DHS promises vigilance in safeguarding NAD database

The Homeland Security Department has stepped up assurances that it will maintain the confidentiality of critical infrastructure information submitted to the National Asset Database, according to the newly revised draft National Infrastructure Protection Plan Base Plan version 2.0.

DHS will evaluate all requests to view the database and will grant access only to select DHS employees and others on a 'tightly controlled, need-to-know' basis, the revised plan states.

The new language is set forth in the 234-page national infrastructure protection plan distributed by DHS this week. The plan was delivered by e-mail via [email protected]

The plan establishes a work and time frame for assessing vulnerabilities and risks and coordinating protections for 17 critical infrastructure sectors, including IT and telecommunications. Cybersecurity is treated as a cross-sector responsibility. The department will accept comments until Feb. 6.

DHS' assurances about database access appear to address concerns raised by IT executives and others over protecting confidentiality of the information they might submit on specific vulnerabilities within their sectors.

One fear raised by IT industry members is that disclosing weak spots in their own networks may result in leaks that can be exploited by competitors.

'We've been concerned about what [DHS] can do to protect the IT infrastructure information and how they can help protect the critical assets,' said Greg Garcia, vice president of information for the Information Technology Association of America in Arlington, Va., who is involved with the IT Sector Coordinating Council organization efforts.

IT industry members have asked for 'originator control' for specific information they provide to the database, so they can be assured of its protection, Garcia said. However, that term does not appear in the new document.

Garcia, contacted today, said he was still reviewing the language proposed by DHS to give access on a need-to-know basis and to selected employees only.

The new version updates an earlier 175-page draft National Infrastructure Protection Plan released in November 2005. It reflects changes in response to nearly 7,000 public comments received on the previous version, according to a statement from DHS officials.

The new document also contains more information on cybersecurity initiatives, international cooperation and the goal of resilience. 'Resilient' and 'resiliency' are mentioned 26 times in the updated plan versus 18 times in the initial draft.

Other changes include a new executive summary, clarification of all hazards linkages and explanations of requirements pertaining to the risk management framework, according to DHS.

Alice Lipowicz is a staff writer for Government Computer News' sister publication, Washington Technology.

About the Author

Alice Lipowicz is a staff writer covering government 2.0, homeland security and other IT policies for Federal Computer Week.


  • Records management: Look beyond the NARA mandates

    Pandemic tests electronic records management

    Between the rush enable more virtual collaboration, stalled digitization of archived records and managing records that reside in datasets, records management executives are sorting through new challenges.

  • boy learning at home (Travelpixs/Shutterstock.com)

    Tucson’s community wireless bridges the digital divide

    The city built cell sites at government-owned facilities such as fire departments and libraries that were already connected to Tucson’s existing fiber backbone.

Stay Connected