www.hpe.com
Open in
urlscan Pro
2a02:26f0:6c00:2b1::1463
Public Scan
Submitted URL: http://app.connect.hpe.com/e/er?elq_mid=32958&elq_cid=49136555&s=2048&lid=203453&elqTrackId=834b66100cec407aa5c1bdc15723658...
Effective URL: https://www.hpe.com/us/en/insights/articles/what-makes-critical-software-critical-2108.html?jumpid=em_si4hnf7vpx_aid...
Submission: On October 22 via api from SE — Scanned from DE
Effective URL: https://www.hpe.com/us/en/insights/articles/what-makes-critical-software-critical-2108.html?jumpid=em_si4hnf7vpx_aid...
Submission: On October 22 via api from SE — Scanned from DE
Form analysis
3 forms found in the DOM<form class="centered-content gn-search-form" data-di-form-track=""> <label for="gn-search-input" class="sr-only">Search</label> <input id="gn-search-input" type="text" class="js-search-input" placeholder="Search hpe.com" autocomplete="off"
spellcheck="false" name="s-query" data-di-id="#gn-search-input"> <button type="submit" class="gn-search-submit" title="Search" aria-label="Search" data-di-id="di-id-75d306a0-89a8652"> <svg xmlns="http://www.w3.org/2000/svg"
xmlns:xlink="http://www.w3.org/1999/xlink" aria-hidden="true" class="gn-icon" data-path="/content/dam/hpe/shared-publishing/SVG-Icons/search.svg" focusable="false" height="24px" role="presentation" viewBox="0 0 24 24" width="24px"
data-di-res-id="880c0667-a3dd6b3d" data-di-rand="1634923790174">
<path d="M22.3,23.9l-7.2-7.2c-1.6,1.3-3.6,2-5.8,2c-5.1,0-9.3-4.2-9.3-9.3c0-5.1,4.2-9.3,9.3-9.3c5.1,0,9.3,4.2,9.3,9.3 c0,2.2-0.7,4.2-2,5.8l7.2,7.2L22.3,23.9z M9.4,2.3c-3.9,0-7.1,3.2-7.1,7.1s3.2,7.1,7.1,7.1s7.1-3.2,7.1-7.1S13.3,2.3,9.4,2.3z">
</path>
</svg> </button> <button type="button" class="gn-search-close" title="Close" aria-label="Close" data-analytics-p13n-event="P13NAnalyticsCommon|Global_Nav_Header|Close_Button" data-p13n-analytics-initialized="true"
data-di-id="di-id-525847f9-f8313b1e"> <span class="close-icon"></span> <span class="close-text">Close</span> </button> </form>
<form class="filter-search body-copy" data-search-page="/us/en/insights/search-results.html" data-di-form-track=""> <input id="filter-search-input" class="search-input body-copy" placeholder="Search Enterprise.nxt" type="text"
data-di-id="#filter-search-input"> <label class="filter-search-label" for="filter-search-input">Search</label>
<div class="search-icons-container"> <button class="search-glass-btn search-icon" data-di-id="di-id-e4f50ed2-a95e9638"><span class="sr-only">Search</span></button>
<div class="vertical-line"></div> <button type="button" class="search-close-btn" data-di-id="di-id-e4f50ed2-a5c7ad4"><span class="sr-only">Close</span></button>
</div>
</form>
<form class="inputs-group" data-di-form-track=""> <label class="search-label" for="search-form-text">Search hpe.com</label> <input type="text" id="search-form-text" class="search-input js-search-input" name="q" placeholder="Help me find something"
autocomplete="off" value="" dir="ltr" spellcheck="false" data-di-id="#search-form-text"> <button type="submit" class="submit-btn" data-analytics-action="footer" data-analytics-value="footer|search"
data-analytics-p13n-event="P13NAnalyticsCommon|Global_Nav_Footer|Section(How_can_we_help)|Search" data-p13n-analytics-initialized="true" data-di-id="di-id-e0875dbe-37bda71b"> <span class="text-hide">Search hpe.com</span> <span
class="button-text">Search hpe.com</span> <em class="icon icon-nav-glass-search" aria-hidden="true"></em> </button> </form>
Text Content
Skip to main content Hewlett Packard Enterprise Hewlett Packard Enterprise * Why HPE * Products * Support * Contact * * * * Sign In * * Search Close * Why HPE * Products * Support * Contact * Shop * United States (EN) HPE MyAccount HPE MyAccount -------------------------------------------------------------------------------- Experience Discover 2021 Experience Discover 2021 HPE MyAccount HPE MyAccount My Bookmarks My Bookmarks Manage account Manage Account Sign Out Sign Out Cube * Exploring what’s next in tech – Insights, information, and ideas for today’s IT and business leaders + Subscribe close Close Filter Search Search Close * All * AI * Analytics * Careers & Culture * Cloud & Hybrid IT * Data Center * DevOps * Digital Transformation * Edge & IoT * Security * Storage * The Doppler * Search Topics & Search Open Filter August 31, 2021 | By Christopher Null WHAT MAKES 'CRITICAL SOFTWARE' CRITICAL? Biden has ordered the government to secure critical software. A zero trust strategy is necessary to meet the goal. Let's get serious about cybersecurity. That was the unvarnished message delivered by the Biden administration in May, when officials unveiled an Executive Order designed to "chart a new course to improve the nation's cybersecurity and protect