{"id":2686,"date":"2021-07-30T18:54:50","date_gmt":"2021-07-30T13:24:50","guid":{"rendered":"https:\/\/xiarch.com\/blog\/?p=2686"},"modified":"2021-07-30T18:54:53","modified_gmt":"2021-07-30T13:24:53","slug":"national-security-memorandum-bolsters-sensitive-infrastructure-cybersecurity","status":"publish","type":"post","link":"https:\/\/xiarch.com\/blog\/national-security-memorandum-bolsters-sensitive-infrastructure-cybersecurity\/","title":{"rendered":"National Security Memorandum bolsters Sensitive Infrastructure Cybersecurity"},"content":{"rendered":"\n<p><p style=\"text-align: justify;\">Joe Biden US President today issued a national security memorandum designed to help in enhancing the security of critical infrastructure by setting baseline performance goals for critical infrastructure owners and operators. The memorandum arrives a revert to recent attacks across the world which includes ransomware attacks on Colonial Pipeline and JBS Foods in the United States that discovered some vulnerabilities across US infrastructure, largely owned and operated by private sector orgs.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">It directs the Department of Homeland Security\u2019s CISA and the Department of Commerce\u2019s NIST, as combined with other federal agencies, to develop cybersecurity performance aims and guidance for sensitive frameworks orgs. \u201cWe expect those standards will guide companies and responsible for giving important services like water, power and transportation to enhance their cybersecurity,\u201d a White House statement said.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">\u201cResponsible sensitive frameworks owners and operators should be following voluntary guidance as well as important needs in order to make sure that the sensitive services the American people rely on are secured from the cyber threats,\u201d a senior administration official added.<\/p><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"534\" height=\"432\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/07\/National-Security-Memorandum-bolsters-Sensitive-Infrastructure-Cybersecurity-image1.png\" alt=\"National-Security-Memorandum-bolsters-Sensitive-Infrastructure-Cybersecurity-image1\" class=\"wp-image-2688\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/07\/National-Security-Memorandum-bolsters-Sensitive-Infrastructure-Cybersecurity-image1.png 534w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/07\/National-Security-Memorandum-bolsters-Sensitive-Infrastructure-Cybersecurity-image1-300x243.png 300w\" sizes=\"(max-width: 534px) 100vw, 534px\" \/><\/figure><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Private Sector Urged to Join Federal Government\u2019s Efforts<\/strong><\/h2>\n\n\n\n<p><p style=\"text-align: justify;\">Today\u2019s NSM also makes the President\u2019s Industrial Control System Cybersecurity (ICS) Initiative, a voluntary, combinative effort between the sensitive framework community and the federal government started in the mid of April to provide the set up of technology providing threat visibility, indicators, detections, and alerts.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">The ICS initiative has already led to over 150 electricity aspects which represent roughly 90 million customers set up or agreeing to set up control system cybersecurity technologies in the future.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">\u201cThese are the technologies that, had they been in place, would have blocked what occurred at Colonial Pipeline in that they connect the operational technology side of the network to the IT side of the network,\u201d a senior administration official further explained. \u201cThese action plans for natural gas pipelines is underway, and additional initiatives for other sectors will pursue later this year.\u201d<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">The private sector (which includes all responsible critical framework owners and operators) is urged to approve the new goals and guidance CISA and NIST will outline as part of a shared effort to protect the USA\u2019s sensitive framework.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">This National Security Memorandum, the ICS Cybersecurity Initiative, TSA\u2019s Security Directives, and foundationally, the President\u2019s Executive Order on Improving the Nation\u2019s Cybersecurity that he signed back in May all are parts of our focused and aggressive continuing effort to address these significant threats to our nation within that first line of modernizing defense of our cybersecurity \u2014 of the administration\u2019s cybersecurity strategy. \u2014 Senior Biden administration official<\/p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Severe Security Breaches Could Lead to Real War<\/strong><\/h2>\n\n\n\n<p><p style=\"text-align: justify;\">Yesterday, President Joe Biden alerted that Cyberattacks leading to severe security breaches could lead to a \u201creal shooting war\u201d with another major world power.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">\u201cYou know, we have seen how cyber threats, consisting ransomware attacks, progressively are able to cause damage and disruption to the real world,\u201d Biden stated during a speech at the National Counterterrorism Center of the Office of the Director of National Intelligence.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">\u201cI can\u2019t ensure this, and you are informed as I am, but I thinks it\u2019s more likely we are going to end up \u2013well if we end up in a war, a real shooting war with major power, it is going to be as a consequences of a cyber breach of great consequences.