Executive Summary
     
    Remove Translation Translation
    Original Text

    Overview

    概要

    The cyber supply chain is defined as follows:

    cyber供应链被定义如下:

    The entire set of key actors involved with/using cyber infrastructure: system end-users, policy makers, acquisition specialists, system integrators, network providers, and software/hardware suppliers. The organizational and process-level interactions between these constituencies are used to plan, build, manage, maintain, and defend the cyber infrastructure.”

    介入与或使用cyber基础设施的整个套关键演员: 系统终端用户、政策制订者、承购专家、系统集成商、网络提供者和软件或硬件供应商。 这些顾客之间的组织和过程级互作用用于计划,建立,处理,维护和保卫cyber基础设施”。

    While most cybersecurity incidents are attributable to online attacks, countless examples used insecure cyber supply chains, introducing new types of risks, threats, vulnerabilities, and even cyber-attacks. For example:

    当多数cybersecurity事件是可归属的到网上攻击时,不计其数的例子使用了不安全的cyber供应链,介绍风险,威胁,弱点的新型和甚而cyber攻击。 例如:

    In 2008, the FBI seized $76 million of counterfeit Cisco equipment. According to an FBI presentation, the fake Cisco routers, switches, and cards were sold to the U.S. Navy, the U.S. Marine Corps., the U.S. Air Force, the U.S. Federal Aviation Administration, and even the FBI itself. One slide referred to the counterfeit Cisco equipment as a “critical infrastructure threat.”

    2008年, FBI占领了$76百万假劣Cisco设备。 根据FBI介绍,假Cisco路由器、开关和卡片被卖了到美国。 海军,美国。 海军陆战队。,美国。 空军,美国。 联邦航空管理局和甚而FBI。 一张幻灯片提到了假劣Cisco设备作为“重要基础设施威胁”。

    Security researchers who analyzed the 2010 Stuxnet attack on Iranian nuclear facilities believe that malware used to infect programmable logic controllers (PLCs) and modify Siemens Step 7 software was likely carried into the facilities by third-party contractors working with the Iranian government. These third-party contractors were identified, attacked, and compromised and then unknowingly transported Stuxnet into the Iranian nuclear facilities, most likely through the use of USB thumb drives.

    分析对伊朗核设施的2010年Stuxnet攻击的安全研究员相信用于的malware传染可编程序的逻辑控制器(PLCs)和修改西门子第7步软件可能运载了入设施由第三方承包商与伊朗政府一起使用。 这些第三方承包商辨认,被攻击的和妥协的然后不知道被运输的Stuxnet入伊朗核设施,很可能通过对USB拇指驱动的用途。

    In 2012, the Chairman and Ranking Member of the House Intelligence Committee, Mike Rogers (R-MI) and C.A. Dutch Ruppersberger (D-MD), released a report recommending that U.S. companies avoid using telecommunications equipment manufactured by Chinese telecommunications companies Huawei and ZTE. The report highlighted U.S. critical infrastructure interconnectivity and went on to warn of the heightened threat of cyber-espionage and predatory disruption or destruction of U.S. networks if U.S-based telecommunications networks were built by companies with known ties to the Chinese state, a country known to “aggressively steal valuable trade secrets and other sensitive data from American companies.”

    2012年,议院情报委员会的主席和等第成员,麦克・罗杰斯(R-MI)和C.A。 荷兰Ruppersberger (D-MD),被发布报告推荐那美国。 公司使用中国电信公司制造的电信设备避免Huawei和ZTE。 报告突出了美国。 重要基础设施interconnectivity和警告cyber间谍活动被升高的威胁和美国的掠食性中断或者破坏。 网络,如果基于美国的电信网由公司建立与知道的领带对中国状态,知道的国家“进取地窃取可贵的商业秘密和其他敏感数据从美国公司”。

    According to documents leaked by Edward Snowden, the National Security Agency (NSA) intercepted networking equipment built in the United States, added backdoors for remote access capabilities, and then shipped these devices to their recipients abroad. When the hacked networking equipment was deployed online, it was programmed to phone home to NSA-controlled servers. "In one recent case, after several months a beacon implanted through supply-chain interdiction called back to the NSA covert infrastructure," said Glenn Greenwald, a reporter at the Guardian at the time. Greenwald further quoted the leaked NSA report: "This call back provided us (i.e., NSA) with access to further exploit the device and survey the network."

