There is growing concern about “systemic cyber risk”—the possibility that a single failure somewhere in cyberspace could cause widening ripples with catastrophic consequences. Whereas most cyber events have a narrowly defined set of victims, a systemic cyber incident could do damage on a national or even a global scale—threatening the digital infrastructure that entire societies, economies, and governments rely on to function. In the last few months alone, two very different events illustrated distinct versions of the problem.
On November 24, 2021, Chinese cybersecurity researchers disclosed a severe vulnerability in Log4j—a low-profile software utility embedded in millions, or perhaps billions, of consumer devices and enterprise systems around the world.1 The security flaw could permit hackers to take total control of vulnerable machines with relative ease.2 The job of fixing Log4j fell to a team of volunteer programmers at Apache, who took two weeks to release a security patch. By that point, the hacking had already begun. The first patch was then followed by a second patch and a third patch, as more security gaps were uncovered. Meanwhile, organizations struggled to apply these patches because Log4j is often hidden underneath layers upon layers of other software packages.3 Experts predict it will take years to fully resolve the issue. Until then, innumerable victims remain vulnerable to state-sponsored hackers, ransomware gangs, and other bad actors.4
Compare the Log4j incident—a slow-rolling crisis actively abused by malicious actors—with another recent global event that was shorter, sharper, and completely accidental. On October 4, 2021, billions of users worldwide lost access to all Facebook services, including Instagram and WhatsApp. This happened because a small error during routine maintenance had unexpected and cascading consequences.5 An errant command was entered, and a bug in Facebook’s auditing systems mistakenly allowed the command to run, disconnecting all data centers. Misjudging the situation, Facebook’s DNS servers reacted by automatically halting public advertisements, blinding the internet to Facebook’s online location. Meanwhile, widespread network failures blocked Facebook’s IT staff from accessing the affected systems, even physically, to restore them.6 Although the outage lasted only six hours, that was a lifetime for many small businesses, family networks, and others reliant on Facebook for their daily needs.
These different incidents point to a common set of underlying problems. While organizations and consumers have more tools than ever to protect their data from loss or compromise, improvements in individual defense have been offset by a heightened risk of systemwide events. Many sectors of the global economy now rely on the same set of critical technology products and services, concentrating risk into an unknown number of possible failure points. The potential for catastrophe increases as developing nations further digitize and as activities that were previously separated from the internet—like medical care or transportation—become networked. The worst cyber events can now cause bodily harm or deaths, political crises, and multibillion-dollar economic losses. As digital networks interlink with the physical world in complex, dynamic, and opaque ways, many observers fear new forms of fragility that no one understands.
The dangers come in various forms and are illustrated by an increasing number of large-scale cyber incidents. Before the Log4j crisis, the WannaCry and NotPetya hacks (2017), the Meltdown and Spectre vulnerabilities (disclosed in 2018), and the compromises of SolarWinds (discovered in 2020) and Microsoft Exchange (2021) all demonstrated how a single piece of faulty hardware or software could jeopardize critical systems worldwide. Before the Facebook outage, simple human errors had triggered previous outages of Amazon, Google, and Microsoft cloud services. There have also been physical disruptions, both malicious—like the 2020 Nashville suicide bombing that impaired regional telecommunications—and natural—like Hurricane Maria in 2017, which disrupted internet connectivity in Puerto Rico. So far, these and other high-impact cyber events have proven largely manageable. Nevertheless, they reveal latent risk factors and illuminate some potential triggers and pathways of a future systemic event. Modelers have warned that even more damaging cyber incidents are possible.
Despite rising worries about systemic cyber risk, the problem and potential solutions are poorly understood. “Systemic cyber risk” is a vague concept with no widely accepted definition. Moreover, tools and methodologies for finding and measuring sources of systemic cyber risk remain very limited. Cyberspace is incredibly complex, with billions of devices managed by millions of organizations. It is hard to assemble useful data on so many interdependencies, and models are still too crude to draw confident conclusions from what data does exist. Worst of all, efforts to bound, reduce, or manage systemic risk remain ad hoc and uncoordinated. A problem of this scale and complexity demands much broader and deeper collaboration among industries, across the public-private divide, and internationally.
This paper seeks to provide a common foundation for understanding and addressing systemic cyber risk. Building on prior research, it explores definitions of the problem, underlying contributing factors, and potential policy responses. Although much remains unknown about systemic cyber risk, including its true size and distribution, public and private sector leaders worldwide can and should act now to investigate, reduce, and manage the risk.
What Is Systemic Cyber Risk?
The concept of “systemic cyber risk” is grounded in the broader idea of “systemic risk”—the possibility that a single event or development might trigger widespread failures and negative effects spanning multiple organizations, sectors, or nations.7 Well-known systemic shocks with global consequences have included the 2008 financial crisis, the COVID-19 pandemic, and recent supply chain disruptions. These events illustrate how various forms of interdependency—whether financial, biological, logistical, digital, or otherwise—can increase volatility in large-scale systems by boosting the chance that any given failure will spread, often in unexpected ways (see figure 1).
Systemic cyber risk is therefore a cousin of other systemic risks. Many cyber analysts recognize this family resemblance and have sought to draw insights from finance, public health, and other disciplines to fill gaps in their understanding of systemic cyber risk.8 Moreover, a systemic cyber event could actually be a cause or consequence of other types of systemic failure. For example, the COVID-19 crisis has led to remote work patterns in developed countries that have put new stresses on some internet services. Although the internet has proved remarkably resilient to these stresses, this example suggests how biological contagions might help precipitate future failures in cyberspace.9 Conversely, a coordinated destructive cyber attack on key pharmaceutical companies could potentially reduce the public’s access to and/or confidence in life-saving vaccines, enabling a cyber incident to exacerbate a systemic health crisis.10
There is no single, widely accepted definition of systemic cyber risk, and most proposed definitions are vague. This is in part because systemic risk is a fuzzy concept. Because systemic risk can arise and manifest in innumerable ways, some commentators have resorted to saying that “we will know it when we see it.”11 But definitional challenges are also the result of important differences in perspectives among stakeholder groups and how they specify the relevant system. A system might be a company, a certain computer architecture, an economic sector, an entire nation, or a supranational region. What counts as “systemic” can look very different depending on the system at issue and one’s relationship to that system.
Parsing different definitions of systemic cyber risk is important because meaningful efforts to address the problem will require intensive collaboration across a diverse set of interest groups. No single player has the tools to fully understand, reduce, or manage systemic cyber risk. Rather, key information and policy levers are scattered in many places—including national security agencies, financial institutions, technology providers, cybersecurity firms, critical infrastructure operators, (re)insurers, civil society organizations, and regulators—around the world. Building partnerships among these divergent players will require common terms of reference or, at least, mutual clarity on how and why definitions differ.
