diff --git "a/data/CHRG-117/CHRG-117hhrg43755.txt" "b/data/CHRG-117/CHRG-117hhrg43755.txt" new file mode 100644--- /dev/null +++ "b/data/CHRG-117/CHRG-117hhrg43755.txt" @@ -0,0 +1,4580 @@ + +
+[House Hearing, 117 Congress] +[From the U.S. Government Publishing Office] + + + + + + WEATHERING THE STORM: + THE ROLE OF PRIVATE TECH + IN THE SOLARWINDS BREACH + AND ONGOING CAMPAIGN + +======================================================================= + + JOINT HEARING + + before the + + COMMITTEE ON OVERSIGHT AND REFORM + + U.S. HOUSE OF REPRESENTATIVES + + [Serial No. 117-5] + + and the + + COMMITTEE ON HOMELAND SECURITY + + U.S. HOUSE OF REPRESENTATIVES + + [Serial No. 117-4] + + ONE HUNDRED SEVENTEENTH CONGRESS + + FIRST SESSION + + __________ + + FEBRUARY 26, 2021 + + __________ + + Printed for the use of the Committee on Oversight and Reform + + + + +[GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT] + + + + + + Available on: govinfo.gov + oversight.house.gov + docs.house.gov + + + ______ + + + U.S. GOVERNMENT PUBLISHING OFFICE + 43-755 PDF WASHINGTON : 2021 + + + + COMMITTEE ON OVERSIGHT AND REFORM + + CAROLYN B. MALONEY, New York, Chairwoman + +Eleanor Holmes Norton, District of James Comer, Kentucky, Ranking + Columbia Minority Member +Stephen F. Lynch, Massachusetts Jim Jordan, Ohio +Jim Cooper, Tennessee Paul A. Gosar, Arizona +Gerald E. Connolly, Virginia Virginia Foxx, North Carolina +Raja Krishnamoorthi, Illinois Jody B. Hice, Georgia +Jamie Raskin, Maryland Glenn Grothman, Wisconsin +Ro Khanna, California Michael Cloud, Texas +Kweisi Mfume, Maryland Bob Gibbs, Ohio +Alexandria Ocasio-Cortez, New York Clay Higgins, Louisiana +Rashida Tlaib, Michigan Ralph Norman, South Carolina +Katie Porter, California Pete Sessions, Texas +Cori Bush, Missouri Fred Keller, Pennsylvania +Danny K. Davis, Illinois Andy Biggs, Arizona +Debbie Wasserman Schultz, Florida Andrew Clyde, Georgia +Peter Welch, Vermont Nancy Mace, South Carolina +Henry C. ``Hank'' Johnson, Jr., Scott Franklin, Florida + Georgia Jake LaTurner, Kansas +John P. Sarbanes, Maryland Pat Fallon, Texas +Jackie Speier, California Yvette Herrell, New Mexico +Robin L. Kelly, Illinois Byron Donalds, Florida +Brenda L. Lawrence, Michigan +Mark DeSaulnier, California +Jimmy Gomez, California +Ayanna Pressley, Massachusetts +Vacancy + + David Rapallo, Staff Director + Peter Kenny, Chief Investigative Counsel + Elisa LaNier, Chief Clerk + + Mark Marin, Minority Staff Director + + Contact Number: 202-225-5051 + ------ + COMMITTEE ON HOMELAND SECURITY + + Bennie G. Thompson, Mississippi, Chairman +Sheila Jackson Lee, Texas John Katko, New York Ranking +James R. Langevin, Rhode Island Minority Member +Donald M. Payne, Jr., New Jersey Michael T. McCaul, Texas +J. Luis Correa, California Clay Higgins, Louisiana +Elissa Slotkin, Michigan Michael Guest, Mississippi +Emanuel Cleaver, Missouri Dan Bishop, North Carolina +Al Green, Texas Jefferson Van Drew, New Jersey +Yvette D. Clarke, New York Ralph Norman, South Carolina +Eric Swalwell, California Mariannette Miller-Meeks, Iowa +Dina Titus, Nevada Diana Harshbarger, Tennessee +Bonnie Watson Coleman, New Jersey Andrew S. Clyde, Georgia +Kathleen M. Rice, New York Carlos A. Gimenez, Florida +Val Butler Demings, Florida Jake LaTurner, Kansas +Nanette Diaz Barragan, California Peter Meijer, Michigan +Josh Gottheimer, New Jersey Kat Cammack, Florida +Elaine G. Luria, Virginia August Pfluger, Texas +Tom Malinowski, New Jersey Andrew R. Garbarino, New York +Ritchie Torres, New York + Hope Goins, Staff Director + Daniel Kroese, Minority Staff Director + Natalie Nixon, Clerk + + C O N T E N T S + + ---------- + Page +Hearing held on February 26, 2021................................ 1 + + Witnesses + +Sudhakar Ramakrishna, President and Chief Executive Officer, + SolarWinds Corporation; accompanied by Kevin B. Thompson, + Former Chief Executive Officer, SolarWinds Corporation +Oral Statement................................................... 8 + +Kevin Mandia, Chief Executive Officer, FireEye, Inc. +Oral Statement................................................... 9 + +Brad Smith, President and Chief Legal Officer, Microsoft + Corporation +Oral Statement................................................... 11 + +Written opening statements and statements for the witnesses are + available in the U.S. House of Representatives Document + Repository at: docs.house.gov. + + Index of Documents + + ---------- + + * Statement for the Record; submitted by Rep. Connolly. + + * Questions for the Record to: Ramakrishna; submitted by + Chairwoman Maloney. + + * Questions for the Record to: Thompson; submitted by + Chairwoman Maloney. + + * Questions for the Record to: Mandia; submitted by Chairwoman + Maloney. + + * Questions for the Record to: Smith; submitted by Chairwoman + Maloney. + + * Questions for the Record to: Ramakrishna; submitted by + Committee Chairman Thompson (Homeland), Rep. Titus, and Rep. + Guest. + + * Questions for the Record to: Thompson; submitted by Committee + Chairman Thompson (Homeland), Rep. Titus, and Rep. Guest. + + * Questions for the Record to: Smith; submitted by Committee + Chairman Thompson (Homeland), Rep. Titus, and Rep. Guest. + +Documents entered into the record during this hearing, and + Questions for the Record (QFR's) with responses are available + at: docs.house.gov. + + + WEATHERING THE STORM: + + THE ROLE OF PRIVATE TECH + + IN THE SOLARWINDS BREACH + + AND ONGOING CAMPAIGN + + ---------- + + + Friday, February 26, 2021 + + House of Representatives, + Committee on Oversight and Reform + Committee on Homeland Security + Washington, D.C. + + The committees met, pursuant to notice, at 9:06 a.m., via +Webex, Hon. Carolyn Maloney [chairwoman of the Committee on +Oversight and Reform] presiding. + Present from Committee on Oversight and Reform: +Representatives Present: Representatives Maloney, Norton, +Lynch, Cooper, Connolly, Krishnamoorthi, Khanna, Mfume, Porter, +Tlaib, Bush, Rice, Wasserman Schultz, Welch, Johnson, Sarbanes, +Speier, Kelly, DeSaulnier, Comer, Jordan, Hice, Grothman, +Cloud, Keller, Sessions, Biggs, Donalds, Fallon, and Franklin. + Present from Committee on Homeland Security: +Representatives Thompson, Langevin, Payne, Correa, Slotkin, +Cleaver, Clarke, Swalwell, Watson Coleman, Rice, Demings, +Barragan, Gottheimer, Malinowski, Torres, Katko, McCaul, +Higgins, Guest, Bishop, Van Drew, Norman, Miller-Meeks, +Harshbarger, Clyde, Gimenez, LaTurner, Meijer, Cammack, +Pfluger, and Garbarino. + Chairwoman Maloney. The committee will come to order. + Without objection, the chair is authorized to declare a +recess of the committee at any time. + I now recognize myself for an opening statement. + Good morning. I want to welcome everyone to this joint +hearing of the Committee on Oversight and Reform and the +Committee on Homeland Security. Welcome to Chairman Thompson, +Ranking Member Katko, Ranking Member Comer, and all of our +members. Today's hearing is the first in the House on the +cyberattack uncovered last year that initially targeted the +software company, SolarWinds, and its Orion product. The +details are truly frightening. + Here is what we know. A sophisticated attacker, reported to +be the Russian Government, broke into SolarWinds' system and +inserted malicious code into its software which customers then +downloaded. The numbers tell how dangerous an attack like this +can be. Nearly 18,000 customers downloaded updates containing +the malicious code. It is not just the number of potential +victims, as staggering as that is, or even the number of known +victims of secondary attacks, but the nature of this attack and +the profiles of victims that should give us all grave concern. +Among the victims were major technology companies, some of +which have the best cybersecurity in the world, as well as +critical infrastructure firms, our Nation's law enforcement and +government agencies involved in foreign affairs, and national +security. It has affected approximately 100 private sector +companies and at least nine Federal agencies, including the +Department of Homeland Security, Department of Justice, and +state, and Treasury, and that is just what we know. There is +much more that we still don't know. We still don't know if they +are still in the system. In the weeks and months ahead, our +committee will continue our joint investigation to examine +other aspects of this massive attack. + Today, our focus is on the private sector. The private +sector plays a key role in our Nation's cyber defenses, they +own critical infrastructure, and they develop essential +information, communications, and technology products. They help +the government and other companies secure and defend their own +networks. It was the private sector that uncovered this attack, +not our own government. Specifically, FireEye discovered it, +reported its findings, and shared it with the world. Had +FireEye not taken that action, the attack could very well be +fully up and running today. + At the same time, the private sector was targeted as part +of a campaign to gain access to government networks and other +entities. All of the companies here today are victims of this +attack, and all provide products and services to the government +that puts the government at risk. Additionally, it is the +private sector to whom the government must turn. In particular, +the government has turned to Microsoft to learn whether it was +exposed and how badly due to the widespread adoption of Office +365 Cloud. + The private sector must be held accountable for its role. +Our committees recently obtained a presentation made by a +former employee at SolarWinds named Ian Thornton-Trump. The 23- +page presentation, a portion of which I will put up on the +screen now, appears to include a proposal from 2017 that +stated, and I quote, ``The survival of the company depends on +an internal commitment to security. The survival of our +customers depends on a commitment to build secure solutions.'' +I look forward to hearing from Mr. Thompson about the steps the +company took in response. + Cybersecurity demands strong leadership, but, +unfortunately, we have suffered under four years of terrible +leadership at the very top. On December 18, Secretary of State +Mike Pompeo stated during a public interview, and I quote, +``This was a very significant effort, and I think it's the case +that now we can say pretty clearly that it was the Russians +that engaged in this activity.'' Yet the very next day, +President Trump tweeted this, and I quote, ``The cyber hack is +far greater in the fake news media than in actuality.'' + So, what can we do now? First, I am pleased the Biden +Administration has taken early steps to elevate the importance +of cybersecurity and supply chain risk. Our committee plans to +focus on Federal procurement. The government pays hundreds of +billions of dollars for goods and services each year. We must +demand better cybersecurity practices from our suppliers as +well as increased information sharing with the private sector +as a product of the contract agreement. Finally, the Oversight +Committee plans to closely review agency roles, +responsibilities, and strategy under the Federal Information +Security Modernization Act, known as FISMA, to meet the complex +and dynamic cybersecurity landscape of today. Much work needs +to be done. Today and in the weeks and months ahead, we will +focus on the facts with an eye toward legislative solutions in +how we can improve cyber defenses across both the public and +private sectors. + With that, I now recognize the distinguished ranking +member, Mr. Comer, for his opening statement. + Mr. Comer [continuing]. Thanking the chairwoman for having +this hearing. Last year, our Federal Government was hacked in +the largest cyberattack in history. Some of the largest +technology companies in the country were also hacked. The +cyberattack took months of planning. It took extreme patience +to execute. According to all the experts, it was incredibly +sophisticated. The attackers covered their steps so they would +not be detected, and it was wildly successful. According to one +of our witnesses today, over 1,000 people were involved in the +attack, and the likely culprit of the attack? Russia. + Three months after the attack was discovered, there is +still a lot we don't know, and many government agencies and +companies were hacked. We don't know what the extent of the +damage is, whether or not the Russians still have access to the +systems they hacked, or whether we have been able to +successfully kick them out. You may not have heard about this +attack because it hasn't affected your daily life. You still go +home to a warm house every night, you can still flip on the +television at night and watch TV, you can still facetime with +your friends and family, but that is only because the attackers +chose not to disrupt those activities. As far as we know, this +attack was an espionage campaign, an intelligence-gathering +operation only, but what the attackers have shown us is none of +the software we use in our daily lives is truly safe. The apps +we download on our phones, laptops, and tablets, any device, +can be sabotaged. + Last week, we all prayed for millions of people in Texas as +the power grid failed and they froze in their homes. Now, +imagine if an adversary had the ability to take our electric +grid offline in the dead of winter or the peak of summer. Now, +imagine if this took place during a national crisis. Imagine if +an adversary wanted to toy with our financial markets. Imagine +if an adversary had the ability to control supply chains and +manipulate whatever they wanted. It doesn't take much to +realize the horror that would ensue if an adversary were +motivated to do any of these things. + The attackers did not take down our electric grid, poison +our water, or cause chaos in our financial system, among other +necessities or occurrences of our daily lives. At least this +time they didn't, but that is not to say they couldn't have. +The truth is this attack is still ongoing even today and has +not been completely neutralized. This offers the potential for +unforeseen additional damage. The fact the attackers did not do +these things that received the attention of Americans going +about their everyday lives says nothing of their capabilities +to do so the next time. This isn't the first-ever attack of +this kind, nor will it be the last. For far too long, +cybersecurity has been addressed as the mere cost of doing +business, an add-on, a minor line item to simply check the box. +This mindset must end. + No one, including Congress, the Administration, or the +private sector can afford to allow this moment pass without +ensuring we finally adopt effective solutions. I appreciate +this opportunity to review what happened in this massive +cyberattack that one of our witnesses referred to as the +largest ever, and to play a part in developing a game plan for +deterring and responding to any future event. I am convinced, +though, that cybersecurity must not be left to the recesses of +academic debate or half-hearted compliance, but, instead, it +must become a daily focus for all involved in software +development, procurement, and operations. + Just contemplate for a moment this particular attack. +Companies, which many expect to secure their systems with +topnotch cybersecurity, were the very ones who failed to +identify the attack before damage had already occurred. Some of +those organizations are here today. The same goes for our +government agencies who glaringly missed the adversary's nearly +year-long presence freely roaming about in our most sensitive +network. I believe the time has come to take concrete action to +actively defend our Nation from foreign cyberattacks just as +forcefully and with the same resources as we would if the +instrument of attack were physical or kinetic. We don't sit +back when our country is physically breached or our homes and +places of business are invaded, and neither should our +responses be to roll over following an attack in cyberspace. + It is only a matter of time or chance until we are faced +with real disruption and destruction. We must do everything in +our power to defend this digital sphere and forecast to our +adversaries that we at least are no longer asleep at the wheel. +I yield back. + Chairwoman Maloney. Chairman Thompson. I now recognize +Chairman Thompson for his opening statement. + Mr. Thompson. Thank you very much. Good morning. I would +like to thank Chairwoman Maloney for holding today's joint +hearing on the SolarWinds breach and the related malicious +cybercampaign. Just over two months ago, we learned that a +state actor, likely Russia, had engaged in a large-scale +cybercampaign, infiltrating government and private sector +networks and burrowing inside them. By the time FireEye +voluntarily shared information about the breach of its network, +Russian actors had established a presence on victims' network, +undetected for nearly a year. That is hardly comforting. While +the campaign is notable for its patience, assistance, scope, +and scale, the methods and tools used, though sophisticated, +are not entirely new. + NotPetya, a 2017 destructive supply chain attack with a +global impact, involved Russian actors compromising Ukrainian +tax preparation software to access victims' network. That same +year, security researchers published their findings regarding +an attack vector using forged SAML tokens. Nonetheless, the +Federal Government and the private sector were caught flat +footed. I do not mean to diminish the complexity of the attack +or to suggest we could have prevented it, but I want to make a +point that our collective failure to make cybersecurity a +central component of our national security and invest in it +accordingly contributed to the success of the campaign and the +difficulty we face in understanding its impact. In short, past +warnings of what could come failed to trigger a meaningful +shift in our approach to security. + My goal in our joint investigation is to move beyond +admiring the complexities of this campaign and the challenges +associated with stopping one like it and start charting a path +forward. In the 15 years I have served on the Homeland Security +Committee, one thing has become clear. We can't become so +consumed by preventing the last attack that we are blind to the +threats of the future. Instead, we must identify systematic +opportunities to improve our ability to prevent, defend +against, mitigate, and raise the cost of all malicious +cyberactivity. Toward that end, I hope to identify a +combination of next-term fixes and longer-term structural +solutions that will improve our ability to better understand +the adversary, defend our networks, and identify attacks more +quickly. + None of the witnesses here today can have a conversation +with me or with the Cybersecurity and Infrastructure Security +Agency about malicious activity occurring on an agency network +because of restrictions agencies add in their contracts. That +unnecessarily complicates our oversight work, limits +situational awareness, and slows recovery. I believe that is a +problem we can fix quickly. In recent days, I have been +encouraged to learn of growing interest in enacting a cyber +incident reporting log. Former chairman of the Cybersecurity +Subcommittee, Cedric Richmond, authored an amendment included +in the House-passed National Defense Authorization Act that +would have established a cyber incident notification +requirement. Unfortunately, we were unable to reach agreement +with our Senate counterparts, but we look forward to trying +again this year and hope we can enact cyber incident +notification legislation in short order. + In the longer term, we must figure out how to make security +a value proposition, not only for policymakers, but for +investors in the private sector who are focused on earnings. We +must address persistent challenges in threat information +sharing and find more strategic ways to effectively leverage +the unique capabilities of the government and the private +sector in our shared goals of better security. In that vein, it +may be time to reassess the obligation of large, highly- +resourced companies with outsized footprints in our economy, in +our government, and evaluate whether more should be expected of +them. And we need to find ways to change behavior in the +private sector, particularly those in the government supply +chain, so executives value security as much as earnings +statements and fast product rollout. I look forward to candid +conversations about these issues today. + Before I close, I want to thank our witnesses for being +here today. Since December, I have been impressed by the degree +of transparency in their conversations with us. It is important +to have a complete record of what happened, and how, so we can +have a candid conversation about what needs to change. With +that, I yield back the balance of my time. + Chairwoman Maloney. I now recognize Ranking Member Katko +for his opening statement. + Mr. Katko. Chairwoman Maloney, and Chairman Thompson, and +Ranking Member Comer, and all my other colleagues that are with +us today, this is a very important hearing. It is one of the +most important threats facing our country today, cybersecurity, +and it is important, I think, that we take a good look at the +situation and learn from it. + As everyone in this hearing knows, we are in the midst of +arguably the most devastating espionage campaign ever waged +against our Nation. With each passing day, we learn more about +the tactics, techniques, procedures, and unprecedented +sophistication surrounding this campaign. While a number of +details remain elusive, the overall picture is slowly coming +together, and much of this incremental clarity is due to what +we have learned from our private sector partners, so I +appreciate their steady engagement in the whole-of-society +response. I also recognize that we need more of this private +sector sharing. I hope we can spend our time during this +hearing evaluating the best paths forward. How can the +cybersecurity community do more than just bounce back, but also +bounce forward from these events? + From my vantage point, we know enough to identify initial +lanes of policy responses that fall into five categories. +First, we need to seriously rethink our fragmented approach to +dot-gov security by centralizing authority with the +Cybersecurity and Infrastructure Security Agency, known as +CISA, wherever possible. While CISA's Federal hunt authority +from the 2021 NDAA is a welcome step in the right direction, +CISA still does not have the proper authorities, resources, or +holistic visibility into the Federal networks enterprise to +effectively defend and nimbly respond to attacks. + Second, we need to better understand the nature and extent +of third-party cyber risks. With no disrespect at all to our +witness, Mr. Ramakrishna, relatively few people had even heard +of SolarWinds in early December 2020, yet its products are +leveraged by most of the Fortune 500's, with a relationship +between vendor and customer that inherently enables a high +degree of administrative privilege on the host network. In this +interconnected web of hardware, software, and services that +underpin our way of life, there are concentrated sources of +risk that could result in cascading or systemic impact if we +assume there is a breach. We need to better illuminate answers +to these questions. + Third, once we identify the potentially concentrated +sources of cyber risk, we need to ensure that vendor +certification processes actually reduce that risk, not create +perfunctory compliance exercises. There are a number of vendor +certification or risk of judgment regimes in various stages of +operationalization right now across the Federal Government with +DOD's Cybersecurity Maturity Model Certification, or CMMC, and +the Federal Acquisition Security Council, or FASC, garnering +the most headlines. Let's work together to ensure these regimes +accomplish our common goal of actually reducing the risk. + Fourth, we need to drive better software assurance and +development life cycle practices across the entire ecosystem. +Whether software flaws are deliberate or not, the software +supply chain represents an attack vector that, if exploited, +leaves the potential for a digital pandemic of sorts, where the +impact of one bad line of code can be felt across the entire +country. Last, we must impose real costs on cyber adversaries +like Russia, China, Iran, and North Korea. While there is no +silver bullet, deterrence still matters. Naming and shaming, +indictments, sanctions, offensive measures where appropriate-- +these should all be tools in our toolkit and tools that we +utilize. From the sophisticated nation-state-led incident to +the more routine, such as ransomware, the cost-benefit analysis +of cyber aggression still favors adversaries far too often. In +short, they are winning the modern-day arms race, and we need +to step up. I welcome the recent announcement by the +Administration to begin to hold Russia accountable through +sanctions. I hope those sanctions are real, I hope they are +firm, and I hope they are severe. + I imagine we will hear a constructive dialog today about +breach notification and incident reporting. An undeniable gap +in our country's cybersecurity posture is the fact that there +is not a consistent, overarching incentive for industry to +disclose a breach. As a result, our Federal agencies are often +operating in the dark instead of having access to the critical +aggregate data regarding the tactics, techniques, and +procedures of bad actors. As we move forward, we must consider +approaches to close this gap. Whether that should be +partnership based or compulsory or hybrid is yet to be seen, +and I welcome robust private sector feedback on this issue. + These are all necessary and worthy policy conversations for +our homeland security, but we must also not lose sight of the +immediate needs to put necessary resources toward the Federal +dot-gov SolarWinds response. I feel strongly that any executive +branch actions related to SolarWinds must build upon and +bolster CISA's mission as the lead Federal civilian +cybersecurity agency, as I recently stated in a letter to +President Biden. + I, again, want to thank our witnesses for testifying today. +I look forward to hearing from you all on an issue of great +bipartisan interest for the Nation. I yield back. + Chairwoman Maloney. Now I will introduce our witnesses. Our +first witness today is Sudhakar Ramakrishna, who is the current +CEO of SolarWinds. Then we will hear from Kevin Thompson, who +is the former CEO of SolarWinds. Next, we will hear from Kevin +Mandia, who is the CEO of FireEye. Finally, we will hear from +Brad Smith, who is the president of Microsoft. The witnesses +will be unmuted so we can swear them in. Please raise your +right hands. + Do you swear or affirm that the testimony you are about to +give is the truth, the whole truth, so help you God? + [Chorus of ayes.] + Chairwoman Maloney. Let the record show the witnesses +answered in the affirmative. Thank you. And without objection, +your written statements will be part of the record. With that, +Mr. Ramakrishna, you are now recognized for your testimony. + + STATEMENT OF SUDHAKAR RAMAKRISHNA, PRESIDENT AND CHIEF +EXECUTIVE OFFICER, SOLARWINDS CORPORATION; ACCOMPANIED BY KEVIN + B. THOMPSON, FORMER CHIEF EXECUTIVE OFFICER, SOLARWINDS + CORPORATION + + Mr. Ramakrishna. Chairwoman Maloney, Chairman Thompson, +Ranking Member Comer, and Ranking Member Katko, and members of +the committee, on behalf of SolarWinds employees, customers, +and partners in the U.S. and around the world, I would first +like to say thank you for inviting us to participate in your +hearing today. By way of background, my name is Sudhakar +Ramakrishna, and I joined SolarWinds as president and CEO on +January 4 of this year. I was previously CEO of Pulse Secure +and before that held other executive roles at technology +companies. In these roles, I have had the experience of being +involved in cyber incidents and seen firsthand the challenges +they present as well as the opportunities for learnings and +improvements. + Also joining me today is Kevin Thompson, who served as our +president and CEO for 10 years until his departure on December +31, 2020, which he had previously announced in August 2020. Mr. +Thompson cares very much for our customers and employees, and +we appreciate his long service to the company. To aid in our +investigation, he has agreed to serve as a special advisor to +me and the board. He has had the opportunity to meet the staff +of both of your committees to provide early insight into the +event. While our products and customers were subject of this +unfortunate and reckless attack, we take our obligations +seriously to work tirelessly to understand it better, to help +our customers, and to be transparent with our learnings. + SolarWinds started in 1999 in Oklahoma as a provider of +network tools, and we have remained true to the mission of +helping IT professionals solve problems and better manage IT +environments, now through more than 90 products. Today, we +remain a U.S.