National Security Agency (NSA), The Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) jointly published guideline to enhanced visibility and hardening guidance for communications infrastructure providing best practices to protect against PRC affiliated threat actor.
According to the guideline above mentioned threat actor has compromised networks of major global telecommunications providers. The guideline urges network engineers and defenders of communications infrastructure to strengthen visibility and harden network devices.
CISA and the FBI released a guide to help organizations quickly identify unusual behavior, vulnerabilities, and threats, as well as respond to cyber incidents. The guide also offers advice on reducing vulnerabilities and improving security configurations.
CISA Executive Assistant Director for Cybersecurity Jeff Greene said, “The PRC-affiliated cyber activity poses a serious threat to critical infrastructure, government agencies, and businesses. This guide will help telecommunications and other organizations detect and prevent compromises by the PRC.
“Along with our US and international partners, we urge software manufacturers to incorporate Secure by Design principles into their development lifecycle to strengthen the security posture of their customers. Software manufacturers should review our Secure by Design resources and put their principles into practice. added he.”
FBI’s Cyber Division Assistant Director Bryan Vorndran said, “Threat actors affiliated with the People’s Republic of China (PRC) are have targeted commercial telecommunications providers to compromise sensitive data and engage in cyber espionage,”.
“Together with our interagency partners, the FBI issued guidance to enhance the visibility of network defenders and to harden devices against PRC exploitation. We strongly encourage organizations to review and implement the recommended measures in this guide and to report suspicious activity to their local FBI field office.”
This guidance is primarily for the communications infrastructure sector, but it can also benefit organizations with on-premises equipment. CISA urges all critical infrastructure organizations to adopt security best practices.
CISA, NSA, and FBI urge all organizations, especially those in critical infrastructure, to follow their best practices. Jeff Greene emphasized that software manufacturers should adopt Secure by Design principles in their development to reduce future vulnerabilities.