Important details about CIRCIA ransomware reporting
In March 2022, the Biden Administration signed into law the Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA). This landmark legislation tasks the Cybersecurity and Infrastructure Security Agency (CISA) to develop and implement regulations requiring covered entities to report covered cyber incidents and ransomware payments.
The CIRCIA incident reports are meant to enable CISA to:
- Rapidly deploy resources and render assistance to victims suffering attacks
- Analyze incoming reporting across sectors to spot trends
- Quickly share information with network defenders to warn other potential victims
As they say, the devil is in the details. In early April, the 447-page Notice of Proposed Rulemaking (NPRM) was published by CISA in response to its responsibilities mandated by CIRCIA. The document is now open for public feedback through the Federal Register.
Considering CIRCIA and its newly published NPRM, what might incident reporting for ransomware attacks look like in the future? Let’s find out.
How does CISA define ransomware?
As per CISA, “Ransomware is an ever-evolving form of malware designed to encrypt files on a device, rendering any files and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption.”
Ransomware groups often target and threaten to sell or leak stolen data or authentication information if the ransom is not paid. Ransomware attacks have become increasingly prevalent among state, local, tribal and territorial (SLTT) government entities and critical infrastructure organizations.
How might incident reporting for ransomware differ from other attacks?
CISA’s NPRM proposes four types of impacts that would result in an incident being classified as a substantial cyber incident and, therefore, reportable. The four types of impact include:
- Impact 1: Substantial Loss of Confidentiality, Integrity, or Availability
- Impact 2: Serious Impact on Safety and Resiliency of Operational Systems and Processes
- Impact 3: Disruption of Ability to Engage in Business or Industrial Operations
- Impact 4: Unauthorized Access Facilitated Through or Caused by a: (1) Compromise of a CSP, Managed Service Provider or Other Third-Party Data Hosting Provider, or (2) Supply Chain Compromise
CISA is further proposing that substantial cyber incidents include any incident regardless of cause — whether or not ransomware is involved. These could be a compromise of a cloud service provider, managed service provider or other third-party data hosting provider; a supply chain compromise; a denial-of-service attack; a ransomware attack; or exploitation of a zero-day vulnerability.
CIRCIA requires covered entities to report to CISA any covered cyber incidents within 72 hours after the entity reasonably believes that the covered cyber incident has occurred.
Meanwhile, ransom payments made in response to a ransomware attack must be reported within 24 hours after the ransom payment has been made. Clearly, CIRCIA places ransomware as a reporting priority.
Read the Definitive Guide to Ransomware
What are the steps to follow for ransomware reporting?
As far as ransomware reporting is concerned, CISA’s NPRM outlines four steps:
- A covered entity that experiences a covered cyber incident must report that incident to CISA.
- A covered entity that makes a ransom payment as the result of a ransomware attack must report that payment to CISA.
- Until a covered entity notifies CISA that the covered cyber incident in question has concluded and been fully mitigated and resolved, a covered entity must submit an update or supplement to a previously submitted report on a covered cyber incident if substantial new or different information becomes available.
- A covered entity must submit an update or supplement to a previously submitted report on a covered cyber incident if the covered entity makes a ransom payment after submitting a Covered Cyber Incident Report.
CISA also explains that time doesn’t exclude reporting. For example, let’s say your company discovers that it experienced a cyber incident two years ago, and the incident is ongoing. You would still be required to submit a Covered Cyber Incident Report under the proposed rule because the incident has not concluded and has not been fully mitigated and resolved.
What exceptions exist when reporting a cyber incident to CISA?
As per CISA, reportable incidents exclude “any event where the cyber incident is perpetrated in good faith by an entity in response to a specific request by the owner or operator of the information system.”
What exactly are “good faith” scenarios? It could be a third-party service provider acting within the parameters of a contract that unintentionally misconfigured a company’s devices, leading to a service outage. Another example would be a properly authorized penetration test that inadvertently results in a cyber incident with actual impacts.
Other good faith exclusions could be incidents related to security research testing. Researchers may have been authorized to attempt to compromise systems, such as in accordance with a vulnerability disclosure policy or bug bounty programs. That being said, CISA anticipates that these exemptions would rarely occur. Good faith security research generally stops at the point where the vulnerability can be demonstrated and should not typically result in an actual impactful incident.
Intentional shutdown not exempt if ransomware involved
In some cases, a covered entity, in response to genuine ransomware or other malicious incident, might decide to take action against itself, resulting in reportable level impacts, such as shutting down systems or operations. For example, a Ransomware-as-a-Service attack victim might do this to prevent a wider impact due to a cyberattack. This scenario is still considered to be a reportable substantial cyber incident.
In such a case, the incident itself was not perpetrated in good faith, and the threshold level impacts would not have occurred if there had been no attack. Therefore, CISA would not consider the covered entity’s actions to meet the “good faith” exception. Clearly, the covered entity intentionally triggered an impactful event (e.g., taking systems offline) in an attempt to minimize the potential damage of a cyber incident. However, this kind of activity would not be exempt from reporting requirements.
Ongoing conversation
The discussion about ransomware reporting requirements is ongoing. And when even entities with robust cyber resilience are at risk, the final conclusions of CIRCIA will be on everyone’s radar.
More from Government
April 18, 2024
Unpacking the NIST cybersecurity framework 2.0
4 min read – The NIST cybersecurity framework (CSF) helps organizations improve risk management using common language that focuses on business drivers to enhance cybersecurity.NIST CSF 1.0 was released in February 2014, and version 1.1 in April 2018. In February 2024, NIST released its newest CSF iteration: 2.0. The journey to CSF 2.0 began with a request for information (RFI) in February 2022. Over the next two years, NIST engaged the cybersecurity community through analysis, workshops, comments and draft revision to refine existing standards…
January 25, 2024
Updated SBOM guidance: A new era for software transparency?
3 min read – The cost of cyberattacks on software supply chains is a growing problem, with the average data breach costing $4.45 million in 2023. Since President Biden’s 2021 executive order, software bills of materials (SBOMs) have become a cornerstone in protecting supply chains.In December 2023, the National Security Agency (NSA) published new guidance to help organizations incorporate SBOMs and combat the threat of supply chain attacks.Let’s look at how things have developed since Biden’s 2021 order and what these updates mean for…
December 28, 2023
Roundup: Federal action that shaped cybersecurity in 2023
3 min read – As 2023 draws to a close, it’s time to look back on our top five federal cyber stories of the year: a compilation of pivotal moments and key developments that have significantly shaped the landscape of cybersecurity at the federal level.These stories highlight the challenges federal agencies faced in securing digital infrastructure in the past year and explore the evolving nature of cyber threats, as well as the innovative responses required to address them.New White House cybersecurity strategyThe White House’s…
Topic updates
Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today
This post was originally published on the 3rd party site mentioned in the title of this this site