-headquartered company, and our 3,000 dedicated +employees work hard every day to help customers succeed. When +we learned of these attacks, our top priority was to ensure +that our customers were safe and protected. Our teams have been +working tirelessly to help our many customers first and +foremost, while also investigating the what, who, and how of +the attack. We acted quickly to disclose the attacks, provide +remediations and support to our customers, and share our +learnings publicly. + We believe our Orion platform was specifically targeted in +this nation-state operation to create a backdoor into IT +environments of select customers through versions that we +released between March and June 2020. That is a three-month +window. SUNBURST has been removed and is not an ongoing threat +in Orion. Additionally, after extensive investigations, we have +not found SUNBURST in any of our more than 70 non-Orion +products. Perhaps the most significant finding of our +investigations to date was the discovery of what the threat +actor used to inject SUNBURST into the Orion platform. The +injected tool, named SUNSPOT, poses a grave risk to automated +supply chain attacks through many software development +companies since the software build processes, like ours, are +very common in the industry. + As part of our commitment to transparency, collaboration, +and timely communications, we immediately informed our +government partners and published our findings with the +intention of helping other companies combat current and future +attacks. We understand the gravity of the situation and are +applying our learnings from the event and sharing this work +more broadly. Internally, we are referring to our work as +Secure by Design, and it is premised on zero-trust principles +and developing a best-in-class secure software development +model to ensure our customers can have the utmost confidence in +our solutions. + We have published details regarding our efforts, but, in +summary, they are focused on three primary areas: first, +further securing our internal environments; second, enhancing +our product development environments; and third, ensuring the +security and integrity of the products we deliver. Given our +unique experience, we are committed to not only leading the way +with respect to secure software development, but to share our +learnings with the industry. While numerous experts have +commented on the difficulties that these nation-state +operations present for any company, we're embracing our +responsibility to be an active participant in helping prevent +these types of attacks. Everyone at SolarWinds is committed to +doing so, and we value the trust and confidence our customers +place in us. + Thank you again for your leadership in this very important +topic. We appreciate the opportunity to share our experience +and our learnings, and I look forward to addressing your +questions. Thank you. + Mr. Lynch. [Presiding.] Thank you, Mr. Ramakrishna, and +because Mr. Thompson and Mr. Ramakrishna submitted joint +testimony, Mr. Thompson is not providing oral testimony at this +time. Therefore, we are going to move on to Mr. Mandia. Mr. +Mandia, you are now recognized for your five minutes of +testimony. + + STATEMENT OF KEVIN MANDIA, CHIEF EXECUTIVE OFFICER, FIREEYE, + INC. + + Mr. Mandia. Thank you. I would like to thank Chairwoman +Maloney, Ranking Member Comer, Chairman Thompson, and Ranking +Member Katko for this opportunity, and I am excited to share my +observations with you, a first-hand account of what took place +at FireEye and at many of these other victims. So, I am going +to share what happened to most of the victim organizations, and +I know Mr. Smith's going next. He's going to talk a lot more +about what to do about it, and though I have opinions about who +did it and what to do about it, I'll reserve those for the +moment when we get questions. + I want to set a little bit of background first about what +FireEye does, and it is just to provide context. Responding to +breaches is what we do for a living. So, when we ourselves were +breached based on having a SolarWinds implant, we put nearly +100 people on the job, and the majority of the folks working +it, figuring out what happened and what to do about it, did +their proverbial 10,000 hours of computer forensics on +intrusions. And as I'm sitting here talking to these +committees, we're responding to over 150 security breaches, and +in 2020, a tough year for chief information security officers, +we responded to nearly 1,000 security breaches globally. So, +we're a company that every time we respond, we're the +detectives, and we take the trace evidence of every single +breach that we have firsthand experience of, and we put in a +data base and track it. So, with that, let me talk about the +anatomy of this intrusion. + First and foremost, everybody's calling it the SolarWinds +hack. In reality, this is an ongoing saga. The group that did +the compromise that led to 100 different organizations +compromised and nine government agencies compromised is not new +to the game. These are folks that are special operations. And +think of it as, if you're an organization and you've locked +your doors and locked your windows, this is the special ops +robbing the house, not some average criminal just trying to +shake the doorknobs or trying to crack open the windows. So, +this was the varsity team on offense, and all the signs, all +the digital fingerprints that our company cataloged proves +that, that this was a foreign intelligence service. + So, stepping through the anatomy of this intrusion, I look +at it in two stages. Stage one, the attacker had to break into +SolarWinds, and when they did that, you already heard the +details from Mr. Ramakrishna that the attackers did something +that's pretty darn hard to detect. At the very end of a build +process, they altered the production environment. So, this +isn't somebody hacking in and changing source code. They're +hacking the build process, and when you go to build your +production code, it is altered at the last minute. In this +case, to provide the timeline, the attackers that broke into +SolarWinds for this stage one of this whole campaign, the first +thing they did, they got the implant in, but the implant was +innocuous, and there's evidence that in October 2019, the +threat actors put the innocuous code in simply to test, ``Do we +have a way to get into the supply chain?'' After the attacker +proved that they could get their arbitrary code into +production, then they created, by March 2020, an implant that +provided surreptitious access to anyone who updated their +networks with the next SolarWinds update to the Orion platform. + So, how did we find this implant at FireEye? We found it +based on literally exhausting every single other investigative +lead at FireEye. We had detected some unusual activity on our +network, and when we investigated that and started pulling the +thread, the earliest evidence of compromise kept going back to +a SolarWinds server. And the reason I am sharing this story +with you is there is no magic wand on finding an implant. +People trust the third-party software that they buy, rely on, +and install. In this case, because we do forensics for a +living, special operations attacked us. It would take special +operations, people that are in the trenches responding to +breaches every day, to detect it. We had to reverse over 18,000 +files that were in the SolarWinds platform; 3,500 of those +files were executables. We de-compiled them into a million +lines, and with people that can read assembly language and +understand it, they are the ones that found the implant, and +that's why this was so hard to detect. So, that's the stage one +of this breach. + Stage two I'll cover very quickly because after stage one, +the attackers had a menu of over 17,000 companies that had +downloaded the implant, but that doesn't mean the attacker +stole anything from 17,000 companies. The stage-two victims are +where the attacker decided, ``I want something,'' and the +attackers manually engaged with about 100 different +organizations. In stage two, the attackers did three things: +first, steal your keys. They came in through the trap door in +the basement that you didn't know about. They took your keys, +and with those keys, they accessed your information the same +way people and employees do. Second thing they did is they did +very specific and focused targeting of documents and emails. +And the third thing these attackers did, I put in the ``other'' +category based on the victim. They stole source code or +software, and in the case of FireEye, they stole assessment +tools that we use to assess the security of organizations. + So, with that level of detail, I'd like to thank the +committee for this opportunity. We stand ready to work with you +and work with the companies in the private sector to defend the +Nation. Thank you. + Mr. Lynch. Thank you very much. That is very helpful +testimony, Mr. Mandia. We appreciate it. Mr. Smith, you are now +recognized for your testimony for five minutes. Thank you. + + STATEMENT OF BRAD SMITH, PRESIDENT AND CHIEF LEGAL OFFICER, + MICROSOFT CORPORATION + + Mr. Smith. Well, thank you, and I want to thank Chairwoman +Maloney, Chairman Thompson, Ranking Member Comer, Ranking +Member Katko, and really all the members of the two committees. + I think Sudhakar and Kevin have done an excellent job of +describing a lot of what happened, and no doubt we'll get into +more of that. I thought I would, as Kevin suggested, build on +what the two of them said and talk a little bit about what is +it that we can do. What is it that the private sector can do? +What is it that all of us can do by working together? I think +there are a number of concrete steps, and some of the opening +comments, I thought, did an excellent job of identifying, as it +was said, many of the lanes down which we need to travel. As +Sudhakar said, this was an attack on the software supply chain, +and by that, he meant it planted malware into a software +update. I think that points to one of the first things we need +to focus on securing, more broadly, across the software +ecosystem. + The International Data Corporation has estimated that as +many as a half a billion software apps will be created in the +next three years globally. Well, all of these applications will +be distributed. They'll need to be updated. I think we all have +work to do. Certainly at Microsoft we look forward to working +with others on what we can do to help secure the software +supply chain and avoid this kind of risk, this kind of problem, +this kind of tampering with software updates. That is a very +specific activity. + I think the second thing we need to do is think much more +broadly. We need to focus on the modernization of the +information technology infrastructure, and we need to apply, +more broadly, cybersecurity best practices. We've looked at the +customers that use Microsoft software that we were able to +identify had been hacked in this incident, and what we have +found repeatedly is that they could've better protected +themselves simply by applying the many cybersecurity best +practices the world has recognized already, that we've +encouraged customers to apply already. And I think this is an +important day for us to step back and think again about how we +better help small businesses, as well as large customers, to +apply these best practices. + I think that leads us to a third opportunity for us all to +do better. When we ask ourselves why the world is not using all +of the cybersecurity best practices that exist today, I think +one of the reasons becomes self-evident. It's because in the +United States and around the world, there is a shortage of +trained cybersecurity personnel. In the United States today, +there's a shortage of more than 300,000 trained cybersecurity +personnel, and this is something that we, a tech company like +Microsoft, can focus on addressing by helping colleges and +universities, high schools, and others develop the people we'll +need in the future. But I think there's an important role for +government to play as well. + The fourth area where I think we can do better, where we +really need to do better, is to share threat intelligence +information to ensure that when there is information about this +kind of hack or attack, it is being shared first with +customers, something that we do immediately when we detect this +kind of hack at a Microsoft customer, but something that +doesn't happen broadly enough across our industry, and we can +share it with the government. It needs to be, I think, better +shared across the government and then in appropriate ways back +with the private sector itself. + Fifth, I think the time has come to adopt a national law +that will impose cyberbreach incident reporting obligations, +and there are important questions to be considered. To whom +should it apply? When should it apply? How should it be +administered? To whom should the information go? How should +that information be shared? These are all questions for your +two committees and the Congress as a whole, but 2021, I +believe, needs to be the year that Congress acts and we use +this step to strengthen the security of the Nation. + Finally, I think we need to strengthen the international +rules of the road. What happened here is and should be a +violation of international norms and international law. It is +the kind of act that was reckless. It is the kind of act that +needs to have consequences, and those consequences need to be +based on global standards. This is a combination of six steps +that we can take, steps that I believe will make us stronger. +Thank you. + Mr. Lynch. Thank you, Mr. Smith. Now I would like to +recognize my friend, the gentleman from Mississippi, Chairman +Thompson, for five minutes for questions. + Mr. Thompson. Thank you very much, Mr. Chairman. I thank +the witnesses for their very important testimony. This is to +Mr. Thompson and Mr. Ramakrishna. A theme emerging this week is +that the supply chain compromise that exploited the SolarWinds +Orion platform could have happened to anyone, but since +December, I have read troubling accounts about the security +culture at SolarWinds. One report indicated your server +password was ``SolarWinds123.'' Now, according to another +report, a former employee raised concerns about the security +culture at SolarWinds four years ago. As you know, we have +recently obtained testimony from that employee during a +presentation. So, Mr. Thompson, did you take any action based +on the security recommendation that this employee, Mr. Trump, +made to the company? + Mr. Thompson. So, I believe that we have, over the history +of time at SolarWinds, taken security seriously, security of +our internal systems and the secure development of our +products. Mr. Trump arrived in the company April 2017. Shortly +after that, we actually hired Tim Brown, who is a 30-year +veteran from Dell who was a fellow at Dell, which is one of +their highest-ranking engineers, to be in charge of not only +the internal security of SolarWinds, but also product security +at SolarWinds. We also actually did hire Mr. Trump back in +September 2017 as part of some of the initiatives that we were +working on. So, I believe we have taken security seriously in +2017, and really beginning in 2016, we enhanced our security +posture. + We hired a CTO in 2016 who had been a CIO at a large global +Fortune 500 company. We hired a very experienced CIO in 2017. +As I said, we hired Tim Brown in the middle of 2017, who is a +very experienced VP of security. We also implemented a---- + Mr. Thompson. Thank you. Thank you. Thank you very much. +So, your testimony is that, based on that recommendation, you +did do things. So, Mr. Smith, you talked about the challenges +facing companies, like all of the cyber companies that we have +talked about. One you talked about, the challenge of a work +force. You know, our committees are constantly being requested +by many of the companies on the screen to expand the visa +programs so that we can import labor supply because we don't +have it here. So, tell me what a company like Microsoft is +doing with historically black colleges and minority-serving +institutions to help that labor force be developed right here +in this country. + Mr. Smith. Well, thank you, Chairman Thompson. I think it +is a very important question. You know, so far, just this year, +Microsoft has spent more than $2 million to provide grants to +faculty members at HBCUs to add cybersecurity and other +information technology curriculum to, you know, the courses +that are offered at these institutions. We are going to be +increasing that amount to $3.2 million per year. We are going +to be spending that each of the next three years. + But it is not just, I think, investing in these +institutions so that they can train the next generation of +professionals. We are very focused on hiring individuals at +HBCUs. Our recruiting season is still unfolding this year, but +already we have had recruiters at 27 HBCUs. We are excited that +already 136 students at these institutions have accepted jobs +to work at Microsoft, 73 full time, 63 to be with us as interns +this coming summer. I do believe that the HBCUs are growing and +powerful engines for the protection of cybersecurity. We can +collectively, I think, as an industry add to their strength, +and we will be the beneficiary of the students that they will +graduate. + Mr. Thompson. Thank you very much. This notion of a cyber +breach info office, I take from your testimony, as you know, we +tried to get it passed last year, and it was taken out in the +Senate. So, your testimony to both committees is that that +would be an important instrument for us to have to get in-time +notification of breaches. + Mr. Smith. Yes, that's correct. I think we do need to take +that type of step. There will be important details that need to +be discussed, but this is the time to take that kind of action. + Mr. Thompson. Thank you very much. I yield back, Mr. +Chairman. + Mr. Lynch. The gentleman yields back. The chair now +recognizes the gentleman from New York, Ranking Member Mr. +Katko. You are now recognized for five minutes. + Mr. Katko. Thank you, Mr. Chairman, and I want to thank all +the witnesses for their very thoughtful and engaging testimony. +I am really heartened that your comments are consistent with +and supportive of the five categories of response that I laid +out in my opening statement, and I want to explore those a +little bit more if I can. + First of all, with Mr. Mandia, earlier this week, you +outlined, Mr. Mandia, some of the enormous time and costs that +go into the threat-hunting and intrusion-remediation services. +Can you describe briefly for me, just briefly, the magnitude of +the resources that go into these threat-hunting teams and +penetration-testing services, how much they cost, the man +hours, woman hours that go into it, things like that briefly? + Mr. Mandia. You know, sir--thank you for the question--I +don't think it takes a lot of people to test your networks on +how secure they are, and I do believe that is the best way to +get unvarnished truth in security. Kind of like you do crash +test dummies to test the safety of a vehicle, shoot real +bullets at a bulletproof vest to determine how effective it is, +in cybersecurity you need to test your security, and that is a +couple folks. There is a great asymmetry between offense and +defense. To have somebody perpetrate what would be perceived as +offense, not a lot of resources. + The problem is the 52-card pickup you play on the other +side because of that asymmetry. One attacker can create work +for hundreds of thousands of defenders. It is a bad asymmetry +in cyberspace I think other nations have picked up on where +they can't beat us with tanks, won't beat us with planes, but +in the cyber domain, if they train folks, the A-team can create +work for potentially millions of defenders. So, the bottom +line, that asymmetry is the problem. It is hard to answer your +question without cataloging the offense, very few people. +Defense, you have to pitch a perfect game every day and put a +lot more people on it. + Mr. Katko. Got it. Thank you for that. And to followup on +that, as you know, CISA was granted authority in the Fiscal +Year 2021 NDAA to conduct threat hunting on Federal agency +networks---- + Mr. Mandia. Mm-hmm. + Mr. Katko [continuing]. With or without consent, which is, +I think, a very positive step forward. Do you have +recommendations on how CISA can most effectively implement this +new authority? + Mr. Mandia. Well, I am convinced this will work with the +private sector on that. We all have threat-hunting teams. My +company does it every single day all the time for thousands of +customers. Microsoft has a team that does it. There are a lot +of security folks that do threat hunting, and the reason we +have to do threat hunting is not every product stops +everything, period. There is no such thing as perfect security, +so you have to have the catcher's mitt behind your products. +And CISA's folks that do threat hunting will be able to tap the +private sector and be driven by the private sector, so I think +it is exactly the right thing to do. + Mr. Katko. Mr. Smith, I am going to followup on something +Chairman Thompson said, and I am in complete agreement with him +that the information sharing is such a critical component. But +the problem with the information sharing is if a company is +hacked into and they share the information, are they buying +themselves more problems and more public scrutiny and perhaps +more liability if they do the right thing and share that +information with CISA? So, what role do you see CISA as a hub +for a Federal focal point to help aggregate all this national +risk picture across the sectors, right, No. 1? And No. 2, how +do you do so in a way that protects the industry and +incentivizes the industry to share this information instead of +just not sharing it because they are afraid of opening +Pandora's box and problems for them? + Mr. Smith. Well, first of all, I think you make a really +important point. The White House said a week ago that more than +100 companies, or roughly 100 companies, in the United States +had suffered this kind of attack or hack. You have three +companies here today, and that is because we have chosen to +speak up, and what you get is an invitation to appear as a +witness under oath at a House hearing. And so I think a lot of +companies choose to say as little as possible, and often that +is nothing. + But silence is not going to make this country stronger, and +so I think we have to encourage and, I think, even mandate that +certain companies do this kind of reporting. I think we do need +to identify the right place where the report should go. CISA is +a very strong candidate, and it deserves serious consideration, +and we need to think about the process and the type of +information that should be shared and when it should be shared. +And we need to be very careful that we don't, in effect, tell +firefighters to stop fighting the fire so they can fill out +forms and, you know, meet with government officials instead. +So, we need to balance all of the work that needs to be done, +but Kevin really captured well the asymmetry, and we can only +be effective if we can connect the dots in everything that we +see. That can only be done with this kind of effective +information sharing. + Mr. Katko. Well, it is not often that you hear the private +sector saying they need more government mandates, so that, I +think, highlights the importance and the magnitude of this +problem. And I think Chairman Thompson, and I, and the others +are going to work very hard to try and make this a reality +because information sharing is what made us a much safer nation +after 9/11 with the Joint Terrorism Task Forces. We need to do +the same thing in the cyber area, and anything we can do to +turbocharge that process, we have to do going forward. I have +so many more questions, but I am out of time and I yield back. +Thank you. + Mr. Lynch. The gentleman yields back. The chair now +recognizes the gentlewoman from the District of Columbia. Ms. +Norton, you are now recognized for five minutes. + Ms. Norton. I thank the gentleman for yielding. This is an +important hearing, and we have heard of breaches of both the +private and the governmental sectors. It is kind of a two- +fisted breach. My first question is for Mr. Mandia of FireEye. +Our most recent information from the current White House, I do +believe these breaches occurred in the last Administration, but +it is clear that it could occur and may be occurring right now. +So, let me ask about the breaches or the impact on government +agencies in particular. + For example, the information I have been given is that the +breaches included the Department of Energy, including a +component responsible for managing the Nation's nuclear +weapons. You can see the issue there, Mr. Mandia. Another +agency was the Department of Justice, of course, which enforces +our laws, but breached also, but also has to do with countering +foreign intelligence on the United States. Also breached, of +course, was the Department of Treasury. Now, that Department +maintains the Nation's financial infrastructure and imposes +financial sanctions on our adversaries. You can see, Mr. +Mandia, what this leaves us open to. Would you agree that +compromising any one of these agencies would be considered a +victory for an adversary? + Mr. Mandia. Well, I think the first comment I would say is +this is an ongoing intrusion set. The SolarWinds backdoor was +just part of a very long saga. I first started responding to +breaches for the U.S. Government in the 1990's. This group was +active then. They are going to be active tomorrow. There is +going to be ongoing targeting of those agencies. This intrusion +set using the SolarWinds backdoor happened to be successful at +least for surreptitious access and staying surreptitious and +clandestine on the networks for a certain period of time. You +know, we will respond to it, and it