    根据爱德华・漏的文件Snowden,国家安全代办处(NSA)拦截了在美国修造的网络设备,增加的backdoors为远程存取能力,然后运输了这些设备对他们的接收者海外。 当被乱砍的网络设备在网上部署了,它被编程打电话在家到NSA受控服务器。 “在一个最近案件,在几数月以后通过供应链子禁止被种入的烽火台叫回到NSA隐蔽基础设施”,当时一位记者说Glenn Greenwald,在监护人。 Greenwald更加进一步引述了漏的NSA报告: “这个电话提供我们(即, NSA)以通入进一步利用设备和勘测网络”。

    The 2013 data breach at U.S. retailer Target exposed the personal and credit card data of more than 110 million consumers. Security researchers believe that this attack began with a spear phishing attack on a Target HVAC contractor, Fazio Mechanical, of Sharpsburg, PA. Cyber-attackers used an e-mail message to compromise a PC at Fazio Mechanical a few months before the attack and then downloaded password-stealing malware onto the system. The perpetrator then used legitimate Fazio credentials to log onto the Target network and ultimately carry out the attack.

    2013数据突破口在美国。 贩商目标暴露了超过110百万个消费者个人和信用卡数据。 安全研究员相信这次攻击从对目标HVAC承包商的一次矛phishing的攻击开始了, Fazio机械, Sharpsburg, PA。 Cyber攻击者使用一个电子邮件妥协个人计算机在Fazio机械几个月在攻击之前然后下载了密码窃取malware系统。 采伐目标网络和最后执行攻击的犯人然后使用的合法的Fazio证件。

    While cyber supply chain security incidents like these threaten businesses and consumers alike, any type of cyber-attack on critical infrastructure organizations could result in massive societal disruption threatening national security. These concerns are exacerbated by numerous events such as:

    当cyber供应链安全事件象这些时威胁企业和消费者,任何类型在重要基础设施组织cyber攻击可能导致威胁国家安全的巨型的社会中断。 这些关心由许多事件恶化例如:

    The Siberian gas pipeline explosion of 1982. In 1982, CIA agents learned of a Russian plot to steal western technologies for updating its outdated gas pipeline system. Armed with this knowledge, the CIA intervened with a covert operation. Unbeknownst to Soviet agents, software stolen in France was actually booby-trapped by the CIA and programmed to create havoc in a series of pumps, values, and turbines and increase pressure across the entire pipeline. Once installed, the malicious software caused a massive explosion. Leaked government documents referred to this event as, “the most monumental non-nuclear explosion ever seen from space,” in the summer of 1982.

    西伯利亚气体管道爆炸1982年。 1982年,中央情报局特工得知俄国剧情窃取西部技术为更新它过时的气体管道系统。 用这知识武装, CIA干预了以一次掩护作战。 Unbeknownst对苏联代理,在法国窃取的软件由CIA实际上设陷井并且被编程创造浩劫参加一系列泵浦、价值和涡轮和增量压力横跨整个管道。 一旦安装,恶意软件导致了巨型的爆炸。 漏的政府文件提到了这个事件和, “从空间看的最巨大的非核爆炸”,在1982年的夏天。

    The Aurora test of 2007. In 2007, Idaho National Labs ran an experiment called Aurora. The experiment simulated a cyber-attack and used a computer program to rapidly open and close a diesel generator’s circuit breakers so they were out-of-phase from the rest of the electric grid. In a now famous video, this remote attack caused a 2.25 megawatt diesel generator to bounce, shake, smoke, and eventually blow up. The entire process took less than three minutes, but researchers believe that a true cyber-attack could have destroyed the generator in less time. This experiment proved that a knowledgeable cyber-adversary could cause massive disruptions to the U.S. power grid. Furthermore, a diesel generator like the one destroyed in this experiment could take months to build, ship, and replace, meaning that a cyber-attack like Aurora could have long-term national security implications.

