July 22, 2024 By Jonathan Reed 2 min read

Federal cyber regulation is edging further into research and development (R&D) and higher education. A recent memo from the Office of Science and Technology Policy (OSTP) states that certain covered institutions will be required to implement cybersecurity programs for R&D security. These mandates will also apply to institutions of higher education that support R&D.

Beyond strengthening the overall U.S. security posture, this move is also in direct response to growing threats posed by the People’s Republic of China (PRC), as per Arati Prabhakar, Assistant to the President for Science and Technology and author of the memo.

Why R&D must improve security

Today, a top priority is placed on security controls and other measures seeking to prevent malware attacks on high-value targets such as critical infrastructure. Also, modern military and economic power largely hinge on technical competitive advantages.

“Technology and R&D are central to this strategic competition, and the PRC has exploited international research collaboration by undermining values — such as transparency, accountability and reciprocity — in order to advance its strategic objectives and military modernization,” writes Prabhaka in the OSTP memo.

A shift in attitude towards security responsibilities

The memo states that the Biden Administration’s research security efforts are twofold. The White House wants to ensure that institutions of higher education and research recognize the current global landscape and fulfill their security responsibilities. Unlike proprietary R&D, most academic research is intended to be published or shared. However, some scholarly research may involve applications with national security implications.

In the past, researchers may have been encouraged to collaborate with institutions within the PRC. However, the OSTP states that the geopolitical landscape is different now. The memo says, “We must be clear with the research community about how the world has changed… the policies and practices of foreign countries of concern differ from those of the U.S.” Furthermore, “Some of the results from U.S. R&D can contribute to human rights abuses, surveillance and military aggression,” as per the memo.

New education R&D requirements

According to the OSTP memo, higher education institutions certified by federal research agencies must implement a cybersecurity program following the CHIPS and Science Act’s cybersecurity document for research-focused entities. That implementation must occur within one year following the final issuance of the document.

Now, covered institutions that receive federal science and engineering support “in excess of $50 million per year” must certify to the funding agency that the institution has established and operates a research security program. Covered institutions will be required to certify that their research security programs include elements relating to (1) cybersecurity; (2) foreign travel security; (3) research security training; and (4) export control training, as appropriate.

By early January 2025, federal research agencies must submit plans for updating policies to comply with the new guidance measures. From there, the agencies have six more months to have finalized plans submitted to OSTP and OMB. Covered institutions will have no more than 18 months after the effective date of their plans to implement the requirements of the memorandum.

Emphasis on avoiding xenophobia

To address risks posed by strategic competitors to the U.S. research and development enterprise, the Biden-Harris Administration is implementing these new measures to improve research security. The new OSTP memo also explicitly states that this must be accomplished “without exacerbating xenophobia, prejudice or discrimination.”

In the increasingly complex task of strengthening national cybersecurity, these new requirements are essential. It’s no surprise that federal regulation is reaching further into R&D.

More from News

FYSA – Adobe Cold Fusion Path Traversal Vulnerability

2 min read - Summary Adobe has released a security bulletin (APSB24-107) addressing an arbitrary file system read vulnerability in ColdFusion, a web application server. The vulnerability, identified as CVE-2024-53961, can be exploited to read arbitrary files on the system, potentially leading to unauthorized access and data exposure. Threat Topography Threat Type: Arbitrary File System Read Industries Impacted: Technology, Software, and Web Development Geolocation: Global Environment Impact: Web servers running ColdFusion 2021 and 2023 are vulnerable Overview X-Force Incident Command is monitoring the disclosure…

Research finds 56% increase in active ransomware groups

4 min read - Any good news is welcomed when evaluating cyber crime trends year-over-year. Over the last two years, IBM’s Threat Index Reports have provided some minor reprieve in this area by showing a gradual decline in the prevalence of ransomware attacks — now accounting for only 17% of all cybersecurity incidents compared to 21% in 2021. Unfortunately, it’s too early to know if this trendline will continue. A recent report released by Searchlight Cyber shows that there has been a 56% increase in…

Cyberattack on American Water: A warning to critical infrastructure

3 min read - American Water, the largest publicly traded United States water and wastewater utility, recently experienced a cybersecurity incident that forced the company to disconnect key systems, including its customer billing platform. As the company’s investigation continues, there are growing concerns about the vulnerabilities that persist in the water sector, which has increasingly become a target for cyberattacks. The breach is a stark reminder of the critical infrastructure risks that have long plagued the industry. While the water utility has confirmed that…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today