will take those agencies +time, months, to get their arms around the scale and scope of +what happened. And I think we are in that window where they +don't know yet, and we got to wait on the final investigation. + Ms. Norton. Well, we certainly need the investigation to be +finalized because we are still in the window and they are still +being breached. That raises continuing problems for us. And +continuing with you, Mr. Mandia, in 2015, a foreign actor or +groups compromised the systems of the Office of Personnel +Management. They accessed clearance information on 21 million +people. Now, that was only one agency. Mr. Mandia, would the +OPM compromise be considered a serious breach? + Mr. Mandia. I think you have to consider it a serious +breach. When you look at these breaches, what generally happens +is there is a successful breach. We find out about it. We take +steps and do sprints within the Federal Government to try to +escalate our security programs. The bottom line, there are +threat actors out there that attack the U.S. Government on a +daily basis, and they are feeling no risk or repercussions to +doing it. So, we are just sitting here playing defense every +day against an A-team that is going to have successes. + Ms. Norton. Yes. This time around, these actors were able +to compromise up to 3 percent of Microsoft Office email +accounts at the Department of Justice. Again, that sounds like +a small number until you put it in perspective. Three percent +of email accounts at the Department of Justice translates into +roughly 3,500 accounts. Mr. Mandia, if you were writing up a +damage assessment for a customer and they had 3,500 accounts +compromised for months, how would you categorize that? Would it +be sincere even what seems to be a small number? How would you +categorize that? + Mr. Mandia. Well, this is obviously a group that +compromised with collection requirements, so the damage +assessment is going to be based on the content of the emails, +period. And how that information is intended to be used, we +don't know. That is the problem. We have to get our arms around +all the content and all the potential use and misuse of all +that content. So, the bottom line, we may never know the full +range and extent of damage, and we may never know the full +range and extent as to how the stolen information is benefiting +an adversary. + Ms. Norton. Well, we better get our arms around the full +impact of these breaches, but we know that it has very serious +implications for both the government--that is why I focused on +Federal agencies--as well as the bottom sector. You have given +us a mandate in this committee to get to the bottom of how this +breach occurred, every entity that was affected, and how to +protect against this type of incident in the future, and it +looks like we have a lot of work to do. I yield back. + Mr. Lynch. The gentlelady yields back. The chair now +recognizes the gentleman from Georgia, Mr. Hice, for five +minutes. + Mr. Hice. Thank you very much, Mr. Chairman. I appreciate +it and appreciate this hearing. As ranking member of Gov Ops, +it has been honor working with Chairman Connolly on these +issues over and over in the past trying to improve our +government-wide information security. And, of course, we both +know, and I am sure everyone on both of these committees, in +fact, everyone involved in this hearing right now is keenly +aware of the importance of cybersecurity, the vital nature that +it provides for our government, and to make sure, frankly, that +our government continues to run efficiently and effectively, +and, most importantly, in this context, securely. I am +certainly looking forward, in that light, to the upcoming +FITARA hearing on the FITARA scorecard that Chairman Connolly +is going to be bringing up, and hopefully we will be able to +discover the level of preparedness of various agencies within +our government. + But in light of the massive attack, the cyberattack that +brings us to this hearing today, these efforts around Federal +information security are obviously extremely important and all +the more prescient for us. And I understand, I get it, and I +think it is probably good that our witnesses today are from the +private sector. They certainly are able to bring some valuable +insight to us today as to what and how we can best secure our +IT assets in Federal Government. + So, Mr. Mandia, let me begin with you. Beginning with your +company's focus on cybersecurity services, I am wondering your +opinion in regard to cloud migration, and, in particular, what +I am talking about, or what at least I have in mind, is +Chairman Connolly's bill, FEDRAMP, which both myself and +Ranking Member Comer have both co-sponsored. But how do you +view that in terms of is it a step in the right direction for +improving cybersecurity? + Mr. Mandia. Sir, first off, the migration cloud is going to +happen whether we want it or not. It is rare in history where +something costs less and is better. Cloud is actually costing +less and is better. For example, if I wanted a server set up at +FireEye, I could ask an IT staff to do it, or I can go to an +infrastructure as a service provider and get it in five +seconds. So, the cloud is coming. And then you add the pandemic +to it and the work from home. All the major enterprises, all +the major organizations are going to the cloud. + The upside is it cuts both ways, but you should get better +visibility and better controls in the cloud, and the reason why +is you are putting all your decentralized IP and value into one +place. It is easier to monitor it, easier to safeguard it. You +don't have distributed security controls at that point. I think +we are in the middle of the cloud migration, but over time, +what we will see is organizations recognizing at least the +infrastructure portion of the cloud will be more secure because +these companies have to secure it, meaning the providers have +to secure it. + Mr. Hice. OK. OK. So, when you say, ``Whether we like it or +not, it is going to happen,'' I get that. + Mr. Mandia. It is going to happen. + Mr. Hice. And you are exactly right. But with it happening +whether we like it or not, do you feel good that that is indeed +a safe method? Is that good for us to go there that way? + Mr. Mandia. Sir, after 30 years in IT security, I believe +it will be easier to secure the cloud than the last 30 years of +us trying to secure everybody's home offices and secure inside +four different walls all over the place. Yes, it is a good +move. + Mr. Hice. OK. Mr. Chairman, for whatever reason, the clock +is not showing up on my screen, so I really don't know where I +am on time, but if there is time, if I could have a brief +answer from each of our---- + Mr. Lynch. The gentleman has 45 seconds. + Mr. Hice. OK. Well, each of the witnesses real briefly, +what needs to be done? What does the private sector have that +we could use? If you can just give a 10-second answer, each of +you, or whatever, just very briefly. I will start with Mr. +Smith. + Mr. Smith [continuing]. The cloud, but then implement the +cybersecurity best practices that are needed to use it +effectively. As a cloud services provider, we can enable all of +the tools, but ultimately, it is our customers that will have +to decide how to use them. + Mr. Hice. Thank you. + Mr. Ramakrishna. Congressman Hice, my recommendation would +be to share information as fast as possible in as timely a +manner as possible because speed and agility are key to +addressing these issues. + Mr. Hice. Thank you, sir. + Mr. Mandia. And, sir, in the last 12 seconds, I will get to +what Congressman Katko was referring to. I believe we need to +separate disclosure of a breach to sharing of threat +intelligence. If you can share threat intelligence from the +private sector to the government, or government to the private +sector confidentially, you can do it quickly without worrying +about all the liabilities that come with public disclosure of a +breach. So, we got to think of threat intel sharing and +disclosure of a breach as two separate things, and threat +intelligence sharing will defend the Nation. + Mr. Hice. Very good. Thanks to each of you, and thank you, +Mr. Chairman. I yield back. + Mr. Lynch. The gentleman yields back. The chair now takes +great pleasure to recognize someone who has done yeoman's work +in this area for a long time. The gentleman from Rhode Island, +Mr. Langevin, is now recognized for five minutes. + Mr. Langevin. Thank you, Mr. Chairman, and I thank you for +your leadership on cyber. + Mr. Lynch. I believe the gentleman may have muted himself. + Mr. Langevin. Yes, I think---- + Mr. Lynch. OK. Go ahead. + Mr. Langevin. Thank you, Mr. Chairman. Again, I was saying +I appreciate your leadership on cyber and data, the chairs of +the two committees that are holding this joint hearing today +and the ranking members. It is obviously a very important +topic, and I want to thank our witnesses for being here this +morning. + Let me start with Mr. Smith, if I could. Mr. Smith, you +have testified that Microsoft is aware of 60 victim +organizations; that is to say, organizations where at least one +Office 365 email account hosted in Microsoft's Cloud was +accessed by the adversary. But how many accounts has Microsoft +confirmed were accessed? + Mr. Smith. I would have to get you the precise number of +accounts. I will say, in general, the pattern that we saw was +typically a relatively small or very small number of accounts +per customer. I think that was indicative of the stealthy +practices that this actor tends to deploy, namely, to take +great care to be very discreet. And so I think---- + Mr. Langevin. OK. Yes, if I could just stop you. Let me +just say my time is limited. In conversations with staff +yesterday, Microsoft indicated that about 77 accounts had been +confirmed to have been accessed. Does that sound about right? + Mr. Smith. It certainly sounds like it is in the right +range. Again, I would want to go check the specifics, but it +sounds like it is in the right range. + Mr. Langevin. All right. That sounds like a just incredibly +small number to me. All right. If I could, just in CISA's alert +detecting post-compromised threat activity in Microsoft cloud +environments, they note that the amount of security log data in +cloud environments is often significantly less than in on- +premises environments, which can hamper threat hunting. In +fact, the same alert notes that in order to detect certain +accounts that have been compromised, a special, more expensive +Office 365 account or G5 or E5 license is required. Do you +believe that security should be an add-on or up charge or baked +into cloud accounts from the get-go? + Mr. Smith. Well, the particular offer that you described, +what we call as E5, you know, is the service that we offer that +includes security and other advanced features. We offer a range +of choices to our customers. E5 is absolutely what we hope and +expect and recommend that our customers purchase. Some people +don't want to buy it, and we honor that, but it is absolutely +what we encourage. + Mr. Langevin. All right. Just so that I understand and the +committee understands, is this a profit center for Microsoft +for this, or are the services being provided at cost that you +are charging the customers? + Mr. Smith. Well, you know, we are a for-profit company. +Everything that we do is designed to generate a return other +than our philanthropic work. + Mr. Langevin. OK. Thank you, Mr. Smith. Mr. Ramakrishna, if +I could turn to you. Can you shed some light on how the +adversary initially accessed SolarWinds' network? On Tuesday, +you testified before the Senate Intelligence Committee that +your partners had narrowed the number of possible vectors to +three. What are those vectors? + Mr. Ramakrishna. Congressman Langevin, thank you for the +question. Our investigation was segmented as to what exactly +happened, how did it happen, and who may have done it. As it +relates to the what, we have made a lot of progress and have +discovered the specific injector tool that I described could +affect any supply chain, and we have been able to publish it +such that other companies can evaluate their security postures +and supply chains and possibly get help from our efforts. + As it relates to your question, we have narrowed it from +several hypotheses. At one time, we had 15 different threads +that we were pulling, so to speak, and we have battled it since +to about three at this point. One is what I call a classic +password spring type approach that we are investigating. Two is +some form of credential theft. That can happen through various +methods. And three is a potential vulnerability in a third- +party software that we have deployed on premises. Just like +other companies on this witness stand, we use a lot of third- +party software as well, and we are looking at it in those three +dimensions at this point. We are evaluating several terabytes +of data to be able to sift through this in the hopes that we +can pinpoint patient zero in this context. + Mr. Langevin. OK. Thank you, Mr. Ramakrishna and Mr. Smith, +to our witnesses. I just wanted to note for the record, Mr. +Chairman, I know my time has expired, but I want to thank Mr. +Ramakrishna for briefing me about a week ago, and I appreciate +how they have been very forthcoming in helping us to get our +arms around this. And to Mr. Smith, your team had briefed me a +couple days ago, and I appreciate them taking some detailed +questions there, too. So, thank our witnesses, and, Mr. +Chairman, I yield back. + Mr. Lynch. The gentleman yields back. The chair now +recognizes the gentleman from Texas, Mr. McCaul, for five +minutes. + Mr. McCaul. Well, thank you, Mr. Chairman. You know, I have +worked on cybersecurity for very many years along with Mr. +Langevin. And back when I was chairman of the Homeland Security +Committee, we authorized, stood up into law CISA to be the lead +civilian agency to protect our networks, and then we had the +cyber incident response teams that were authorized into law. +You know, 80 percent of this critical infrastructure is done in +the private sector as is most of the threat information, and +that is why these private/public partnerships, I believe, are +so important. + I have had the opportunity to visit with Mr. Ramakrishna. +SolarWinds is actually in my district in Austin, and also with +Mr. Smith from Microsoft, but I want to just get a couple of +just factual details on the event itself. And, Mr. Ramakrishna, +I also want to thank you for being so forthcoming and +transparent with the Federal Government, but do you think the +initial intrusion began around, say, March of last year? + Mr. Ramakrishna. Congressman McCaul, thank you for the +question. March of last year is when we first shipped, so to +speak, the code with the malware injected in it, so three +releases between March 2020 and June 2020 is when the malware +was impacting the Orion platform. + Mr. McCaul. So, between March and June you have the +intrusion. It is detected in December 2020. Is that correct? + Mr. Ramakrishna. Yes. + Mr. McCaul. So, this is very sophisticated malware that +can, as I understand, can go in and out of your system through +the in-door and through the backdoor without detection. Is that +correct? + Mr. Ramakrishna. So, that threat actor I would describe, +Congressman McCaul, as hiding in plain sight. + Mr. McCaul. Mm-hmm. + Mr. Ramakrishna. They were very, very careful about +covering their tracks, cleaning up after themselves, and the +patience with which they worked was not similar to the run-of- +the-mill virus whose job is to spread as fast as possible and +create as much damage as possible. This was very sophisticated. +And, as you heard from Mr. Smith and Mr. Mandia, being in the +security business, it still took them a long time, and in +talking to Mr. Mandia, they looked at this as almost a last +resort in their investigation. + Mr. McCaul. I am sorry, but my time is limited. So, when it +was detected in December, within two days Microsoft developed +and created the kill switch. Is that correct? + Mr. Ramakrishna. That is true, and within a matter of 72 +hours, our teams fixed the malware and delivered remediated +code. And since then, we have pretty much had a 7 by 24 +operation---- + Mr. McCaul [continuing]. Report it to CISA and the Federal +Government? At what time? + Mr. Ramakrishna. We reported it as soon as we knew on +December 12 to CISA and the Federal Government, and we continue +to do so. + Mr. McCaul. We believe that this originated out of Russia. +Would you agree with that assessment? + Mr. Ramakrishna. Congressman, we do not have the internal +expertise to create attribution, but based on our investigation +partners, it appears to be true. + Mr. McCaul. So, this is for both you and Brad Smith. What +is the extent of the damage, to your knowledge, and if it came +from Russia, which I believe it did, by looking at what they +stole, it didn't seem to be a destructive virus, but more of a +theft and espionage type of malware. What was their motivation +and intent here? + Mr. Smith. Well, I would say that, based on every +indication so far, there were probably two or three. One is +espionage, obviously to obtain information, especially, say, +from the U.S. Government and other agencies. Second, to learn +more about technology because obviously technology is the plane +on which this organization's activities take place. That is why +50 percent of the victims that we identified are communications +and technology companies. Third, I think there is an aspect of +this that you would almost put in the context of +counterintelligence. They focus on red team tools so that they +know how to withstand attacks. They look for whether a company +like Microsoft may be knowing about them so that they are able +to try to circumvent what we are doing in the future. That is +true for other tech companies as well. + Mr. McCaul. Now, I applaud you for transparency, the kill +switch, and the notification, but not all companies do this. +And Mr. Langevin and I are working on a mandatory notifications +breach of any cyber intrusions. This can be done by taking +sources and methods and company names out to protect them as +you have a duty to shareholders. It would just simply send the +threat information itself to CISA so they could provide both +industry-wide, and Federal-governmentwide, and state the threat +information that they would need to address it on a larger +scale. Is that something you think would be a good solution? + Mr. Smith. I think that would be an important step. I think +the time has come to recognize that it is probably an essential +step, and I think the precise tailoring, something along the +lines of what you just described, is exactly the kind of +conversation we need to have. + Mr. McCaul. Well, I appreciate that, and I thank you for +testifying here today. And with that, Mr. Chairman, I yield +back. + Mr. Lynch. The gentleman yields back. The chair now +recognizes himself for five minutes. + You know, one of the weaknesses in our system is the +endemic need for us to share information in order for it to be +applied, and that includes classified information. One of the +things, Mr. Mandia and Mr. Smith, that I have come across +during 20 years of these investigations is that the worst is +always denied. So, in this case, we are being reassured by some +that that no classified systems were compromised. That is what +we are being told. But if the previous patterns are followed +here like they have in other breaches and other investigations +that we have done, later on down the line we find out that, +yes, in fact, classified systems were compromised. + So, can you, Mr. Mandia and Mr. Smith, can you reassure me? +I mean, are you willing to guarantee me that no classified +systems were compromised? These people had at least nine +months, and it seems to be the general consensus here that +these were highly professional people. This was a special ops +deal, and they cleaned up after themselves. They clearly +intended, with the patience that they exerted, and we are +talking about thousands of people working on this hack, you +know. Can you assure me that our classified systems were not +compromised? + Mr. Smith. Well, I would say, first, I think we are +probably the wrong people to try to answer that question. You +know, the classified systems are obviously, you know, +maintained by the government, and, you know, it is the +government's---- + Mr. Lynch. That is what worries me. + Mr. Smith. But I would say this. I mean, first, there are +two things that one should think about, and they cut in +opposite directions. The SolarWinds hack was one vector of +attack by an agency that, in all probability, is engaged in +many vectors of attack every single day of the year on a broad +international basis. So, what we have seen here is one slice of +activity that is always ongoing, and we should, I think as your +question suggests, always assume that there are things that we +don't know, and even assume that there are things that are +worse than what we do know. That is, I think, a cause for +concern. + Now, I will say, on the other hand, what this actor did in +many instances, really in all instances, is once they were in a +network, they were able to take advantage of lapses in basic +cybersecurity practices. The reason they got into, say, a +particular number of DOJ email accounts, in all probability, +was because they were able to steal the password of someone or +some individuals who had access to those accounts. And by +definition, I think we can count on the government to have +higher levels of cybersecurity precautions in place for secret +and top-secret workloads. + You know, as a cloud services provider, Microsoft, you +know, stands up secret and top-secret workloads for the U.S. +Government, and, you know, what we consistently find is what +you would expect. You know, the people in government agencies +who are working in this space are, by definition, going to be +more rigorous, so, you know, we should assume that there are +more vigorous attacks or hacks. We should also count on +stronger protection for those kinds of workloads. + Mr. Lynch. Mr. Mandia? + Mr. Mandia. Yes, I think, again, we are not in the purview +to know the answer to that question. I can tell you this is an +intruder that has collection requirements, sensitive data lost +definitely. I did do my stint in the military. I would say it +is unlikely that classified information was probably accessed, +meaning classified systems, but I can't answer the question. I +am not in a position to do so. + Mr. Lynch. Yes. Well, thank you for your service. I +appreciate that. Obviously, it would be valuable to us to know +right now in designing our response. It is a whole different +dynamic and the level of urgency if our classified systems have +been compromised, not only, you know, for the purpose of +plugging those holes, but also protecting, you know, sources +and methods and other aspects of that as well, so it would be +very, very important for us to know that as soon as possible. + With that, I see my time has expired, and I will now +recognize the gentleman from Wisconsin, my colleague and +ranking member, Mr. Grothman. You are now recognized for five +minutes. + Mr. Grothman. Can you hear me? Can you hear me? + Mr. Lynch. Yes, we can hear you. Go ahead. + Mr. Grothman. OK. I think Mr. Mandia mentioned that there +was a problem in that we don't have enough people going into +this field. Maybe it was him, maybe it was Mr. Ramakrishna. For +either one of you, first of all, what type of compensation do +people, say, right out college make if they go into this sort +of field? Could you give me an idea? I guess it is maybe an +unfair question. + Mr. Mandia. Yes, I think it was Mr. Smith that commented on +that, but I would comment. I think everybody is seeking to hire +more cybersecurity professionals. This is something that you +don't just walk out of college great at this and proficient at +this. You do come out of college with some background in it, +but generally you have to do some on-the-job training as well, +but right now there is a lot of colleges offering programs. +There is a lot of infusion of talent into those programs, and I +know the military is actively recruiting people into the +cybersecurity space. So, it is something where the ranks are +starting to grow, but right now the biggest challenge is the 1- +A enterprises are getting the talent because they can afford it +and they have the resources for it. And I think there is a +bigger concern for smaller agencies in the government or for +small to medium businesses that may not have the mission or the +money to get the talent. + Mr. Grothman. OK. I realize people probably pay all over +the map and that sort of thing, but give me a general idea, and +two questions. First of all, a general idea of the compensation +people make, and second, what type of background you look at. I +think like a lot of jobs, you are telling me you get hired by +somebody and then they train you, but if that is the case, what +type of background do you get out of college? Do you want to be +a communications major? Do you want to be a physics major? What +type of thing are you looking for when you hire somebody out of +college as well? + Mr. Mandia. For me and then, you know, I would be +fascinated with the other witnesses' answers, it is a computer +science background or just an unbelievable passion and desire +to be in cybersecurity. It has got to be a fit of desire. + Mr. Smith. Yes, I would offer a few thoughts. I mean, No. +1, if somebody wants to go get trained in cybersecurity, they +are likely to have a good job for the rest of their life. This +is an area that is going to continue to grow in importance. +Second, I would just say, you know, if you look at technology +jobs, if you certainly look at companies like ours, you know, +even entry-level positions, you know, have compensation at or +north of $100,000 per year, and, you know, people make more +money over time. + Third, I do think that there is another important aspect of +this, which is really thinking about the pipeline even more +broadly than, say, computer science graduates from four-year +colleges. At one level, I think there is a huge amount that +community colleges can do to help accelerate the development of +the cybersecurity work force. People who might have gotten +their training in something else, if they want to go back, if +they want to want to spend, say, a year taking a set of +cybersecurity-related courses in community colleges, they can +put themselves on a path to quickly enter this field. And then +finally, I would say we need to keep investing even before we +get kids to college. + Mr. Grothman. Right. + Mr. Smith. I grew up in the district next to yours. I grew +up in Appleton. You know, as a company, we in Microsoft, you +know, do work to provide computer science in high schools. We +do it in, say, the two Oshkosh high schools in your district, +and what we are finding is that there are young people +everywhere who want to learn this field. They just don't have +the opportunity that they need and deserve today. So, I think +with the right kind of action from the Federal Government, +state governments, private sector, philanthropy, we can move so +much faster to create more opportunities for people. + Mr. Ramakrishna. And, Congressman Grothman, if I may add, I +agree with both my colleagues here on all the points that they +made. There are a lot of free online courses and resources that +students and kids can essentially access and start becoming +savvy in these fields. The criticality