Uncle Sam wants full access to its suppliers IT systems — and unsurprisingly, they are not happy
FAR draft changes are meant to address critical breaches
The rules applied to US government IT contractors and suppliers as part of the Federal Acquisition Regulation (FAR) are under review due to the increasing numbers of new and existing threats.
Under the drafted changes proposed to FAR, contractors would have to disclose detected incidents within eight hours to the Cybersecurity and Infrastructure Agency (CISA) with updates every 72 hours, and provide full access to all IT systems and employees.
Contractors and suppliers to the US government are not happy with the proposed changes, as it would effectively give federal authorities the keys to their networks and hinder their ability to operate.
Industry Anger
A number of bodies that represent IT and cloud industry leaders have lodged numerous responses on the proposed draft which had its commenting period extended by an additional two months.
These responses criticized the inefficiencies and potential bureaucracy of enforcing these guidelines upon companies, with HackerOne pointing out that providing total access to federal authorities could expose the data of non-federal customers.
As a result of this, HackerOne stated that “Non-federal customers may be reluctant to continue working with federal contractors, potentially forcing federal contractors to choose between selling to non-federal customers or the government.”
The Information Technology Industry Council (ITIC) which represents tech giants such as Apple, Samsung, and Microsoft, criticized the enforced disclosure deadline as “unduly burdensome” and stating that the 72 hour update frequency “does not reflect the shifting urgency throughout an incident response.”
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
Talking to TechRadar Pro, Dr Ilia Kolochenko, CEO and Chief Architect at ImmuniWeb and Adjunct Professor of Cybersecurity and Cyber Law at Capital Technology University, commented, “If the proposed amendment comes into force, it will likely bring more troubles than benefits. While the underlying concept of accelerating and solidifying incident response makes perfect sense, it seems to be abstracted from the operational environment.
“For instance, it is highly unlikely that the CISA will have enough personnel to review an avalanche of data breach submissions within the novel eight-hour deadline. Instead, snowballing data breach reports will be piling up, driving CISA’s analysts crazy with the insurmountable volume of work. Likewise, getting access to the breached companies may be a good idea subject to the availability of DFIR experts having enough time to perform investigations.
“Additionally, the CISA, as a nationwide collector of valuable cyber intelligence, will become a high-priority target for sophisticated state-backed cybercriminals. Therefore, unless the CISA and all other federal agencies are confident that they can properly address the new volume of information, as well as timely investigate and then prosecute most important security incidents, this amendment may rather create a huge mess and weaken national cybersecurity.”
Via TheRegister
More from TechRadar Pro
- Spyware risks are rising fast, and you should definitely be worried — even Google says so
- Take a look at our rankings of the best endpoint protection software
- Boost your network security with the best firewalls
Benedict has been writing about security issues for over 7 years, first focusing on geopolitics and international relations while at the University of Buckingham. During this time he studied BA Politics with Journalism, for which he received a second-class honours (upper division), then continuing his studies at a postgraduate level, achieving a distinction in MA Security, Intelligence and Diplomacy. Upon joining TechRadar Pro as a Staff Writer, Benedict transitioned his focus towards cybersecurity, exploring state-sponsored threat actors, malware, social engineering, and national security. Benedict is also an expert on B2B security products, including firewalls, antivirus, endpoint security, and password management.