federal government networks." The order wasn't the usual lip service about the importance of computer security but rather was intended as a wake-up call to industry about the need for new safeguards. The government briefing mentioned recent high-profile attacks against important physical infrastructure and Internet security services. As the official running the briefing noted at the time, we now find ourselves under "constant, sophisticated, and malicious attack—[ranging] from nation-state adversaries to run-of-the-mill criminals." Executive Order 14028 is more than 8,000 words in length and runs the gamut from requiring threat and incident information to be shared among competitors to mandating implementation of zero trust architectures across all government agencies. One of the most talked-about components of the order involves a mandate to "enhance the security of the software supply chain," which includes developing plans to lock down what the order calls critical software. The catch: At the time of the order's release, no one really knew what critical software was, much less how to protect it. "...the federal government must take action to rapidly improve the security and integrity of the software supply chain, with a priority on addressing critical software." Executive Order on Improving the Nation's Cybersecurity, May 12, 2021 WHAT IS CRITICAL SOFTWARE, ANYWAY? The Executive Order did spell out a strategy to get to that definition, however, giving the secretary of commerce 45 days to formally define critical software. In June, the National Institute of Standards and Technology (NIST) released a formal definition, another 3,300 words of dense material that lays out some new ground rules. Please read: Zero trust makes business secure by default As part of that, NIST defines critical software as any software that has any one of the following characteristics (or has dependencies upon any device with one of these characteristics): * Is designed to run with elevated privilege or manage privileges; * Has direct or privileged access to networking or computing resources; * Is designed to control access to data or operational technology; * Performs a function critical to trust; or * Operates outside of normal trust boundaries with privileged access. Drilling down further, NIST details a variety of specific categories of software that the definition applies to, including identity and access management systems, operating systems (real or virtual), web browsers, security software, various network and operations management systems, remote access tools, and backup utilities. The list is so exhaustive, observers say it would be hard to imagine a piece of software today that is not "critical" under the definition. In any event, the next deadline is in November, when guidelines on how to specifically enhance these critical software tools are set to be published. Pilot security programs developed under the guidelines are expected to be implemented in February 2022. PREPARING FOR DOOMSDAY Until that time, technology providers are preparing themselves for what is certain to be a mad scramble to secure systems that are sold to and used by government agencies. How complex will it be to turn critical software into software that operates safely? "This whole idea of criticality is that, whether it's hardware or software or data, it's required to be able to recover from a malware attack," says Tom Laffey, a distinguished technologist at Aruba, a Hewlett Packard Enterprise company, and noted expert in the development of secure computing systems. Laffey lays out a simplified scenario as an example: Imagine a device with boot firmware, like a PC. Under a critical software scenario, that firmware would include routines that continually authenticate the firmware, and should something turn out to be amiss due to a hacking attempt or other type of corruption, it can initiate a recovery operation—preferably automatically—that reverts the firmware to a known good version. "There will be some mechanism that basically says, 'I know that whatever I was normally going to boot is not trusted any longer, so I'm going to get a new load,'" Laffey explains. Please read: Constant scrutiny is the key to making zero trust happen "The intention of the people who wrote this is to make it automated," he says. That's a key point when you're talking about the thousands or millions of systems that can comprise key infrastructure networks. If each of those component systems becomes infected, remediation can quickly become a nightmare, as was the case when the nation of Estonia, including everything from its banking services to broadcasting capabilities, was brought to a standstill in 2007 during weeks of what appeared