there is that the +internet is not accessible to everyone in the country. And to +the degree that we can do that to ensure that, for instance, +inner-city kids, economically disadvantaged children have +access to the internet and we give visibility to them for these +courses, we will have a larger, more effective, more diverse +work force. And to your question about what can they get paid, +I would say with a high school degree and some experience +learning online and putting it to use, depending on where you +are in the country because cost of living changes, you can make +anywhere from $70,000 to $120,000 to begin with. + Mr. Grothman. OK. Thank you. Next general question. Well, I +will switch to another question here. This is for Mr. Mandia. + Mr. Lynch. The gentleman's time has expired. I am sorry. +The chair now recognizes the gentleman from New Jersey, Mr. +Payne, for five minutes. + Mr. Payne. Thank you, Mr. Chairman, and I would like to +thank the chairs of the whole committees, Chairwoman Maloney +and Chairman Thompson, for holding this hearing today. Just to +the point my colleague just before me, to all the witnesses, +that information that you are talking about, the opportunities +to enter that field and have people learn online and what have +you, I think if you could take the time to publicize that more +somehow across your companies, that would be very helpful +because there are a lot of times where inner-city youth don't +know that. But if you were able to publicize it more, they +would be able to find those opportunities, so I just wanted to +mention that. + The Russian Government has backed, either directly or +indirectly, election meddling and other malicious cyberactivity +against our interests for quite some time. During his term, +former President Trump was reluctant to confront Russia for +these attacks and failed to publicly condemn multiple instances +of cyber aggression. It is clear that the former President's +appeasement of Russian cyberattacks emboldened our adversaries +and is partly to blame for the SolarWinds breach. The question +is for all the witnesses. Why is it important that our leaders +present a strong, united front in containing cyberattacks? + Mr. Smith. Well, I will say I think this is like any type +of offense that the world wants to stop. People will only stop +if they are held accountable for the violations in which they +engage. You have got to have clear rules. You have got to have +clear standards. You have to have clear lines so that it is +apparent to everybody when somebody steps over the line. And +then you have to have people, especially people in government, +who are prepared to speak up and hold others accountable. I +think the best type of attribution takes place when it is not +just one government, but even by multiple governments together +when that is what the situation warrants. + We did see that twice in 2017. I think it is right to +acknowledge that. You know, the White House, together with +other governments, did that vis-`-vis North Korea in the wake +of the WannaCry attack. It did it again with Russia in the +NotPetya attack. But we need this on a consistent basis, and I +am very hopeful that with leadership that Anne Neuberger is +bringing to the White House as deputy national security +advisor, with her press conference last week, with the steps +she's talking about taking, you will see the kind of leadership +we need. + Mr. Payne. OK. Thank you. Next? + Mr. Ramakrishna. I agree with Mr. Smith's comments about +accountability and rules of engagement. It is important to +recognize that we do not accept attacks without some form of +reciprocation, so to speak, and holding people to account. + Mr. Payne. Thank you. Next? + Mr. Mandia. Yes, and I would just agree with the other +witnesses. It is about risks and repercussions. It is about +understanding the rules of the road. + Mr. Payne. Thank you. And I guess, Mr. Chair, my time is +dwindling, so I will yield back. + Mr. Lynch. The gentleman yields back. The chair now +recognizes the gentleman from Texas, Mr. Cloud, for five +minutes. + Mr. Cloud. Thank you, Chairman, and thank you to the +witnesses for being here. I really appreciate you taking the +time. I want to especially thank Mr. Ramakrishna for being here +in light of the context of what we are dealing with. Your +transparency and involvement in this process, we are very +grateful for that. I want to ask you, have you provided a list +of your clients to the committee? + Mr. Ramakrishna. Mr. Cloud, thanks for the information. +Thanks for the question. As it relates to providing names of +clients, we have not. + Mr. Cloud. I serve as ranking member, along with Chair Raja +Krishnamoorthi, on the Economic and Consumer Policy +Subcommittee of Oversight. Could you provide a list to our +committee? + Mr. Ramakrishna. Congressman Cloud, I will take that for +the record and consult with my team to see what is possible to +disclose at this point in time. + Mr. Ramakrishna. As you can understand, we take the privacy +of our customers very seriously, but I will go back and work +with my team on it. + Mr. Cloud. OK. Thank you. Mr. Mandia, you said December of +last year that this all began as a dry run in October 2019. You +also indicated in December of last year and in Tuesday's Senate +hearing that government agencies sensed something wrong in +their systems but couldn't really connect the dots until they +were notified by FireEye of the breach. What would have enabled +us to connect those dots sooner, and would any of these +proposals of a centralized agency have assisted with that? + Mr. Mandia. You don't know. The bottom line, sir, I just +felt, as soon as we detected our breach, we were in dialog with +our government customers, period, first, to tell them about it. +Regardless of laws and legal liabilities, we told our +government customers about what we were dealing with. My +reaction was that I didn't see surprise. Like, people were +shuffling, thinking, and I think that there are a lot of folks +who have various products that they had little blips on the +radar, and we had to connect dots for many different vectors. +This attack, because of the way it was conducted, is just +harder to piece together. If you centralize the intel, it can +only improve the speed at which that picture and vision will +come together. + Mr. Cloud. OK. One of the questions that I have is, you +know, I wholeheartedly agree we need to invest more in making +sure that we have the capability to defend and also to build in +some attack capabilities certainly to respond to situations +like this, the workflow issue being one of the primary +indicators, so, you know, making sure students have an interest +in engagement. But we also know from past experience that our +universities have been a place where, especially notable actors +like China, which I realize this is attributed to Russia, at +least to our understanding at the moment. But how do we ensure, +of course without creating some sort of discriminatory +environment, that we won't be training our adversaries in this +regard, you know, especially for something so critical to our +national security? + Mr. Smith. I guess I would suggest here a few things. I +mean, one, obviously there is always a role for background +checks in a wide variety of different situations. Two, I think +the best way for us as a country to ensure that the people that +we are training at our universities really support our country +is to bring to the country people that we want to have stay +here and to make it easier for them to stay here. Right now, +unfortunately, it is easy to come study, but it is hard to then +stay afterwards. So we are, almost by definition, focusing on +training people that we expect to go back to their home +country, and I don't think that is the right way to conceive of +the talent strategy for the country. The last thing I would say +is, if you want to pinpoint the greatest risks, I probably +myself would not look to universities. + Mr. Cloud. Right. Right. + Mr. Smith. You know, most of what happens in universities +gets published anyway. + Mr. Cloud. OK. Well, yes, I appreciate that. Those are some +good thoughts. One final thing, and you probably would be the +best to comment on this. In Tuesday's Senate hearing, there was +a discussion about the difference between compliance and +excellence, especially in critical areas of our government +cyber structure, to create some standards that ensure that we +have a high standard of protection. But doing so in such a way, +a lot of times when government imposes a regulation or +mandates, it becomes a check box as opposed to continuing to +foster this innovative spirit. How do we get that balance +right? + Mr. Ramakrishna. Congressman Cloud, I think I was the one +that mentioned that distinction. There are a couple of ways we +can do that. One is, CISA has been mentioned a few times in +this conversation. We are dedicating resources from our team to +work directly with CISA on sharing information. So, it is not +just about threat intelligence, but it is also human resource, +and human intelligence, and actual experience of building +software that needs to be shared, such that standards bodies, +like NIST and CMMC, can actually have examples of correct +behavior that will put us all on a path of excellence versus +simply checking boxes on have you done this, have you done that +kind of question and answer. So, that is really where I was +coming from where real examples from companies, such as the +ones here today, can be contributed to those standards bodies +to enrich them. + Mr. Lynch. OK. The gentleman's time has expired. + Mr. Cloud. Thank you all. + Mr. Lynch. I just want to inform the members that there are +series of five votes on, so after I recognize the next speaker, +I will turn the gavel over to the gentlelady from District of +Columbia, Ms. Norton, to preside while I vote. I now recognize +the gentleman from Tennessee, Mr. Cooper, for five minutes. + Mr. Cooper. Thank you, Mr. Chairman. Can you hear me? + Mr. Lynch. I can, yes. + Mr. Cooper. The testimony so far strikes me as at least +fatalistic, if not defeatist, because here we have a number of +prominent tech companies, and they are really not proposing +tech solutions. They are proposing human re-engineering. So, it +is as if they are telling us they really can't sell products +that are completely safe, so we have to have a rule instead of +``let the buyer beware.'' And I think that tech companies +should continue to pursue tech solutions to make us all safer. + But another interesting thing in the testimony that has +been completely unmentioned so far is the fact that there is +already a hidden, private-sector regulator of cyber intrusion, +and perhaps it is hidden because it is private sector, and here +I am thinking of insurance companies that sell errors and +omissions policies. On page 25 of the stock offering that +SolarWinds engaged in in 2018, they talk about how they have +incurred and expect to incur significant expenses to prevent +security breaches. Then they go on to say, ``Our errors and +omissions insurance coverage, covering certain security and +privacy damages and claim expenses, may not be sufficient to +compensate for all liabilities we incur.'' + So, I would like to find out from each of the companies +what claims you have already made to your errors and omissions +insurance companies, how much they have paid. Have your +premiums increased or do you expect them to increase, because +this is the primary way insurance companies regulate behavior, +by increasing their premiums for riskier companies. And what +percent of the industry do you think has this sort of coverage +to essentially inoculate yourselves, but not your customers, +against these errors and omissions, and what are the names of +these prominent errors and omissions insurance companies? And +wouldn't you want to suggest to those companies that they +perhaps have a more polite name for the coverage, because +``errors and omissions'' seems kind of disrespectful to their +customers. So, perhaps we can start with SolarWinds and go to +FireEye and then to Microsoft. + Mr. Ramakrishna. Congressman Cooper, thank you for the +question. Since my coming on board, we have really focused on +the investigation and addressing the safety and security of our +customers through remediation. And to your point about the +private sector taking on more responsibility for tech-based +solutions, I could not agree more with you, and that is the +reason why we came up with the notion of Secure by Design, +which is completely a technical-based approach to enhancing and +ensuring the safety and security of our supply chain and that +of our customers. + Now, specific to your question, I do recognize that we have +insurance. However, I would like to take that question on +record to give you the specifics, which I don't have handy at +this point in time. + Mr. Cooper. Mr. Mandia? + Mr. Mandia. Sir, same answer. I would like to take that +question on record because I am not prepared to speak to it at +this point. + Mr. Cooper. Mr. Smith? + Mr. Smith. I would say two things. First, I don't know +about the specifics here, but generally as a company, Microsoft +self-insures. We don't rely on policies from insurance +companies. But second, more broadly, if we have left you with +the impression that we are defeatist, then that is the error +and omission that we should be talking about. We are the +opposite of defeatist. We are looking at this as an enormously +challenging and important problem the country needs to address. +These are major nation-states, but technology is moving +forward. It is getting better. We are offering technology +solutions to our customers, not just as a company, but as an +industry. You are right that ultimately, just like an +automobile, it takes the driver to choose to put on the safety +belt, but we are making it easier every year. And I think we +should be embracing this with an enormous amount of self- +confidence. + Mr. Cooper. Well, instead of two-factor authentication, do +we need three-factor? What is it going to be? Are we stuck with +passwords? There has got to be a better way to do this, to +interface with humans. + Mr. Smith. Oh, I completely agree, but it is really a +combination of steps, and I think that is what your question +points to. You know, it is really some things as simple as +putting your authentication into the cloud. You know, a lot of +what happened here was with customers who did not have it +there. They hadn't secured their devices with a service like +Intune that we offer. They were not necessarily using what is +called ``least privileged access'' so that when one person's +password was stolen, you know, they were able to access more +accounts than they should have been able to. A lot of the +steps, when you really understand them, do rely on common sense +and vigilance. And I do think it is up to us to continue to +make that easier for our customers in this country and around +the world. + Ms. Norton. [Presiding.] The gentleman's time has expired. +Next is Mr. Higgins of Louisiana. + Mr. Higgins. Thank you, Madam Chairwoman. It is our +understanding that Russia is responsible for this cyber +espionage. They utilized some of our own publicly available +hosting services to orchestrate these illegal actions. In my +opinion, all server hosting companies, large and small, share a +responsibility in vetting their clients, and then also play a +part in preventing foreign interference in their operations. +There is no daylight between private operations and government +operations in the cyber realm. We have to work together to +secure our systems for the citizens we serve. This was a direct +attack on our Nation's technology infrastructure on a scale +never seen before. Eighteen thousand SolarWinds customers +compromised and many more thousands of systems breached in the +private and government sectors. Russian cyber espionage gained +full access across thousands of systems for a number of months. +I think it is important to note that this is not the first time +that the U.S. Government and private American cyber systems +have been subject to major cyber espionage from Russia. + Many years ago, two Administrations ago, the Kaspersky +systems were approved on the GSA catalog. That security system +was brought into Federal cyberinfrastructure. In 2015, it was +identified as being used to steal NSA tools. In 2017, it was +finally banned and removed from the GSA list. There are reports +as recent as 2019 that Kaspersky software lingers in the +government system, and beyond that, Kaspersky had a deal with +Best Buy to preload on every computer they sold. Thus, they +infiltrated the private systems at the same time. So, I have +been listening to the testimony and the questions from my +colleagues. None of us should be surprised about this, and I +believe we should be more prepared than we are right now. + Mr. Thompson, I have a question for you, sir. Is it true +that you received a 23-page PowerPoint presentation from a +former SolarWinds security advisor that listed potential +SolarWinds breach vulnerabilities and suggested improvements +needed to bolster security? Did you receive that briefing in +2017? And if you did receive that briefing, what did you do +about that, good sir? + Mr. Thompson. Yes. I believe that we have really taken the +security of our customers and our products seriously over the +history of the company. We have got a unique relationship with +our customers where we are very engaged with the individual +users of our products. And so this---- + Mr. Higgins. Pardon me, Mr. Thompson, but that sounds like +an answer prepared by attorneys. It is a simple question, +respectfully. Did you receive this major briefing in 2017 that +I am referring to? Did they recommend changes, and did you +enact those changes? + Mr. Thompson. So, it is my understanding, based on our +investigation, that there was a briefing provided to some of my +IT leadership team, and that that briefing was about security +posture in general and about what the company could do to make +sure that its security posture was enhanced and to make it a +leader in security. And, yes, not as a result of that +presentation, but beginning even before that, we began to +invest in security and enhancing the posture of our security +environment. In fact, we spent more than the average technology +company of our size over the last four years on security. So, +we have taken security very seriously, but not really as a +reaction to that presentation because we knew security was +important before that, and we were focused on it. + Mr. Higgins. I appreciate your response. My time is winding +down. Mr. Smith, can you quickly address the cloud hosting +systems? It has been reported that threat actors in this breach +leveraged servers from Amazon Web Services. Can you talk about +what we can do to protect our cloud systems from further +espionage efforts? + Mr. Smith. Well, I am obviously not in a position to speak +on behalf of Amazon or AWS. I do think we should take more +steps. We certainly are always taking more steps in Microsoft +to ensure that our cloud services, to the extent possible, +cannot be used by a foreign adversary. I actually think it +should start with transparency. I am here today. I am answering +all your questions. Microsoft has published 32 blogs since this +came to light. Amazon has yet to publish its first. So, I think +we will all benefit if we create a culture where tech companies +are sharing more information. + Mr. Cooper.[Inaudible] for that point, Mr. Smith. Madam +Chair, my time has expired. I yield. + Ms. Norton. Yes, the gentleman's time has expired. I +recognize Ms. Clarke of New York. Go ahead, Ms. Clarke. + Ms. Clarke. Yes. Thank you very much, Madam Chair. I just +wanted to, first of all, thank our panelists today for +appearing before us. I currently serve as the chairwoman of the +Cybersecurity Subcommittee, and I want to be perfectly clear +that as a Nation, we cannot let this happen again. SolarWinds +was but the latest malicious cyber campaign against our +country, and it will not be the last. We certainly must hold +the perpetrators of these attacks responsible, but we also must +bolster our defenses so that they can't succeed in the future. +So, my question is for Mr. Smith and Mr. Ramakrishna. + Earlier this week, you both expressed your support for +requiring critical infrastructure owners and operators to +report cybersecurity incidents. Again, as the chairwoman of the +Cybersecurity Subcommittee, this is something my subcommittee +has been working on for some time. In fact, the House-passed +version of the Fiscal Year 2021 NDAA included language that +would require critical infrastructure entities to report cyber +incidents to CISA. Unfortunately, that language fell out during +the conference, but I intend to take a close look at this issue +again, and I am heartened to see that there is so much momentum +behind this. + As anyone that has been working on this issue for a while +knows, the devil is in the details. We need to figure out who +would be subject to reporting requirements and what kind of +incidents would trigger the requirement report. We also need to +determine who they are reporting incidents to, whether that is +CISA, a new agency modeled after the NTSB, or someone else. And +finally, we need to decide what our ultimate goal is, holding +companies accountable or are we just trying to get a better +understanding of why our security controls fail. So, to the two +gentlemen, can you elaborate on the reasons you believe we need +a cyber incident reporting requirement and some of the benefits +you expect to flow from such reporting? + Mr. Smith. Well, I would say we really appreciate the +leadership that you have been bringing to this, and I think you +provided a checklist of some of the most important questions +that need to be answered. But to address the one that you posed +at the end, which perhaps is the most important of all, what +are we trying to accomplish, I think our top priority is to +make the country more secure. And the reason that we should +want companies in the private sector, companies that, as you +mentioned, are in the area of critical infrastructure, it is to +provide information about threats so that one entity is in a +position to scan the entire horizon and connect the dots +between all of the attacks or hacks that are taking place. + I think Kevin Mandia who described it really well earlier-- +you know, you really cannot oftentimes determine exactly what +is going on until you connect all of those dots, and today, +this information is in separate silos. So, I would say let's +solve the problem that needs to be solved, which is the +cybersecurity protection for the country. + Ms. Norton. Mr. Ramakrishna? + Mr. Ramakrishna. Congresswoman Clarke, thank you again for +your leadership and for your question. Having a single entity +to which all of us can refer to will serve the fundamental +purpose of building speed and agility in this process. Too much +time is wasted in communicating across agencies where +information is very fragmented, and oftentimes the dots are not +connected because they are separate. That is the fundamental +reason why I think having a singular agency to which all of us +can communicate to and have two-way communication with them is +fundamental to improving our speed and agility around these +topics. + Ms. Clarke. We have a few seconds left, but I would be +interested in your thoughts on how Congress should scope this +new reporting requirement. Who should it be subject to, who +should be required to report, and who within the Federal +Government is best positioned to receive and make use of such +reports? + Mr. Ramakrishna. Congresswoman Clarke, you mentioned CISA a +few times. We have been engaged with CISA and other government +agencies. We are also offering our human resources to work with +CISA as well. That could be an initial starting point, and +obviously you are more qualified to decide if that is the +established entity to take this on and going public. So, our +belief is all private enterprises should be instructed with +reporting requirements and be made part of this community +vision where public and private sectors can work together to +tackle this issue. + Ms. Norton. The gentlewoman's time has expired. + Ms. Clarke. Very well. I have run out of time. I yield +back. I look forward to our conversation as we continue to +address this issue. Madam Chairwoman, I yield back. + Ms. Norton. I thank the gentlelady from New York, and I +call on Mr. Norman of South Carolina. + Mr. Norman. Thank you. Two of the most, I guess, disturbing +things that I have heard this morning during this testimony is, +one, that it took nine months, that the Russians or whoever was +involved had access to our most valuable intelligence. And I +agree with Congressman Lynch: our next hearing ought to be with +those that can answer the questions, what has been compromised, +because national security is at risk. The other thing that +really has shocked me is, Mr. Smith, your testimony that, +really, we are at a shortage of cyber experts to connect the +dots. I guess my question, we can't wait to train somebody out +of high school, college, junior college. What group can we go +to? Is it those that have been successful at breaking the +system and are incarcerated, that are street smart, I guess, to +know how to get to making sure this doesn't happen again? Your +thoughts. + Mr. Smith. Well, I think it is a key question, and I would +point to two things that I think we can do to move faster as a +country. No. 1, really harness the power of our community +colleges. We don't need to send somebody back for four years of +education. You know, there is a set of eight or ten courses +that an individual can take over, say, a year or a bit more if +they want to go full time, or they can, you know, take some +courses while they are holding a full-time job. And I think +that is probably the fastest way for us to expand the +cybersecurity work force. + I think the second thing is really for us in the tech +sector ourselves. You know, we are doing more, we are investing +more, but I think we can and should do more, and, you know, +that is a good point of learning for somebody like me and for a +company like Microsoft. You know, we have LinkedIn. That is +part of Microsoft. And so, you know, it is an opportunity for +us to harness the power of, say, LinkedIn Learning and the +connections not just with community colleges, but with +employers. We are also focused on, you know, how we can add +cybersecurity curriculum to, you know, the training programs of +employers of all sizes so that if there is somebody who needs +to learn, you know, six extra things, they don't need to go +back to school. They don't even need to take a course to do it. +We can take the training to where they are, and we can build it +into their workflow on the job. That is something that we are +using our own technology to do. + So, I think this is a lot like anything. Once you +understand the importance of the problem, you can really +harness all of the available resources to address it. And I +think it is right that we make this one of the priorities that +comes out of this. + Mr. Norman. So, as a Member of Congress, what should we do +to get the Amazons on board? You know, you are one company. You +are a big company in Microsoft. But what can we do to get +private sector, the other large companies that, you know, +basically have monopolies, how do we get them activated, or +what is your advice to us? + Mr. Smith. Well, look, I am not the best