Senate Homeland Security Committee hearing on SolarWinds and federal cybersecurity is starting now: hsgac.senate.gov/hearings/preve…
In opening statement, ranking member Rob Portman questions why HHS didn't declare its SolarWinds breach to be a "major incident" per FISMA. He also questions why HSGAC learned from news reports that SolarWinds had hit DHS/CISA, including DHS secretary and incident responders.
In opening statement, Acting CISA Director Brandon Wales says one of CISA's top priorities this year is creating joint cyber planning office (authorized in NDAA) to strengthen public-private collaboration, which he says was key to successful SolarWinds/Exchange responses.
Wales: “As the pace and scale of cyber threats that we face expands, so must our response toolkit.”

He said a proposed Cyber Response and Recovery Fund would "ensure CISA has sufficient resources and capacity to respond rapidly to catastrophic cyber incidents.”
Peters asks Wales to elaborate on how a CRRF would help CISA.

Wales says it would help ensure that CISA has enough incident responders (for example, by paying contractors); can deploy additional sensors and technology; and can reimburse other federal agencies for their help.
HHS CISO Janet Vogel on why dept didn't initially declare SW a major incident:

“We felt that we had not lost any data, we had...firewalled everything appropriately...there wouldn't be follow-up activity. ... We determined right away we did not believe this was a major incident."
Commerce CISO Ryan Higgins, asked why DOC only sent a vague initial notification to Congress about SolarWinds, says the department didn’t know right away what systems were affected and what stakeholders were impacted. It wanted to gather more information first.
Portman: Did Colonial contact CISA after being hacked?

Wales: “They did not contact us. … We were brought in by the FBI after they were notified about the incident.”
Portman: Would it have been helpful if Colonial had contacted you immediately and shared information?

Wales: “We received information fairly quickly, in concert with the FBI. ... We are waiting for additional technical information on exactly what happened at Colonial..."
Portman: So you still don’t have the technical data that you need?

Wales: “Yes, but that is not surprising...they've only been working on the incident response since over the weekend...We do expect information to come from that."
Portman: If the FBI hadn’t brought you in, do you think Colonial would have contacted you?

Wales: No.
Johnson: Are you looking to see if SolarWinds and the Colonial Pipeline hack are connected?

Wales: We're evaluating all intelligence, including what the hackers were able to access through SolarWinds. But FBI has attributed Colonial to a criminal group.
Johnson: Have we looked at the cybersecurity risks of switching to green infrastructure? “A move toward green energy is potentially, probably making us even more vulnerable.”

Wales carefully dodges the question.
Rosen: Would it help if the government embedded cybersecurity advisers in HHS’ regional offices to help small and rural healthcare providers?

HHS CISO Janet Vogel: “We are looking at how to reinforce the capabilities that we have in our regional offices.”
Portman: Is it true that SolarWinds compromised CISA incident responders and the secretary of homeland security?

Wales: Can’t say in an open forum. But can say that SW didn’t compromise operational networks, where we manage EINSTEIN, collect+analyze incident response data, etc.
Josh Hawley: Do you agree with suggestion that Pulse Secure attack was partly about economic espionage?

BW: “Not aware of any specific economic thefts from that operation, but...we are still trying to understand the full scope of what happened during the Pulse Secure campaign."
Peters: Do you have the insight that you need into every agency’s risk posture?

Wales: No.

Peters: What do you need?

Wales: We’re starting to make certain “critical improvements” using the American Rescue Plan Act money.
Peters, closing the hearing, says he wants to amend FISMA "so there is no ambiguity, so there's no confusion, on when and if an agency needs to declare a major incident and notify Congress about those events."

Follows criticism that HHS didn't do this with SolarWinds.

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Eric Geller

Eric Geller Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @ericgeller

12 May
BREAKING: Biden signs sweeping cyber EO to close gaps exposed by SolarWinds.

Highlights:
* Incident reporting reqs for IT contractors
* Security reqs for software contractors
* Encryption, MFA, EDR reqs for agencies
* Cyber incident review board

Story: subscriber.politicopro.com/article/2021/0…
More highlights:

* Pushes toward zero-trust architecture
* FedRAMP cloud security modernization
* New fed cloud strategy
IoT security labeling pilot program
* Encourages SBOM
* CISA incident response "playbooks" for agencies
* Govt-wide log retention/analysis policy
The EO "makes a down-payment towards modernizing our cyber defenses" and "reflects a fundamental shift in our mindset from incident response to prevention, from talking about security to doing security," a sr admin official told reporters.
Read 17 tweets
10 May
Biden addressed the Colonial Pipeline hack a few minutes ago.

"So far there is no evidence from our intelligence people that Russia is involved, although there is evidence that the actor's ransomware is in Russia. They have some responsibility to deal with this."
Biden was asked, if you can't protect U.S. critical infrastructure from a criminal gang, how can you protect it from a nation-state actor?

"We can do both," he responded, "and we will."
"This is something that our administration has been tracking extremely carefully, and I have been personally briefed every day," Biden said at the top of his remarks.
Read 4 tweets
10 May
White House briefing starting now, with Homeland Security Adviser Elizabeth Sherwood-Randall and Deputy National Security Adviser for Cyber and Emerging Technologies Anne Neuberger.
Sherwood-Randall: "Thus far, Colonial has told us that [its pipeline] has not suffered damage and can be brought back online relatively quickly, but that safety is a priority, given that it is never before taken the entire pipeline down."
A White House-convened interagency team with DOE, CISA, FBI, DOT, Treasury, and DoD "met throughout the weekend," Sherwood-Randall said.
Read 17 tweets
30 Mar
DHS just wrapped up a background briefing with senior officials on the department's cybersecurity agenda.

Nothing earth-shattering, but I'll share a few comments that stood out to me.
We've previously heard from Anne Neuberger that the Biden administration has an EO coming with mitigations related to the SolarWinds/Exchange vulnerabilities. Today, a senior DHS official told us that it will contain "close to a dozen actions."
DHS Sec Mayorkas will be discussing cyber tomorrow during an RSA event.

Per sr official, he will offer a "comprehensive vision" for using DHS/CISA to defend the country, incl through several "cybersecurity sprints" that he previously teased.

1st sprint will focus on ransomware.
Read 11 tweets
30 Mar
New: The U.S.' cyber agency is underfunded, overwhelmed, and struggling to keep up with evolving threats.

@CISAgov got $650m in the Covid-19 bill, but experts say it'll need a lot more support to have a chance of stopping the next SolarWinds.

My story: politico.com/news/2021/03/3…
I talked to 15 people familiar with CISA’s work, including 4 current employees and 5 former CISA officials. Some of the problems they described:

* Far too few hunt & incident response teams

* Not enough $ for risk management center

* Not enough data analysis capabilities
Even though many employees are "exhausted," as one put it, they're still optimistic about their agency's future.

They love their mission and hope new Biden admin leadership will get them what they need.
Read 10 tweets
18 Mar
Senate Homeland Security Committee is beginning a hearing on the federal response to the SolarWinds campaign.

Federal CISO, acting CISA director, and senior FBI cyber official are testifying.

hsgac.senate.gov/understanding-…

We previewed what to expect in MC: subscriber.politicopro.com/newsletter/202…
HSGAC Chair Gary Peters: “The process and procedures for responding to cyberattacks desperately needs to be modernized,” including by reforming FISMA and streamlining information sharing.
Peters: “It is clear from the gravity of this threat that we need to examine whether CISA, the FBI and other agencies have what they need to protect the American people.”
Read 26 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!

Follow Us on Twitter!

:(