For example, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) recently launched a Systemic Cyber Risk Reduction Venture.12 This effort focuses on cyber risks that are “concentrated” enough to pose “critical risks to the Nation’s security and economic security.” In other words, CISA defines the “system” at stake as the United States itself (or U.S. security)—a frame of reference that matches the agency’s core mission. CISA therefore prioritizes cyber risks that threaten its list of fifty-five U.S. “national critical functions,” such as maintaining the U.S. water supply and conducting U.S. elections.13 In one sense, the agency’s definition could be considered inclusive given the vast range of economic sectors covered. But in another sense, the definition could be construed as narrow because it focuses primarily on national impact, while ignoring harm suffered by other nations.
The financial system’s approach tends to be more sector-specific and international.14 The European Systemic Risk Board (ESRB), for example, defines a systemic cyber incident as one occurring “in the financial sector” that potentially threatens “serious negative consequences for the internal market and the real economy.”15 Unlike CISA, the ESRB is not concerned with disruptions to a U.S. city’s water supply but rather with cyber events that might destabilize international financial markets (by deleting critical transaction data, for example) or disrupt the global economy (by causing a prolonged outage of international shipping networks). The ESRB approach is grounded in its organizational mission of supervising the EU financial system’s overall stability.
A third approach to systemic cyber risk can be found in the insurance industry, which has experienced rapid growth in the issuance of insurance policies that pay out to victims of cybersecurity incidents. Many industry professionals consider a cyber risk to be systemic if it is uninsurable—based on the scale of potential losses; loss correlation across many clients, sectors, and regions; and the difficulty of modeling and hedging.16 The reinsurance firm Munich Re cites such factors to explain why a major internet failure would carry “systemic accumulation risk.”17 A 2017 report by the insurance company AIG defined systemic cyber risks simply as those cyber events “capable of impacting many companies at the same time.”18
These are just a few ways to define systemic cyber risk, and they do overlap. An extremely catastrophic cyber event—such as the widespread loss of integrity and trust in critical financial transaction data—would likely qualify as systemic from almost anyone’s perspective. Less severe incidents are likely to elicit different views. For instance, CISA might consider the ransomware attack on the Colonial Pipeline in 2021 a systemic event. Yet the event’s impact on fuel distribution was short-lived, it did not cause financial market instability, and its insurance impacts were limited (because most losses were downstream of the victim and likely uninsured)—meaning that other stakeholders might take a different view.
Given the lack of shared terminology, how should cybersecurity experts classify incidents that have already occurred? Reports from the Swiss Re Institute in 2017 and the EastWest Institute in 2019 asserted that no previous cyber event had qualified as systemic.19 On the other hand, the risk analytics firm Cyberhedge has described the SolarWinds breach as systemic, and several of the “systemic” scenarios outlined by AIG in 2017 resemble subsequent real-world events, including (brief) outages of major cloud services.20 These diverging interpretations may complicate efforts to rally stakeholders toward collective action. Those who believe that systemic cyber events are already happening may feel greater urgency to act, while those who believe such events remain hypothetical might want to prioritize more clear and present cyber dangers.
What Does Systemic Cyber Risk Look Like?
Systemic cyber risk comes in multiple forms and can be categorized in different ways. One practical approach is to identify the different kinds of causal sequences that can amplify a trigger event—the spark that lights the tinder—and produce systemic consequences. The three sequences described here show how systemic failures can occur vertically, horizontally, or both.
Chain Reaction (Vertical Failure)
A problem affecting a single component of the overall system triggers a chain reaction affecting an ever-expanding range of dependent entities (see figure 2). For example, attackers take down an internet exchange point, disrupting operations for multiple entities that can no longer provide critical services for customers. The customers must then halt service for their own customers, and so on.
Contagion (Horizontal Failure)
Identical copies of a system component fail simultaneously or in rapid succession (see figure 3). One failure creates systemic effects without a chain reaction. For example, a malicious exploit affecting all copies of a software product allows attackers to disrupt core operations for all users of that product.
A contagion affecting several critical components triggers multiple chain reactions.
Another way to categorize systemic cyber risk is by understanding the different roles that cyberspace may play in a systemic event. Systemic cyber events can have cyber triggers, cyber pathways, cyber effects, or all of the above. A cyber trigger is an adverse event originating within cyberspace, such as a malicious intrusion into a computer network. A cyber pathway is the digital infrastructure (such as ubiquitous network protocols) through which an initial trigger propagates and is amplified. Cyber effects are harms experienced within cyberspace, such as the non-availability of a computer system.
These three variables can combine in many different ways and interact with noncyber factors. For example, the Colonial Pipeline incident was caused by ransomware (cyber trigger), which led the company to shut down pipelines for the United States’ East Coast fuel system (noncyber pathway), and ultimately disrupted surface transportation (noncyber effect). Conversely, a missile strike (noncyber trigger) that destroys a data center (cyber pathway) may cause data losses (cyber effect) as well as work stoppages at organizations that relied on the deleted data (noncyber effect).
Although observers disagree about which real-world cyber incidents (if any) qualify as systemic, a number of large-scale cyber events have illustrated the potential triggers and pathways. Most attention has focused on malicious hacks, malware incidents, and exploitable vulnerabilities, including the following:
- Morris Worm (1988): An accidental software bug caused a computer worm to spread rapidly, crippling tens of thousands of computers and forcing important institutions to disconnect from the internet.21
- Internet Root Server Attack (2002): A coordinated attack that disabled nine of thirteen root servers running the internet’s Domain Name System. One expert believes “it [was] clearly done with the intent to cripple or shutdown the Internet.”22
- SQL Slammer (2003): A computer worm rapidly infected tens of thousands of machines and disrupted access to most of the world’s data query servers and networks.23
- Dyn (2016): Criminals in control of the Mirai botnet launched a distributed denial-of-service attack against an important piece of the Domain Name System, blocking access to major websites including Twitter and PayPal.24
- WannaCry and NotPetya (2017): The WannaCry attackers exploited a Windows vulnerability to launch global ransomware that compromised over 230,000 computer systems within a day.25 The NotPetya wiper, masquerading as ransomware, used a flaw in Ukrainian tax preparation software to spread the attack among international corporations, causing an estimated $10 billion in damages.26
- Meltdown and Spectre (2018): Researchers disclosed critical vulnerabilities in Intel chips used in the servers of leading cloud service providers that, if exploited, would have allowed attackers to steal data from countless corporate customers.27
- VxWorks (2019): In 2019, researchers revealed previously undisclosed security vulnerabilities inside an operating system called VxWorks, used in settings like aviation and industrial automation where physical safety is essential.28 This single dependency, obscured in the supply chain, imparts remotely triggerable failure modes to over 200 million devices across all critical infrastructure sectors.29
- Kaseya (2021): Using a zero-day vulnerability (unknown to the vendor) in a popular IT management tool, a criminal ransomware group infected between 800 and 1,500 businesses in one attack.30
While malicious cyber exploitation causes unease and grabs headlines, systemic cyber events can have many other triggers, both intentional and unintentional. The 2020 Nashville suicide bombing caused days-long regional outages of AT&T’s telecommunications networks. And in 2013, in California, suspected insiders cut fiber optic cables and disabled a power substation with gunfire, illustrating the dangers of physical attacks.31 Human errors have reportedly contributed to outages of Amazon Web Services (2017), Google Cloud (2018), and Microsoft Azure (2019) services.32 Natural disasters can also cause large-scale cyber effects. Lightning strikes in 2018 affected an Azure data center in Texas, triggering a cascading series of failures in the region and beyond. Hurricane Maria in 2017 led to internet and phone problems throughout Puerto Rico that persisted for more than a year.33
The consequences of these and other noteworthy incidents were ultimately contained. No single cyber event has come close to rivalling the worst noncyber systemic events, such as the 2008 financial crisis or the COVID-19 pandemic. Nevertheless, many large-scale cyber incidents could have caused greater damage than they did—if a hostile perpetrator desired it, if fail-safes had malfunctioned, and so on.34 Malicious cyber operations are particularly concerning because while most adversaries have not yet demonstrated an intent to cause systemic-level harms, their motivations could shift quickly for a variety of reasons. Moreover, if systemic vulnerabilities accumulate, it will become easier to cause a systemic cyber event, and the field of actors capable of doing so will grow. While nation-states have long been viewed as the primary actors capable of triggering systemic shocks via cyberspace, more criminals, extremist groups, and other mischief-makers may soon take a seat at the table.