person to give you +advice on how to get Amazon to do something. There will be +others who will be more insightful than me. What I would say is +if I were in your shoes and I really wanted to have the +broadest impact as quickly as possible, you know, I would look +at opportunities to provide, you know, incentives for +individuals who want to go study at community colleges so they +can do so. And I would look at, say, tax credits for smaller +businesses so that if they want to invest in the training of +their people, they can do that as well, so that you would +target, you know, the limited budget, the limited taxpayer +dollars to the places where they would have the greatest impact +in the shortest possible time. + Mr. Norman. Well, that is just what we need to hear, and a +lot of times in politics, we don't know what we don't know. We +are going to have to depend on y'all to give us a roadmap on +how we can do it. We simply cannot take another nine months to +let countries that don't have our best interests at heart +damage us, and I would be interested in anybody else, any other +comments any of the other panelists have, I would be interested +in. + Mr. Ramakrishna. Congressman Norman, if I may suggest one +area where the Congress may be able to help us also is by +encouraging us and incentivizing us to come forward with more +of these intelligence aspects and share them more broadly. In +addition to litigation risk, some of us may be worried about +reputational risk that it causes where the victim is victimized +for coming forward, and those should stop so that we can all +come together and really build our efforts to thwart these +major issues going forward. + Ms. Norton. The gentleman's time has expired. I will call +on Mr. Connolly of Virginia next. + [No response.] + Ms. Norton. Is Mr. Connolly there? + [No response.] + Ms. Norton. If Mr. Connolly isn't there, I am looking for +the next Democrat. Please give me the name of the next +Democrat. I think you are the next Democrat, sir. + Mr. Krishnamoorthi. Were you talking to me, Chairwoman? + Ms. Norton. Yes. Yes. + Mr. Krishnamoorthi. OK. + Ms. Norton. I am moving to you, yes. + Mr. Krishnamoorthi. OK. OK. Very good. Thank you so much +for all of you testifying today, and thank you for your +transparency and for giving us some very insightful +information. So, my first question is to Mr. Smith. Mr. Smith, +you gave an interview with ``60 Minutes'' recently, and in that +interview, you said that essentially the supply chain tech +attack was ongoing currently. One question I have right out of +the box is, are you aware of whether that malware and that +attack is potentially present on computers in the U.S. House of +Representatives? + Mr. Smith. We are not aware of this being focused on the +U.S. House of Representatives, so no. The answer is, no, I am +not aware of that. + Mr. Krishnamoorthi. How about the U.S. Senate? + Mr. Smith. I am not aware of any use of this tactic on the +U.S. Senate either. We have seen cyberattacks, you know, in the +past on members of the House and members of the Senate, and +whenever we have detected them, we have let either the +Sergeant-at-Arms or the Speaker or members know. + Mr. Krishnamoorthi. Sorry. My time is limited, Mr. Smith, +so I am just to ask you to respond briefly. + Mr. Smith. OK. + Mr. Krishnamoorthi. How about the Office of the President? + Mr. Smith. I am not aware of any attack using this vector +on the Office of the President. + Mr. Krishnamoorthi. Now, in that ``60 Minutes'' interview, +you also mentioned that perhaps the only way--because you have +to understand this. The way I kind of picture this is that it +is almost like the burglar is in the home while we are all +here. And one of the things that you said that really struck me +in your ``60 Minutes'' interview is that you said that perhaps +the only way to make sure that we get rid of this attack or +this intruder is to ``rip and replace every single piece of +network equipment and computer that may have been affected.'' +Do you still stand by that quote that you gave to ``60 +Minutes''? + Mr. Smith. Yes, I don't believe that I am the one who said +that. If I did, I referred to the thought that some have that +that may need to be done. I don't---- + Mr. Krishnamoorthi. OK. Let me stop you there for a second. +Have you done an assessment of what that might require? +Because, at the end of the day, we need a foolproof way to +eject the intruder from our homes. We cannot be in a situation +where the intruder has carte blanche espionage capability on +us. So, talk to me a little bit about that. What type of, you +know, effort would be required if we were to undertake that? + Mr. Smith. Well, we have not been asked to do it. To the +best of my knowledge, we have not undertaken an analysis of +what it would take to rip and replace all of the, say, +technology infrastructure of a particular agency or part of +government. It is actually not what I believe needs to be done. +I think that efforts are better focused on other approaches. + Mr. Krishnamoorthi. Well, here's my concern, which is, what +is the foolproof way to get rid of the intruder from our +collective home at this point, because we are tired of hearing +that the intruder is here. We have no idea what that person, +that intruder is doing, but we should just kind of move on to +the next subject. We need to eject the intruder from our +computers right now, whether it is in the private sector or in +the public sector. So, what is the foolproof way that would +come short of ripping and replacing all this network +infrastructure? + Mr. Smith. Well, I would say two things. No. 1, one always +needs to identify how someone got in or is getting in in order +to get them back out. So, you know, that is in the realm of the +kind of cybersecurity sort of forensic investigation that, you +know, a company like Microsoft can help with, a company like +FireEye does, you know, every day. You know, among the best, we +are the best in the world. That is one part. The second thing +is, there are five really straightforward cybersecurity steps +that we believe, put together, will strengthen protection +across the board: move authentication into the cloud, secure +each of your devices, ensure that you are using anti-malware +software across the board, use multi-factor authentication, +apply privileged access. If you do those five things following +a review by a company like FireEye, you should be in a much, +much stronger position. + Mr. Krishnamoorthi. I guess my final question is to Mr. +Ramakrishna. You know, you are the new CEO and you are coming +into a pretty bad situation. The NSA is not allowed to surveil +private networks. It is only allowed to surveil foreign +networks. Is the FBI and current agencies capable of doing what +is necessary to surveil private sector networks in the U.S.? + Mr. Ramakrishna. Congressman Krishnamoorthi, I wish I were +an expert in being able to give you a yes or no answer on that, +but I am not particularly qualified to address that. Does some +level of surveillance and sharing of information between +private and public sector need to happen at a level that is not +happening today? My belief is absolutely yes, but with regards +to surveillance, I am not the expert to address it. + Mr. Krishnamoorthi. Fair enough. Thank you. + Ms. Norton. I thank the gentleman for his questions. His +time has expired, and I call on Mr. Biggs of Arizona next. + Ms. Biggs. Thank you, Madam Chair. Because of the scope of +this attack, I am concerned. It looks like it may take years +before we fully understand its impact. Mr. Smith, my first +question is for you. How likely is it that these attacks are +continued, and, if so, how can we best determine who is still +being attacked? + Mr. Smith. Well, the first thing I would say is this +agency's attacks or hacks did not start with the use of +SolarWinds software, and it did not and will not end there. I +think we should assume that this is an agency, and this is one +of a relatively small number of very well-resourced governments +that are focused on these kinds of threats against the country +every single day, and they will be for the rest of our lives. +And so I think what we need to do is just continue to +strengthen the cybersecurity defense of the country, and we +need, in part, to couple that with the better sharing of threat +intelligence so that we are better able to spot the attacks or +hacks as early as possible after they begin. + Ms. Biggs. So, one of the concerns I have is that Congress +is going to say, well, let's just create another layer of +bureaucracy in there and then call it good. We will have done +something until the next time we have an episode like this that +we need to deal with. And I am wondering, and I will just turn +to all the panelists, real briefly if you would. Would you tell +us whether you see the solutions to prevent future attacks +coming from government, or are they going to come from the +private sector? So, let's start with Mr. Smith and then just +move on down the panel. + Mr. Smith. Well, I think we each need to play our role and +do it well. I think that the public sector, the government has +a unique role to play in establishing rules of the road, strong +laws and holding foreign governments accountable. I think the +government has a unique role to play, both in and securing the +government's own infrastructure and in collecting threat +intelligence in a centralized way and putting it to good use. I +think those of us in the private sector have an enormous role +as well. We need to continue to strengthen the technology. We +need to continue to make it easier for people to use the +technology. We need to share the information we have, something +that is not yet happening nearly to the extent that it needs to +happen across the tech sector. + Ms. Biggs. Thank you. Mr. Ramakrishna, if you would go next +please. + Mr. Ramakrishna. Congressman Biggs, I agree with my +colleague, Brad Smith's, comments here and the work that he, +and Kevin Mandia, and our colleagues at CrowdStrike and others +are doing. As it relates to your question, the picture I would +like to paint is, we are dealing with intruders, not an +intruder, in this case. They behave like Transformer toys in +many ways where they are constantly morphing and changing their +tactics and procedures on us. So, to that end, we have to be +nimble as well in working between the private and public +sectors, and shaping our policies and shaping our information +practices to adapt to this changing set of intruders and go on +the offensive. + Ms. Biggs. Thank you. Mr. Mandia? + Mr. Mandia. Yes, I agree with both witnesses, both Sudhakar +and Brad, on this one. It comes down to the government exists +to have a proportional response and deterrence. The private +sector will most likely be building the technology to safeguard +in cyberspace working with the government, and you meet in the +middle with the threat intelligence sharing. + Ms. Biggs. So, all of you at one point, either in answering +this question or other times today, have talked about +information sharing. I just want to know, are there any legal +or regulatory barriers to information sharing that you see that +currently exists? Back to you, Mr. Smith. + Mr. Smith. Well, I would say there are two barriers today. +The first is, it is not always entirely clear to whom we should +be sharing the information or sharing it with. But then second +is, the one thing that we have noticed that we have mentioned +publicly that is a legal barrier, is today, it is a fairly +standard aspect of Federal contracting practices that agencies +restrict a company, like Microsoft, from sharing with others in +the Federal Government when a particular agency has been hacked +in this way. So, one of the specific things that we had to do +in December was go to each agency, tell them that we had +identified that they were a victim of this. And then we had to +say, you need to go over to this person in this other part of +the government to let them know. Please do that. We cannot do +that for you. And the good news is that people did that. They +did it quickly. But I think it is a barrier that is an +impediment. + Ms. Biggs. In what little time I have left, I would urge +the chairs of these two committees to take us into a classified +hearing because I think there are some things, like, I would +like to know, how do we know it was Russia. I would like to +know what China's involvement was. A classified hearing would +allow us to get more of that information, and I would look +forward to that. And I thank all the panelists, I thank the +chair, and I yield back. + Ms. Norton. Well, that, I think, is certainly an idea. The +gentleman's time has now expired, and I call on Mrs. Watson +Coleman of New Jersey now. Mrs. Watson Coleman, you are +recognized for five minutes. + [No response.] + Ms. Norton. Mrs. Watson Coleman appears to have stepped +out. Mrs. Demings of Florida, you are recognized for five +minutes. + Mrs. Demings. Thank you so much, Madam Chair, and thank you +so much to those who are with us today. It has been a very good +discussion. As I listened to the line of questioning from Mr. +McCaul from Texas, those were particularly some areas that I +certainly was interested in. I believe during that line of +questioning, there was an indication that the malware was +hiding in plain sight, and I've also heard that in order to +keep up, that we have to constantly change and adapt and +improve, I guess, our capabilities. What I am particularly +interested in is a better understanding of how the transition +to iCloud services, like Microsoft, affects a customer's +visibility related to network activity. Although the cloud +environment was not the initial entry point for malicious +actors in this campaign, it is where they were able to access +data and proliferate through iCloud assets undetected for the +better part of the year. + So, Mr. Smith, have any of Microsoft's cloud customers +informed Microsoft that their cloud environment was accessed as +part of this campaign, or has Microsoft had to inform its +customers? + Mr. Smith. Yes, it is an excellent question. The first +thing I would say is the right way to think about what happened +here is that each and every one of these attacks, hacks, that +we have seen happened on premise, meaning it was on a server, +say, that was in the server room or onsite. Now, once the +attacker was in the network, one of the things it did was it +looked for the keys or the passwords to get into cloud +services, like email or documents, or other things. Once they +did that, then they were able to go up into the cloud and +access those kinds of cloud services. + Once they did that, we were able to see them because we +scan the services that we run every day with a specific eye +toward some particular threats. We have a Threat Intelligence +Center that does that. So, in each of the 60 instances where +there were Microsoft customers that were victims, we identified +that they were the victim and we notified them. We have a team +called the Detection and Response Team, DART. It is their +mission to every day take this kind of information and let +customers know if they are being victimized in this way. And, +yes, it is one thing that we do. I think it is something that +the tech sector more broadly needs to do. + Mrs. Demings. OK. Thank you so very much for that. And for +my kind of breaking it down as a former law enforcement +officer, I kind of liken what you just said as to a burglar +going around trying the doors. You are looking for that +unlocked door or the key, and then they are able to access, as +you just indicated. Can a cloud customer identify unauthorized +access to their Office 365 accounts with their own logs? Can +they do it themselves, the customers? + Mr. Smith. I think the short answer is, yes, they can do it +in a variety of ways. They can do it either by themselves or, +you know, some customers may want to rely on the help of a +third-party service provider, a cloud service provider and the +like, you know, that is working with them. So, yes, they don't +need to rely exclusively on the infrastructure or, you know, a +company like Microsoft to do that, but it is an added service +that we do provide both in terms of detection and letting +people know. + And then I will also say we also try to offer advice. In +some ways, what happened here was, you know, for example, it is +like leaving your keys on the kitchen table, and when you do +that, somebody can go steal your car, you know. The cloud may +be, in this case, you know, your email that they access. + Mrs. Demings. Right. And, you know, Mr. Smith, what bothers +me so much about that is we are talking about nine governmental +agencies, right? + Mr. Smith. Well, that is why we say don't leave your keys +on the kitchen table. + Mrs. Demings. Yes. Yes. Yes. + Mr. Smith. We give people advice and secure ways to store +their keys. + Mrs. Demings. What steps have been taken, finally? I have +14 seconds. What steps have been taken or discussions that have +taken place to really review the cloud environment logs and +prepare for the next breach? + Mr. Smith. Well, I think that work is ongoing. Any time +something like this happens, it should cause all of us to step +back and say what have we learned and how can we get better +because we continually must. We are definitely working through +an effort like that here at Microsoft, and, yes, I would hope +it is taking place at other companies in the cloud services +business as well. + Mrs. Demings. Mr. Smith, and to all of our witnesses---- + Ms. Norton. The gentlelady's time has expired. The +gentlelady's time has expired. I call on for five minutes Mr. +Van Drew of New Jersey. + Mr. Van Drew. Thank you, and I want to thank the chairs and +ranking members for doing this. This is good work. You know, +America is under constant attack from adversaries looking to +damage our businesses, our hospitals, our municipalities, and +critical infrastructure using cyber warfare. Like the witnesses +have already stated, we face serious threats from Iran, China, +Russia, North Korea, and other bad actors in the global +landscape. The SolarWinds campaign was a devastating attack +that showed how vulnerable we are to those types of attacks. +The integrity of our critical infrastructure is not as robust +as we thought it was. + The Federal Government needs to do better and so does the +tech industry. With close to 80 percent of Fortune 500 +companies utilizing SolarWinds technology, there needs to be +collaboration obviously between public and private entities to +protect America. We owe it to our constituents, our +municipalities, and our country to ensure that we are +adequately prepared for these harmful actions. + In my district, two years ago, the Atlantic County +Utilities Authority, located in Egg Harbor Township, New +Jersey, was the victim of a cyberattack. The Utilities +Authority reported an incident in which perpetrators gained +unauthorized access to sensitive data of customers. +Additionally, operational information was withheld as the +criminals demanded ransom. Fortunately, the overall function of +the Authority was minimally impacted, but the fallout could +have been far, far worse. I applaud the previous +Administration's efforts to increase our Nation's cyber +defenses and improve gaps in our framework, and I implore the +Biden Administration to take this issue seriously and +prioritize the safety and well-being of Americans. + For Mr. Smith, in your written testimony, you discuss +Microsoft's relationship with other technology companies and +their role in Microsoft's response to the attacks. How is +Microsoft's relationship with the Cybersecurity and +Infrastructure Security Agency, CISA, and do you feel we are +safe from future cyberattacks of this nature? + Mr. Smith. Well, I think it is an excellent question. We +feel very good about the progress that CISA has been making. It +is a young agency. It has moved far, and it has moved fast. It +is going to need, I think, to move farther and faster in the +future, and that will require additional resources as we +continue to build the role of CISA in protecting the country. I +also think it is just worth noting, your examples, I thought, +were so important because so often we see two things. We see +the most sophisticated cyberattacks begin with nation-states, +and then we see their tactics copied by cybercriminal +organizations, and then they go to the weakest point. And the +kind of ransomware attacks that you have experienced in your +district, they were experienced in Baltimore, in New Orleans, +by hospitals across the country. + And if there is one thing I consistently find today, it is +that many of the public sector computers and information +systems software, especially at the state and local level, are +not as modern as they should be. Just to give you one example, +one department of health at the state level that we are working +with on the distribution of vaccines, we went to help them +strengthen their work. And when our consultants looked at the +manual for the software program they were using, it was for a +company that Microsoft acquired more than 20 years ago, so the +software was more than two decades old. So, part of what I +think we need to do is strengthen CISA, but I think part of +what we need to do is really, across the country at the state +and local level, embrace the modernization of our IT +infrastructure, and, in so doing, embrace the modernization of +our cybersecurity protection. + Mr. Van Drew. So, thank you for a very good answer. Do you +know what they are doing with localities? Are they specifically +working? Like, I know, for example, in our utility, there was +ransom, the ransom was paid, it went through insurance, and +then they still didn't have a key to get them out. They +actually had to figure it out on their own. + Mr. Smith. Yes. No, that is often a problem. We oftentimes +work with hospitals and municipalities that have been the +victims of these kinds of ransomware attacks. There are times +when consultants like ours can go in and solve the problem, and +there are times when it is not possible because of the +effectiveness of the attack. I do think CISA does an important +job in providing advice, but this also comes down to really +state and local government budgeting for modernization, and, I +would say, decisionmaking so that you integrate the decisions +of the IT team with the needs of, say, in vaccines, the +epidemiologist, for example, that need the technology to help +them do their jobs. You know, we need to just think anew about +how we manage technology across the public sector. + Mr. Van Drew. Real quick. Are we going in the right +direction? + Mr. Smith. We are going in the right direction. We need to +move much faster. + Mr. Krishnamoorthi.[Presiding.] Thank you, Mr. Van Drew. I +would like to now recognize the distinguished gentleman from +Virginia, Mr. Gerry Connolly. + Mr. Connolly. Thank you, Mr. Chairman. Can I be heard? + Mr. Krishnamoorthi. Yes. + Mr. Connolly. Thank you. I want to talk about threat +hunting and cyberdefense, and I am going to ask all the +witnesses when I pose a question to be as succinct as you can +because I have a lot of them. Last month, Mr. Ramakrishna +announced SolarWinds intends to increase threat hunting +capabilities to bolster the company's security. Mr. Thompson, +did SolarWinds routinely employ threat hunting before the +discovery of the attack in December? + Mr. Thompson. We had a number of security defenses at the +company before the discovery of the SUNBURST malicious code. +So, we leveraged a lot of the technologies that other companies +leverage, and I think that we were doing more than the average +software company to protect our environment. + Mr. Connolly. The question was threat hunting capabilities +specifically. + Mr. Thompson. And I don't recall whether we were doing +threat hunting specifically. + Mr. Connolly. Mr. Smith, Microsoft provides threat hunting +as part of its cybersecurity services. Why did Microsoft's +threat hunters fail to discover the SolarWinds compromise? + Mr. Smith. We do have a large number of threat hunters. I +would say we did not detect this intrusion as quickly as we +might because, first, it was very limited on Microsoft's own +network, and second, until we heard from someone else, like +FireEye, you know, we didn't have the specific threat to hunt +for. You know, it is definitely a capability that we are +continuing to invest in to expand at Microsoft. + Mr. Connolly. Has Microsoft learned any lessons from its +investigation of the compromise that could improve hunting for +this type of threat in the future? + Mr. Smith. Absolutely. I mean, I think whenever something +like this happens, we need to learn a lot, and you need to take +a little bit of time and let the dust settle. You know, there +is the kind of threat hunting that needs to take place every +day, and that includes the work of our Threat Intelligence +Center to scan the horizon. I think one of the things that we +learned is when you have an adversary that is this focused, +this determined, and this well-resourced, there will be major +cyber incidents that require you to expand overnight the number +of individuals who are engaged on response or threat hunting. + We did that in this instance. We expanded to more than 500 +engineers who were pretty much on this 24 by 7, but we are +asking ourselves how we build the capability in the future to +grow to even a larger number if that is what we need to do. + Mr. Connolly. OK. I am sorry. I am going to run out of +time, but let me ask one more question in this series. How can +the government support private companies that have been engaged +to threat hunt on Federal networks? + Mr. Smith. Well, I think the single most important thing +the government can do is create a centralized point of intake +so the threat intelligence, the information that is found from +threat hunting, can go to a central place, but there is a +second step that is needed as well. The government then needs +to decide when and how to share information it is finding back +with companies, like FireEye or Microsoft, so that we can act +using that information in an appropriate way. + Mr. Connolly. The National Defense Authorization Act +provided cybersecurity agencies with increased authorities to +do threat hunting across the Federal civilian networks. Do you +believe those provisions in the National Defense Authorization +Act would do what you just suggested? + Mr. Smith. I think the NDAA that was just passed goes far +in adding additional tools and layers of protection. I think +there is more that we need to do to add to what was passed last +year. In this area of, you know, information about threat +intelligence, I think, you know, this is a specific topic that +it is good we are talking about here. I think it is an area +where additional legislation would be helpful. + Mr. Connolly. Mr. Ramakrishna, you indicated, in response +to Mr. Langevin, three theories you have about the attack, but +the third one intrigued me, that you were a victim of supply +chain attack. What is the evidence to support that? + Mr. Ramakrishna. Congressman Connolly, my point on the +third hypothesis that we laid out was a potential vulnerability +in a third-party software that we are deploying at our company. +So, I wasn't referring to necessarily a supply chain attack on +a third party as much as a vulnerability that we are yet to +discover. + Mr. Connolly. And my final question is to Mr. Mandia. Based +on your experience in the Air Force and the Pentagon, what are +the limitations from your