Documents/BIBE/6: Digital Assets/6.6: Trust Model

6.6: Trust Model

Approach confidentiality of key cybersecurity data through a risk-based trust model.

Other Information:

The challenges of building a set of cybersecurity strategies are manifold, but a key obstacle is the need to share information. Secrecy is important, but too much can be just as bad as not enough. The importance of confidentiality spans from the public sector, where it is hidden away as classified, and the private sector, where liability and antitrust present risks to sharing information. The government must approach confidentiality of key cybersecurity data through a risk-based trust model, rather than riding on top of National Security classification systems. It is important to protect investigations and not reveal too much to the adversaries we are investigating, but the current default has gone too far in the opposite direction. Government monitoring and defenses first discovered a large percentage of attacks, breaches and security incidents. Federal agencies must expand their capacity to work with private companies under attack. An overemphasis on secrecy can further inhibit information sharing and disclosure that can drive accountability. Moreover, public analysis of data can guide the future of research, policy and law enforcement efforts.

Indicator(s):