In sum, recent events offer ample warning that systemic cyber risk is a real threat. Although the worst-case scenarios remain hypothetical, the list of large-scale cyber events continues to grow, with many of biggest incidents happening in just the last few years. These incidents reveal the diversity of forms that systemic cyber risk can take—a broad and expanding set of potential triggers, pathways, and effects. If present trends continue, then major cyber incidents will probably become ever-larger and more damaging in the coming years. And, eventually, a bona fide national (or global) catastrophe will occur in cyberspace. It is therefore urgent that policymakers understand what factors underlie these trends and what they can do to address them.
What Can Cause (or Mitigate) Systemic Cyber Risk?
Given its interconnected structure, many aspects of cyberspace naturally amplify systemic risk. Standardized digital technologies—including common protocols—create a highly interdependent web of technical and organizational linkages.35 At least five properties of cyberspace help to magnify systemic risk.
Many aspects of the digital economy have consolidated around common technologies, software products, and third-party service providers. This offers greater efficiency, capability, and agility for some organizations.36 But widespread dependence on fewer, more specialized services and products creates common vulnerabilities, data bottlenecks, and single points of system failure.37 This concentrates risk by magnifying the negative consequences of individual failures.
Computer networks and the operational and human systems that interface with them are increasingly complex, which “ensures hidden levels of mutual dependence.”38 The internet’s shifting web of technical, contractual, and financial linkages prevents organizations from fully understanding which system components support which core functions for which organizations.39 Single points of failure can easily escape scrutiny.
Many of the most important features of digital technology are intangible and proprietary in nature. This means that understanding systemic relationships requires specialized knowledge of and access to sensitive parts of privately operated technology systems. Yet companies often have commercial, legal, and other motivations to withhold such information from outsiders.
Cyberspace weaves together millions of vulnerable machines that often share identical, remotely exploitable vulnerabilities. This creates low marginal costs for high-impact attacks, incentivizing malicious operations designed to ensnare the maximum number of victims. It also increases the likelihood of a systemic incident even if an adversary does not intend to cause one.
The presence of intelligent adversaries greatly complicates the task of understanding and managing systemic cyber risk.40 Malicious humans act with purpose, patience, and technical savvy to tilt the odds, finding latent concentration risks or burrowing their way into the best defended organizations to trigger a chain reaction of failures. Patient opponents can sometimes turn an otherwise improbable sequence of events into a virtual certainty.41
These cyber-specific properties are not the only factors amplifying systemic cyber risk. Fragility in real-world systems can set the conditions for an initial cyber trigger to cause widespread harm. For example, just-in-time shipping makes it more likely that a ransomware attack on an important port would cause logistical bottlenecks across multiple sectors. Excessive financial leverage increases the odds that an economically damaging cyber attack would prompt bankruptcies or market turbulence. Weak governance in a country could lead to a situation where localized infrastructure outages caused by a cyber intrusion ignite large-scale political unrest and social crises. These examples illustrate why studies of systemic cyber risk should look well beyond traditional cybersecurity concerns and seek to draw on a wide range of disciplines and data sources.
While multiple studies have examined the factors driving systemic cyber risk, there has been less analysis of possible countervailing trends and mitigating factors. For example, the continued growth of digital interconnection may be offset by a global rise of techno-nationalism and cyber sovereignty. The U.S. and Chinese technology sectors in particular are undergoing a partial “decoupling” that will affect many other countries and private actors around the world.42 Moreover, some major tech companies continue to invest in “walled garden” technology ecosystems with intentional limits on the available interconnections to competitors’ platforms. Conceivably, a more fragmented digital world based on geographic and technological boundaries could limit the impact of some cyber incidents. Alternatively, balkanization might encourage state actors to carry out even more aggressive cyber attacks against their adversaries, because the attackers’ own digital sphere of influence would be relatively insulated from direct collateral damage.
Proactive steps to achieve resilience can reduce the likelihood and severity of systemic cyber events. However, much more study is needed to understand and measure various forms of resilience.43 Consider the 2017 infection of Maersk, the global shipping giant, by the destructive NotPetya malware. Resilience in that situation would have had many different elements. First, were Maersk’s backup systems and recovery plans in place (cyber resilience)? Second, did the company’s logistics networks have enough slack to absorb a cyber-triggered disruption (operational resilience)? Third, did Maersk’s competitors have the excess capacity and agility to fill in while the company recovered (sector-wide resilience)? Fourth, could Maersk’s customers tolerate delays in sending and receiving shipments (customer resilience)? As this example shows, systemic resilience can be just as complex as systemic risk. It merits more attention from researchers and policymakers.
How Can Sources of Systemic Risk Be Identified?
Effective risk management requires some capacity to quantify the probability and severity of harmful events and locate specific trouble spots where interventions can best be applied. This is a major challenge with any complex system, and it is acute in the context of systemic cyber risk. Large-scale digital networks such as the internet change constantly and behave in unpredictable ways. Without better data and risk models, any attempts to map the many possible digital origins, pathways, and effects of a systemic shock would be incomplete at best and quickly become outdated.