perspective about threat hunting when +used by the Federal Government, and then I will yield back, Mr. +Chairman. + Mr. Mandia. First, I think threat hunting is something that +is probably a decade old. Not every company does it. We are +talking about an attack that impacted 17,000-plus +organizations, and nobody detected it until we reversed the +whole thing. So, you are going to see threat hunting gain in +popularity, but it is a high-skill-set thing. Government +agencies that we have worked with are well trained, can conduct +threat hunting, and I think it is all about authority. Do they +have the authority to do it or not? + Mr. Connolly. Does the NDAA give broader authority? + Mr. Mandia. I am not prepared today to speak to that. I +haven't read the whole document. + Mr. Connolly. Maybe you could get back to us with that for +the record. + Mr. Krishnamoorthi. The gentleman's time has expired. + Mr. Connolly. Thank you, Mr. Chairman. I yield back. + Mr. Krishnamoorthi. Thank you, Mr. Connolly. Now I would +like to recognize Mr. LaTurner from Kansas. Mr. LaTurner, you +are on the clock. + Mr. LaTurner. Thank you. My question is for Mr. Smith, and +I would like to discuss cyber deterrence as it relates to the +private sector. This is a discussion that you had some on +Tuesday, but I want to talk about the frustration that does or +does not exist in the private sector that the U.S. Government +just isn't doing enough to deter these attacks. Could you speak +to that? + Mr. Smith. I think that there is a need for additional +deterrence or accountability measures, and I think it probably +needs to fall into three categories. First, in certain areas, +there is an opportunity to strengthen the rules of the road +and, in particular, with respect to three issues: something +that puts this kind of software supply chain or hardware supply +chain disruption off limits, especially for these kinds of +disproportionate and indiscriminate attacks; second, something +should put attacks on hospitals and the public health service +off limits; and third, it should put attacks on the electoral +system off limits. That is step one. + Step two, I think we then need a consistent government +policy that says that when these lines are crossed, the +government, whenever it finds sufficient information, is going +to have public attribution, and that public attribution, where +possible, should be with our allies as well so it has +multinational effect. And third, the government needs a set of +tools so that there are consequences for when these lines are +crossed. + Attribution is the first step, but there may be instances +where there are sanctions. There may be instances where there +are other steps. I think this is fundamentally a question for +the government itself, but it is like anything. If you catch +somebody who is engaged in an offense, you need to hold them +accountable, and you need a variety of ways to do that. + Mr. LaTurner. I appreciate that, and I want to talk about +information sharing and how that can enhance the ability to +address some of these threats. And specifically, does Microsoft +contracts prevent you from sharing threat intelligence with the +government? What kind of restrictions does that put on you? + Mr. Smith. Well, the government's contracts impose +restrictions on Microsoft and other government contractors in +this kind of situation. So, that was the specific limitation +that we encountered when we wanted to notify different parts of +the U.S. Government of what we were seeing. And we found that +we could only inform the agency that was the victim itself, and +we had to ask them to go talk to another person, or individual, +or part of the government, which they did. But it struck us as +a barrier that is not serving the government itself very well. + Mr. LaTurner. But no issues with private sector contracts. +Is that what you are saying? + Mr. Smith. No. I mean, it is very interesting to me how +varied the practice is across the tech sector. At Microsoft, +when we see one of our customers that are attacked, I think it +is our first responsibility to let the customer know. We have +done this more than 13,000 times in the last two-and-a-half +years with nation-state attacks, and yet there are other +companies that, to the best of my knowledge, have not even +alerted their customers or others that they were a victim of +the SolarWinds-based attack. These are companies where their +own infrastructure was used to launch the attack, and somehow +they don't think it is part of their responsibility to let +these victims know that they are victims. And that needs to +change, and it needs to start in the tech sector. I think we +need to come to terms with this. + Mr. LaTurner. Thank you for your testimony today. Mr. +Chairman, I yield back. + Mr. Krishnamoorthi. Thank you very much, Mr. LaTurner. +Congresswoman Kelly? + [No response.] + Mr. Krishnamoorthi. Congresswoman Kelly? + [No response.] + Mr. Krishnamoorthi. Congresswoman Kelly, can you hear me? + [No response.] + Mr. Krishnamoorthi. Robin? She just responded. +Congresswoman Kelly, you are recognized for five minutes. + Ms. Kelly. Oh my goodness. I can't believe it. OK. Let me +get the thing up. Thank you so much, Mr. Chair, and thank you +to the witnesses. Can you hear me? + Mr. Krishnamoorthi. Yes. + Ms. Kelly. OK. The SolarWinds hack reflects a disturbing +new paradox for the security of U.S. computer and information +technology systems. Regular software updates and patches are +often critical for correcting known vulnerabilities and +preventing cyberattacks. Many of my colleagues will recall the +March 2017 Equifax data breach that resulted in the loss of +massive amounts of personal and sensitive data. In that case, +the hackers exploited a widely known vulnerability that should +have been patched several months earlier. Mr. Mandia, can you +tell us why regular software updates and patching is important +for protecting an individual or a business's systems and +networks? + Mr. Mandia. Absolutely. When you are patching, what you are +trying to do is close the window of vulnerability, period. You +know, software, there is always first-to-market versus secure- +to-market, and a lot of times it is hard to find security +imperfections in software ahead of time because it is hard to +predict the thousands of different ways people may use your +software. So, I have heard people say building software is like +building a bridge. It is not. Bridges follow the laws of +physics. Software does not. But the bottom line is this: there +is always a gap between what attackers can do and the +capability and the safeguards that we have. When you get a +patch, the faster you patch it, you are reducing your window of +vulnerability. + Ms. Kelly. Thank you. In the case of SolarWinds, a software +update itself, a trojan horse, ended up installing malware on +the victims' computer networks. I am concerned that at a time +when regular software updates are as important as ever, the +SolarWinds attack might deter individual customers and systems +administrators alike from installing needed software updates. +Mr. Mandia, what would you say to customers or systems +administrators who may be concerned or reluctant to download +updates or patches for software for fear that updates might +contain malware? + Mr. Mandia. Well, I can tell you even in the SolarWinds +breach, we have to remember the funnel. Over 17,000 companies +were stage 1 victims, but the attacker only accessed 100. This +was a manual attack, not an automated virus. There is a human +on a keyboard. This is a threat group that doesn't target +everybody all the time, so the risk is far less based on the +constraints that the hacker had or the attack group had based +on manual labor. The bottom line is everybody is now +recognizing the rules of the road are that foreign intelligence +services are hacking the supply chain, and everybody is +wondering is there another implant in some other software. So, +I think that there is going to be more inspection, where the +capability to inspect exists, for all updates on a go-forward +basis, and the industry is going to change both how software is +created and how software is vetted. + Ms. Kelly. Thank you so much. Mr. Ramakrishna, SolarWinds +has reported that the company has 33,000 Orion users. You later +identified that 18,000 had downloaded an effective version of +Orion during a three-month period. My question is, customers +have to manually download updates from you, correct? + Mr. Ramakrishna. Congressman Kelly, that is true, yes. + Ms. Kelly. This would suggest that just over half of your +customers downloaded an update during three months, to say +nothing of whether or not they actually installed it, correct? + Mr. Ramakrishna. That is correct. + Ms. Kelly. And then at the same time, the customers that +did download the update exposed their systems to this malware. + Mr. Ramakrishna. That is a potential, yes, Congresswoman. +As Mr. Mandia described it, once the patch with the affected +code is installed at a customer site, in certain installations, +not everywhere, not in every place, they try to connect back to +essentially their home server to see if they can actually get +connectivity and then potentially start doing some things +manually to break through the defenses once they have gotten +in, which is---- + Ms. Kelly. OK. I got you. Mr. Smith, let me turn to you +quickly. Does it concern you that users may think twice about +downloading an update, and can you explain? + Mr. Smith. I think it should concern us all. I think Kevin +Mandia put it well. I mean, I do think that this will +strengthen the process that is used to build and vet software, +but I would still say the message to the consumers of America +should be clear: you are far safer if you update your software. +It is a little bit like thinking---- + Ms. Kelly. And what---- + Mr. Smith. Well, one seat belt may have a defect, but you +should still put on your seatbelt. You are going to be far +safer every day if you update your software. + Ms. Kelly. Thank you so much, and thank you to all the +witnesses. And I yield back the balance of my time. + Mr. Krishnamoorthi. Thank you, Congresswoman Kelly. Next, I +would like to recognize the gentlelady from Tennessee, +Congresswoman Harshbarger. You are on the clock. + Mrs. Harshbarger. Thank you, Mr. Chairman. I guess I just +have a statement first, and then I will go into a question. +Since we don't know how the malicious code was inserted into +the software updates, which is unbelievable, and several of you +have said that the U.S. Government needs a national strategy to +strengthen how we share threat intelligence between the U.S. +Government and the private sector, you know, we are constantly +patching and adopting continuous updates, and it has been a +standard of cybersecurity best practices measures for years. I +guess I was looking at testimony from Tuesday, and, Mr. Mandia, +in your testimony, you mentioned that the adversary was able to +disarm some of your sensors as part of the intrusion. Can you +tell us what you mean by that? + Mr. Mandia. Absolutely. When the implant in the SolarWinds +software ran, one of the first things it did, 11 days after it +installed--mind you, it slept for the first 11 days--is it +looked at the system it was running on, and it looked for +common safeguards, like Windows Defender, like CrowdStrike, +like FireEye's Endpoint, and it shut them off. And, again, the +implant ran at system level. It had the permissions to do +whatever it needed to do, so it just said, ``What security is +running? Kill it,'' and that is why we couldn't detect it in +the first stage of the attack. + Mrs. Harshbarger. Thank you for that. Also, Mr. Smith, in +your testimony on Tuesday, you said that while the adversaries +had gained access to your source code, you don't consider the +code to be particularly sensitive. And I guess from media +reporting, it has been suggested that this effort by the +adversary allowed it to exploit the identity and authentication +features of Microsoft in other breaches of entities. Can you +tell me a little bit about that? + Mr. Smith. Yes, there are two different concepts in your +question. I mean, first, you know, we share our source code +broadly. We share it with all of our employees, and the secrecy +and the security protection of our technology is not based on +the secrecy of the code itself. We live in a world where, you +know, much code is published, you know, to the world on the +internet in open source form. The second part of your question +then goes to, you know, our services overall, and I would say a +couple of things. In no instance did we identify any action or +case where anyone was able to use Microsoft's services as a +vector of attack, as a means to attack any other customer. +There are, you know, discussions that, you know, have ensued, +rightly so, about the use of some industry-standard approaches +for the authentication of accounts. Microsoft, like everybody +in this business, supports these industry-wide standards. One +of the standards, in particular, is 13 years old. It is called +SAML. + It has been superseded, in our view, by something we have +been encouraging customers and developers to move to since, but +there was a vulnerability, so to speak, in SAML that was +exploited in a small percentage--and I think that is important +to underscore as well--a small percentage of the instances that +we saw. And it was only exploited after someone had already +basically gotten elevated privileges, for example, by stealing +a key or breaking a password. But nonetheless, I think this is +quite rightly raising questions, how do we address this issue +in the future. We are focused on that. Others are focused on +it. I do think it is something that we will want to continue to +work to address. + Mrs. Harshbarger. You know, honestly, coming from the +private sector to the government sector, you know, we trust +that those apps that we are installing, those updates on our +Apple phone, on our watch, on anything that we do in a business +environment or the government environment, we assume that it is +safe because it has been vetted. I guess my question is, how +can we be assured in the future that these software updates are +going to be safe, and, in your best estimate, you know, how +soon are we going to be attacked again, I guess is my question. +We update every day something, and that makes me a little +fearful going into the future. + Mr. Smith. Well, I think there are two things that we need +to do to better secure this kind of software updating. The +first, as Kevin Mandia was saying before, is we are going to +need to work with everyone who creates software to secure what +is called their build process and to vet the software that is +built. You know, at a company like Microsoft, we have an +extraordinary range of controls to address that, but, you know, +software is being built by companies and other organizations, +large and small. And second, I think this is why it is so +important for the government itself to send a message to the +world that this type of indiscriminate and disproportionate +tampering with the software supply chain is a violation of +international norms and rules, and there will be accountability +when foreign governments do this. + Mr. Krishnamoorthi. Thank you. The gentlewoman's time is +up. + Mrs. Harshbarger. Thank you, Mr. Chairman. + Mr. Krishnamoorthi. Let me now turn to Congressman Eric +Swalwell, the distinguished member from California. You are on +the clock. You are muted. + Mr. Swalwell. Thank you, Mr. Chairman. Thank you, +panelists. This attack, I think it is pretty clear, was done by +Russia, likely its intelligence services. That is what public +reporting has shown. So, Mr. Smith, we know that Russia does +not have much use for economic espionage. They are just not a +country that is stood up in a way that they can benefit like +our other adversary, China, who commits economic espionage +every single day. However, this attack does touch not only on +public-sector networks, but also private-sector networks. How +much worse could this have been if an adversary, like China, +had gone as far down the stack as Russia? + Mr. Smith. I don't know that I have the best answer to that +question. I guess I would say we need to recognize that we live +in a world where there are multiple governments that are +investing in these kinds of cyber intrusion capabilities. They +may act based on different motives, and they may use what they +obtain for different purposes, and we do see that in a somewhat +diversified way around the world. I guess you could say, you +know, it can always be worse. It could have been worse, and +obviously it could have been much better. I think the most +important thing is that we learn from this, recognize that it +is a dangerous world in which we live, and we are going to have +to strengthen our defenses. + Mr. Swalwell. Mr. Smith, earlier my colleague, Mr. +Krishnamoorthi, who is also on the Intelligence Committee with +me, asked you whether the House of Representatives, Senate, or +Office of the President's systems had been penetrated that had +Microsoft platforms, and I believe you said no. How about in +the last election cycle, in the current cycle we are in? +Microsoft was quite helpful in actually being the first to +report that, I think, some campaigns had been breached even +before the U.S. Government had told Congress. Have you seen any +recent attacks against members of the House or the Senate and +against their campaigns? + Mr. Smith. I am not aware of anything since the last +election ended. That doesn't mean that there hasn't been +anything, but nothing has crossed my desk. You know, we +certainly did see a series of intrusions, hacks, attacks, if +you will, during the last electoral cycle, as you mentioned. +You know, we did bring that information forward. You know, we +have created an offering called AccountGuard that we provide +free of charge to every Member of Congress, every political +campaign, to think tanks, to the political parties, if they are +using Office 365. We provide this at no additional cost, and +what we do is employ our Threat Intelligence Center to +constantly look for these kinds of attacks and then let people +know if we find something, and we do that immediately. + Mr. Swalwell. Thank you, Mr. Smith. Mr. Ramakrishna, you +alluded earlier that you believe that having some sort of, not +incentive, but safe harbor to disclose breaches would likely +result in more cyber companies or companies writ large +disclosing breaches. Can you elaborate on that? How could we +make sure that, one, consumers are able to hold companies +accountable if there is a breach that the company was +responsible for, but that we would still be able to see +companies disclose breaches early to protect consumers? And I +think in tort law, for example, you know, if your restaurant is +being sued because a deck collapsed and the restaurant took +measures to fix the deck, they could still be sued for the +injuries of the deck collapse, but it could not be used against +them if they sought to fix the deck collapse. Can you just talk +about how can you make sure consumers are protected, but +industry is still disclosing and has an incentive to do so? + Mr. Ramakrishna. Congressman, thanks for that question. +Where we are coming from on this topic is that, as companies +discover malware and other vulnerabilities, the fact of the +matter is no matter how many resources any one of our companies +have, no matter what level of controls we have, all of our +software has some form of vulnerabilities or another. When we +discover those, we should be able to not only fix them, but +also share them with others such that each one of us are not +discovering the same issues over and over again and, in that +process, losing time. So, where we are coming from is the early +disclosure so that we don't have to repeat the same situation +over and over again, both at the customer level as well as at a +software supplier level, must be eliminated. + So, the challenge here is one of potential litigation and +one of, as I described it, victimizing the victim itself for +coming out. And those are things that need to be eliminated or +those stigmas need to be eliminated for more of us to come out +and speak openly. Obviously, today, three of us have come and +spoken about it. We should get more vendors and more customers +to speak up so that we can together solve this problem. It is +not purely one of resources. It is one of how resources use +information and share it for our collective benefit. + Mr. Swalwell. Thank you. I yield back. + Mr. Krishnamoorthi. Thank you so much, Mr. Swalwell. Next, +I would like to recognize the gentlewoman from Iowa, Mrs. +Marionette Miller-Meeks. + Mrs. Miller-Meeks. Thank you so much, Mr. Chair. I want to +also thank the extraordinary knowledge of our witnesses' +testimony. And also, as a former Army veteran, or as an Army +veteran, I want to thank Mr. Mandia specifically for his +service. This is a tremendously important hearing, and as I +have listened to the testimony of our witnesses and both the +insightful questions from my colleagues and the answers +provided by our expert witnesses, I am reminded of pulling a +single thread which then unravels an entire garment. You know, +we are all a weak link in this system. + So, like many people, I am a doctor. I interface with a +hospital system and have protected health information that I am +concerned about and concerned about my own financial +information. But when I have to change my password every two +months and when I have to do my security training every year, I +perceive it as a nuisance, and I don't think I am alone in +that. However, what you all have brought to our acute awareness +and alarm, we are all each individually a weak link as we +interface and interact both in our private lives and with state +and Federal Governments. + So, Mr. Ramakrishna, as the CEO of SolarWinds, and, +granted, only a very brief time, and I can only imagine coming +into an organization as the CEO with this overhanging your new +tenure, you have been very forthright about some of SolarWinds' +security culture challenges from the past and how you have +leaned into improvements to the security culture, particularly +around software development practices. We need to use events +like these as collective learning moments to raise the overall +tide level for everyone. The stakes are just too high to stand +idly by. What role do you think companies like SolarWinds have +to use their experiences and past challenges to promote better +practices ecosystem-wide? + Mr. Ramakrishna. Congresswoman, thank you for your +question. We take our obligation to be a very active +participant in this. While we were subject to this attack, we +have learned a lot as well, and I will elaborate on one +specific thing. I am happy to elaborate further as you please. +As it relates to supply chain, one of the key challenges that +we have uncovered as part of this attack is, typically all of +us as software vendors use our certificate to sign the product +that we deliver as the mark of integrity of the software that +we deliver. Obviously, in this particular unique supply chain +attack, that mechanism is not sufficient. + So, one of the improvements that we are making, which we +are also publishing both to CISA and others as well as our +industry colleagues, is a different way and an enhanced way of +building software that gives more confidence and trust to +customers as to how it needs to be done that does not only rely +on age-old ways of signing with our certificates, and instead, +having parallel build environments that are managed and +accessed by different sets of engineers. And that is an +investment that we are making in that process to ensure that, +across parallel build environments, the integrity of what we +deliver is assessed and not compromised. So, that is a unique +way of doing things and an extended way of doing things based +on this very specific learning that we intend to publish +externally as well. + Mrs. Miller-Meeks. Thank you so much for that. And, Mr. +Smith, before my time expires, you alluded to this earlier when +you spoke about training your customers. And so do we need to +have more broad-based security training for all of us as +individuals, again, as we interact and interface with both +local, state, and Federal Government entities? As I mentioned, +it has been raised to my alarm that we are all a weak link, and +I am going to have better security measures going forward. + Mr. Smith. Well, I first want to say we really appreciate +the leadership you have provided in focusing on state and local +needs, and, you know, highlighting some of the kinds of +ransomware attacks in a place like Iowa, because I do think +that that really highlights that this happens in, you know, +every part of the country. I hope we don't need to ask every +individual as a consumer to, you know, suddenly spend a lot +more time than they do today. Our goal is to make it easy and +simple for individual consumers to simply, you know, turn on +something like Microsoft Defender and let it go to work. But I +think when we get to organizations--a hospital, a school, a +municipality, a state agency--you know, that is where we need +more personnel. We do need more training, and we are going to +need more tools, which we are absolutely committed to +providing. + Mrs. Miller-Meeks. Thank you so much. I yield back my time. + Ms. Norton. [Presiding.] We will take a recess at this +time. We are not through. Excuse me. There is somebody there +ready to go, so excuse me. I understand that Miss Rice of New +York is prepared to come forward at this time. Miss Rice, you +are recognized for five minutes. + Miss Rice. Thank you so much, and I want to thank our +witnesses today. This is incredibly enlightening at a critical +time. But I also want to thank my colleagues on both sides of +the aisle because the one message that I am getting loud and +clear is that we can be doing better. It is one thing to have +all of our witnesses here talking about what they are doing, +but we need to actually act as well. + So, Mr. Smith, a consistent theme in today's conversation +has been that the U.S. Government needs to improve and +incentivize intelligence sharing between Federal agencies and +the private sector. I believe that you have called for the +Federal Government, and forgive me, I had to + [inaudible] so I left for a little while. I don't know if +you addressed this. But you have called for the Federal +Government to impose clear cyberattack reporting requirements +on the private sector, and you have pointed to the EU's law +requiring digital service providers to notify authorities of +incidents as a model to follow. Would you consider the EU the +gold standard around the globe, and are there any other +countries we can look at to emulate what they are doing and +recreate it here? + Mr. Smith. Well, I definitely think we should learn from +what the European Union is doing. I don't know if I would call +them the gold standard, and there are others worth looking at +as well, and I should do some more homework and get you some +more examples. I think we need something that works for the +United States, and I think we can put something like that +together. Yes, I think we have had good conversation here on +some of the specifics. You know, it is not something that needs +to apply to everyone in the country, but it definitely should +apply, at a minimum, to, you know, those entities like my own +that are part of the critical infrastructure for the country +and that are obtaining this kind of