\u201d<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">Biden\u2019s also remarks come after a NATO statement from the mid of June that compare the impact of \u201csignificant\u201d Cyberattacks to \u2018armed attacks.\u2019 \u201cWe continue that a decision as to when a cyber attack would lead to the appeal of Article would take by the North Atlantic Council on a case-by-case basis,\u201d the NATO spokesperson said.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">\u201cSome of the allies recognize that the impact of significant malicious malware aggregate Cyber activities may, in some of the circumatnces, be taken as amounting to an armed attack.\u201d<\/p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Joe Biden US President today issued a national security memorandum designed to help in enhancing the security of critical infrastructure by setting baseline performance goals for critical infrastructure owners and operators. The memorandum arrives a revert to recent attacks across the world which includes ransomware attacks on Colonial Pipeline and JBS Foods in the United [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":2689,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[15],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.11 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>National Security Memorandum bolsters Sensitive Infrastructure Cybersecurity - Xiarch Solutions Private Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xiarch.com\/blog\/national-security-memorandum-bolsters-sensitive-infrastructure-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"National Security Memorandum bolsters Sensitive Infrastructure Cybersecurity - Xiarch Solutions Private Limited\" \/>\n<meta property=\"og:description\" content=\"Joe Biden US President today issued a national security memorandum designed to help in enhancing the security of critical infrastructure by setting baseline performance goals for critical infrastructure owners and operators. The memorandum arrives a revert to recent attacks across the world which includes ransomware attacks on Colonial Pipeline and JBS Foods in the United [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xiarch.com\/blog\/national-security-memorandum-bolsters-sensitive-infrastructure-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Xiarch Solutions Private Limited\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/xiarch\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-30T13:24:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-30T13:24:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/07\/National-Security-Memorandum-bolsters-Sensitive-Infrastructure-Cybersecurity-featured-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"525\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Xiarch Security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xiarch\" \/>\n<meta name=\"twitter:site\" content=\"@xiarch\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xiarch Security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/xiarch.com\/blog\/national-security-memorandum-bolsters-sensitive-infrastructure-cybersecurity\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/national-security-memorandum-bolsters-sensitive-infrastructure-cybersecurity\/\"},\"author\":{\"name\":\"Xiarch Security\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\"},\"headline\":\"National Security Memorandum bolsters Sensitive Infrastructure Cybersecurity\",\"datePublished\":\"2021-07-30T13:24:50+00:00\",\"dateModified\":\"2021-07-30T13:24:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/xiarch.com\/blog\/national-security-memorandum-bolsters-sensitive-infrastructure-cybersecurity\/\"},\"wordCount\":649,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"articleSection\":[\"Infosec News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/xiarch.com\/blog\/national-security-memorandum-bolsters-sensitive-infrastructure-cybersecurity\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/xiarch.com\/blog\/national-security-memorandum-bolsters-sensitive-infrastructure-cybersecurity\/\",\"url\":\"https:\/\/xiarch.com\/blog\/national-security-memorandum-bolsters-sensitive-infrastructure-cybersecurity\/\",\"name\":\"National Security Memorandum bolsters Sensitive Infrastructure Cybersecurity - Xiarch Solutions Private Limited\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#website\"},\"datePublished\":\"2021-07-30T13:24:50+00:00\",\"dateModified\":\"2021-07-30T13:24:53+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/xiarch.com\/blog\/national-security-memorandum-bolsters-sensitive-infrastructure-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/xiarch.com\/blog\/national-security-memorandum-bolsters-sensitive-infrastructure-cybersecurity\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/xiarch.com\/blog\/national-security-memorandum-bolsters-sensitive-infrastructure-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/xiarch.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"National Security Memorandum bolsters Sensitive Infrastructure Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/xiarch.com\/blog\/#website\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"name\":\"Xiarch Solutions Private Limited\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/xiarch.