Data collection faces major obstacles. Many organizations do not know their first-order cyber dependencies. Some struggle to implement even basic steps, such as maintaining software and hardware inventories. Thus, surveying individual organizations will not yield a complete picture of systemic-level points of failure. For example, some insurers have sought to identify portfolio-wide cyber risks by asking policyholders to report their most important software applications and services. But these reports, when compared to the results of external network scans, reveal many omissions. Additionally, organizations often do not want to disclose sensitive information about their dependencies to outside entities such as insurers or government bodies. They may fear losing competitive advantages, inviting regulatory and legal scrutiny, or providing a road map for hostile actors to exploit. Critical technology providers, in particular, often keep their technical architectures a closely guarded secret.
Moreover, collecting data on cyber dependencies is only useful when the right analytic methodologies and tools are used to process the data and predict how trigger events might propagate and cause systemic harms. Risk models have been developed for systemic cyber risk, but their usefulness is often hampered by a lack of transparency (the underlying methodologies remain secret) and consistency (different models cannot readily be compared on a like-for-like basis). Commercial or security interests can therefore limit the ability of a user to interpret why a model has generated a particular result.
More fundamentally, there are no historical case studies to help refine the modeling tools, because many of the most concerning systemic cyber scenarios have never occurred. Today’s models must therefore depend heavily on assumptions. For example, in 2021, RAND published “a quantitative model of cascading failures to estimate the potential economic damage associated with a given cyber incident.” Applying this model to Maersk’s NotPetya infection, RAND found the total economic cost may have been as little as $3 billion or as much as $57 billion.44 The dramatic range underscores the uncertainties involved in attempting to anticipate the effects and losses of highly consequential cyber events.
Thankfully, some concentration risks are fairly evident. It is widely recognized that the Domain Name System, the Border Gateway Protocol, GPS-based position/navigation/timing, and the Linux kernel are critical to the stability of the digital world. But there may be many other latent concentration risks, and some could be more dangerous. SolarWinds was a “little-known” and “obscure” company before it was hacked by Russian operatives.45 Many SolarWinds customers were users without even knowing it.46
The difficulty of mapping and measuring systemic cyber risk presents at least two policy problems. First, without the ability to understand and communicate the probability and severity of systemic cyber events, decisionmakers cannot determine whether resources currently devoted to other problems (including other forms of cyber risk) should be redirected toward steps to mitigate systemic cyber risk. Second, without a clear picture of where the problem areas lie and which possible failure points deserve the most attention, policymakers cannot determine precisely which resources should be redirected and how.
Many observers believe that systemic cyber risk is a large and growing challenge and that such risks are distributed throughout many sectors of the economy and society, with innumerable triggers and pathways. Popular acceptance of these beliefs has dampened risk appetites among cyber re/insurers and regulators and has sparked some calls for large-scale governmental interventions to address systemic cyber risk. Meanwhile, although a minority, other observers argue that systemic cyber risk is smaller and less widely distributed than commonly believed.47 This camp believes that digital and operational systems have so far proven tolerably resilient to cyber events; insurance markets should assume more cyber exposure; and collective action should focus on a handful of sectors, technologies, and circumstances where systemic cyber risk concentrates. Definitively resolving this argument will require better data and methodologies than currently exist. But even as experts work to better understand and quantify systemic cyber risk, it is already clear that policymakers must do more to tackle the problem.
How Can Policymakers Respond?
Generally speaking, addressing systemic cyber risk involves three types of interventions. First, policymakers can try to enhance the ability to identify and measure such risks. Second, they can seek to bound, reduce, or even eliminate some systemic cyber risks. And third, they can work to better manage whatever systemic cyber risk cannot be eliminated.
Given the breadth and complexity of the underlying problem, effective policy should involve a diversity of stakeholders: private actors (such as technology providers, cybersecurity firms, critical infrastructure operators, and re/insurers) as well as public actors (including regulators and national security agencies). International cooperation is also essential because systemic cyber risk is inherently global and systemic shocks are not bound by national borders.
Below are just a few of many initial ideas that merit further exploration.
Identify Unrecognized Software Dependencies
Some sources of risk concentration can be readily identified. For example, the U.S. National Institute of Standards and Technology (NIST) recently published a list of “critical software” categories, such as operating systems and web browsers. The categories were identified by their elevated privileges and trusted functionality. However, the VxWorks case indicates that organizations may depend on software that is not apparent to risk managers. Efforts to achieve a comprehensive understanding of software supply chains are therefore essential. To that end, transparency into the provenance of software offers a foundation for building a system-wide view of specific software dependencies.
One mechanism for promoting transparency could be a software bill of materials, intended to enable vendors to communicate the contents of their software products.48 In the United States, NIST has sketched the outlines of what a Software Bill of Materials must contain, pursuant to President Joe Biden’s Executive Order 14028 on “Improving the Nation’s Cybersecurity.”49 The Linux Foundation’s Core Infrastructure Initiative is another attempt to identify which elements of open source code are systemically critical.50 Google, too, has a new tool to reveal dependencies for open-source projects.51 There is significant additional space for industry to innovate in this area.
Promote Diversity of Products and Services in Narrow Segments
Dispersing digital dependence across multiple software products, computing hardware, or internet infrastructure services could “increase resiliency and prevent cascading failures” resulting from a single malicious compromise.52 Efforts by CISA to shift businesses away from total reliance on GPS signals for position, navigation, and timing data offer one example.53 Governments can use tools such as grants, tax incentives, and antitrust policy to increase competition in key technology markets. Major investors could set up funds focused on nurturing new entrants in highly concentrated, critical IT segments. If successful, these newcomers would both generate profits for the investors and help to reduce systemic cyber risk across the rest of their portfolios.
Diversification should be pursued thoughtfully to manage potential tensions with other aspects of cybersecurity. For example, introducing alternative new IT products and services could be harmful in the short run if they happen to be less secure than the previously dominant technology. Diversification can also sometimes increase system-wide complexity and costs, making it harder to monitor and manage a system’s operations and risk profile. Efforts to diversify IT should go hand in hand with efforts to better manage network complexity and cost.
Identify Systemically Important Digital Entities
Following the 2008 global financial crisis, a number of countries and international bodies sought to better identify, monitor, and regulate “systemically important” financial institutions whose failures could have cascading consequences. The Financial Stability Board, which includes the G20 and several other countries, now works with other international and national regulators to designate global banks and insurers as systemically important.54 National legislation such as the U.S. Dodd-Frank Act complements this international scheme by creating additional designation authorities and imposing tailored regulation on designated entities.55
A similar scheme could be developed for systemically important digital entities—those most at risk of triggering, propagating, or suffering the effects of systemic cyber events. Policymakers should consider several questions in weighing and designing such a scheme. First, what consequences would a designation have? Designated entities would presumably need to meet heightened resilience and transparency requirements. They might also need increased governmental support, such as intelligence collaboration. Second, what would be the designation criteria? While banks have well-understood and readily measured markers of systemic importance, such as total assets and leverage ratios, digital entities would need to somehow be evaluated based on their networked interconnections. Third, who would make the designations? Global bodies such as the International Telecommunication Union are one option, though their decisionmaking can be distorted by geopolitics. Finally, how can a designation scheme overcome political resistance and inertia? Tech companies may lobby against what they see as new regulatory burdens, and there has not yet been a cyber event catastrophic enough to galvanize significant global action.