information. I think we can +put together a gold standard ourselves as a Nation in terms of +reporting the right information to the right people as rapidly +as possible, and then I think, critically, sharing back the +right information in an appropriate way as well so that we are +better informed about what to look for. + Miss Rice. Well, I hesitate to speak for every one of my +colleagues on this hearing, but I, of course, stand ready to +work on that with you. Mr. Mandia, in a similar vein, you have +argued that the U.S. should establish a confidential +information sharing solution to encourage public/private +communication after breaches. And I believe you pointed to the +FAA's Aviation Safety Reporting System, which uses non-punitive +anonymous reporting to encourage the private sector to +communicate about threats. To your knowledge, do any countries +take a similar approach to encouraging the private sector to +identify and address threats? + Mr. Mandia. I think nobody does it exactly right. I have +seen a lot of nations go through a lot of different evolutions, +you know. I look at the U.K. They do a better job, in my +opinion, of private and public partnership. They have more +centralization of how they respond to incidents such as this. +You look at Israel, much smaller scale, but, you know, they +have their Iron Dome in how they approach threat intelligence +sharing there. + But my remarks were basically about if the threat +intelligence sharing is not confidential, then as a reporter of +threat intel, you have to get your arms around all the +liabilities first, and it just creates too much delay, too much +time, and the intel won't be actionable. So, I believe threat +intelligence needs to be shared quickly, and I think you can +define first responders in the industry, folks who respond to +unauthorized, unlawful, or unacceptable behavior. If you do +that for a living or provide those services and you see +something, you can report that very confidentially. You can +defend the Nation. You can get it to the right government +entities, and, quite frankly, let the company get their arms +around, ``So, what did we lose?'' + And realize this: a lot of disclosure creates fear, +uncertainty, and doubt that is unnecessary. Most organizations, +when they have a breach, lack the expertise to get a full scope +of what did we lose and what should we do about it. They can't +do it, and they are just going to scare the heck out of +everybody by saying, ``Hey, we had a breach,'' and everybody +goes, ``Well, what does that mean? What does it mean to me?'' +And it could just be a small thing, a small matter that doesn't +impact the consumers. So, every organization will need some +time. + Miss Rice. So, let me just ask you, Mr. Smith and Mr. +Mandia, you know, what we are talking about today shows a level +of human weakness and bad cyber hygiene. What steps could we +take here in Congress? I mean, I am calling for all of the +members to be required to have cyber education, which we are +not required to do. How can we improve our cyber hygiene at the +Federal level? + Mr. Smith. Kevin, do you want to go, or do you want me to +go first? + Mr. Mandia. Brad, you can go first. + Mr. Smith. OK. Well, I would say, first of all, I think +your question is very important in the sense that everybody +talks about technology, but, ultimately, it is always about +people. And I think what it really connects with is the need to +have, you know, consistent training, consistent implementation +of what we all recognize today, our best practices, and +ultimately an expansion of the work force in the cybersecurity +field so that we have more trained people who can support all +of the organizations and customers across the country. + Ms. Norton. The gentlewoman's time has expired. The +witnesses have asked for a 10-minute recess. They are really +entitled to that. This is a long hearing because there are two +committees meeting and asking questions, but we don't want it +to go on forever, so we will take a 10-minute recess at this +time. + [Recess.] + Ms. Norton. The committee will reconvene. We have a very +large set of members because there are two committees. This is +a joint hearing. That is why this is going on for so long. I +want to call on the next member on my list. It is Mr. Clyde of +Georgia. You are recognized for five minutes. + Mr. Clyde. Thank you, Madam Chairwoman. As a Navy officer, +a Navy combat veteran, I am quite aware that our military is +tasked with protecting our Nation, and we take that very +seriously and have been very successful in doing that for over +a century. But cyberattacks on our country are something that +literally can go right through whatever military protections we +have, and can affect especially our civilian population in ways +that can be devastating for medium businesses, large +businesses, and even small businesses. So, several of you have +said that the U.S. Government needs a national strategy to +strengthen how we share threat intelligence between the +government and the private sector. So, would each of you give +me an idea of how you would see this playing out? What role do +you see CISA playing to help support this, especially when it +concerns the private sector? And I guess we could start with +the CEO of SolarWinds. + Mr. Ramakrishna. Congressman Clyde, thank you again for the +question. In terms of CISA, there are a few things that we can +work with CISA on as part of a private sector entity. One is +CISA can essentially be the clearinghouse of all threat +information that is given to it by the public sector. That is +No. 1, and the converse is true from a private sector +information gathering standpoint as well. Once it has got a +coordinated set of information, it can take the responsibility +to disseminate it to all impacted and potentially impacted +parties as well. That will ensure that we are all coordinated, +that we are fast and agile in learning and responding. The +other major area that I would suggest is CISA can be a big +influencer in establishing best practices and disseminating +best practices across the entire value chain, not just in the +threat aspect of it, but in the standardization of it, such +that as things become more standard and more of us in the +private sector follow, then potential for leakage across +private sector entities is significantly reduced and +diminished. + Mr. Clyde. Thank you. I appreciate that. Mr. Thompson, any +comments from you, sir? + Mr. Thompson. Yes. The only thing I would add to what +Sudhakar said is I do believe that CISA has an opportunity, +based on where it sits in the government, to really coordinate +resources from both the private and public sector. I think as +private sector software companies, we would be willing to +dedicate some amount of resources to work with CISA in coming +up with cybersecurity strategies for both the private and +public sector. But someone is going to have to be the +coordinator of that, and I think CISA might be, if resourced +appropriately, be in the right position to be able to do that. + Mr. Clyde. Thank you very much. Mr. Mandia? + Mr. Mandia. Yes, not too much to add to that other than +when I think about intel sharing, if there is intel in, it +makes sense that it goes to a single entity and the government. +If there is intel out, that has got to be communicable to all +the technology companies that safeguard the Nation in the +private sector, public sector. And then there has got to be a +prioritization, that there is probably different industries-- +healthcare, utilities, telecom--that rise above some of the +others that you got to make sure abide by certain legislation +standards or regulations, and most of those are regulated +industries. But that is how I think about it: intel in, then +intel has got to get out, and then we get a Nation that can put +shields up a lot faster than it can today. + Mr. Clyde. Thank you. Thank you. And last, Mr. Smith. + Mr. Smith. Yes, I think these provided good perspectives. +The one thing I would add is, obviously this is a paradigm +where CISA would be responsible for the assessment of threat +data that is being reported domestically from companies inside +the United States. You know, at the same time, you still have +the NSA, which has this critical responsibility and role with +respect to data, that it is able to identify from outside the +United States. And then for the government as a whole, you need +to have, you know, both of these sources to get the full +picture of the threats to the country. + Mr. Clyde. OK. Thank you very much. We had quite a serious +ransomware attack in my district to a private company that +basically shut them down for five weeks and cost them almost +$10 million, so this is very, very important what we are doing +here. Thank you, Madam Chairwoman, and I yield back. + Ms. Norton. I thank the gentleman for his questions, and +his time has expired. I call on Ms. Tlaib of Michigan now. Ms. +Tlaib, you are recognized for five minutes. + Ms. Tlaib. Thank you so much, Chairwoman. Mr. Thompson, you +served at SolarWinds for 14 years, including 10 as its CEO, so +I just want to make sure it is fair to say that you know this +company better than anyone. I think Bloomberg News said two +former employees viewed your company's security lapses as so +significant that they said they viewed a major breach as +inevitable. So, one of those employees, Mr. Ian Thornton-Trump, +said that he warned the company in 2017 of security risks, but +found the company's executives were, and I quote, ``unwilling +to make the corrections.'' So, Mr. Thompson, I am sure you were +expecting this question, but, you know, did you all take +immediate action when these concerns were raised? + Mr. Thompson. So, I believe we have taken this security of +our customers, of our company, of our products seriously my +entire tenure at SolarWinds. I believe we have invested at the +appropriate level. In fact, over the last four years, we were +spending at a level meaningfully higher than the industry +average. + Ms. Tlaib. When did you all start investing in security? + Mr. Thompson. We have been investing in security since we +got here, but obviously that security investment has grown as +the company has grown. But if you look back to 2016, in 2016, +we really looked at the business. We looked at where it was, +and we began to invest at a higher level. We brought in a CTO +who had been a CIO for many years. In early 2017, we brought in +a very experienced CIO. We then added a VP of security who +deals with product security---- + Ms. Tlaib. And this all happened in 2016? + Mr. Thompson. In 2016 and 2017. + Ms. Tlaib. So, Mr. Thompson, is it true, and this is +something when the committee told me, I was kind of in +disbelief. If all that was going on, then why in 2019 it was +said that you could easily access your server by simply using +the password ``SolarWinds123?'' + Mr. Thompson. So, that related to a mistake that an intern +made, and they violated our password policies, and they posted +that password on their own private GitHub account. As soon as +it was identified and brought to the attention of my security +team, they took that down. + Ms. Tlaib. Yes. You know, it just doesn't, you know, invoke +a lot of confidence when many of us when we hear it is an +intern could have done that, and, again, that same password was +used to access your server. The other one, is it true that +SolarWinds did not create a role of a vice president of +security until 2017? + Mr. Thompson. So, we did not have a role for vice president +of security, but as I have said, we had a very sophisticated +CIO and a CTO who had been a CIO at a very large Fortune 500 +company, and we had a security team, and we had a security +process. We just didn't have a VP of security prior to that +day. + Ms. Tlaib. So, with all those people, two years later, +2019--I don't know if they were in place--you know, how fast +did you fix the issue with the ``SolarWinds123'' password to +access your servers? + Mr. Thompson. As soon as it was identified to us, it was +fixed almost---- + Ms. Tlaib. Days, weeks, months? How long? + Mr. Thompson. Faster than days once we found out about it. + Ms. Tlaib. Well, it also has been reported that back in +October, another security company, Palo Alto Networks, raised +concerns with SolarWinds about--am I saying it right, Orion +product--based on behavior that they had observed, which is now +believed to be related to the cyberattack. What steps did you +all take to ensure that this issue was investigated, Mr. +Thompson? + Mr. Thompson. So, I will pass that to Sudhakar because I +have not been the CEO since December 31 of 2020, and there have +been a lot of investigation work done since then. So, I will +let Sudhakar respond to that. + Mr. Ramakrishna. Thank you, Kevin. + Ms. Tlaib. You got any interns messing up, Mr. new CEO? So, +I would love to hear about what you all are doing about these +concerns raised in October. + Mr. Ramakrishna. We heard about it from Palo Alto as a +possible victim of the malware that was delivered as part of +the Orion code and related issues. It wasn't about the security +hygiene or security posture of SolarWinds itself. In fact, we +are a customer of Palo Alto's, and we have 44 pairs of Palo +Alto infrastructure protecting us, not just from a firewall +standpoint, but also doing some threat hunting within our +environments today. + Ms. Tlaib. Well, I appreciate all of that. I just want my +colleagues to understand it is not only that we need to find +out what they were able to access, but the fact that, you know, +SolarWinds did have a weak security culture that, you know, ran +right up against this attack. And we need to acknowledge that +because, I mean, I understand that there was just a recent post +on LinkedIn for different security positions you guys may have +posted recently. And so I just really want to make sure that, +again, my colleagues, that we are all doing our due diligence +in regards to some of these companies that we contract out to, +to protect the privacy and protect our country from these kinds +of attacks. With that, I yield. Thank you so much. + Ms. Norton. The gentlewoman's time has expired, and I thank +her for yielding. Mr. Fallon of Texas is next. + [No response.] + Ms. Norton. Mr. Fallon, are you there? + Mr. Fallon. Yes, ma'am. Can you hear me? + Ms. Norton. I can hear you. You can proceed. + Mr. Fallon. Well, thank you very much, and I want to thank +the witnesses for bearing with us in a joint committee. I know +it has been a long day thus far. You know, what alarmed me when +I was reading through sourcing material was the fact that, and +it really got my attention, was the fact that the Secretary of +Homeland Security's own email had been compromised. Mr. Mandia, +thank you for your service to our country. I wanted to ask, in +your opinion, what would have happened and how much more damage +would or could have been done if your company hadn't discovered +this breach in December 2020? + Mr. Mandia. Well, you know, I think over time, people would +have come across enough smoke to find the fire, so it would +have been discovered in time and people would have connected +the dots. We just happen to be a forensic firm and, you know, +special ops met special ops. We responded appropriately with +the right skill sets, found the implant. In regard to what +could have happened, the attacker had unfettered access to over +17,000 different organizations and nobody saw it. So, this +attacker stayed laser focused on stealing specific information. +They showed, arguably, constraint, and they didn't do anything +destructive, but in reality, sir, it would have been easier for +this attacker to destroy data than do the operations that they +did. So, I think there was a range of options for the threat +actor to behave like, and they behaved in a manner to steal +emails and documents that they were targeted in collecting. + Mr. Fallon. Just to followup on that, if they chose to +start destroying data, would that have, in and of itself, kind +of raised red flags, and would they have discovered it then? Is +that the reason why they wanted to do that? + Mr. Mandia. I think there is a line of, you know, you are +going to start noticing if machines get shut down or if data +starts getting deleted. My observation on the rules of the +playground in cyber, maybe we don't have written rules that +everybody follows all the time, and maybe it is hard to get +people to agree as to what is fair game for espionage, but here +is one thing I do know. I don't think any modern nation wants +to see modern nations' A-teams break in and start changing +data, deleting data, putting industrial control system malware +in place, and doing certain things that I still haven't seen +done by those threat actors that are representing a foreign +intelligence service. So, there are still another couple levels +of escalation that have not, at least I haven't witnessed yet +in cyberspace. + Mr. Fallon. OK. Thank you. Mr. Thompson, in retrospect, was +this breach, in your opinion, preventable, and if so, what +should SolarWinds have done differently? + Mr. Thompson. So, I will answer part of that question, and +I will let Sudhakar answer some of it because, as I said, I +have been gone since December 31. But this attacker designed +this attack to be very, very difficult to find. They were +incredibly patient. They moved very slowly. And the software +was of tremendous complexity, and so it was designed in a way +that made it very difficult for anyone to detect whether it was +us or whether it was FireEye or Microsoft, which is why it took +as long as it did. And I will let Sudhakar add what we have +learned since December. + Mr. Fallon. Thank you. + Mr. Ramakrishna. Congressman Fallon, in addition to Mr. +Thompson's comments, the way we looked at it is, given the +novelty of the supply chain attack and, as I described it, the +attacker hiding in plain sight, the fundamental things that we +are looking at is what do we learn from this. How do we protect +supply chains of companies like SolarWinds and our industry +peers going forward? That led us to build the initiative that +we call Secure by Design internally, which provides specific +guidelines and execution tactics of how to protect internal +environments, how to make build systems a lot more robust, +including access to the build systems, and then how to evolve +software development life cycles to be much more secure +development life cycles where you are not testing security +after something is delivered, but designed as you build it. And +I believe that is the responsibility of the industry to take +more ownership of and share that not just amongst us, but also +with our government colleagues who also build software. + Mr. Fallon. Thank you. And I have one quick last question +for Mr. Mandia. While the experts seem to think that this was a +nation-state-sponsored attack, I am guessing because of the +complexity of it all, but I am a lay person. I just look at it +in layperson's terms. Why are we so sure that it was nation- +state-sponsored attack and not just a group of highly talented, +albeit nefarious, cybercriminals? + Mr. Mandia. So, I started responding to breaches in the +United States Air Force by 1995. Back then, most of the +breaches we responded to were not attractive nuisances. It was +dot-gov against dot-gov, dot-mil against dot-mil. I have got +about seven reasons why I believe it is a foreign intelligence +service. I will give you two. FireEye was attacked by over 20 +different IP addresses, and we were a Stage 2 victim of this +attack after we did a SolarWinds update. The systems used to +attack us were used in exactly zero other breaches. That is +very uncommon, sir. What normally happens, if I am a threat +actor and I am doing ransomware, I have the same infrastructure +for every attack I do. We went through our partners Microsoft, +our partners in the intel community. None of the systems are +used to attack anybody but FireEye. I have got six other +technical reasons. I am happy to take them offline with you. + Mr. Fallon. Thank you. + Mr. Mandia. I have virtually no doubt, 10 minutes into the +first briefing I got on our incident, this was a foreign +intelligence hack, and I had a good idea which one. + Mr. Fallon. Thank you very much. Thank you, Madam Chair. I +yield back. + Ms. Norton. Yes, the gentleman's time has expired. Mr. +Correa of California. + [No response.] + Ms. Norton. Mr. Correa of California, are you---- + Mr. Correa. Can you hear me OK, Madam Chair? + Ms. Norton. I can hear you now, sir. + Mr. Correa. Thank you, ma'am. I want to thank all of our +chairs and ranking members for this most important hearing. I +wanted to ask a question of all our guests, Mr. Ramakrishna, +Mr. Smith, Mr. Mandia. The question is as follows: Is this a +political diplomatic issue, or is this a technical issue? And I +ask this question because, Mr. Smith, during your presentation +you said that we needed to strengthen international law and the +consequences for violation of international law. Yet I recently +read a report that talked about the Chinese intelligence, that +they had stolen our espionage code and essentially customized +it and were using it against us. So, those folks overseas, are +they better than we are now? Are Russia, China, and others +better than we are in this cyber battlefield, and if they are, +how do we stop them? So, again, my question is, is this an +international law consequences issue, or is this a technical +issue? To all our guests, please. + Mr. Smith. Well, I am happy to field that first. You know, +I think you framed the question well. Is it a diplomatic issue +or is it a technical issue? Yes. That is a way of saying it is +both, and we need to deal with it on both levels. And I don't +believe for a moment that we live in a world where our +adversaries are more capable than our own government, but we do +live in a world where there is an asymmetry. It is easier to +play offense than it is to play defense. When you play offense, +you can scan the horizon and look for the weakest point, and +then that is where you direct your energy. And when you are on +the defensive, that means you need to scan and secure the +entire horizon. + So, on the technical side, that means that there this +enormously important work to strengthen all of our cyber +defenses, and it equally makes it a critical diplomatic and +international legal issue because it simply must be the case +that there are certain acts that are put off limits and for +which there are international and diplomatic consequences. And +this kind of indiscriminate and disproportionate attack on the +software supply chain is and should be one of them. + Mr. Correa. Mr. Ramakrishna, Mr. Mandia, go ahead. + Mr. Ramakrishna. Congressman Correa, I agree with my +colleague, Brad Smith, that it is a technology as well as a +political diplomatic issue. Especially as it relates to the +private sector, we have to learn and anticipate issues like +this and collaborate together on coming up with best practices +similar to the ones that we are trying to do at SolarWinds with +our Secure by Design and some new things that our colleagues at +Microsoft and FireEye, CrowdStrike, KPMG are doing. +Additionally, I think internally within the United States, we +need to look at our disclosure rules and, as we have all been +saying, encourage more of us to come forward and disclose +without fear of being punished either in the public or legally. +So, that is as it relates to us in the U.S. + And then diplomatically, setting some ground rules, holding +people accountable, and driving consequences is, I would say, +the help that we can get from the government. And last but not +least, the point I have highlighted a couple of times today +with regards to the need for speed and agility in terms of +information sharing and information dissemination might require +some help from lawmakers such as yourself. + Mr. Correa. Thank you. Mr. Mandia? + Mr. Mandia. Yes, I think everything both the witnesses have +said is exactly right. It is a diplomatic issue. It is a +technical issue. What I have learned over 20 years-plus in +responding to security breaches, sir, is that all the threats +we respond to literally mimic real-world geopolitical +conditions and really economic alliances as well. So, when you +look at what the threat is to the United States in cyber, it is +North Korea, it is Iran, China cyberespionage, it is Russia, +and then it is just folks who are safe harbors for ransomware, +so it is going to take diplomacy. It is going to take +technology. It will be both. + Mr. Correa. In my last seconds I have, Mr. Smith, you +talked about a community college being enough to get cyber +education. Do you have a list of community colleges that offer +that education now? + Mr. Smith. I will see what we have. + Mr. Correa. Do you know of any? Do you know of any? + Mr. Smith. Oh yes. + Mr. Correa. It is not a ``gotcha'' question. Are you +showing us how far we have got to go? + Mr. Smith. No, actually the community colleges of the +country have created the kinds of courses that we need. They +have become a much more common part of the curriculum. You +know, we have a robust cybersecurity profession in the United +States. We just need to make it larger. And so I think we can +harness what exists and expand the capacity and basically make +it financially easier for people to go get these courses and +education. + Ms. Norton. The gentleman's time has expired, and I thank +the gentleman for his questions. Mr. Gimenez of Florida? + [No response.] + Ms. Norton. Mr. Gimenez of Florida, are you there? + [No response.] + Ms. Norton. You are recognized for five minutes. + [No response.] + Ms. Norton. You are recognized for five minutes. I see you, +but I don't hear you. + [No response.] + Ms. Norton. I will go to the next person. Mr. Donalds of +Florida. + [No response.] + Ms. Norton. Mr. Donalds, are you there? + [No response.] + Ms. Norton. Let us then go to Ms. Porter of where? + Ms. Porter. I am from California, ma'am. + Ms. Norton. All right. Ms. Porter of California. Sorry. + Ms. Porter. Thank you so much. Mr. Ramakrishna, we are here +today to talk about a major security breach. Why are security +breaches a problem? Very briefly just in a few words, what are +we worried about? + Mr. Ramakrishna. They could impact people at a personal +level through theft of credentials. They could impact companies +with regards to breach of sensitive information and data, and +they could impact---- + Ms. Porter. Wonderful. Mr. Ramakrishna, do you want to +please provide your home address for the committee today and +the American public? + Mr. Ramakrishna. I am happy to provide it, Representative. +I would like take down record and provide it offline. + Ms. Porter. So, you don't want to share it with the whole +world, like with Russia. + Mr. Ramakrishna. Yes. + Ms. Porter. So, you would agree that the information that +got hacked is national security information that is damaging to +national security implications. It could literally put lives at +risk. You don't want to even give out your address, much less +personal security information. What kind of legal liability is +SolarWinds facing for this hack? + Mr. Ramakrishna. Congresswoman Porter, we have our standard +end user licensing agreements that we signed with every one of +our customers, including our Federal customers, and we are +bound by those. + Ms. Porter. So, your customers can sue you? There is a law +that makes you legally liable for this data breach. + Mr. Ramakrishna. I do not have the details of it, +Congresswoman. I am happy to find out those