Site icon Check Point Blog

Unpacking the New DHS Guidelines for Securing Critical Infrastructure from AI-related Threats

Under President Biden’s Executive Order regarding the safe development and use of Artificial Intelligence, the Department of Homeland Security published new guidelines about how to secure critical infrastructure from AI-related threats.

The guidelines are focused on three key categories. The first is attacks using AI; this refers to the use of AI to plan and carry out either physical or cyber attacks on key infrastructure. The second is attacks targeting AI systems; this refers to attacks on the AI systems itself that support critical infrastructure. And third is failures in AI design; this refers to any deficiency in the planning or execution that may lead to unintended consequences.

The report then outlined a four part mitigation framework. This builds upon the National Institute of Standards and Technology’s (NIST) AI Risk Management Framework. The mitigations are:

Govern refers to creating a culture of risk management around AI. This puts the onus on organizations to create a safety culture and ensure that security is at the top of the business priority list.

Map refers to understanding the use context for AI as it relates to the particular part of critical infrastructure. From this lens, the organization can better evaluate risks.

Measure refers to the development of repeatable systems to measure and monitor AI risks.

Manage asks organizations to implement and maintain risk controls to maximize the benefits and decrease any negative benefits.

These guidelines are a great place to start in securing critical infrastructure.

In addition, it’s critical to gain extensive visibility into your critical systems. This not only identifies threats, but helps to eliminate blind sports. Beyond immediate threats, deep visibility allows security leaders to gain a deeper understand of processes and how they interconnect, and allows the organization to shape and implement realistic security expectations, while prioritizing improvements.

Check Point recommends the following best practices:

Exit mobile version