    极光测试2007年。 2007年,爱达荷国家实验室跑了称Aurora的实验。 实验模仿了cyber攻击并且使用计算机程序迅速地开始并且关闭柴油发电器的开关,因此他们从电栅格的其余是out-of-phase。 在现在著名录影,这次遥远的攻击造成一台2.25兆瓦柴油发电器弹起,震动,抽烟和最终鼓起。 整个过程需要了少于三分钟,但研究员相信真实在较少时间cyber攻击可能毁坏了发电器。 这个实验证明,一个博学的cyber敌人可能导致大规模瓦解对美国。 功率网格。 此外,在这个实验象那个毁坏的一台柴油发电器可能需要几个月对修造,运送,并且替换,意味cyber攻击象极光可能有长期国家安全涵义。

    The cyber-attacks on Estonia in 2007. In 2007, the Estonian government removed a Soviet-era statue, the Bronze Soldier of Tallinn, from the city. This action was taken as an insult by Russian nationals within Estonia and some members of the Russian cybersecurity community within and outside the government. In April 2007, the small Baltic nation experienced a wave of devastating distributed denial-of-service (DDOS) attacks that disrupted the services of the Estonian banks, broadcasters, ministries, newspapers, and parliament. The Estonian attacks are sometimes referred to as the first documented acts of cyberwar.

    2007年在爱沙尼亚cyber攻击。 2007年,爱沙尼亚语政府从城市去除了苏维埃时代雕像, Tallinn的古铜色战士。 这次行动在爱沙尼亚范围内采取了作为侮辱由俄国国民和俄国cybersecurity社区的有些成员在和在政府之外之内。 在2007年4月,小波儿地克的国家体验了摧残打乱爱沙尼亚语银行、播报员、部、报纸和议会的服务的分布的否认服务(DDOS)攻击波浪。 爱沙尼亚语攻击有时指计算机战争首先被提供的行动。

    The cyber-theft of the F-35 Joint Strike Fighter and other military secrets. In 2015, NSA documents leaked by former contractor, Edward Snowden, revealed that cyber-attackers in China obtained more than 50 terabytes of data from U.S. defense contractors and government networks. This data included detailed plans about the F-35 Joint Strike Fighter’s stealth radar and engine. By learning about these and other design points, Chinese defense companies were able to include similar designs and technologies in China’s new stealth jet, the J-20. The secret also could allow Chinese air defenses to target the F-35 in a future conflict.

    F-35联接罢工战斗机和其他军事秘密的cyber偷窃。 2015年, NSA文件由前承包商,爱德华Snowden漏了,显露cyber攻击者在中国获得了超过数据50个太字节从美国。 防御工程承包商和政府网络。 这数据包括详细计划关于F-35联接罢工战斗机的秘密行动雷达和引擎。 通过得知这些和其他设计点,中国防御公司能包括相似的设计,并且技术在中国的新的秘密行动喷射, J-20。 秘密在未来冲突能也允许中国空防瞄准F-35。

    The potential for a devastating cyber-attack on U.S. critical infrastructure has had Washington’s attention for a number of years. In 1998, Deputy Defense Secretary John Hamre cautioned the U.S. Congress about critical infrastructure protection (CIP) by warning of a potential “cyber Pearl Harbor.” Hamre stated that a devastating cyber-attack “… is not going to be against Navy ships sitting in a Navy shipyard. It is going to be against commercial infrastructure.”

