US government initiatives designed to encourage information sharing amongst federal agencies, are also helping private enterprises improve their network defences, a National Security Agency (NSA) leader told Black Hat conference attendees.
In his keynote presentation at the annual hacker confab in Las Vegas, Tony Stager, chief of the Vulnerability Analysis and Operations Group at the NSA said that data-sharing efforts led by his agency and others in the federal space are maturing rapidly.
Having served a little less than 30 years as a security expert at the NSA, Stager said that federal agencies are finally succeeding in their efforts to build standards for issues such as secure configuration of Microsoft's Windows operating systems, and that those guidelines are likewise being adopted by other security initiatives and moving into the public arena.
At the heart of the progress is the notion that government entities and private institutions cannot effectively tackle security problems on their own, a deduction that seems obvious, but one that has been hard to implement on a practical level, in particular among agencies such as the NSA and US Department of Defense, which closely guard all their IT policies.
"NSA has shifted the nature of its work over the last few years; the time has come when we are all living in this same chaotic network and need to come together to solve problems of this scale," Sager said.
"In the old days, the idea was that we could simply design away the risk, but this is a much more complex world today," he said. "We've gone from protecting [assets] to protecting not only data, but all the information around that and the infrastructure that supports it; it's a much more dynamic problem, and there's no way of escaping that this is a shared problem."
As part of its effort to help foster security data sharing, NSA has moved its focus from trying to build technologies aimed at solving major security issues to attempting to influence practices across the government space that can also be adopted by private-sector firms, he said.
A major element of the vision is pushing for standards that translate security intelligence into language that any organization can interpret, said Sager. He highlighted the Common Weakness Enumeration (CWE) project - an effort aimed at creating a common language for identifying software vulnerabilities that is backed by the Department of Homeland Security and non-profit Mitre - as one example of the types of standards that are delivering on the NSA's goal.
"The time has come when folks in my business are thinking about how to transfer knowledge outwardly; we don't solve these problems one organisation or one vulnerability at a time, so we're thinking of ways to leverage knowledge in light of the available economies of scale," Sager said. "We must be able to deliver expertise within the context of others' problems. In that way, this has become a business of influence [for the NSA]."
In a nod to the challenges of the past, Sager said that organisations such as the NSA traditionally developed their own practices for handling issues such as secure configuration of Windows, and that nearly every other government agency would do the same.