United States: White House Issues Executive Order On Improving Critical Infrastructure Cybersecurity

On February 12, 2013, after months of speculation and leaked drafts, President Obama signed an Executive Order on Improving Critical Infrastructure Cybersecurity (EO).  The EO represents the White House’s response to Congress’s failure last year to pass the Cybersecurity Act of 2012 (S. 2105).  As such, the EO puts in place measures aimed at replicating key provisions of the failed bill, in particular, measures to encourage information sharing between the government and private industry, as well as measures to put in place “voluntary” cybersecurity standards for critical infrastructure.  

Without a congressional enactment, the EO relies on existing authorizations.  As explained below, the result is mixed.  The EO puts in place limited information sharing measures that will expand on existing pilot efforts to share classified cyberthreat information generated by the government with industry, but these measures do not expand private entities’ ability to share their own information with the government.  (Notably, Congress is currently considering a bill, the Cyber Intelligence and Information Sharing and Protection Act (CISPA) that would address this limitation.)  On the other hand, the EO puts in place what could be a fairly muscular program to encourage the adoption of the voluntary cybersecurity standards by critical infrastructure owners.  This program, which is nearly as strong as the measures proposed in the final version of the ill-fated Cybersecurity Act of 2012, employs a number of different incentives to encourage adoption of higher standards that may make the program more mandatory than it appears.  A key question, however, will be how stringent the actual cybersecurity standards that get adopted will be.

Information Sharing

One of the few areas of agreement during last year’s cybersecurity legislative debate was that more information sharing was needed to ensure that both private and government actors had the latest available cyberthreat information.  Current cybersecurity technology relies largely on using “signatures” of known attacks to filter out malware before it enters IT systems.  The challenge with such technology is ensuring that when new attacks are discovered, information about them is rapidly disseminated so that other entities can protect themselves.  Up until now, concerns about the security of classified information has limited the amount of information the government was willing to share with industry to a narrow pilot program aimed at defense contractors called the Defense Industrial Base Enhanced Cybersecurity Services program.  And privacy laws, in particular those related to wiretaps, have made it difficult without legislative action for some companies to share information with the government.  

The EO primarily addresses the former issue by making it easier for the government to share information with the private sector:

  • It provides for the creation of “unclassified reports of cyber threats to the US homeland that identify a specific targeted entity” and for the creation of a process to disseminate these reports to those entities.  The Secretary of Homeland Security (Secretary), the Attorney General, and the Director of National Intelligence are required to issue instructions for the creation of these unclassified reports within 120 days of the order.
  • It requires the expansion of the Enhanced Cybersecurity Services (ECS) program from just focusing on defense contractors to now providing classified cyberthreat indicators to critical infrastructure companies and their service providers.  White House talking points regarding the EO indicate that this will be aimed at creating "real time information sharing."  Again, the procedures for expanding this program have to be established within 120 days of the date of the order, and the EO further provides for expedited processing of security clearances for critical infrastructure employees to ensure that these entities can participate in ECS.
  • Finally, in order to provide the government better insight into the cyberthreat information needs of critical infrastructure owners, the EO also provides for the expansion of programs to bring private sector subject matter experts into the government.  This is one of the few measures that will allow the private sector to share its knowledge with the government.  But this appears to be aimed more at helping the government strengthen its own sharing systems than it appears likely to result in the dissemination of actionable cyberthreat information to the government.

In recognition of continuing potential legal barriers to voluntary sharing of information by the private sector to the government, Representatives Mike Rogers (R-MI) and Dutch Ruppersberger (D-MD) reintroduced CISPA on February 13, 2013.  CISPA, which passed the House of Representatives in 2012, would create an exception to federal and state wiretap and other laws to allow for the sharing by private companies of cyberthreat information. The bill, however, was criticized by some last year because of privacy concerns, and the White House threatened to veto it.  

Voluntary Critical Infrastructure Cybersecurity Program

The second major component of the EO is a set of measures aimed at creating voluntary cybersecurity standards for private critical infrastructure owners.  During the 2012 legislative debates, opposition by industry first led to the Senate dropping proposed mandatory regulation of critical infrastructure in favor of voluntary standards and then caused even that watered down proposal to be defeated by a filibuster.  While the President may lack the legislative authority to explicitly impose regulatory requirements, the EO puts in place a voluntary scheme, similar to last year’s legislative proposal for voluntary measures, that is likely to have some teeth.  The EO requires the creation of a “framework to reduce cyber risks to critical infrastructure” and then it includes a number of measures to encourage the adoption of this framework.

