CISA has released new cybersecurity guidelines for communications infrastructure. The guidance comes in the wake of a series of disclosures that massive Telecommunications Carriers have been compromised by Salt Typhoon and other China-sponsored adversaries.
At the same time, the U.S. Federal Communications Commission (FCC) has proposed a Declaratory Ruling to require telecommunications carriers to protect their networks from infiltration. A draft ruling was introduced in early December, 2024 by FCC chairwoman Jessica Rosenworcel. The draft ruling was sparse on details, but outlined two major purposes:
The proposed ruling was quickly followed by the introduction of legislation for a potential Senate vote. As of this writing, no law had been passed, though the FCC fact sheet stated that the Declaratory Ruling could take effect “immediately” if the five members of the Commission voted to adopt it.
Additionally, Senate subcommittee hearings on December 11 discussed the Salt Typhoon intrusions and their implications for strategic, operational, and legal concerns around cybersecurity in telecommunications providers.
CISA’s guidance falls into two main categories: Strengthening visibility, and hardening systems and devices. In each of those categories, guidance is provided for both network engineers, and network defenders. The advice heavily focuses on segmentation, and on reducing the level of exposure that network devices have to the public internet. However, significant attention is also paid to managing and monitoring the configuration of software, hardware, and firmware, with particular emphasis on routers and switches. An entire section is devoted to Cisco-specific guidance since Cisco devices have been so frequently targeted by People’s Republic of China (PRC) threat actors.
Eclypsium can help telecommunications providers achieve many of the critical requirements recommended by CISA, including the following:
“Closely scrutinize and investigate any configuration modifications or alterations to network devices such as switches, routers, and firewalls outside of the change management process.”
“Monitor user and service account logins for anomalies that could indicate potential malicious activity. Validate all accounts and disable inactive accounts to reduce the attack surface. Monitor logins occurring internally and externally from the management environment.”
Ensure the inventory of devices and firmware in the environment are up to date to enable effective visibility and monitoring.
“Confirm the integrity of the software image in use by using a trusted hashing calculation utility, if available.”
“If a utility is unavailable, calculate a hash of the software image on a trusted administration workstation and compare against the vendor’s published hashes on an authenticated site as a trusted source of truth. This may require engaging the device’s maintenance contract to access source of truth hash values. For additional security, copy the image to a forensic workstation and calculate the hash value to compare against the vendor’s published hashes.”
Additionally, several items listed in the guidance relate to vulnerability management including identifying known vulnerabilities, insecure protocols, and default credentials. Eclypsium offers network vulnerability scanning, which can be complimented with nmap scanning with vulnerability identification.
The post CISA and FCC Issue Urgent Call for Cyber Hardening for Communications Infrastructure appeared first on Eclypsium | Supply Chain Security for the Modern Enterprise.
*** This is a Security Bloggers Network syndicated blog from Eclypsium | Supply Chain Security for the Modern Enterprise authored by Chris Garland. Read the original post at: https://eclypsium.com/blog/fcc-cisa-communications-infrastructure-cyber-security/