Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecurityCybersecurity News

Making sense of federal cybersecurity critical infrastructure guidance

Four steps to take now to establish a minimum level of cybersecurity posture

By Derek Kernus
compliance-freepik1170x658.jpg
February 2, 2022

The breaches continue despite heightened cybersecurity awareness. To help establish standards, the Cybersecurity and Infrastructure Security Agency (CISA) has issued best practices around nine cybersecurity goals for control systems in response to a July 2021 Presidential Memorandum. 


The CISA guidelines establish a minimum level of cybersecurity posture across 16 sectors, many of which include private businesses, whose critical infrastructure supports national defense; critical lifeline sectors (i.e., energy, communications, transportation, and water); or where the failure of control systems could have impacts to safety. 


Let’s unpack what’s involved in the CISA guidelines, who should be paying attention, and the steps your company may need to take now.


Setting a cybersecurity baseline

The CISA guidelines are baseline objectives — the minimum cybersecurity practices that should reasonably be in place for all businesses connected to the government. The requirements were developed from standards and controls already released by CISA and the National Institute of Standards (NIST). They are not as thorough as those controls required by other new government cybersecurity frameworks like the Cybersecurity Maturity Model Certification (CMMC) and the finalized CISA controls that will be released later this year. Instead, companies should view them as the compliance framework that any client would want to see in a SOC2 Type 2 report. 


CISA’s goals and objectives will become controls in the future. There’s nothing new or surprising in the list of best practices, and it’s certainly not an exhaustive list or the only cybersecurity measures that US companies should have in place. That said, setting a cybersecurity baseline is an important step. Just like the requirements for public health and safety that keep the public safe, these guidelines task critical infrastructure owners and operators to protect national and economic security.


Sage advice for small and mid-sized businesses

While the CISA guidelines are intended for organizations that potentially impact critical U.S. infrastructure, they are also a prescription for all small and mid-sized U.S. businesses. Meeting cybersecurity standards help protect the businesses’ data and ability to operate, the U.S. economy, as well as personal investments.


The guidelines define what must be done while leaving flexibility for how businesses achieve it. They offer best practice advice, like using hybrid cloud tools while hosting data locally to boost security cost-effectively. For the technical aspects, an IT consultant can suggest different options based on a company’s existing structure and systems, allowing them to plan and budget. Importantly, nearly half of the guidelines are not technical, so businesses can begin implementing them independently or use the guidelines as a checklist to see what more they need to be doing. 


This is the moment: Four steps to take now

Arguably there’s never been a time when cybersecurity is more important to U.S. businesses. Prioritizing and starting now is important for several business-minded reasons:


  1. Cybersecurity is a change management process. It takes time to turn a ship, especially onboarding people and devices. Implementing tougher cybersecurity is often easier in brand new companies where policies are established from the very start. Asking people to change — even for tasks as simple as how they log in to email or shared folders — requires communication, training, and a period of adjustment. 
  2. Sooner equals better. The security best practices outlined by CISA reduce the risk of a ransomware attack. Many small business owners think they are too small to be a target, but they are wrong. Bad actors hack into a small business because they are often less protected. They aren’t looking to make money or steal data, rather they use the small business as a testbed to work out the kinks in ransomware and plan for larger, more sophisticated attacks. This exact scenario led to the ransomware attack on the City of Atlanta. Investigators traced the roots of the attack back to small businesses in New Jersey, then a small town in Arizona, then the Colorado Department of Transportation, and then eventually to Atlanta. 
  3. Sooner equals cheaper. The cost of ever-evolving cyber protection will continue to increase, so meeting minimum standards now means many companies will be able to update rather than overhaul. It’s also important when technical controls and license costs are based on company headcount or the number of devices. It’s less costly to get compliant before you grow. If technical controls and operational processes are established when smaller, it becomes the way when you grow. New user accounts and new hardware assets will be configured with the security protocols at the start, and the processes will be the only ones employees have known. This will result in less time and money spent modifying existing assets and going through the change management process with staff.
  4. Future-proofing. In time, customers and clients will start looking at cybersecurity like they do a company’s credit score — writing requirements into RFPs and contracts. Meeting standards, like the CISA guidelines, ahead of the pack can be a competitive advantage and sets companies up to make more strategic investments and decisions about cybersecurity rather than being reactionary.


Looking at the CISA guidelines from an implementation perspective, there isn’t anything too challenging or scary for most businesses. Training and awareness, and incident response and recovery, are goals that might require time. The planning, testing and integration to support these goals will undoubtedly be more consuming for businesses than implementing the technical configurations and logical controls, which can be completed by a consultant in a few weeks or months. 


Importantly, business owners need to understand that meeting cybersecurity standards doesn’t mean a huge financial outlay or hiring experts. Many options exist for tools and as-needed consultant expertise that keep costs down for policies and procedures, remediation, automation technologies and more.  


The CISA guidelines signal that the Federal government, traditionally behind the industry, is serious about cybersecurity standards. Now is the time for businesses to get primed and ready to respond and pull their weight to contribute to a more secure environment for all.

KEYWORDS: CISA compliance tools cyber security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Derek Kernus is the director of cybersecurity operations at DTS and holds CISSP, CCSP and CMMC RP certifications. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyberattack-ddos-freepik1170x658.jpg

    Making sense of the muddled mess of cybersecurity terms

    See More
  • coronavirus

    CISA Releases Version 3.0 of Guidance on Essential Critical Infrastructure Workers during COVID-19

    See More
  • 6 Steps Toward a Better Cyber Risk Management Strategy

    CISA releases updated guidance on essential critical infrastructure workers

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!