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\",\"name\":\"Xiarch\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"contentUrl\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"width\":300,\"height\":300,\"caption\":\"Xiarch\"},\"image\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/xiarch\/\",\"https:\/\/twitter.com\/xiarch\",\"https:\/\/www.linkedin.com\/company\/xiarch\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\",\"name\":\"Xiarch Security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"caption\":\"Xiarch Security\"},\"sameAs\":[\"https:\/\/xiarch.com\/blog\/\"],\"url\":\"https:\/\/xiarch.com\/blog\/author\/vector\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"National Security Memorandum bolsters Sensitive Infrastructure Cybersecurity - Xiarch Solutions Private Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xiarch.com\/blog\/national-security-memorandum-bolsters-sensitive-infrastructure-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"National Security Memorandum bolsters Sensitive Infrastructure Cybersecurity - Xiarch Solutions Private Limited","og_description":"Joe Biden US President today issued a national security memorandum designed to help in enhancing the security of critical infrastructure by setting baseline performance goals for critical infrastructure owners and operators. The memorandum arrives a revert to recent attacks across the world which includes ransomware attacks on Colonial Pipeline and JBS Foods in the United [&hellip;]","og_url":"https:\/\/xiarch.com\/blog\/national-security-memorandum-bolsters-sensitive-infrastructure-cybersecurity\/","og_site_name":"Xiarch Solutions Private Limited","article_publisher":"https:\/\/www.facebook.com\/xiarch\/","article_published_time":"2021-07-30T13:24:50+00:00","article_modified_time":"2021-07-30T13:24:53+00:00","og_image":[{"width":1000,"height":525,"url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/07\/National-Security-Memorandum-bolsters-Sensitive-Infrastructure-Cybersecurity-featured-image.jpg","type":"image\/jpeg"}],"author":"Xiarch Security","twitter_card":"summary_large_image","twitter_creator":"@xiarch","twitter_site":"@xiarch","twitter_misc":{"Written by":"Xiarch Security","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xiarch.com\/blog\/national-security-memorandum-bolsters-sensitive-infrastructure-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/national-security-memorandum-bolsters-sensitive-infrastructure-cybersecurity\/"},"author":{"name":"Xiarch Security","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c"},"headline":"National Security Memorandum bolsters Sensitive Infrastructure Cybersecurity","datePublished":"2021-07-30T13:24:50+00:00","dateModified":"2021-07-30T13:24:53+00:00","mainEntityOfPage":{"@id":"https:\/\/xiarch.com\/blog\/national-security-memorandum-bolsters-sensitive-infrastructure-cybersecurity\/"},"wordCount":649,"commentCount":0,"publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"articleSection":["Infosec News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/xiarch.com\/blog\/national-security-memorandum-bolsters-sensitive-infrastructure-cybersecurity\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/xiarch.com\/blog\/national-security-memorandum-bolsters-sensitive-infrastructure-cybersecurity\/","url":"https:\/\/xiarch.com\/blog\/national-security-memorandum-bolsters-sensitive-infrastructure-cybersecurity\/","name":"National Security Memorandum bolsters Sensitive Infrastructure Cybersecurity - Xiarch Solutions Private Limited","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/#website"},"datePublished":"2021-07-30T13:24:50+00:00","dateModified":"2021-07-30T13:24:53+00:00","breadcrumb":{"@id":"https:\/\/xiarch.com\/blog\/national-security-memorandum-bolsters-sensitive-infrastructure-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xiarch.com\/blog\/national-security-memorandum-bolsters-sensitive-infrastructure-cybersecurity\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/xiarch.com\/blog\/national-security-memorandum-bolsters-sensitive-infrastructure-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xiarch.com\/blog\/"},{"@type":"ListItem","position":2,"name":"National Security Memorandum bolsters Sensitive Infrastructure Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/xiarch.com\/blog\/#website","url":"https:\/\/xiarch.com\/blog\/","name":"Xiarch Solutions Private Limited","description":"","publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xiarch.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/xiarch.com\/blog\/#organization","name":"Xiarch","url":"https:\/\/xiarch.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","contentUrl":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","width":300,"height":300,"caption":"Xiarch"},"image":{"@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/xiarch\/","https:\/\/twitter.com\/xiarch","https:\/\/www.linkedin.com\/company\/xiarch"]},{"@type":"Person","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c","name":"Xiarch Security","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","caption":"Xiarch Security"},"sameAs":["https:\/\/xiarch.com\/blog\/"],"url":"https:\/\/xiarch.com\/blog\/author\/vector\/"}]}},"_links":{"self":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/2686"}],"collection":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/comments?post=2686"}],"version-history":[{"count":1,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/2686\/revisions"}],"predecessor-version":[{"id":2690,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/2686\/revisions\/2690"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media\/2689"}],"wp:attachment":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media?parent=2686"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/categories?post=2686"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/tags?post=2686"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}