United States President Joe Biden has estimated that the computer attack on the colonial pipeline was carried out by people living in Russia, but has indicated that current evidence does not link the Russian government to the operation.
“We do not believe – I emphasize this point – we do not believe that the Russian government was involved in this attack. But we have good reason to believe that the criminals who committed the attack live in Russia. They came from there. They were from Russia, “Biden suggested late last Thursday.
The President of the United States also stated that his security officials were “in direct contact with Moscow” in order to “take decisive action against these networks by the responsible countries”.
Biden signed an executive order to improve US cybersecurity on Wednesday after the computer attack on the colonial oil pipeline, the most important in the country, had to be shut down to protect operating systems and finally resume operations on Wednesday.
The order has been in process since the beginning of the Biden administration and is intended to serve as an example for the private sector to take the initiative to strengthen cybersecurity, as a senior government official suggested at a press conference at the White House.
The Implementing Ordinance assumes that cybersecurity reference standards will be established for all software purchased by the government and that all software products it uses will comply with these standards within nine months.
With that in mind, software developers who do business with the government need to make their security data available to the public, reports The Hill.
Additionally, the order requires that the government put the use of encryption and multi-factor authentication into practice in a “tight” timeframe, as the senior official points out, who added that vendors must obtain an approved national security exemption from the Council. (NSC) if encryption is not fully implemented in six months.
On the other hand, Biden’s newly signed ordinance provides for a government-wide terminal detection and response system that federal agencies can use to share information about cyber threats.
This also includes the creation of a standardized “playbook” on how agencies should react immediately to future cyber violations. This includes establishing a cybersecurity review board made up of the Department of Security, Justice Department, Pentagon and the private sector.