This week the Senate Homeland Security and Governmental
Affairs Committee held a
hearing on the reauthorization of the Chemical Facility Anti-Terrorism
Standards (CFATS) program. The short take on the hearing is that the CFATS
program will be reauthorized and there will be tweaks made to the program. The
most important thing to come out of this hearing, however, was that there are
serious issues with how the CFATS program deals with cybersecurity issues.
Hearing Details
There were three important aspects to the way the Committee
held this hearing. First, instead of having two different panels of witnesses
appear; first government witnesses and then industry witnesses; the hearing was
held at a large square table with all of the witnesses present at one time.
This allowed for some limited exchange between the government and industry
witnesses that added some additional clarity.
Secondly, there were only four Senators that took part in
the hearing. This allowed Sen. Johnson (R,MN) more discretion on the time allotted
for questions and responses. This contributed to the give and take between the
Committee and witnesses as well as between the witnesses.
The final unusual element of the hearing was that one of the
witnesses, Jesse (Jay) LeGros Jr, was a Chemical Security Inspector with the
Infrastructure Security Compliance Division. The fact that he is also a union
representative (AFGE National Local #918) was an interesting take on the normal
congressional interest in the union point of view on legislation and
regulation.
Cybersecurity Problems
The written
testimony from LeGros raised specific issues with the qualification of CSI
to evaluate the cybersecurity implementation of facility site security plans.
This is a problem that I have raised questions about over the years, but it is
the first time that the issue has been raised in a public forum.
LeGros reports that ISCD classifies facilities as having on
of three different levels of cybersecurity issues; minimal, partial and significant.
Since CFATS is a chemical-based security program, the level of concern about
cybersecurity is directly related to how closely the cyber controls are tied to
either the tiered chemicals of concern (COI) or the security controls
protecting those chemicals. No details were provided on how ISCD headquarters
delineates what level a specific facility falls within.
LeGros explains that all CSI are trained to answer the
limited cybersecurity questions that apply to minimal cybersecurity facilities.
A limited number of CSI are supposedly trained to address the cybersecurity
issues at partial cybersecurity facilities and LeGros has questions about the
level of training supplied to those CSI. Finally, only cybersecurity subject
matter experts at ISCD headquarters are able to answer the security questions
associated with significant cybersecurity facilities.
Finally, LeGros describes how an increasing emphasis on
completing a high number of authorization and compliance inspections has
increased the workload on all member of ISCD, but specifically on CSI and that
has apparently blurred the rules on the cybersecurity portion of the
inspections.
There was an interesting interchange between Le Gros and
Sen. Peters (D,MI) at 1:04:50 thru 1:14:51 during the hearing
video. This includes some responses from Christopher P. Currie of the GAO
and by David Wulf, the Acting Deputy Assistant Secretary for Infrastructure
Protection, National Protection and Programs Directorate and more usually the
Director of ISCD. This ten minute dialog reinforces the points made above.
At the end of that discussion Chairman Johnson makes the
following comment:
“One thing we really need to be
concerned about is mission creep and I think that CFATS is meant to address a
particular problem. Cyber is incredibly complex and is changing all of the
time. I think that it is unrealistic to think that CFATS inspectors can be
cyber trained and really ought to be doing a deep dive. I think that it is outside
of the scope of what CFATS ought to be. That’s my personal opinion. What I
would recommend is focusing the effort on the task at hand, prioritizing things,
and let the cyber issue be dealt with other people at DHS.”
Commentary
I finally got a chance to watch this hearing looking for
information on the Senate attempts at reauthorizing the CFATS program. The good
news is that all of the Senators in the hearing as well as all of the witnesses
favored a reauthorization of the CFATS program. Okay, the explosives people had
a minor caveat to that support; they reasonably want a CFATS exemption for ATF
licensed facilities.
I am extremely concerned with the problems identified in the
cybersecurity implementation in the CFATS program. The CFATS program is only
concerned with computer systems and control systems that directly impact the
safety and security of 300+ chemicals of concern. For chemicals with a release
security issue (toxic, flammable or explosive chemicals) this could specifically
include control systems that automate the manufacture, handling, or storage
those chemicals. This makes the CFATS program one of the few federal regulatory
programs that specifically addresses industrial control system security.
The cavalier statement by Johnson that the cybersecurity
issue at the chemical facilities should be dealt with by “other people at DHS”
demonstrates a complete misunderstanding of the situation. The cybersecurity
issues that CFATS deal with are directly related to the safety and security of
the dangerous chemicals at the covered facilities; this makes it a security issue
that must be addressed by the CFATS regulations.
There is a way that Johnson’s ‘let someone else handle it’
guidance could work. The reauthorization bill could require that ICS-CERT act
as the cybersecurity inspection force for the CFATS program. The reauthorization
would have to require that ICS-CERT work with ISCD to establish inspection
processes that support the requirements of Risk Based Performance Standard #8, Cyber,
conduct the inspections and support the analysis of inspection results to
ensure that the facility’s site security plan met the RPBS standards and, on
subsequent compliance inspections, that the facility was meeting the security
plan cybersecurity implementation requirements.
Unfortunately, I do not see this happening. First off, it is
hard to have one federal agency providing day-to-day support for another agency;
the level of coordination, even within the same Department is high and there
are competing requirements for manpower scheduling and training.
Second, there is the on-going issue of having enough cybersecurity
experts to go around the necessary government agencies. This is an especially aggravating
problem for industrial control system cybersecurity issues. On the other hand,
ICS-CERT probably has a better chance of attracting ICS cybersecurity talent
than does ISCD. But both agencies will have pay/perk issues with competing with
private sector entities.
Probably the most effective way of dealing with this
particular situation is to authorize ISCD CSI to attend control system security
classes taught by ICS-CERT. There should probably be a basic cybersecurity
course for all CSI (non-ICS computer systems are also covered by the CFATS RBPS
8). More detailed ICS cybersecurity training should be mandated for a minimum
number of inspectors for each regional office. Finally, the ISCD headquarters
should maintain a core of cybersecurity professional, including ICS security
experts, subject matter experts to monitor for changes in the cybersecurity
threat and reports of cybersecurity incidents.
No comments:
Post a Comment