As to the framework itself, the EO requires the National Institute of Standards and Technology (NIST) to lead its development in consultation with the National Security Agency, agencies responsible for regulating particular critical infrastructure sectors, other government agencies, like OMB, and industry.  The EO requires that the framework “include a set of standards, methodologies, procedures, and processes that align policy, business, and technological approaches to address cyber risks,” and that the framework “incorporate voluntary consensus standards and industry best practices to the fullest extent possible.”  

NIST will be required to publish a preliminary version of the framework within 240 days for comment, and then the final version will be published within a year, with NIST regularly reviewing and updating it as necessary.  The major question to watch for with this framework is how stringent the actual requirements will be.  Given that the EO has been issued after industry opposition blocked legislation to do the same thing, and also given the fact that NIST will be working on a relatively tight deadline to produce the framework, the chances seem good that the process of developing it will be a contentious one that might lead to only a bare minimum set of standards.  Another issue to watch will be how effectively the ultimate framework addresses technological change.  Critics have raised concerns that the framework would be ineffective if all it does is lock in existing standards that may soon be out of date.

The EO also contains a number of measures aimed at encouraging adoption of the framework by critical infrastructure owners.  While these provisions have been touted publicly as "voluntary,” the EO in a number of places requires the use of existing legislative authority to urge compliance with them.  Perhaps more significantly, the framework is likely to go a long way in establishing a standard of care for cybersecurity among at least critical infrastructure owners.  Thus, if in the future a critical infrastructure owner suffers a breach, prospective plaintiffs—including people harmed by the breach as well as shareholders—may ask whether the owner complied with the framework.  As a result, mandatory or not, companies may feel compelled to comply with them.

The measures include:

  • Within 150 days, the identification through a consultative process by DHS of critical infrastructure that is at the greatest risk.  The EO includes a broad definition of critical infrastructure.  Section 2 of the EO defines critical infrastructure as “systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters.”  The E.O, however, explicitly states that the Secretary may not identify commercial IT products or consumer IT services as critical infrastructure.  Once they have been identified, owners and operators of critical infrastructure are to be confidentially notified of their status and given an opportunity request reconsideration of the designation.
  • The creation of a voluntary program to support the adoption of the framework by “owners and operators of critical infrastructure and any other interested entities.”  The EO instructs sector-specific agencies, consulting with other government agencies and in coordination with relevant Sector Coordinating Councils “to review the Cybersecurity Framework and, if necessary, develop implementation guidance or supplemental materials to address sector-specific risks and operating environments.”  The EO also includes several possible ways of encouraging adoption of the framework.  First, it employs “name and shame” tactics, requiring sector-specific agencies to report annually to the President on the extent to which identified infrastructure has adopted the framework.  Second, the EO requires the Secretary, working with the Treasury and Commerce Departments, to propose a set of incentives for parties to adopt the framework within 120 days of the signing of the EO.  Finally, it requires the Department of Defense and the General Services Administration to make recommendations to the President within 120 days on the feasibility of incorporating cybersecurity requirements into acquisition planning and contract administration.
  • A requirement that government agencies that regulate critical infrastructure sectors review the framework “and determine if current cybersecurity regulatory requirements are sufficient given current and projected risks.”  Agencies will be required to publish a preliminary assessment of existing regulations 90 days after the preliminary version of the framework is published that takes into account whether or not the agency has clear regulatory authority to put in place standards based on the framework and any additional authority that might be required.  To the extent that agencies determine that their regulatory requirements are insufficient, they will be required, 90 days after the publication of the final framework, to propose prioritized, risk-based actions to improve cybersecurity in the critical infrastructure sectors that they regulate.


Much of the impact of the EO will likely turn on how stringent the voluntary cybersecurity standards that it creates will be.  As noted, there are many reasons to believe that, at least in its first iteration, the voluntary framework will aim for the lowest common denominator in cybersecurity standards.  Nonetheless, the EO may impact a number of industries.  Regulated entities and government contractors will particularly need to watch and see whether the voluntary framework will lead to mandatory requirements for them.  Entities ultimately identified as critical infrastructure will also need to consider carefully the incentives and disincentives for complying with the EO.  It is worth noting in this context that the EO does not appear to create a mechanism for monitoring industry compliance.  Finally, companies not directly affected by the EO will need to consider the extent to which the voluntary framework will create a standard of care within their own industry.