While designing and implementing such a scheme would be challenging, some early efforts are already underway. In the U.S. House of Representatives, for example, a bipartisan bill introduced in 2021 would empower CISA to designate a subset of critical infrastructure (both digital and nondigital) as systemically important.56
Pursue Scale in Hardening Elements of Non-substitutable Digital Infrastructure
Some sources of risk concentration are here to stay. It is probably impractical to reduce widespread dependence on some building blocks of cyberspace, such as popular cloud platforms, key open-source software, and internet infrastructure.57 These elements of digital infrastructure offer an attractive target for steering limited resources to harden systems against disruption and to shrink the pool of adversaries (and nonmalicious triggers) that might be capable of compromising them.
One approach would be to convene international, multistakeholder working groups, perhaps under the aegis of existing industry or international forums or trusted nongovernmental organizations. Each working group could focus on a different source of concentrated risk. For example, a cloud working group could vet and disseminate best practices, such as the use of mathematical techniques to find and improve the security of software components that are common to many cloud environments.58 An open-source working group could mobilize actors to more consistently enforce licensing agreements and to broaden successful efforts to reduce known vulnerabilities—such as the Internet Security Research Group’s effort to translate Linux (the internet’s most important operating system) into a more secure language.59 A public core working group could address recurrent problems in systems like the Border Gateway Protocol or the Domain Name System.60 By bringing together disparate stakeholders to address discrete areas of systemic cyber risk, these working groups could help to spur collaborative relationships and create processes that could be assessed, refined, and built upon over time.
Scale Response Capacity for the Have-Nots
An important element of resilience is a ready-made capability to respond and recover quickly from a given incident. But the incident response industry is already struggling to keep pace with routine intrusions. In the case of a horizontal or contagion systemic failure, this could leave most victims without timely access to response and recovery capabilities. Countries need the ability to quickly scale the provision of technical assistance to a wide range of actors.
There is no quick or easy solution to this problem, but several promising models merit expansion, at least to test their ability to operate at scale. In the United States, for example, there are National Guard cyber units as well as state-level efforts like the Michigan Cyber Civilian Corps or Wisconsin’s Cyber Disruption Response teams. Connecting local governments and business groups directly with communities of white-hat (or ethical) hackers could offer another way to deliver immediate emergency assistance when other avenues are unavailable.
Enhance the Role of Insurance
Any events that generate massive correlated losses at a global scale—especially business interruptions, a major worry in systemic cyber events—will exceed the response capacity of the private insurance market. However, it should be possible to design public-private partnerships in which private insurers cover some elements of systemic cyber risk while governments step in after a certain threshold. Such an arrangement would have many benefits, including drawing more private capital into the marketplace and creating an orderly, pre-planned mechanism to compensate victims.61
Public-private partnerships have demonstrated their potential in other challenging insurance areas, including extreme weather and natural catastrophe, nuclear energy, trade credit, and terrorism. These partnerships can offer various forms of support, including risk pooling and backstops. In the United States, the Cyberspace Solarium Commission recommended looking at the need for a federal backstop for losses from catastrophic cyber events. The European Insurance and Occupational Pensions Authority has likewise noted that the “threat of systemic risk events coming from cyber incidents might require responses from both the government and the industry to provide adequate insurance capacity in support of the real economy.”62
The growing awareness of systemic cyber risk is revealing two central challenges: complex systems are difficult to understand, and coordinated action is hard to incentivize at the system level. While these problems are not confined to cyber risk, the ever-expanding capabilities of digital technology, coupled with deepening dependence throughout society, mean that systemic cyber risk has the potential to spread harm with a unique combination of speed, scale, and uncertainty.
While systemic cyber risk has become a hot topic, it deserves even more (and closer) attention than it has so far received. Many key questions remain unanswered. Exactly how serious and widespread is systemic cyber risk? What are the most important aggravating and mitigating trends? Where can we find better definitions, data, and models to identify systemic cyber risk? And crucially, how can disparate private and public stakeholders around the world come to together to tackle this global problem? It may take years to arrive at satisfactory answers. But now is the time to pose these questions and begin taking tangible action—before a truly catastrophic cyber event occurs.
The views expressed in this paper do not represent the position of any U.S. government agency or department.
The authors wish to thank Marjory Blumenthal, Tracie Grella, Jay Healey, Trey Herr, Ariel (Eli) Levite, George Perkovich, Milena Rodban, and Jonathan Welburn for their valuable feedback. The authors are solely responsible for the final paper, and the views expressed here do not represent the position of any U.S. government agency or department.
1 William Turton, Jack Gillum, and Jordan Robertson, “Inside the Race to Fix a Potentially Disastrous Software Flaw,” Bloomberg, December 13, 2021, https://www.bloomberg.com/news/articles/2021-12-13/how-apache-raced-to-fix-a-potentially-disastrous-software-flaw?sref=QmOxnLFz; and Joe Uchill, “Log4j Vulnerability Cleanup Expected to Take Months or Years,” SC Media, December 13, 2021, https://www.scmagazine.com/analysis/application-security/log4j-vulnerability-cleanup-expected-to-take-months-or-years.
2 “Threat Advisory: Critical Apache Log4j Vulnerability Being Exploited in the Wild,” Talos, December 10, 2021, https://blog.talosintelligence.com/2021/12/apache-log4j-rce-vulnerability.html.
3 “Understanding the Impact of Apache Log4j Vulnerability,” Google Security Blog, December 17, 2021, https://security.googleblog.com/2021/12/understanding-impact-of-apache-log4j.html.
4 “Guidance for Preventing, Detecting, and Hunting for Exploitation of the Log4j 2 Vulnerability,” Microsoft Security, December 11, 2021, https://www.microsoft.com/security/blog/2021/12/11/guidance-for-preventing-detecting-and-hunting-for-cve-2021-44228-log4j-2-exploitation/. While cybersecurity experts and officials have been virtually unanimous in warning of the Log4j bug’s potentially catastrophic consequences, it remains too early to accurately assess the damage. Joseph Marks, “One Month In, There Aren’t Any Huge, Known Log4j Hacks,” Washington Post, January 11, 2022, https://www.washingtonpost.com/politics/2022/01/11/one-month-there-arent-any-huge-log4j-hacks/.
