The US government has called for aggressive regulation as part of its National Cybersecurity Strategy for 2023, ITops company Automox has warned.
Jason Kitka and Peter Pflaster, writing for Automox, noted that this is the first new such plan in five years.
“The goal is to establish a safe digital environment in the US and position the internet as a shield to protect and secure the nation’s people, their freedoms, information, and the economy,” they wrote in a blog post.
According to the Automox writers, vendors must step up to the plate.
The US administration is making vendors more accountable for vulnerabilities and push them towards greater security developments alongside a “big shift” towards attack prevention – rather than compliance and controls or versus nation-state actors.
“This is indeed a new direction,” they said.
Threats have become complex and more dangerous, which means better solutions are needed.
The Automox blog prescribed co-ordinated efforts among “innovators” and more reliable resources, backed by government where needed.
More targeted regulation could however help secure higher-risk institutions such as banks, hospitals, schools, and utilities, with a focus on defence and resilience aligned with values, with “certain products and platforms” built with protective features from their conception.
This might shift some responsibility for good practice from buyers to vendors, Pflaster and Kitka wrote.
“The strategy is intended to increase private sector investment in security, collaboration, resilience, and research and development.
“The Office of the National Cyber Director (ONCD) and the Office of Management and Budget (OMB) will issue annual guidance on cybersecurity budget priorities to guide this investment,” the blog noted, based on the US government announcement.
IT and security teams are likely to be interested in Strategic Objective 3.3: Shift Liability for Insecure Software Products and Services.
“The strategy asserts that markets pose inadequate costs to entities that introduce vulnerable products, and we agree.
“Too often products and their hardware and software are released without adhering to security best practices which result in increased stress on organisations and their IT and security teams to pick up the pieces.”
For now, patching as quickly as possible for the mountain of vulnerabilities remains critical, and remediating critical vulnerabilities takes too long – 60 days on average, Automox’s Pflaster and Kitka pointed out.
( Photo by Caleb Perez on Unsplash )