Given the tight deadlines within the EO, we understand that its implementation is likely to occupy a number of policymakers’ and regulators’ attention this year, particularly at the Department of Homeland Security.   This will be an important space to watch.

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

To print this article, all you need is to be registered on Mondaq.com.

Click to Login as an existing user or Register so you can print this article.

Similar Articles
Relevancy Powered by MondaqAI
In association with
Related Topics
Similar Articles
Relevancy Powered by MondaqAI
Related Articles
Related Video
Up-coming Events Search
Font Size:
Mondaq on Twitter
Mondaq Free Registration
Gain access to Mondaq global archive of over 375,000 articles covering 200 countries with a personalised News Alert and automatic login on this device.
Mondaq News Alert (some suggested topics and region)
Select Topics
Registration (please scroll down to set your data preferences)

Mondaq Ltd requires you to register and provide information that personally identifies you, including your content preferences, for three primary purposes (full details of Mondaq’s use of your personal data can be found in our Privacy and Cookies Notice):

  • To allow you to personalize the Mondaq websites you are visiting to show content ("Content") relevant to your interests.
  • To enable features such as password reminder, news alerts, email a colleague, and linking from Mondaq (and its affiliate sites) to your website.
  • To produce demographic feedback for our content providers ("Contributors") who contribute Content for free for your use.

Mondaq hopes that our registered users will support us in maintaining our free to view business model by consenting to our use of your personal data as described below.

Mondaq has a "free to view" business model. Our services are paid for by Contributors in exchange for Mondaq providing them with access to information about who accesses their content. Once personal data is transferred to our Contributors they become a data controller of this personal data. They use it to measure the response that their articles are receiving, as a form of market research. They may also use it to provide Mondaq users with information about their products and services.

Details of each Contributor to which your personal data will be transferred is clearly stated within the Content that you access. For full details of how this Contributor will use your personal data, you should review the Contributor’s own Privacy Notice.

Please indicate your preference below:

Yes, I am happy to support Mondaq in maintaining its free to view business model by agreeing to allow Mondaq to share my personal data with Contributors whose Content I access
No, I do not want Mondaq to share my personal data with Contributors

Also please let us know whether you are happy to receive communications promoting products and services offered by Mondaq:

Yes, I am happy to received promotional communications from Mondaq
No, please do not send me promotional communications from Mondaq
Terms & Conditions

Mondaq.com (the Website) is owned and managed by Mondaq Ltd (Mondaq). Mondaq grants you a non-exclusive, revocable licence to access the Website and associated services, such as the Mondaq News Alerts (Services), subject to and in consideration of your compliance with the following terms and conditions of use (Terms). Your use of the Website and/or Services constitutes your agreement to the Terms. Mondaq may terminate your use of the Website and Services if you are in breach of these Terms or if Mondaq decides to terminate the licence granted hereunder for any reason whatsoever.

Use of www.mondaq.com

To Use Mondaq.com you must be: eighteen (18) years old or over; legally capable of entering into binding contracts; and not in any way prohibited by the applicable law to enter into these Terms in the jurisdiction which you are currently located.

You may use the Website as an unregistered user, however, you are required to register as a user if you wish to read the full text of the Content or to receive the Services.

You may not modify, publish, transmit, transfer or sell, reproduce, create derivative works from, distribute, perform, link, display, or in any way exploit any of the Content, in whole or in part, except as expressly permitted in these Terms or with the prior written consent of Mondaq. You may not use electronic or other means to extract details or information from the Content. Nor shall you extract information about users or Contributors in order to offer them any services or products.