    在毁灭的潜力在美国cyber攻击。 重要基础设施几年有华盛顿的注意。 1998年,代理国防部长约翰Hamre警告了美国。 国会关于重要基础设施保护(CIP)由潜在的“cyber珍珠港的警告”。 Hamre阐明,毁灭cyber攻击“…不反对坐在海军造船厂的军舰。 它反对商业基础设施”。

    After taking office, President Obama stated:

    在担任职务以后, Obama总统陈述的:

    “From now on, our digital infrastructure, the networks and computers we depend on every day will be treated as they should be; as a strategic national asset. Protecting this infrastructure will be a national security priority. We will ensure that these networks are secure, trustworthy, and resilient. We will deter, prevent, detect, and defend against attacks and recover quickly from any disruptions or damage.”

    “从现在起,我们的数字式基础设施、我们依靠的网络和计算机每天对待他们应该是; 作为战略全国财产。 保护这基础设施将是一种国家安全优先权。 我们保证这些网络是安全,信得过和韧性的。 我们将阻止,防止,查出,并且保卫反对攻击并且从所有中断或损伤迅速恢复”。

    In 2012, defense secretary, Leon Panetta, echoed these earlier warnings, stating that the U.S. faced a potential “cyber Pearl Harbor,” and was vulnerable to an increasing number of foreign hackers who could disrupt U.S.-based power grids, transportation networks, financial systems, and the government itself. Finally, in February 2015 at a cybersecurity summit held at Stanford University, President Obama announced five priorities to strengthen the U.S. approach to cybersecurity threats:

    2012年,国防部长, Leon Panetta,随声附和了这些早期前兆,阐明,美国。 面对潜在的“cyber珍珠港”,并且是脆弱的到可能打乱美国-基于功率网格、运输网络、财政系统和政府外国黑客的一个增长的数字。 终于,在2月2015年在cybersecurity山顶举行了在斯坦福大学, Obama总统宣布五种优先权加强美国。 对cybersecurity威胁的方法:

    1. Protecting the country's critical infrastructure—our most important information systems—from cyber-threats.

    1. 保护国家的重要基础设施我们的最重要的信息系统从cyber威胁。

    2. Improving the country’s ability to identify and report cyber-incidents so that we can respond in a timely manner.

    2. 改进国家的能力辨认和报告cyber事件,以便我们可以及时地反应。

    3. Engaging with international partners to promote internet freedom and build support for an open, interoperable, secure, and reliable cyberspace.

    3. 国际伙伴与$$4相啮促进互联网自由和获得支持为开放,相互可操作,巩固和可靠的网际空间。

    4. Securing federal networks by setting clear security targets and holding agencies accountable for meeting those targets.

    4. 巩固联邦网络通过设置清楚的安全目标和拿着代办处对实现那些目标负有责任。

    5. Shaping a cyber-savvy workforce and moving beyond passwords in partnership with the private sector.

    5. 塑造cyber精明的劳工和移动在密码之外与私人部门合伙。

    There is clear evidence that the U.S. critical infrastructure faces a state of constant cyber-attack and a successful breach could have devastating consequences. Are critical infrastructure organizations adequately prepared to defend themselves? Do they have the right controls and oversight in place for cyber supply chain security? Are government agencies providing critical infrastructure organizations with the right programs and support? This ESG research report is intended to explore the answers to these important questions.

    有美国的清楚的证据。 重要基础设施面对状态恒定cyber攻击,并且一个成功的突破口可能有破坏性结果。 重要基础设施组织充分地准备保护自己? 他们是否为cyber供应链安全到位有正确的控制和失察? 政府机构提供重要基础设施组织以正确的节目并且支持? 这个ESG研究报告意欲探索答复到这些重要问题。

    Report Conclusions

    报告结论

    ESG surveyed 303 IT and cybersecurity professionals representing large midmarket (500 to 999 employees) organizations and enterprise-class (1,000 employees or more) organizations in the United States within 16 vertical industries designated as critical infrastructure by the U.S. Department of Homeland Security (DHS).

