2154 Rayburn House Office Building
Chairman Chaffetz, Ranking Member Cummings, and members of the Committee, thank you for the opportunity to appear before you today. The Office of Personnel Management (OPM) compromise clearly demonstrates the challenge facing the Federal Government in protecting our citizens’ and employees’ personal information against sophisticated, agile, and persistent threats. Addressing these threats is a shared responsibility. I will discuss the Department’s role in the recent compromise at OPM and how we are working with OPM and other agencies to accelerate improved cybersecurity across the Federal Government.
The Role of the Department of Homeland Security in Federal Cybersecurity
Cyber security, like physical security, requires layers of protections. The Federal Information Security Modernization Act of 2014 specifies that federal agencies are responsible for their own cybersecurity. Although agencies must take the lead in their own cybersecurity, as OPM is currently doing, DHS helps federal agencies protect their systems using two programs: (1) EINSTEIN, a perimeter protection program that detects and blocks threats attempting to access agencies’ unclassified networks, and (2) Continuous Diagnostics and Mitigation (CDM), a DHS program that provides federal civilian agencies with tools to monitor agencies’ internal networks. In addition, DHS has the mission to provide a common baseline of security across the civilian government and help agencies manage their cyber risk. DHS assists agencies by measuring and motivating agencies to implement best practices, by serving as a hub for information sharing, and by providing incident response assistance when agencies suffer a cyber intrusion.
Like a fence around a physical building, EINSTEIN protects agencies’ unclassified networks at the perimeter of each agency. Furthermore, EINSTEIN provides situational awareness across the government, as threats detected in one agency are shared with all others so they can take appropriate protective action. The U.S. Government could not achieve such situational awareness through individual agency efforts alone.
The first two versions of EINSTEIN – EINSTEIN 1 and 2 – identify abnormal network traffic patterns and detect known malicious traffic. This capability is fully deployed and screening all federal civilian traffic that is routed through a Trusted Internet Connection (a secure gateway between each agency’s internal network and the Internet). EINSTEIN 3 Accelerated (EINSTEIN 3A), which actively blocks known malicious traffic, is currently being deployed through the primary Internet Service Providers serving the Federal Government. EINSTEIN 1 and 2 use only unclassified information, while EINSTEIN 3A uses classified information. Using classified indicators allows EINSTEIN 3A to detect and block many of the most significant cybersecurity threats. I am happy to discuss the Department’s efforts to accelerate EINSTEIN 3A’s deployment across the Federal civilian government, as well as the development of advanced malware and behavioral analysis capabilities that will automatically identify and separate suspicious traffic for further inspection, even if the precise indicator has not been seen before. We are examining best-in-class technologies from the private sector to evolve to this next stage of network defense. And as I will discuss later, EINSTEIN played a key role in understanding the recent compromise at OPM.
Continuous Diagnostics and Mitigation (CDM)
Security cannot be achieved through only one type of tool. EINSTEIN is a perimeter system, but it will never be able to block every threat. It must be complemented with systems and tools inside agency networks. Through the CDM program, DHS provides Federal civilian agencies with tools to monitor agencies’ internal networks. I am happy to take any questions about how CDM protects networks and the role is play in cybersecurity, but first I want to address the current incident.
DHS’s Role in the OPM Compromise
Leveraging the expertise and guidance provided by DHS, the Office of Personnel Management has spent the last year implementing improved cybersecurity capabilities across its networks. As a result, in April 2015, OPM became aware of a cybersecurity intrusion affecting one of its systems. As soon as OPM identified malicious activity on their network, they shared this information with the DHS National Cybersecurity and Communications Integration Center (NCCIC).
The NCCIC then used one of our programs – EINSTEIN 2, the intrusion detection and situational awareness tool – to look back in time for other compromises across the federal civilian government. Through this process, the NCCIC identified a potential compromise at another location with OPM data. Since the incident was identified, OPM has partnered with various federal agencies, including DHS and the Federal Bureau of Investigation (FBI), to go onsite to investigate and mitigate the intrusion. At the same time, OPM immediately implemented additional security measures and continues to improve the security of the information it manages.
In May 2015, during the investigation and in the process of applying mitigating controls provided by DHS, OPM identified evidence that personnel records for current and former federal employees had been compromised. This remains an active investigation, and DHS, the FBI, and other partners are working closely with OPM to determine the extent of the compromise and potential implications. Information regarding this incident may change as the investigation progresses.
