BLOG

CISA Cyber Performance Goals: Third-Party & Supply Chain Requirements

The Cybersecurity and Infrastructure Security Agency (CISA) has been hinting for weeks about a pending announcement on cybersecurity for the nation’s critical infrastructure including healthcare. That update has arrived in the form of a major publication titled CPG: Cross-Sector Cybersecurity Performance Goals.[1]

The CPGs provide a mechanism for healthcare organizations and other critical sector entities to prioritize their implementation of the most effective and essential security controls required to defend against emerging cyberattacks.

This blog provides an overview of the CPGs and delves into the CPGs that are dedicated to supply chain and third-party vendor risk management. We also discuss the history and genesis of the CPGs, definitions and components, and practical applications for the CPGs for healthcare organizations.

Note: an audio summary overview of the CPGs is also available in our recent CyberPHIx podcast episode: CyberPHIx Roundup – Industry News and Trends for November, 2022.

History and Context

President Biden issued several executive orders and national security memos in 2021 including Improving the Nation’s Cybersecurity and Improving Cybersecurity for Critical Infrastructure Control Systems.

The national security memo was issued following the high-profile cyberattack against the Colonial Pipeline that resulted in the declaration of a national security emergency. The memo required the CISA, in coordination with the National Institute of Standards and Technology (NIST) and the interagency community, to develop baseline cybersecurity performance goals, or CPGs, that are consistent across all critical infrastructure sectors.

The following resources published by CORL Technologies and our sister company, Meditology Services, provide more information about these presidential executive orders.

What are the Cyber Performance Goals (CPGs)?

According to the CISA[2], the CPGs are “a prioritized subset of IT and operational technology (OT) cybersecurity practices that critical infrastructure owners and operators can implement to meaningfully reduce the likelihood and impact of known risks and adversary techniques. The goals were informed by existing cybersecurity frameworks and guidance, as well as the real-world threats and adversary tactics, techniques, and procedures (TTPs) observed by CISA and its government and industry partners. By implementing these goals, owners and operators will not only reduce risks to critical infrastructure operations, but also to the American people.”

The CPGs are intended to be:

  • A baseline set of cybersecurity practices broadly applicable across critical infrastructure with known risk-reduction value
  • A benchmark for critical infrastructure operators to measure and improve their cybersecurity maturity
  • A combination of recommended practices for IT and OT owners, including a prioritized set of security practices
  • Unique from other control frameworks as they consider not only the practices that address risk to individual entities, but also the aggregate risk to the nation

The CISA comments up front that the CPGs are voluntary in nature. President Biden’s memo did not compel organizations to adopt the CPGs or provide reporting on them to any government agency. It would not be surprising if the CPGs were leveraged as part of future cybersecurity laws, but for now, they are voluntary.

The CISA acknowledges that the CPGs are not comprehensive in nature and are not designed to replace security control frameworks like NIST Cybersecurity Framework (NIST CSF). Rather, the CPGs are intended to provide a starting point for organizations to implement the most critical security controls first and to help prioritize remediation for areas that will have the greatest impact on thwarting the latest attack methods. The CPGs are mapped and aligned to the NIST CSF and are framed by the CISA as “a kind of QuickStart guide” for the NIST CSF.

CPG Security Domains

The CPGs are organized into 8 categories or domains:

  1. Account Security
  2. Device Security
  3. Data Security
  4. Governance and Training
  5. Vulnerability Management
  6. Supply Chain / Third Party
  7. Response and Recovery
  8. Other (e.g. Network Segmentation, Email Security)

CPG Structure & Design Considerations

The CISA explained its selection criteria for how it chose the CPGs as follows:

  1. Significantly and directly reduce the risk or impact caused by commonly observed, cross-sector threats and adversary TTPs
  2. Clear, actionable, and easily definable
  3. Reasonably straightforward and not cost-prohibitive for even small- and medium-sized entities to successfully implement

Each CPG follows the same basic model that includes 6 data elements:

  1. The security outcome the CPG will enable
  2. The TTP or risk addressed by the CGP (including mapping to MITRE ATT&CK TTPs)
  3. The scope of the security practice – this mostly refers to IT or OT or both, but there are some more specific examples like windows-based IT assets or departing employees
  4. Recommended actions which are practical tips and examples of how an organization can implement the CPGs
  5. The NIST CSF subcategory references that relate most closely to the security practice

The CPG publication provides handy and practical materials to try to solve the “where do I begin problem” that so many healthcare organizations face when looking to adopt security frameworks. There is a downloadable Excel version of the CPGs that lists all CPGs and maps them back to other frameworks.

