Michigan and the Feds Try Sharing Cyber-Security Tools
The experiment could help states cut the cost of protecting sensitive government information.
Protecting the information stored in government computer systems is one of the tougher challenges facing state and local agencies. Cyber-criminals grow more sophisticated by the day, and your defense against a cyber-attack is only as good as your weakest link. Add the fact that IT security spending has stagnated in many jurisdictions thanks to the recession, and you have a recipe for potential disaster.
All of that is what makes an experimental partnership between Michigan and the U.S. Department of Homeland Security (DHS) so intriguing. In December 2009, Michigan IT officials announced they began using the federal government's Einstein 1 network monitoring system to watch for suspicious activity in executive branch computer networks.
Einstein 1 looks at where network traffic comes from, where it's going and what kind of traffic it is - and collects that information for analysis by the United States Computer Emergency Readiness Team (US-CERT), a public-private group of cyber-security experts operated by the DHS. Federal executive branch agencies already use the system, and the 12-month Michigan pilot marks the first attempt to extend the system to state government.
Michigan CIO Ken Theis says sharing resources like Einstein 1 could help cut the cost of protecting sensitive government information. "They're extending this technology out to us. So rather than us needing to make these investments, we're leveraging the investment they've already made," he says. "That allows us to continue to increase our security capabilities."
Michigan is no slouch when it comes to data protection. It added extensive security measures during an initiative to consolidate state government technology systems. But the Einstein experiment gives the state access to global cyber-security analysis conducted by the US-CERT. The feds benefit, too, by getting a more complete picture of potential threats hitting government computers. "It's a win-win," says Theis. "To me, there's not a greater example of collaboration and shared services."
But just because sharing security resources makes sense doesn't mean it's easy. Michigan's Department of Information Technology spent more than a year hammering out details with the DHS. Among the sticking points: reconciling state and federal laws on data security and privacy, determining what types of information can be shared between the state and DHS, and figuring out how to handle Freedom of Information Act requirements.
The DHS will evaluate the project after 12 months and assess its future, and is careful to point out that Einstein 1 does not read the content of e-mail and other messages traveling through Michigan computer networks. Instead, the system examines "network flow records" that merely show peripheral data about traffic entering and leaving state computers.
Theis acknowledges that if the program were to expand, giving the feds access to state computer systems could cause heartburn in some statehouses and among privacy advocates. "They [DHS] are trying to keep this a security issue, not a political issue," he says.
But if the experiment succeeds, it could pave the way for greater sharing of cyber-security resources among state, local and federal government - and give better protection against increasingly sophisticated cyber-criminals.
We invite you to discuss and comment on this article using social media.
GOP Health Bill Gets Support From 8 GOP Governors1 day ago
Failed Equal Rights Amendment to U.S. Constitution Gets New Hope From Nevada1 day ago
Blaming Racism and Sexism, Hawaii Lawmaker Leaves Republican Party1 day ago
Utah Governor Signs Nation's Strictest Drunk Driving Law1 day ago
California Passes Toughest Methane Emission Regulations in U.S.1 day ago
No Permit? No Problem. You Can Still Carry a Concealed Weapon in North Dakota.1 day ago