityweek.com\/russia-ukraine-threat-local-cyber-operations-escalating-global-cyberwar\">concern of increased cyberattack<\/a> attempts <a href=\"https:\/\/governmentciomedia.com\/dhs-lead-russia-ukraine-response-efforts-cisa-warns-cyber-fallout\">against the U.S. by Russian actors<\/a>, possibly in response to increased U.S. sanctions against Russia. The Biden Administration began calling attention to the possibility of Russian cyber-based aggression <a href=\"https:\/\/nypost.com\/2022\/02\/18\/us-companies-warned-to-brace-for-possible-russian-cyberattacks\/\">prior to Russia\u2019s physical invasion of Ukraine<\/a>. Russian hackers successfully took down <a href=\"https:\/\/www.wired.com\/2016\/03\/inside-cunning-unprecedented-hack-ukraines-power-grid\/\">Ukraine\u2019s power grid<\/a> in 2015, the first confirmed hack to do so. The notable Solar Winds attack, which <a href=\"https:\/\/whatis.techtarget.com\/feature\/SolarWinds-hack-explained-Everything-you-need-to-know\">targeted multiple American federal agencies<\/a> and private companies, is widely believed to have been perpetrated by Russian actors, as well. Even more recently, Russian actors were responsible for the <a href=\"https:\/\/nypost.com\/2022\/02\/15\/ukraine-defense-ministry-banks-hit-by-cyber-attacks-report\/\">early February disruption<\/a> of Ukrainian government agencies and bank websites. <a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2022-03-07\/hackers-targeted-u-s-lng-producers-in-run-up-to-war-in-ukraine\">Cyberattacks on major energy providers<\/a> launched in the weeks immediately preceding the invasion were determined to have gained access to current and former employees\u2019 devices across twenty-one companies.<\/p>\n<p>In reaction to Russia\u2019s attacks on Ukraine and the cyberactivity already occurring in 2021, CISA posted a \u201c<a href=\"https:\/\/www.cisa.gov\/shields-up\">Shields Up<\/a>\u201d advisory, warning that Russia\u2019s invasion could impact American organizations as well. CISA\u2019s advisory encourages all U.S. organizations to be on alert and <a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa22-011a\">provides security guidance<\/a> for all U.S. federal agencies and critical infrastructure companies. This heightened vigilance comes on the heels of the Department of Defense (\u201cDOD\u201d) Inspector General\u2019s <a href=\"https:\/\/media.defense.gov\/2022\/Feb\/24\/2002944191\/-1\/-1\/1\/DODIG-2022-061.PDF\">released findings<\/a> that some contractors to the DIB failed to comply with <a href=\"https:\/\/www.nist.gov\/blogs\/manufacturing-innovation-blog\/what-nist-sp-800-171-and-who-needs-follow-it-0\">DOD and federal cybersecurity requirements<\/a> for protecting sensitive information. Some of the requirements identified which <a href=\"https:\/\/media.defense.gov\/2022\/Feb\/24\/2002944191\/-1\/-1\/1\/DODIG-2022-061.PDF\">organizations failed to satisfy<\/a> are <a href=\"https:\/\/www.nist.gov\/blogs\/manufacturing-innovation-blog\/what-nist-sp-800-171-and-who-needs-follow-it-0\">considered basic cybersecurity practices<\/a> for ensuring network and system security, such as multi-factor authentication, requiring strong passwords, monitoring network traffic, and disabling inactive users.<\/p>\n<p><strong>Government action to protect critical infrastructure<\/strong><\/p>\n<p>Just last week, Congress passed the <a href=\"https:\/\/www.hsgac.senate.gov\/imo\/media\/doc\/210928_PetersPortmanCyberIncidentReportingAct_AsIntroduced.pdf\">Cyber Incident Reporting Act<\/a>. (\u201cThe Act\u201d), which was <a href=\"https:\/\/www.congress.gov\/bill\/117th-congress\/house-bill\/2471\/actions?r=36&amp;s=1\">signed into law by President Biden<\/a> on March 15, 2022. The new legislation requires all companies considered critical to U.S. national interests to report \u201c<a href=\"https:\/\/www.securityweek.com\/hacked-us-companies-face-new-reporting-requirements\">any substantial cyber incident<\/a>\u201d to the federal government within three days and to report payment of ransomware within twenty-four hours. <a href=\"https:\/\/governmentciomedia.com\/cisa-cyber-incident-reporting-mandates-get-billions-congressional-budget\">This includes<\/a> companies that deal with water, wastewater, nuclear waste, hospitals and healthcare organizations, the DIB, and more.<\/p>\n<p>The Act primarily focuses on <a href=\"https:\/\/www.debevoisedatablog.com\/2022\/03\/16\/new-cyber-incident-reporting-coming-for-critical-infrastructure-five-key-takeaways\/\">reporting requirements<\/a> for <a href=\"https:\/\/obamawhitehouse.archives.gov\/the-press-office\/2013\/02\/12\/presidential-policy-directive-critical-infrastructure-security-and-resil\">critical infrastructure entities<\/a> \u2013 it appoints CISA as the central information point for incident reporting, and formalizes communications pathways for better, and faster, national threat awareness and threat information exchange. This advancement is a major step in the right direction \u2013 clear, formal, and coordinated channels for communicating threats, as well as requiring critical organizations to report incidents, are both <a href=\"https:\/\/www.techrepublic.com\/article\/how-biden-new-cybersecurity-law-will-affect-your-business\/\">essential in mitigating the effects of cyberattacks<\/a>. The longer a threat goes unnoticed, the more damage it can produce. This new legislation is partially in response to the Biden Administration\u2019s inclusion of cybersecurity in its list of \u201c<a href=\"https:\/\/www.dhs.gov\/topics\/cybersecurity\">top priorities<\/a>.