The publication also contains a worksheet with some components that would come in handy for a low-maturity organization. This worksheet contains tables that include all the data elements outlined above, but it also includes:

  • High, medium, and low-impact ratings for the controls
  • High, medium, and low complexity ratings in terms of implementation level of effort
  • Specific verbiage on recommended actions relative to the scope of the control (including specific advice for OT vs IT implementations)
  • An assessment checklist for current state and 1-year-later state to allow organizations to get started implementing a control while leaving room to mature over time

Supply Chain / Third-Party Requirements

The CPG’s include a domain area dedicated to third-party vendor risk management (TPRM) for critical infrastructure industries including healthcare.

There are three CPGs, or requirements, under the Supply Chain / Third Party category:

  1. Vendor / Supplier Cybersecurity Requirements
  2. Supply Chain Incident Reporting
  3. Supply Chain Vulnerability Disclosure
Vendor / Supplier Cybersecurity Requirements

The first supply chain CPG is focused on requiring healthcare organizations to conduct vendor risk assessments for cybersecurity capabilities and to institute preferential purchasing for vendors with stronger security controls.

Figure 1 – CPG 6.1 Vendor / Supplier Cybersecurity Requirements

Supply Chain Incident Reporting

The second supply chain CPG is focused on requiring vendors to sign contractual agreements that commit to reporting cybersecurity incidents within a pre-defined “risk-informed” timeframe. This timeframe should be determined by the healthcare entity and documented via formal Service Level Agreements (SLAs) within vendor contracts.

Figure 2 – CPG 6.2 Supply Chain Incident Reporting

Supply Chain Vulnerability Disclosure

The third, and final, supply chain CPG requires vendors to report confirmed security vulnerabilities to customers within a risk-informed timeframe. This requirement is similar to CPG 6.2 around incident reporting, but instead requires SLAs in contracts around vulnerability reporting.

Figure 3 – CPG 6.3 Supply Chain Vulnerability Disclosure

What’s Next for CPGs?

CORL recommends that healthcare organizations of all shapes and sizes review the CPGs and leverage them to support and mature their cybersecurity and TPRM programs. CORL has also aligned our TPRM technology and managed services to reflect these CPG requirements around vendor security assessments, incident reporting, and vulnerability disclosure.

The CPGs are also about much more than third-party vendor risk management. For smaller organizations, the CPGs provide an excellent “on-ramp” to the adoption of larger, more complex security control frameworks like the NIST CSF or HITRUST. The CPGs provide the greatest “bang for the buck” in terms of cost-effective security controls that can greatly limit the likelihood and impact of cyberattacks.

For larger organizations, the CPGs are an excellent resource to prioritize ongoing assessment and remediation activities. The areas outlined in the CPGs should be prioritized above other assessment results to shore up security controls related to the latest threats and attack vectors facing the industry.

The CPG publication is one example of a series of high-quality publications that the CISA and other federal agencies have produced in recent months.

Contact our team here at CORL to learn more about the CPGs and how your organization can adopt and implement these controls to enhance your third-party vendor risk management program.

[1] https://www.cisa.gov/sites/default/files/publications/2022_00092_CISA_CPG_Report_508c.pdf

[2] https://www.cisa.gov/sites/default/files/publications/2022_00092_CISA_CPG_Report_508c.pdf

Most Recent Posts
Keep Up with CORL: Vendor Breach Digest, 10/11/22 Read More
TPRM is Broken: Healthcare’s Unsustainable Approach to Third-Party Vendor Risk Management Read More
Cloud Security Alliance Weighs in on Third-Party Risk Management in Healthcare Read More