to be state-sponsored attacks brought on by a local political decision involving the relocation of a statue. If such critical systems can be redesigned to revert to a trusted state without human intervention after an exploit is detected, even massive attacks like that in Estonia could theoretically be staved off with relative ease. THE ROAD TO SECURE COMPUTING But putting that into practice won't be easy, which is why the mandate to protect critical systems is being pushed from government agencies to the providers of the software and services they use. "The idea isn't that the enterprises lock the software down," says Dan Desko, CEO of Echelon Cyber, a cybersecurity risk advisory. "It is more about holding the software providers accountable for producing products that are error free and that their code base is adequately protected from breach and implants." In other words, force software and hardware developers to design protections into their products, and the end user has a lot less to worry about. Laffey says an ecosystem for protecting critical software has been developing for years, but most perceive it as remaining mired in the research stage, perhaps because of the lack of any real mandate to bring the concept into production. That changes with the Executive Order. "I think across the industry we now see more people understanding what this is for and why people want it," he says, pointing to the availability of technologies that can now authenticate a variety of hardware, software, and firmware devices. Explore everything security. From trusted supply chain to zero trust, find the most up to date news and insights. Learn more BRINGING CRITICAL SYSTEM SECURITY TO THE MASSES While the Executive Order covers only government systems, it probably won't be long before the mandate trickles down to enterprises. Corporate America uses the same cloud computing services, telco networks, and computer operating systems that the government does, so whether they demand it or not, businesses that have no connection to government at all are likely to implement such security technologies in the near future as well. "If security can enable the generation of more business or can improve businesses, then it should be introduced," says Uri Bar-El, head of the cybersecurity practice at Qualitest, a software assurance and testing company. As such, it likely makes sense for all hardware and software developers to begin taking steps to implement trusted computing technologies into their products, whether they are perceived as critical or not. Eventually, such security routines may become a minimum business requirement for tech companies that market to government, businesses, or consumers. Please read: How enterprises are securing themselves with zero trust In addition to technology infrastructure providers like telcos and broadband services, financial services, healthcare, and utility organizations will likely be among the first to roll out these security tools, since disruption of their services can have a devastating human impact. And Microsoft is already getting in on the game, confirming reports that Windows 11, which arrives in October, will include Secure Boot routines that will not be bypassable. That will likely mean outlays for new hardware in many corners, as the new operating system will run only on recent model processors, released after 2017. But at the consumer level, protecting PCs is just the first step, warns Laffey. "You've got home routers, smart TVs, and cameras that are used for security—things that have been compromised in the past," he notes. "This type of protection has to go into those kinds of devices as well. And that could take a while." LESSONS FOR LEADERS * Biden's Executive Order may apply only to the federal government, but everyone needs to assess the security of their critical software and follow its lead. * The possibility that large numbers of critical systems would need quick remediation from an attack means that the only practical solution is an automated one. * Industry, including Microsoft with Windows 11, is already moving in the direction of requiring support for strong protection and recovery of systems. This article/content was written by the individual writer identified and does not necessarily reflect the view of Hewlett Packard Enterprise Company. CHRISTOPHER NULL CEO, Null Media LLC 21 publications Christopher Null is an award-winning journalist, editor, and columnist with more than 20 years of experience working in business and technology journalism. He has worked as a top editor for PC Computing, Smart Business, and New Architect magazines, and was the founder of Mobile PC magazine in 2003, the first-ever periodical focused