One of the important roles DHS plays is helping share information across agencies, and in some cases, with the private sector. For example, as soon as OPM identified malicious activity on their network, they shared this information with DHS. DHS then developed a signature for the particular threat, and used EINSTEIN 2 to look back in time for other compromises across the federal civilian government. This same threat information is used by EINSTEIN 3A to block potential threats from impacting federal networks. Thus, DHS is using EINSTEIN 3A to ensure that this cyber threat could not exploit other agencies protected by the system. DHS is accelerating EINSTEIN 3A deployment across the Federal Government. While it is challenging to estimate the potential impact of a prevented event, each of these malicious DNS requests or emails that were blocked by EINSTEIN 3A may conceivably have led to a cybersecurity compromise of severe consequence.
DHS’s Role in Federal Incident Reponses
Cybersecurity is about risk management, and we cannot eliminate all risk. Agencies that implement best practices and share information will increase the cost for adversaries and stop many threats. But ultimately, there exists no perfect cyber defense, and persistent adversaries will find ways to infiltrate networks in both government and the private sector. When an incident does occur, the NCCIC offers on-site assistance to find the adversary, drive them out, and restore service. In Fiscal Year 2015, the NCCIC has already provided onsite incident response to 32 incidents – nearly double the total in all of Fiscal Year 2014. The NCCIC also coordinates responses to significant incidents to give senior leaders a clear understanding of the situation and give operators the information they need to respond effectively. Similar to the recent incident at OPM, providing on-site incident response assistance also allows the NCCIC to identify indicators of compromise that can then be shared with other agencies and applied to EINSTEIN for broad protection across the Federal Government.
Last year, Congress acted in a bipartisan manner to pass critical cybersecurity legislation that enhanced DHS’s ability to work with the private sector and other federal civilian departments in each of their own cybersecurity activities, and enhanced the Department’s cyber workforce authorities. DHS is using the authority granted in one of those bills – the Federal Information Security Modernization Act of 2014 – to direct Federal civilian Executive branch agencies to fix critical vulnerabilities on their Internet-facing devices through the recent issuance of a Binding Operational Directive.
Additional legislation is needed. I previously highlighted EINSTEIN’s key role in identifying and mitigating an additional potential compromise during the OPM activity. The Department and Administration have a longstanding request of Congress to remove obstacles to the EINSTEIN program’s deployment across federal civilian agency information systems by codifying the program’s authorities and resolving lingering concerns among certain agencies. Some agencies have questioned how deployment of EINSTEIN under DHS authority relates to their existing statutory restrictions on the use and disclosure of agency data. DHS and the Administration are seeking statutory changes to clarify this uncertainty and to ensure agencies understand that they can disclose their network traffic to DHS for narrowly tailored purposes to protect agency networks, while making clear that privacy protections for the data will remain in place. I look forward to working with Congress to further clarify DHS's authority to rapidly and efficiently deploy this protective technology.
In addition, carefully updating laws to facilitate cybersecurity information sharing within the private sector and between the private and government sectors is also essential to improving the Nation's cybersecurity. While many companies currently share cybersecurity threat information under existing laws, there is a heightening need to increase the volume and speed of information shared without sacrificing the trust of the American people or the protection of privacy, confidentiality, civil rights, or civil liberties. It is essential to ensure that cyber threat information can be collated quickly in the NCCIC, analyzed, and shared quickly among trusted partners, including with law enforcement, so that network owners and operators can take necessary steps to block threats and avoid damage.
Federal agencies are a rich target and will continue to experience frequent attempted intrusions. This problem is not unique to the Federal Government – it is shared across a global cybersecurity community. The key to good cybersecurity is awareness and constant vigilance at machine speed. As our detection methods continue to improve, more events will come to light. The recent breach at OPM is emblematic of this trend, as OPM was able to detect the intrusion by implementing cybersecurity best practices recommended by DHS. As network defenders are able to see and thwart more events, we will inevitably identify more malicious activity and disappoint the adversary’s attempts to access sensitive information and systems. We are facing a major challenge in protecting our most sensitive information against sophisticated, well-resourced, and persistent adversaries. In response, we are accelerating deployment of the tools we have and are working to bring cutting-edge capabilities online. And we are asking our partner agencies and Congress to take action and work with us to strengthen the cybersecurity of Federal agencies.