    ESG在美国的勘测了303位它和cybersecurity专家代表大midmarket (500到999雇员)组织和企业类(1,000名雇员或更多)组织在16垂直的产业之内被选定作为重要基础设施由美国。 国土安全(DHS)的部门。

    The survey focused on critical infrastructure organizations’ current cybersecurity processes in general and cyber supply chain security awareness and safeguards in particular. Based on the data collected, ESG concludes:

    勘测特别是一般来说集中于重要基础设施组织’当前cybersecurity过程和cyber供应链安全了悟和保障。 基于数据收集了, ESG结束:

    The threat landscape has grown more dangerous for critical infrastructure organizations. Nearly one-third (31%) of critical infrastructure organizations believe that the threat landscape (i.e., cyber-adversaries, cyber-attacks, exploits, malware, etc.) is much worse today than it was two years ago, while another 36% say that the threat landscape has grown somewhat worse in the past two years. Alarmingly, only 37% of critical infrastructure organizations rate their cybersecurity policies, processes, and technology safeguards as excellent and capable of addressing almost all of today’s threats. The remaining 63% aren’t nearly as confident.

    威胁风景增长危险为重要基础设施组织。 几乎三分之一(31%)重要基础设施组织相信威胁风景(即, cyber敌人, cyber攻击,盘剥、malware等等)比它是更坏的今天是二年前,当威胁风景增长有些坏在过去二年的另外36%言时。 令人挂虑地,仅37%重要基础设施组织对他们的cybersecurity政策、过程和技术保障估计如优秀和能演讲几乎所有今天威胁。 剩余63%不是几乎如确信。

    Critical infrastructure organizations are under attack. A majority (68%) of critical infrastructure organizations have experienced various cybersecurity incidents over the past two years, including compromises of an employee system, data breaches due to lost or stolen equipment, insider attacks, and breaches of physical security. Over one-third (36%) of these security incidents resulted in the disruption of a business process and/or critical operations. The ramification is clear: Cyber-attacks are already impacting critical infrastructure operations and could certainly disrupt services.

    重要基础设施组织受到攻击。 大多数(68%)重要基础设施组织体验了各种各样的cybersecurity事件在过去二年,包括雇员系统的妥协,数据突破口由于失去或被窃取的设备、知情人物理安全攻击和突破口。 三分之一(36%)这些安全事件导致业务流程和重要操作的中断。 分枝是清楚的: Cyber攻击已经冲击重要基础设施操作,并且可能一定打乱服务。

    Cyber supply chain security is growing more difficult. A majority (60%) of critical infrastructure organizations believe that cyber supply chain security is much more difficult or somewhat more difficult than it was two years ago. Of those that believe that cyber supply chain security has become more difficult, 44% equate this change to new types of IT initiatives that increased the cyber supply chain security attack surface, 39% say that they have more IT suppliers than two years ago, and 36% have consolidated IT and operational technology (OT) security, increasing cyber supply chain complexity.

    Cyber供应链安全增长更加困难。 大多数(60%)重要基础设施组织相信cyber供应链安全比它二年前更多困难或稍微困难。 那些相信cyber供应链安全变得更加困难, 44%视同对新型的这变动的它增加cyber供应链安全攻击表面的主动性, 39%言他们比二年有更多它供应商前,并且36%巩固了它和操作的技术(OT)安全,增加cyber供应链复杂。

    IT vendor cybersecurity audits remain haphazard. While more critical infrastructure organizations audit their IT supplier’s security processes and metrics today than five years ago, audit processes remain somewhat ad-hoc. For example, only 14% of the critical infrastructure organizations surveyed audit the cybersecurity practices of all strategic IT infrastructure vendors, use standard processes for these IT vendor audits, and use the results of these audits as formal guidelines for IT procurement decisions. In spite of progress in IT security auditing over the past five years, many critical infrastructure organizations still treat IT vendor security as a check-box exercise rather than a serious risk management requirement.