5 Santosh Janardhan, “More Details About the October 4 Outage,” Engineering at Meta, October 5, 2021, https://engineering.fb.com/2021/10/05/networking-traffic/outage-details/.
6 Mike Isaac and Sheera Frenkel, “Gone in Minutes, Out for Hours: Outage Shakes Facebook,” New York Times, October 4, 2021, https://www.nytimes.com/2021/10/04/technology/facebook-down.html.
7 Christopher Wilson, Tamas Gaidosch, Frank Adelmann, and Anastasiia Morozova, “Cybersecurity Risk Supervision,” International Monetary Fund, 2019, https://www.imf.org/-/media/Files/Publications/DP/2019/English/CRSEA.ashx; and Pawel Smaga, “The Concept of Systemic Risk,” Systemic Risk Centre, August 10, 2014, https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2477928.
8 Ariel E. Levite and Lyu Jinghua, “Travails of an Interconnected World: From Pandemics to the Digital Economy,” Lawfare, April 30, 2020, https://www.lawfareblog.com/travails-interconnected-world-pandemics-digital-economy.
9 John Villasenor, “Zoom Is Now Critical Infrastructure. That’s a Concern,” Brookings Institution, August 27, 2020, https://www.brookings.edu/blog/techtank/2020/08/27/zoom-is-now-critical-infrastructure-thats-a-concern/.
10 Nicole Wetsman, “The COVID-19 Vaccines Weren’t Hacked—This Task Force Is One Reason Why,” The Verge, July 8, 2021, https://www.theverge.com/2021/7/8/22568397/covid-vaccine-cybersecurity-cisa-task-force.
11 “Understanding Systemic Cyber Risk,” World Economic Forum, October 2016, 5, https://www3.weforum.org/docs/White_Paper_GAC_Cyber_Resilience_VERSION_2.pdf.
12 “Systemic Cyber Risk Reduction Venture,” Cybersecurity and Infrastructure Security Agency (CISA), https://www.cisa.gov/systemic-cyber-risk-reduction.
13 “National Critical Functions Set,” CISA, April 2019, https://www.cisa.gov/sites/default/files/publications/national-critical-functions-set-508.pdf.
14 Lincoln Kaffenberger and Emanuel Kopp, “Cyber Risk Scenarios, the Financial System, and Systemic Risk Assessment,” Carnegie Endowment for International Peace, September 30, 2019, https://carnegieendowment.org/2019/09/30/cyber-risk-scenarios-financial-system-and-systemic-risk-assessment-pub-79911.
15 “Systemic Cyber Risk,” European Systemic Risk Board, February 2020, 22, https://www.esrb.europa.eu/pub/pdf/reports/esrb.report200219_systemiccyberrisk~101a09685e.en.pdf.
16 Susanne Sclafane, “Writing Cyber Is Key to Survival, Munich Re Exec Says,” Carrier Management, September 13, 2021, https://www.carriermanagement.com/news/2021/09/13/226172.htm.
17 “What If a Major Cyber Attack Strikes Critical Infrastructure?,” Munich Re, November 22, 2018, https://www.munichre.com/topics-online/en/digitalisation/cyber/silent-cyber.html.
18 “Is Cyber Risk Systemic?” American International Group (AIG), 3, https://insidecybersecurity.com/sites/insidecybersecurity.com/files/documents/may2017/cs2017_0167.pdf.
19 “Cyber: Getting to Grips With a Complex Risk,” Swiss Re Institute, Sigma 1 (2017), https://www.swissre.com/dam/jcr:995517ee-27cd-4aae-b4b1-44fb862af25e/sigma1_2017_en.pdf; and “Cyber Insurance and Systemic Market Risk,” EastWest Institute, June 2019, https://www.eastwest.ngo/cyberinsurance.
20 “Cyber Insurance Industry Struggling With the Systemic Implications of the SolarWinds Breach. This Calls for a Systemic Response, Including Improved Disclosure Requirements,” Cyberhedge, February 8, 2021, https://cyberhedge.com/insights/daily/2021/02/08/cyber-insurance-industry-struggling-with-the-systemic-implications-of-the-solarwinds-breach/.
21 FBI, “The Morris Worm,” November 2, 2018, https://www.fbi.gov/news/stories/morris-worm-30-years-since-first-major-attack-on-internet-110218.
22 William F. Slater, “The Internet Outage and Attacks of October 2002,” Internet Society, 2002, 7, https://billslater.com/writing/2002_1107__Internet_Outage_and_Attacks_in_october_2002_by_William_Slater.pdf.
23 Danny Palmer, “After a Decade of Silence, This Computer Worm Is Back and Researchers Don’t Know Why,” ZDNet, February 3, 2017, https://www.zdnet.com/article/sql-slammer-worm-comes-back-from-the-dead-after-a-decade-of-inactivity/.
24 Nicky Woolf, “DDoS Attack That Disrupted Internet Was Largest of Its Kind in History, Experts Say,” Guardian, October 26, 2016, https://www.theguardian.com/technology/2016/oct/26/ddos-attack-dyn-mirai-botnet.
25 Charles Cooper, “WannaCry: Lessons Learned 1 Year Later,” Symantec, May 15, 2018, https://symantec-enterprise-blogs.security.com/blogs/feature-stories/wannacry-lessons-learned-1-year-later.
26 Ionut Arghire, “NotPetya—Destructive Wiper Disguised as Ransomware,” Security Week, June 29, 2017, https://www.securityweek.com/notpetya-destructive-wiper-disguised-ransomware; and Andy Greenberg, “The Untold Story of NotPetya, the Most Devastating Cyberattack in History,” Wired, August 22, 2018, https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/.
27 Brad Robinson, “A Simplified Explanation of the ‘Meltdown’ CPU Vulnerability,” Hackernoon, January 11, 2018, https://hackernoon.com/a-simplified-explanation-of-the-meltdown-cpu-vulnerability-ad316cd0f0de.
28 Scott Ferguson, “‘Urgent/11’ Vulnerabilities Affect Many Embedded Systems,” Bank Info Security, July 30, 2019, https://www.bankinfosecurity.com/urgent11-vulnerabilities-affect-many-embedded-systems-a-12851.
29 Jai Vijayan, “Millions More Embedded Devices Contain Vulnerable IPnet Software,” Dark Reading, October 2, 2019, https://www.darkreading.com/vulnerabilities-threats/millions-more-embedded-devices-contain-vulnerable-ipnet-software; Lily Hay Newman, “An Operating System Bug Exposes 200 Million Critical Devices,” Wired, July 29, 2019, https://www.wired.com/story/vxworks-vulnerabilities-urgent11/; and “Urgent/11,” ARMIS, December 15, 2020, https://www.armis.com/urgent11/.