\u201d Enhanced cybersecurity for American critical infrastructure has support across the political spectrum, and is increasingly understood to be a <a href=\"https:\/\/www.americanbar.org\/news\/abanews\/aba-news-archives\/2022\/03\/us-must-harden-its-cybersecurity-defenses\/\">national security concern<\/a>. President Biden\u2019s National Security Council is the first to include a <a href=\"https:\/\/www.politico.com\/news\/2021\/01\/06\/biden-white-house-cybersecurity-neuberger-455508\">Deputy National Security Advisor for Cyber and Emerging Technology<\/a>. In January 2022, the Administration\u2019s focus on cybersecurity was again made evident with the signing of a <a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/statements-releases\/2022\/01\/19\/fact-sheet-president-biden-signs-national-security-memorandum-to-improve-the-cybersecurity-of-national-security-department-of-defense-and-intelligence-community-systems\/\">National Security Memorandum<\/a>, which aims to enhance cybersecurity measures in National Security, DOD, and Intelligence Community Systems. Bipartisan support for enhancing U.S. cybersecurity protections is clearly evident in Congress, which <a href=\"https:\/\/governmentciomedia.com\/cisa-cyber-incident-reporting-mandates-get-billions-congressional-budget\">allocated $2.59 billion to CISA<\/a> in its government funding bill \u2013 millions of dollars beyond the Biden Administration\u2019s proposed budget.<\/p>\n<p>While <a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/statements-releases\/2021\/11\/10\/fact-sheet-vice-president-harris-announces-initiatives-on-space-and-cybersecurity\/\">international cybersecurity cooperation<\/a>, <a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/statements-releases\/2021\/10\/01\/statement-by-president-joe-biden-on-cybersecurity-awareness-month\/\">K-12 educational institutions<\/a>, the <a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/statements-releases\/2022\/01\/27\/fact-sheet-biden-harris-administration-expands-public-private-cybersecurity-partnership-to-water-sector\/\">water sector<\/a>, and even <a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/statements-releases\/2021\/10\/01\/statement-by-president-joe-biden-on-cybersecurity-awareness-month\/\">cybersecurity awareness<\/a> are other areas where the Biden Administration has focused its attention, a concerted government focus on cybersecurity, specifically in critical infrastructure, has been <a href=\"https:\/\/www.popsci.com\/technology\/cybersecurity-receives-funds-infrastructure-package\/\">desperately needed for years<\/a>. Unfortunately, the benefits of The Act won\u2019t be felt immediately, as it <a href=\"https:\/\/www.natlawreview.com\/article\/president-biden-signs-law-cyber-incident-reporting-act-imposing-reporting\">will not go into effect<\/a> until the final rules are promulgated \u2013 and allows for a 24-month time frame in which to publish a proposed rulemaking. In conjunction with the many other initiatives to enhance security, the U.S. is <a href=\"https:\/\/www.cisa.gov\/news\/2022\/03\/11\/statement-cisa-director-easterly-passage-cyber-incident-reporting-legislation\">making headway<\/a> in augmenting its security posture and creating cohesive cybersecurity protections. However, it remains to be seen if the <a href=\"https:\/\/www.jdsupra.com\/legalnews\/2022-cyber-watch-list-a-look-at-2021-1801664\/\">forthcoming enhancements<\/a> will come soon enough.<\/p>\n<div class=\"pn-shadow-host js-pn-create-project-modal\"><\/div>\n<div class=\"pn-shadow-host js-pn-feedback-modal\"><\/div>\n<div class=\"pn-shadow-host js-pn-image-modal\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Long gone are the days when cybersecurity concerns existed solely in the domain of technology teams. Various organizations, from schools to government entities (at every level), to private companies alike have fallen prey to cyberattacks. May 2021\u2019s Colonial Pipeline attack caused chaos and a temporary gas frenzy that brought awareness of the vulnerabilities of the technology we rely on to even the least technically minded American. Cybersecurity, and more specifically, the security of critical infrastructure immediately became an issue that the U.S. Government is taking very seriously.<\/p>\n","protected":false},"author":90,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[553,1135,1150,1152,1205,1623],"class_list":["post-4561","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-cyber-attacks","tag-infrastructure","tag-international","tag-international-affairs","tag-journal-of-regulatory-compliance","tag-cybersecurity"],"_links":{"self":[{"href":"https:\/\/blogs.luc.edu\/compliance\/index.php?rest_route=\/wp\/v2\/posts\/4561","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.luc.edu\/compliance\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.luc.edu\/compliance\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.luc.edu\/compliance\/index.php?rest_route=\/wp\/v2\/users\/90"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.luc.edu\/compliance\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4561"}],"version-history":[{"count":0,"href":"https:\/\/blogs.luc.edu\/compliance\/index.php?rest_route=\/wp\/v2\/posts\/4561\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.luc.edu\/compliance\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4561"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.luc.edu\/compliance\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4561"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.luc.edu\/compliance\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4561"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}