{"id":11977,"date":"2023-03-16T11:04:44","date_gmt":"2023-03-16T14:04:44","guid":{"rendered":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=11977"},"modified":"2023-03-16T11:04:44","modified_gmt":"2023-03-16T14:04:44","slug":"la-estrategia-nacional-de-seguridad-cibernetica-de-eeuu-impulsa-la-regulacion-y-operaciones-agresivas-de-hack-back","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=11977","title":{"rendered":"La Estrategia Nacional de Seguridad Cibern\u00e9tica de EEUU impulsa la regulaci\u00f3n y operaciones agresivas de &#8216;hack-back&#8217;"},"content":{"rendered":"<p>El gobierno de EE. UU. lanz\u00f3 recientemente su muy anticipada Estrategia Nacional de Ciberseguridad , impulsando la regulaci\u00f3n obligatoria sobre los proveedores de infraestructura cr\u00edtica y dando luz verde a un enfoque m\u00e1s agresivo de &#8216;hack-back&#8217; para tratar con adversarios extranjeros y actores de ransomware.<\/p>\n<hr \/>\n<p>The U.S. government released its widely anticipated\u00a0<strong>National Cybersecurity Strategy<\/strong>\u00a0on Tuesday, pushing mandatory regulation on critical infrastructure vendors and green-lighting a more aggressive \u2018hack-back\u2019 approach to dealing with foreign adversaries and ransomware actors.<\/p>\n<p>As previously reported, the White House plans to use regulation to \u201clevel the playing field\u201d and<a href=\"https:\/\/www.securityweek.com\/us-national-cyber-strategy-pushes-regulation-aggressive-hack-back-operations\/\" target=\"_blank\" rel=\"noopener\">\u00a0shift liability to organizations<\/a>\u00a0that fail to make reasonable precautions to secure their software.<\/p>\n<p>\u201c[While] voluntary approaches to critical infrastructure cybersecurity have produced meaningful improvements, the lack of mandatory requirements has too often resulted in inconsistent and, in many cases inadequate, outcomes,\u201d the document argues, calling for a dramatic shift of liability \u201conto those entities that fail to take reasonable precautions to secure their software.\u201d<\/p>\n<p>\u201cIn setting cybersecurity regulations for critical infrastructure, regulators are encouraged to drive the adoption of secure-by-design principles, prioritize the availability of essential services, and ensure that systems are designed to fail safely and recover quickly. Regulations will define minimum expected cybersecurity practices or outcomes, but the Administration encourages and will support further efforts by entities to exceed these requirements,\u201d the strategy document argues.<\/p>\n<p>The federal government plans to use existing authorities to set \u201cnecessary cybersecurity requirements in critical sectors\u201d and where there are legal gaps around authority, the White House plans to work with Congress to close them.<\/p>\n<p>The strategy, divided by five pillars, seeks to:<\/p>\n<ol>\n<li>Defend Critical Infrastructure<\/li>\n<li>Disrupt and Dismantle Threat Actors<\/li>\n<li>Shape Market Forces to Drive Security and Resilience<\/li>\n<li>Invest in a Resilient Future<\/li>\n<li>Forge International Partnerships to Pursue Shared Goals<\/li>\n<\/ol>\n<p>The strategy also gives high-level authorization to law enforcement and intelligence agencies to \u201cdisrupt and dismantle threat actors,\u201d including foreign APT campaigns and data-extortion ransomware groups.<\/p>\n<p>\u201cDisruption campaigns must become so sustained and targeted that criminal cyber activity is rendered unprofitable and foreign government actors engaging in malicious cyber activity no longer see it as an effective means of achieving their goals,\u201d the White House stressed, noting that the federal government will increase the speed and scale of information sharing to proactively warn of looming threats.<\/p>\n<p>\u201cThe Federal Government will work with cloud and other internet infrastructure providers to quickly identify malicious use of U.S.-based infrastructure, share reports of malicious use with the government, make it easier for victims to report abuse of these systems, and make it more difficult for malicious actors to gain access to these resources in the first place,\u201d it added.<\/p>\n<p>The aggressive strategy is meant to preemptively \u201cdisrupt and dismantle\u201d hostile networks by authorizing U.S. defense, intelligence, and law enforcement agencies to hack into the computer networks of criminals and foreign governments.<\/p>\n<p>The White House is also discouraging the payment of data-extortion ransoms to cybercriminals, arguing that \u201cthe most effective way to undermine the motivation of these criminal groups is to reduce the potential for profit.\u201d<\/p>\n<p>\u201cOur goal is to make malicious actors incapable of mounting sustained cyber-enabled campaigns that would threaten the national security or public safety of the United States,\u201d the strategy says.<\/p>\n<p>The strategy document (<a href=\"https:\/\/www.whitehouse.gov\/wp-content\/uploads\/2023\/03\/National-Cybersecurity-Strategy-2023.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">PDF<\/a>) goes deeper, assigning the work to the FBI\u2019s National Cyber Investigative Joint Task Force working in tandem with all relevant U.S. agencies. It said private companies will be \u201cfull partners\u201d to issue early warnings and help repel cyberattacks.<\/p>\n<p>The government is also exploring a federal cyber insurance backstop to provide stability to the economy during catastrophic events or major crises.<\/p>\n<p><strong>Fuente:<\/strong> <a href=\"https:\/\/www.securityweek.com\/white-house-releases-national-cybersecurity-strategy\/\" target=\"_blank\" rel=\"noopener\"><em>https:\/\/www.securityweek.com<\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>El gobierno de EE. UU. lanz\u00f3 recientemente su muy anticipada Estrategia Nacional de Ciberseguridad , impulsando la regulaci\u00f3n obligatoria sobre los proveedores de infraestructura cr\u00edtica&hellip; <\/p>\n","protected":false},"author":1,"featured_media":11978,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[23,28],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/11977"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=11977"}],"version-history":[{"count":1,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/11977\/revisions"}],"predecessor-version":[{"id":11979,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/11977\/revisions\/11979"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/media\/11978"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=11977"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=11977"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=11977"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}