30 Neil Jenkins, “Incident Response Blog: REvil Ransomware Campaign Targeting Kaseya VSA Customers,” Cyber Threat Alliance, July 7, 2021, https://www.cyberthreatalliance.org/incident-response-blog-revil-ransomware-campaign-targeting-kaseya-vsa-customers/; and Charlie Osborne, “Updated Kaseya Ransomware Attack FAQ: What We Know Now,” ZDNet, July 23, 2021, https://www.zdnet.com/article/updated-kaseya-ransomware-attack-faq-what-we-know-now/.
31 Adi Robertson, “AT&T Recovers From Multi-State Outage After Nashville Bombing,” The Verge, December 28, 2020, https://www.theverge.com/2020/12/28/22202822/att-outage-nashville-christmas-bombing; and Jose Pagliery, “Sniper Attack on California Power Grid May Have Been ‘an Insider,’ DHS Says,” CNN Business, October 17, 2015, https://money.cnn.com/2015/10/16/technology/sniper-power-grid/.
32 Tim Maurer and Garrett Hinck, “Cloud Security: A Primer for Policymakers,” Carnegie Endowment for International Peace, August 31, 2020, https://carnegieendowment.org/2020/08/31/cloud-security-primer-for-policymakers-pub-82597.
33 Maurer and Hinck, “Cloud Security”; and Nick Thieme, “After Hurricane Maria, Puerto Rico’s Internet Problems Go From Bad to Worse,” PBS, October 23, 2018, https://www.pbs.org/wgbh/nova/article/puerto-rico-hurricane-maria-internet/.
34 Lily Hay Newman, “How an Accidental ‘Kill Switch’ Slowed Friday’s Massive Ransomware Attack,” Wired, May 13, 2017, https://www.wired.com/2017/05/accidental-kill-switch-slowed-fridays-massive-ransomware-attack/.
35 James E. Scheuermann, “Cyber Risks, Systemic Risks, and Cyber Insurance,” Penn State Law Review 122, no. 3 (2018): 613, 617–18, https://www.pennstatelawreview.org/print-issues/cyber-risks-systemic-risks-and-cyber-insurance/; and Peter Sommer and Ian Brown, “Reducing Systemic Cybersecurity Risk,” Organisation for Economic Co-operation and Development (OECD), January 14, 2011, 15–20, 23, https://www.oecd.org/gov/risk/46889922.pdf.
36 Dan Geer, Eric Jardine, and Eireann Leverett stated that “trends toward market concentrations are the new normal in IT systems, on the Internet, and across the World Wide Web”; see “On Market Concentration and Cybersecurity Risk,” Journal of Cyber Policy 5, no. 1 (2020): 9–29, https://www.tandfonline.com/doi/abs/10.1080/23738871.2020.1728355. Also see J. Arkko et al., “Considerations on Internet Consolidation and the Internet Architecture,” Data Tracker, Internet Engineering Task Force, April 26, 2019, https://datatracker.ietf.org/doc/html/draft-arkko-iab-internet-consolidation-00.
37 Scheuerman, “Cyber Risks, Systemic Risks, and Cyber Insurance,” 622; and “Appendix J: Strengthening the Resilience of Outsourced Technology Services,” Business Continuity Planning Booklet, https://www.ffiec.gov/press/PDF/FFIEC_Appendix_J.pdf.
38 Dan Geer, “Heartbleed as Metaphor,” Lawfare, April 21, 2014, https://www.lawfareblog.com/heartbleed-metaphor. While many sources of concentration risk stand out—consumer operating systems, precision timing data derived from GPS satellites, or internet infrastructure—others are greatly obscured. Leonoy Barkai and Andrew Shaughnessy have stated that an “organisation’s internal and third-party cyber-dependencies can be highly opaque, and the threat landscape noisy and confusing”; see “Shockwaves, Ripples and Dominoes: Identifying and Addressing Systemic Cyber Risks,” S-RM, 2021, https://insights.s-rminform.com/identifying-addressing-systemic-cyber-risks.
39 Tyson Macaulay has said that “governments have an urgent need to achieve a clearer understanding of the often-opaque interdependencies between critical infrastructure sectors, and to take steps to mitigate the chances of cascading chain reactions”; see “The Danger of Critical Infrastructure Interdependency,” Centre for International Governance Innovation, 2019, https://www.cigionline.org/articles/danger-critical-infrastructure-interdependency/. Dave Clemente has noted that “understanding and managing the risk that arises from these dependencies is rarely straightforward or transparent”; see “Cyber Security and Global Interdependence: What Is Critical?,” Chatham House, February 2013, https://www.chathamhouse.org/sites/default/files/public/Research/International%20Security/0213pr_cyber.pdf. In 2018, AIR, now part of the analytics company Verisk, has noted that the “sources of systemic cyber risk are many—similar to land mines in a minefield—and the insurance industry’s inability to navigate this minefield and quantify this risk is limiting the growth of this line of business”; see “Rethinking Systemic Cyber Risk—An Approach for Growth,” 2018, https://www.air-worldwide.com/siteassets/Publications/Brochures/documents/issue-brief-rethinking-systemic-cyber-risk-an-approach-for-growth. The EastWest Institute has observed that to “deal with this inherent challenge, many insurers and reinsurers are looking for innovative ways to improve their underwriting and risk modeling methodologies”; see “Cyber Insurance and Systemic Market Risk,” 30. Months after the VxWorks disclosures described, the same vulnerabilities were discovered in five additional products used in yet more critical infrastructure systems—much to the surprise of the manufacturers and customers; see Vijayan, “Millions More Embedded Devices Contain Vulnerable IPnet Software.”
40 “Systemic Cyber Risk,” European Systemic Risk Board, February 2020, 38, https://www.esrb.europa.eu/pub/pdf/reports/esrb.report200219_systemiccyberrisk~101a09685e.en.pdf?fdefe8436b08c6881d492960ffc7f3a9.
41 In 2016, Rob Joyce, the U.S. National Security Agency’s director for cybersecurity, explained the meaning of the term for nation-state threat actors: “There’s a reason it’s called advanced persistent threats. Because we’ll poke and we’ll poke and we’ll wait and we’ll wait and we’ll wait, right? We’re looking for that opening and that opportunity to finish the mission.” Ryan Naraine, "NSA's Rob Joyce Explains 'Sand and Friction' Security Strategy," SecurityWeek, October 5, 2021, https://www.securityweek.com/nsas-rob-joyce-explains-sand-and-friction-security-strategy. For a gripping hypothetical account that illustrates how known cybersecurity risks can generate systemic effects, see R. Kikuo Johnson, “The Big Hack,” New York Magazine, June 19, 2016, https://nymag.com/intelligencer/2016/06/the-hack-that-could-take-down-nyc.html.