exclusively on mobile technology. Later, he spent more than four years writing about tech daily for Yahoo as a "The Working Guy" and six years as the tech columnist for Executive Travel magazine. Today, he continues to write regularly for Wired, PC World, and numerous other outlets while working as the CEO of Null Media LLC, a boutique content marketing and custom publishing firm. Show more Show less Related articleWhy would people continue to use methods known to be insecure? Mostly widespread use of them and inertia. Top 4 insecure standards we can't easily abandonWhy are we still swiping credit cards? Steven Vaughan-Nichols articleZero trust is fast becoming the default approach for protecting organizations' proprietary assets and data from today's relentless cyberattacks. How do we trust the untrustable?Trust must be earned Enterprise.nxt staff articleFor reasons of security, performance, cost, and just plain trouble, there are many apps you should pay others to run. Top 7 Internet applications you should probably outsourceDon't DIY your DNS Ericka Chickowski articleTools are ideal, but rigor and regularity are key for DIYers How to test your backup and restore plan—the right wayRestores fail a lot David Rand articleHere are best practices for embracing data in the modern enterprise. Getting the most from your data-driven transformation: 10 key principlesDevelop a data strategy Janice M. Zdankus & Anthony Delli Colli articleThese four people-related factors will determine whether your transformation progresses or stalls. Investing in people is key to successful transformationGood people make good transformation Anke Hirning CREATE AN HPE MY ACCOUNT Streamlined chat to sales and support, centralized access to your HPE account, plus the ability to bookmark Resource Library assets. Create Account CHRISTOPHER NULL CEO Null Media LLC 21 publications Christopher Null is an award-winning journalist, editor, and columnist with more than 20 years of experience working in business and technology journalism. He has worked as a top editor for PC Computing, Smart Business, and New Architect magazines, and was the founder of Mobile PC magazine in 2003, the first-ever periodical focused exclusively on mobile technology. Later, he spent more than four years writing about tech daily for Yahoo as a "The Working Guy" and six years as the tech columnist for Executive Travel magazine. Today, he continues to write regularly for Wired, PC World, and numerous other outlets while working as the CEO of Null Media LLC, a boutique content marketing and custom publishing firm. Show more Show less More by Christopher Null The cash for bugs business is booming. Here's why Why is it so difficult to harness energy from the ocean? Is it wrong to pay ransom? TOPICS * Security articleWhy would people continue to use methods known to be insecure? Mostly widespread use of them and inertia. Top 4 insecure standards we can't easily abandonWhy are we still swiping credit cards? Steven Vaughan-Nichols SUBSCRIBE TO THE ENTERPRISE.NXT NEWSLETTER Stay up to date on the tech trends that are impacting the future of business Subscribe now CREATE AN HPE MY ACCOUNT Streamlined chat to sales and support, centralized access to your HPE account, plus the ability to bookmark Resource Library assets. Create Account How can we help? Search hpe.com Search hpe.com Search hpe.com Buy How to Buy Product Product Support Email Email Sales Chat Chat with Sales Call HPE Contact HPE FOLLOW HPE Linkedin Twitter Facebook Youtube RSS Company About HPE Accessibility Careers Contact Us Corporate Responsibility Global Diversity & Inclusion HPE Modern Slavery Transparency Statement (PDF) Hewlett Packard Labs Investor Relations Leadership Public Policy Learn About Artificial Intelligence Cloud Computing Containers Machine Learning Enterprise Glossary News and Events News and Insights Newsroom HPE Discover Events Webinars PARTNERS Partner Programs Find a Partner Certifications support Product Support Software & Drivers Warranty Check Enhanced Support Services Education and Training Product Return and Recycling OEM Solutions Validate Equipment Parts Communities HPE Community Aruba Airheads HPE Tech Pro Community HPE Developer All Blogs and Forums Customer Resources Customer Stories How To Buy Financial Services Executive Briefing Center Email Signup Login Resource Library Video Gallery Voice of the Customer Signup FOLLOW HPE Linkedin Twitter Facebook Youtube RSS United States (en) © Copyright 2021 Hewlett Packard Enterprise Development LP * Privacy * Terms of Use * Ad Choices & Cookies * Do Not Sell My Personal Information * Sitemap Loading information, please wait Close Overlay Collapse Overlay - Back Link Loading information, please wait