In your use of the Website and/or Services you shall: comply with all applicable laws, regulations, directives and legislations which apply to your Use of the Website and/or Services in whatever country you are physically located including without limitation any and all consumer law, export control laws and regulations; provide to us true, correct and accurate information and promptly inform us in the event that any information that you have provided to us changes or becomes inaccurate; notify Mondaq immediately of any circumstances where you have reason to believe that any Intellectual Property Rights or any other rights of any third party may have been infringed; co-operate with reasonable security or other checks or requests for information made by Mondaq from time to time; and at all times be fully liable for the breach of any of these Terms by a third party using your login details to access the Website and/or Services

however, you shall not: do anything likely to impair, interfere with or damage or cause harm or distress to any persons, or the network; do anything that will infringe any Intellectual Property Rights or other rights of Mondaq or any third party; or use the Website, Services and/or Content otherwise than in accordance with these Terms; use any trade marks or service marks of Mondaq or the Contributors, or do anything which may be seen to take unfair advantage of the reputation and goodwill of Mondaq or the Contributors, or the Website, Services and/or Content.

Mondaq reserves the right, in its sole discretion, to take any action that it deems necessary and appropriate in the event it considers that there is a breach or threatened breach of the Terms.

Mondaq’s Rights and Obligations

Unless otherwise expressly set out to the contrary, nothing in these Terms shall serve to transfer from Mondaq to you, any Intellectual Property Rights owned by and/or licensed to Mondaq and all rights, title and interest in and to such Intellectual Property Rights will remain exclusively with Mondaq and/or its licensors.

Mondaq shall use its reasonable endeavours to make the Website and Services available to you at all times, but we cannot guarantee an uninterrupted and fault free service.

Mondaq reserves the right to make changes to the services and/or the Website or part thereof, from time to time, and we may add, remove, modify and/or vary any elements of features and functionalities of the Website or the services.

Mondaq also reserves the right from time to time to monitor your Use of the Website and/or services.


The Content is general information only. It is not intended to constitute legal advice or seek to be the complete and comprehensive statement of the law, nor is it intended to address your specific requirements or provide advice on which reliance should be placed. Mondaq and/or its Contributors and other suppliers make no representations about the suitability of the information contained in the Content for any purpose. All Content provided "as is" without warranty of any kind. Mondaq and/or its Contributors and other suppliers hereby exclude and disclaim all representations, warranties or guarantees with regard to the Content, including all implied warranties and conditions of merchantability, fitness for a particular purpose, title and non-infringement. To the maximum extent permitted by law, Mondaq expressly excludes all representations, warranties, obligations, and liabilities arising out of or in connection with all Content. In no event shall Mondaq and/or its respective suppliers be liable for any special, indirect or consequential damages or any damages whatsoever resulting from loss of use, data or profits, whether in an action of contract, negligence or other tortious action, arising out of or in connection with the use of the Content or performance of Mondaq’s Services.


Mondaq may alter or amend these Terms by amending them on the Website. By continuing to Use the Services and/or the Website after such amendment, you will be deemed to have accepted any amendment to these Terms.

These Terms shall be governed by and construed in accordance with the laws of England and Wales and you irrevocably submit to the exclusive jurisdiction of the courts of England and Wales to settle any dispute which may arise out of or in connection with these Terms. If you live outside the United Kingdom, English law shall apply only to the extent that English law shall not deprive you of any legal protection accorded in accordance with the law of the place where you are habitually resident ("Local Law"). In the event English law deprives you of any legal protection which is accorded to you under Local Law, then these terms shall be governed by Local Law and any dispute or claim arising out of or in connection with these Terms shall be subject to the non-exclusive jurisdiction of the courts where you are habitually resident.

You may print and keep a copy of these Terms, which form the entire agreement between you and Mondaq and supersede any other communications or advertising in respect of the Service and/or the Website.

No delay in exercising or non-exercise by you and/or Mondaq of any of its rights under or in connection with these Terms shall operate as a waiver or release of each of your or Mondaq’s right. Rather, any such waiver or release must be specifically granted in writing signed by the party granting it.

If any part of these Terms is held unenforceable, that part shall be enforced to the maximum extent permissible so as to give effect to the intent of the parties, and the Terms shall continue in full force and effect.

Mondaq shall not incur any liability to you on account of any loss or damage resulting from any delay or failure to perform all or any part of these Terms if such delay or failure is caused, in whole or in part, by events, occurrences, or causes beyond the control of Mondaq. Such events, occurrences or causes will include, without limitation, acts of God, strikes, lockouts, server and network failure, riots, acts of war, earthquakes, fire and explosions.

By clicking Register you state you have read and agree to our Terms and Conditions