42 Jon Bateman, “On Decoupling,” Carnegie Endowment for International Peace, https://carnegieendowment.org/2020/09/09/on-decoupling-pub-82514.
43 Jonathan W. Welburn and Aaron Strong, “Systemic Cyber Risk and Aggregate Impacts,” RAND Corporation, February 18, 2021, https://www.rand.org/pubs/external_publications/EP68520.html.
45 Matt O’Brien, “Little-Known SolarWinds Gets Scrutiny Over Hack, Stock Sales,” AP News, December 16, 2020, https://apnews.com/article/hacking-solarwinds-cybersecurity-texas-1467388fe7234f2d3619289a49060eab; and William Turton, “Hackers Used Obscure Texas IT Vendor to Attack U.S. Agencies,” Bloomberg Businessweek, December 14, 2020, https://www.bloomberg.com/news/articles/2020-12-14/hackers-used-obscure-texas-it-vendor-to-attack-top-u-s-agencies.
46 David E. Sanger, Nicole Perlroth, and Julian E. Barnes, “As Understanding of Russian Hacking Grows, So Does Alarm,” New York Times, January 2, 2021, https://www.nytimes.com/2021/01/02/us/politics/russian-hacking-government.html.
47 Catrin Shi, “CFC: Real-life Systemic Cyber Events Challenging Model Assumptions,” Insurance Insider, December 6, 2021, https://www.insuranceinsider.com/article/29eg3lhzopfx8r3rvr2f4/cfc-real-life-systemic-cyber-events-challenging-model-assumptions.
48 Seth Carmody et al., “Building Resilient Medical Technology Supply Chains With a Software Bill of Materials,” npj Digital Medicine 4, no. 34 (2021), https://www.nature.com/articles/s41746-021-00403-w.
49 NIST, “The Minimum Elements for a Software Bill of Materials (SBOM),” July 12, 2021, https://www.ntia.doc.gov/files/ntia/publications/sbom_minimum_elements_report.pdf.
50 “Core Infrastructure Initiative,” Linux Foundation, https://www.coreinfrastructure.org/.
51 “Introducing the Open Source Insights Project,” Google Open Source, June 3, 2021, https://opensource.googleblog.com/2021/06/introducing-open-source-insights-project.html.
52 Geer, Jardine, and Leverett, “On Market Concentration and Cybersecurity Risk.”
53 “Positioning Navigation and Timing,” CISA, https://www.cisa.gov/pnt.
54 “Ending Too-Big-to-Fail,” Financial Stability Board, January 7, 2021, https://www.fsb.org/work-of-the-fsb/market-and-institutional-resilience/post-2008-financial-crisis-reforms/ending-too-big-to-fail/.
55 “Systemically Important or ‘Too Big to Fail’ Financial Institutions,” Congressional Research Service, September 24, 2018, https://crsreports.congress.gov/product/pdf/R/R42150.
56 “Katko, Spanberger Lead Major Effort to Secure Systemically Important Critical Infrastructure,” press release, U.S. Congressman John Katko, October 5, 2021, https://katko.house.gov/media-center/press-releases/katko-spanberger-lead-major-effort-secure-systemically-important.
57 A security vulnerability affecting the Network Time Protocol, used by billions of digital devices to synchronize time, could allow a clever attacker to trigger a systemic shock—yet this essential component of cyberspace was managed and secured by one person as of 2016. Charles Babcock, “Harlan Stenn Tackles NTP Security Issues as Big Move Looms,” Information Week, March 28, 2016, https://www.informationweek.com/strategic-cio/security-and-risk-strategy/harlan-stenn-tackles-ntp-security-issues-as-big-move-looms/d/d-id/1324475.
58 “Provable Security: Security Assurance, Backed by Mathematical Proof,” Amazon Web Services, https://aws.amazon.com/security/provable-security/.
59 In a 2014 incident known as Heartbleed, experts discovered critical security vulnerabilities in a package of free software code called OpenSSL, used by countless websites to secure the transmission of internet data. At the time, one full-time employee had the responsibility of securing this critical resource. According to an analysis by David Wheeler, the Heartbleed vulnerabilities “affected a huge number of popular websites, including Google, YouTube, Yahoo!, Pinterest, Blogspot, Instagram, Tumblr, Reddit, Netflix, Stack Overflow, Slate, GitHub, Yelp, Etsy, the U.S. Postal Service (USPS), Blogger, Dropbox, Wikipedia, and the Washington Post.” See David A. Wheeler, “How to Prevent the Next Heartbleed,” David Wheeler, July 18, 2020, https://dwheeler.com/essays/heartbleed.html. Also see Jon Brodkin, “Tech giants, chastened by Heartbleed, Finally Agree to Fund OpenSSL,” ArsTechnica, April 24, 2014, https://arstechnica.com/information-technology/2014/04/tech-giants-chastened-by-heartbleed-finally-agree-to-fund-openssl/. Another example of a concentrated risk emanating from open-source software is the Network Time Protocol, used by billions of digital devices to synchronize time—and which was overseen by one person as of 2016; see Babcock, “Harlan Stenn Tackles NTP Security Issues as Big Move Looms.”
60 The President’s National Security Telecommunications Advisory Committee long ago reasoned that a sophisticated attack on the Border Gateway Protocol (BGP) could cause “immediate, widespread impact to end users” with outages that could last “from hours to weeks or months”; see “NSTAC Report to the President on Communications Resiliency,” The President's National Security Telecommunications Advisory Committee, April 19, 2011, https://www.cisa.gov/sites/default/files/publications/NSTAC-Report-to-the-President-on-Communications-Resiliency-2011-04-19.pdf, 35. Also see Craig Timberg, “A Disaster Foretold—and Ignored,” Washington Post, June 22, 2015, https://www.washingtonpost.com/sf/business/2015/06/22/net-of-insecurity-part-3/. Even short of a global internet calamity, targeted BGP attacks present a source of concentrated risk because they enable attacks on a variety of vital network services, including anonymity systems like Tor, public key infrastructure (for example, encrypted communications), and cryptocurrency infrastructure. See Yixin Sun et al., “Routing Attacks on Internet Services,” Freedom to Tinker, April 11, 2018, https://freedom-to-tinker.com/2018/04/11/routing-attacks-on-internet-services/.
61 Jon Bateman, “War, Terrorism, and Catastrophe in Cyber Insurance: Understanding and Reforming Exclusions,” Carnegie Endowment for International Peace, October 5, 2020, https://carnegieendowment.org/2020/10/05/war-terrorism-and-catastrophe-in-cyber-insurance-understanding-and-reforming-exclusions-pub-82819.
62 European Insurance and Occupational Pensions Authority, “Cyber Underwriting Strategy,” February 11, 2020, 3, https://www.eiopa.europa.eu/document-library/strategy/cyber-underwriting-strategy.