    它供营商cybersecurity审计保持随便。 当更加重要的基础设施组织比五年今天验核他们的它供应商的安全过程和度规前时,审计过程依然是有些特别。 例如,被勘测的仅14%重要基础设施组织验核cybersecurity实践所有战略它基础设施供营商,为这些使用标准过程它供营商审计,并且使用这些审计的结果作为正式指南为它获得决定。 竟管进展在它验核在过去五年的安全,许多重要基础设施组织仍然治疗它供营商安全作为复选框锻炼而不是严肃的风险管理要求。

    Critical infrastructure organizations continue to employ risky IT technologies. As evidence of continuing cyber supply chain security risk, 58% of critical infrastructure organizations admit that they use products or services from IT vendors that have product and/or internal process security issues that are cause for concern.

    重要基础设施组织继续使用危险它技术。 作为继续cyber供应链安全风险的证据, 58%重要基础设施组织承认他们使用产品或服务从它有产品和内部处理安全性问题是令人担心的事的供营商。

    Third-party IT relationships exacerbate cyber supply chain risk. Critical infrastructure services often rely on a vast network of connected organizations. Fifty eight percent of the organizations surveyed claim that they use IT services or business applications provided by third parties, while 48% provide IT service or business application access to third-party business partners. Of those critical infrastructure organizations with these types of external IT relationships, 38% provide IT access to more than 100 third-party organizations, while 27% consume IT services and business applications from more than 100 third parties. Most critical infrastructure organizations protect these third-party IT relationships with security controls and some oversight, but these safeguards are not nearly as formal or process-oriented as they should be.

    第三方它关系恶化cyber供应链风险。 重要基础设施服务经常依靠连接的组织一个浩大的网络。 被勘测的组织的百分之五十八声称他们使用它为服务或第三方提供的商业应用,而48%提供它服务或对第三方商务伙伴的商业应用通入。 那些重要基础设施组织与外部的这些类型它关系, 38%提供它对超过的通入100第三方组织,而27%消耗它从超过100第三方为服务和商业应用。 多数重要基础设施组织保护这第三方它与安全控制和某一失察的关系,但这些保障不是几乎作为正式或针对过程,象他们应该。

    Software security remains a major concern. One-third of critical infrastructure organizations have experienced some type of security incident directly related to the compromise of internally developed software. This is particularly concerning since critical infrastructure services depend upon specialized processes often requiring homegrown software. To address software vulnerabilities, many critical infrastructure organizations have put secure software development processes in place, but only half of these firms implement these methodologies across the entire enterprise.

    软件安全依然是主要关心。 重要基础设施组织的三分之一体验了安全事件的一些个类型直接地与内部被开发的软件有关妥协。 因为重要基础设施服务取决于经常要求家庭产生的软件的专业过程这特别有关。 要针对软件弱点,许多重要基础设施组织到位投入安全软件开发过程,但仅一半这些企业实施这些方法学横跨整个企业。

    Critical infrastructure organizations want more help from Washington. Only 22% of cybersecurity professionals working at critical infrastructure organizations believe that the U.S. government’s cybersecurity strategy is extremely clear and thorough, while the remaining 88% are somewhat confused by Washington. Additionally, 45% believe that the U.S. government should be significantly more active with cybersecurity strategies and defenses. Those on the critical infrastructure cybersecurity front lines would like Washington to create better methods for sharing security intelligence with the private sector, black list IT vendors with poor cybersecurity track records, and limit government IT purchases to those vendors with demonstrably superior product and process security.

    重要基础设施组织想要更多帮助从华盛顿。 仅22%工作在重要基础设施组织的cybersecurity专家相信美国。 而剩余88%有些由华盛顿,混淆政府的cybersecurity战略是极端清楚和详尽的。 另外, 45%相信美国。 政府应该是更激活与cybersecurity战略和防御。 那些在重要基础设施cybersecurity前线希望华盛顿创造更好的方法为分享安全智力与私人部门、黑名单它购买对那些供营商以可示范地优越产品和过程安全的它供营商与恶劣的cybersecurity记录和极限政府。