specifics from our +teams and furnish them to you. + Ms. Porter. OK. Mr. Ramakrishna, does this look familiar to +you? + Mr. Ramakrishna. Yes. + Ms. Porter. ``SolarWinds123.'' Is it true that some servers +at your company were secured with this Cracker Jack password, +``SolarWinds123? + Mr. Ramakrishna. Congresswoman, I believe that was a +password that an intern used on one of his GitHub servers back +in 2017, which was reported to our security team and it was +immediately removed. And that particular---- + Ms. Porter. Mr. Ramakrishna, reclaiming my time, I have got +a stronger password than ``SolarWinds123'' to stop my kids from +watching too much YouTube on their iPad. You and your company +were supposed to be preventing the Russians from reading +Defense Department emails. Do you agree that companies like +yours should be held liable when they don't follow best +practices? Yes or no. + Mr. Ramakrishna. Congresswoman---- + Ms. Porter. Should there a national breach law? + Mr. Ramakrishna. We believe we take our security as well as +the security of our customers very, very---- + Ms. Porter. Reclaiming my time, Mr. Ramakrishna. I am sure +you take everything seriously. You seem like a very serious +person. But I am asking you, should there be a breach law. +Let's move on. Mr. Smith, should there be a law requiring +companies to notify Federal law enforcement when they have had +a cybersecurity breach, yes or no? + Mr. Smith. Yes, I believe there should be a law that +applies to some, and then we should decide who they notify. I +am not sure it should be law enforcement. It could be an +organization like CISA. + Ms. Porter. Excellent. Mr. Smith, thank you for that. +Earlier this week, you told the Senate Intelligence Committee +that it took ``courage'' for FireEye and SolarWinds to reveal +this hack to authorities. What did you mean by that? + Mr. Smith. What I mean is you have three companies here +today because we have chosen to share information. At +Microsoft, we have published 32 blogs about what we observed +and what we have seen. If I take my colleagues at Google and +Amazon and put them together, they have published one blog. +They didn't get an invitation here as a result. + Ms. Porter. OK. So, Mr. Smith, I appreciate that, but you +are not really saying we should give you some kind of Scout +badge for telling the Federal Government that the Russians are +waist deep in your source code. I mean---- + Mr. Smith. No, I did not ask for any kind of badge. + Ms. Porter. Well, that is good because I am not going to +give you one, so we are in agreement. + Mr. Smith. I didn't think you would. + Ms. Porter. Do engineers or people at Microsoft, to come +forward and reveal these kinds of breaches, do they have +protection? Can they do so without fear of retaliation? + Mr. Smith. Within our company? It is their job to bring +this kind of information---- + Ms. Porter. Is that true at every company, Mr. Smith? +Should it be true at every company? + Mr. Smith. I think it should be true at every company. Yes, +I believe that. + Ms. Porter. There should be whistleblower protection so +that companies don't have to rely on corporate courage. + Mr. Smith. Well, I think that you need whistleblower +protection, but, more important than that, we need to pay more +people to make it their mission in life, their job, to do this +kind of threat hunting, find these kinds of problems, surface +them so then companies can solve them. + Ms. Porter. Thank you very much. My time has expired. + Mr. Smith. Thank you. + Ms. Norton. I thank the gentlewoman for her questions. I +recognize Mr. Meijer of Michigan for five minutes. + Mr. Meijer. Thank you, Madam Chair, and ranking member, and +to our witnesses who are here today, and I just want to kind of +echo my gratitude for actually stepping forward. I am not sure +it is within our congressional prerogative to offer merit +badges, but I just want to thank you. You know, on February 17, +Deputy National Security Advisor for Cyber and Emerging +Technology Anne Neuberger announced that hackers had launched +the attack from obviously inside the United States using our +own infrastructure. This is a question for the panel. Can you +explain the unique challenges that are presented when we are +having to mitigate the efforts of a foreign actor, but one that +is using our own internal systems or domestic-based systems? + Mr. Smith. Well, I will offer a couple of thoughts. We are +in, like, hour five now, so we are sort of taking turns. You +know, we have a well-established ability as a government, as a +country through the National Security Agency to look at what is +going on beyond our borders. You know, the question is, how do +we take stock of what is going on inside the United States, +especially when a foreign government can basically use a credit +card and a false ID to get access to a server, you know, in the +U.S. data center. It is not an easy problem to solve. I think +we all would recognize we don't want to live in a country where +there is, you know, extraordinary domestic surveillance, so we +have to ask ourselves, well, how do we collect the information +when there are these kinds of threats. And I think the first +thing we should do is call on what I would hope would be, you +know, sort of the loyalty of companies in the country to step +forward voluntarily and share information. + But clearly that is not sufficient. It is not doing the +job. And so I think we should put in place a legal obligation +that certainly applies to, you know, companies that are in the +critical infrastructure business, people that are the first +responders. At Microsoft, we are a first responder. That is why +we would say we would recognize that it is reasonable for this +kind of law to apply to us. That creates the data that goes to +the government. There needs to be careful thought to how it is +used, with whom it is shared, when it is shared back with +others in the private sector. + Mr. Meijer. Thank you, Mr. Smith. I would hope that, you +know, that sense of shared collective self-interest, not +necessarily originating from a patriotic impulse, but at least +just an awareness and understanding that when we are dealing +with cybersecurity, the contagion component of it is essential. +I mean, we are obviously referring to this as the ``SolarWinds +hack,'' and I know many have referred to it and are looking to +kind of change that to ``Holiday Bear,'' you know, the shift of +the name. The tainting of the reputation all too often goes +toward those who are willing to acknowledge what had occurred +and to share it rather than not. And I guess on that point, Mr. +Ramakrishna, I guess if you can just put it simply, I mean, why +did you come forward to testify today? + Mr. Ramakrishna. Congressman, we believe it is our +obligation to learn from incidents such as this and be an +active participant in the recovery and the remediation. As we +heard earlier today, we need to bounce forward from this, not +so much bounce back only. So, we have taken our learnings very +seriously and have created an initiative within our company +that we are sharing very publicly, and so I considered it my +obligation to be very active in the bouncing forward aspect of +this. + Mr. Meijer. Thank you. And then just one kind of, I guess, +more specific question, Mr. Ramakrishna. You know, I think it +was determined by analysts that 30 percent of the victims had +no direct connection to SolarWinds, but were still targets of +the broader campaign. Can you share, you know, what methods +were used to arrive at this understanding and, I guess, why +they weren't targeted in a separate effort, why they were +targeted using the SolarWinds access? + Mr. Ramakrishna. That is not a study that we conducted, so +I don't really have the specifics as it relates to the numbers. +But the way I would describe this is, as I engage with national +defenders across the world--for instance, we have spoken to the +U.K. Cybersecurity Center--and as we were discussing other +matters with them, they said they are actively investigating +other supply chain attacks within the U.K. and other places. A +few days ago, a French company reported a supply chain attack +as well, so the point here being, multiple different vectors +are being used. SolarWinds was one of them, but there are many +different ways that threat actors are coming into various +systems. + Earlier in the conversation today, I described the +intruders as behaving like Transformer toys where they are +changing their personalities and personas constantly, and that +is the reason why I am urging all of us to share information as +quickly as possible so we can together thwart these attacks. + Mr. Meijer. Thank you, Madam Chairwoman. My time has +expired. + Ms. Norton. The gentleman's time has expired. I thank him +for his questions. Mr. Gimenez of Florida. + Mr. Gimenez. Thank you. I hope everybody can hear me now. +Thank you so much. I have got a couple of questions. Mr. +Ramakrishna, you said that you are an American-based company +and you talk about the supply chain. When you are developing +software, especially + [inaudible], is it a bunch of people in a room developing +the software, or do you, you know, sub that out to other parts +of your supply chain, many of which could be offshore? + Mr. Ramakrishna. Congressman, in this particular context, +when we refer to supply chain, these are employees of ours that +may be globally deployed. So, like many American companies, we +have a global work force, and we have employees all over the +world that contribute to the development of our software, which +essentially is part of a supply chain that we deliver. + Mr. Gimenez. Where in the supply chain was this malware +embedded? + Mr. Ramakrishna. It was on a platform which we call the +Orion platform. That is a product of ours. + Mr. Gimenez. No, I understand that, but where exactly? You +said this software is developed from all around the world. +Where was this malware embedded? Where did it come from? + Mr. Ramakrishna. It is difficult for me to pinpoint a +location, Congressman. This particular software is built in a +combination of our various development centers, including in +the U.S. and in non-U.S. locations. + Mr. Gimenez. So, somebody got access to your software +development platform? + Mr. Ramakrishna. Basically, what has happened is somebody +got access to one of our build servers and hid a piece of +malware on it that was observing when products were being +built. And as products were being built, in one particular +file, they were able to replace that and keep it in the +building process. + Mr. Gimenez. Did you run the software through security +checks before you introduced it into the general public? + Mr. Ramakrishna. There are secured development practices +that we had been adopting that were part of our standard +software development processes, Congressman, which we have +since learned on what else we can do. So, that is the +initiative that I was describing earlier called Secure by +Design. + Mr. Gimenez. Mr. Smith, you said that everybody should +adhere to best practices. Are you saying that those Federal +agencies that were infected do not adhere to best practices? + Mr. Smith. I don't want to speak to any specific Federal +agency. I will say that across 60 customers, you know, we saw +typically a failure in one area or another to adhere to best +practices. You know, we saw, for example, that, you know, +passwords or keys were not kept in a secure location. We saw +that there wasn't a practice called-least privileged access +where you really try to give an individual access to only a +limited part of the network. We saw instances, you know, for +example, where there might not have been the use of multi- +factor authentication. We definitely saw lapses which could +have prevented the impact among certain customers of what +happened. + Mr. Gimenez. Thank you. I appreciate that. Would it be fair +to say that China, Russia, North Korea, Iran are the major +players in this cyberwar that we are engaged in? + Mr. Smith. Well, at Microsoft, we publish what we call a +security defense report--I am forgetting the precise name; it +came out in September--and we catalogued all the nation-states, +and all, except one nation-state actor, was from those four +countries. + Mr. Gimenez. From those four countries, right? + Mr. Smith. Yes, that is right. + Mr. Gimenez. OK. How would you gauge our United States +offensive capabilities in cyberwarfare? + Mr. Smith. I am definitely not the expert on that. + Mr. Gimenez. Fair enough. OK. And, sir, at Microsoft, are +you in China? Are you in Russia? + Mr. Smith. We do have personnel in both countries, yes. + Mr. Gimenez. In the Chinese subsidiary, are there Chinese +interests that have an ownership stake in Microsoft? + Mr. Smith. Not that I am aware of. We do certain work with +joint ventures, but we operate through Microsoft Corporation +and we operate through wholly owned subsidiaries. I am not +aware of any other kind of structure. + Mr. Gimenez. Because, I mean, I have been made aware that +if you are doing business in China, they need to have 51 +percent ownership to do business in China. That doesn't apply +to you? + Mr. Smith. It certainly doesn't apply to Microsoft. I would +want to go back. You know, it is a big company, and there are +other companies we have acquired in recent years, and I would +want to go back and look specifically at the ownership +structure for each of those. We run through our own company. + Ms. Norton. The gentleman---- + Mr. Gimenez. Thank you, Madam Chair. I know my time is up, +and I yield my time. + Ms. Norton. I thank the gentleman for his questions. Next +would be Mr. Johnson of Georgia. + Mr. Johnson. Thank you, Madam Chair. + Ms. Norton. You may be muted, Mr. Johnson. + [No response.] + Ms. Norton. Mr. Johnson, can you hear me? + [No response.] + Ms. Norton. He may be having bandwidth problems. We may +have to go on to another member while we wait for Mr. Johnson +of Georgia, but just a moment, please, until I see who is next. +Witnesses are in and out with votes, so it is difficult to know +who is available. Just a moment, please. + [Pause.] + Ms. Norton. Let us take a five-minute recess to see if +there are members available. I apologize to our witnesses, but +with the rolling votes, we are having this difficulty seeing +who is available, but we will back in five minutes. Thank you. + [Recess.] + Ms. Norton. I believe Ms. Porter of California is +available. Ms. Porter, you are recognized for five minutes. + Ms. Porter. Thank you so much, Ms. Norton, but I don't see +Mr. Smith in the hearing. Is he available? + Ms. Norton. There he is. + Ms. Porter. Thank you so much, Mr. Smith. I see you now. It +seems like one of the takeaways from this hearing is that +successful cyberattacks are really a matter of when, not if. +When investigating a cyber breach, it is helpful for companies +to have comprehensive logs to review so that they know who +accessed what, what settings were changed, and so on. Is that +right? Those logs can be helpful. + Mr. Smith. Generally, logs can be helpful. That is correct. + Ms. Porter. And it is the cloud companies like Microsoft +who keep those logs. The attacker who first got into +SolarWinds' network did so in September 2019. How long does +Microsoft keep network logs for? + Mr. Smith. Well, logs are kept in a variety of +circumstances, and they are kept by all kinds of companies, and +they are kept by IT administrators, so I cannot give you a +specific---- + Ms. Porter. Mr. Smith, how long do you keep logs for at +Microsoft? + Mr. Smith. I don't know. I would have to go ask, you know, +and it would depend on which service and the like. + Ms. Porter. So, based on my information, what I understand +is that the range is fairly short, something between seven days +and 60 days, and it depends, as you just said yourself, on what +services the client has purchased, they can purchase to keep +the logs more as part of a package. Everyone on this panel has +said that successful attacks are basically inevitable, but you +didn't sell the DOD the logs that they would need to be able to +fully assess the damage? + Mr. Smith. Well, I think the premise of that question is a +little bit off, to be honest. First of all, there was no +indication, to my knowledge, that the DOD was attacked. Second, +I don't know what the DOD has purchased, you know, from us. +Third, I don't know how long the logs would go back, you know, +for services that we do provide to the DOD. + Ms. Porter. Mr. Smith, do you own a toaster? + Mr. Smith. I sure do. I own one. + Ms. Porter. When you use that toaster, do you expect it to +catch fire? + Mr. Smith. I sure as heck don't. No, I do not. + Ms. Porter. So, imagine you were selling toasters, Mr. +Smith, and you knew that toasters you were selling were going +to explode 1 day. It was a matter of when, not if, but you sold +those toasters anyway. What would happen to the company that +you were running that sold those toasters? + Mr. Smith. Well, look, we are not in the toaster business +and we are not talking about toasters, but I would not want to +work at a toaster company that had toasters that they knew were +going to explode 1 day. + Ms. Porter. Toaster companies are held--You are lawyers. +You know the standard of strict liability. They are legally +liable if they sell a product knowing that there is a +likelihood that it will become defective or not work, if it +doesn't have all the necessary safety features, for example. +Why should Microsoft, or should Microsoft, let me ask you, be +held to a similar liability standard, maybe not strict +liability, but at least negligence, if you are selling server +services and not selling sufficient logs as part of that in +order to really do the work of stopping and identifying +cyberbreaches? + Mr. Smith. Well, let's separate two things. One, the +specific, what logs are we providing, et cetera, that is a +factual question that neither you nor I right now have the +information about. I do take your broader question, and I think +it is basically this: should companies be held to a duty of +care? Should they be obliged to follow reasonable cybersecurity +practices? Yes, we do, and I think it is important to recognize +that every one of these hacks didn't take place in the cloud. +They took place on premise, on the networks, in the server +rooms of these customers. They were the ones that had the logs, +not us, for those intrusions. + Ms. Porter. OK. So, you would agree that we need a national +breach law, some kind of standard that sets out what the +standard of care is, and that if you don't follow the standard +of care, you could be held liable. + Mr. Smith. Well, I would separate that from what I actually +think is the most important issue in this hearing, which is, +for certain companies, first responders, critical +infrastructure providers, to let the government know whenever +there is an attack. This is more like letting 9-1-1 know that +someone has broken into a house. It doesn't matter whether a +duty of care was followed or not. There is a burglar in the +house. We need to go, you know, send the police to get them +out. + Ms. Porter. So, but, Mr. Smith, reclaiming my time. If we +want people to do that notification, to make that 9-1-1 call, +do you support whistleblower protection for employees who make +those disclosures? + Mr. Smith. Look, I haven't thought about that. I would be +happy to think about it. I don't think you need whistleblower +protection. We just need to create a system that puts the +obligation on the companies themselves that have this +information, and I think if that obligation is in place, other +companies will follow. Look, we at Microsoft have been +reporting this kind of information sharing. We have been +publishing blogs without any legal duty to do so. + Ms. Norton. The gentlelady's time has expired. I believe +she was able to speak again because somebody yielded her time +to speak again. I want people to understand that. I call on Mr. +Garbarino of New York. You have five minutes, Mr. Garbarino. + Mr. Garbarino. Thank you very much, Madam Chairwoman. To +the two witnesses from SolarWinds, the committee is concerned +that many of the current governmental procurement certification +regimes are only check-the-box exercises and don't actually buy +down risk. Can you discuss the various certification regimes +that SolarWinds products were required to meet in order to be +to be put on the GSA scale and made available to government +agencies? Either Mr. Thompson or Mr. Ramakrishna. + Mr. Ramakrishna. Sorry. Go ahead---- + Mr. Thompson. No, go ahead, Sudhakar. + Mr. Ramakrishna. Congressman, we comply to the standards +that we have to comply to to ensure that the Federal Government +can deploy our products. For instance, the FIPS certifications +are required by the government and we comply to those. So, as +it relates to Federal agencies, their compliance requirements, +we have conformance working with our partners and directly with +our customers themselves across the board. If you would like a +full list of our compliance certificates, I am happy to furnish +them to you as well. + Mr. Garbarino. Well, what were you required to do? What was +SolarWinds required to go through in order to be put on the +list? What is GSA requiring? You know, is it enough? Should +they require more before something can be made available to +government agencies? + Mr. Ramakrishna. To the best of my understanding, it is not +so much a set of requirements that need to be added. Coming +back to the issue at hand, I would doubt if more specification +may have helped this particular case as much as an +understanding of how these supply chain attacks are evolving, +and for us as the private sector to take corrective steps and +learnings from this experience and implement them and obviously +pass that on from a software development and a secure +development standpoint as well. To me, it does not appear to be +a requirements thing at this point. + Mr. Garbarino. OK. Mr. Thompson, anything additional? + Mr. Thompson. The only thing I would add is that different +areas of the Federal Government require different levels of +certification, and in every area of the Federal Government +where we were allowed to sell, we had the required +certifications. Whether that was COE, whether that was APL, +Common Criteria, we had the required certifications. But I +would agree with Sudhakar. Some of those certifications, while +they do have security testing requirements that our products +went through, and I think that that helps to ensure the +security of the products, I think as you think about this +particular breach and what happened, I don't think those +certification requirements are designed to capture something +like this. + Mr. Garbarino. OK. So, is it fair to say we should now +update to try to address it so this doesn't again or so other +things don't happen again? + Mr. Thompson. Yes, I think that is a good question for CISA +to ask them in terms of what could be done because I don't +really have all the answers there. But I do think we have to +think about together, private and public sector, how we do we +work together more closely to make sure products are secure. +And a lot of the panelists have talked about how do we share +information very, very quickly so we can address issues as they +occur, because nation-states will come up with new vectors of +attack. They will come up with a new one tomorrow, and they +will come up with a new one the day after, and the only way to +protect ourselves is to let everyone know what those vectors +are so that we can respond to them. + Mr. Garbarino. I appreciate that. Thank you. Mr. Smith, a +question for you. Can you help the committee understand +Microsoft's statement: ``We found no evidence of access to +production services or customer data. The investigation also +found no indications that our systems at Microsoft were used to +attack others.'' What exactly are you saying here? Can you help +us understand what did and didn't happen in your view? In your +testimony on Tuesday, you mentioned that some Office 365 +accounts were compromised through simple password guesses and +sprays. How were the other accounts compromised? + Mr. Smith. Sure. Well, what that statement says is three +things. It says that our build systems were secure and they +were not penetrated in any way, that we had no customer data +that was touched in any way, and that we found no evidence that +any of our services or products were used as a vector of attack +to launch an attack against anyone else. What we did find in +certain instances was once this intruder was inside a network +of, say, a customer, you know, say a Federal agency, one of the +things it was able to do was get access to an account that had +what we call elevated privileges, like an IT administrator. It +was able to find the password or get the key to get into that +account. When it was in that account, they found that that +individual had access, say, to the Office 365 email of a +portion or all of several customers. And so once they were +there, then they went into the Office 365 cloud service and +that is when we identified their presence. + Ms. Norton. The gentleman---- + Mr. Garbarino. Thank you very much. I yield back. + Ms. Norton. The gentleman's time has expired. I thank him +for his questions. I recognize Mr. Johnson of Georgia. + Mr. Johnson. Thank you. Can you hear me now, Madam Chair? + Ms. Norton. I can, and you are recognized for five minutes. + Mr. Johnson. Thank you. Technology advancements have +created a world that looks unrecognizable compared to our lives +just 30 short years ago, but Americans have grown accustomed to +these changes. They have adapted. The average person not only +may not understand the nuts and bolts of technology, but they +do understand the risk of not being careful with it. Many of us +use two-point authentication for our email, a third of +Americans change their passwords annually, and we all know +better than to make our passwords ``JohnSmith123.'' Companies +that work with millions of individuals' personally identifiable +information should be held to a high standard that at least +reflects what ordinary people employ in their day-to-day +affairs using technology. + The SolarWinds preparedness and response to this hack were, +at best, incredibly negligent and, at worst, criminal. And +unfortunately we have seen a lot of data breaches that have +dealt with the lack of protection for sensitive data. +Hospitals, governments, county and local governments have been +held hostage, hospitals, even government agencies. I believe +eight or nine government agencies using SolarWinds software +were able to be hacked into. Mr. Mandia, why was the SolarWinds +breach so dangerous to our national security? + Mr. Mandia. Well, that is a great question. First, I would +like to comment that even if you are compliant, and almost +every one of the 1,000 victims we respond to every year are, I +am not convinced compliance in any standard regulation or +legislation is going to stop a Russian foreign intelligence +service from successfully breaching an organization, which is +what happened here. The reason that the breach that we are +describing was so entrenched is the fact that it was +surreptitious and clandestine for nine months, and the threat +actor behind it looks to be a foreign intelligence service. +That is why. I don't think it impacts the general consumer that +goes home every day. They are not thinking about this, but the +government agencies that were impacted and the companies +impacted are thinking about it. So, I think---- + Mr. Johnson. Well, what can our enemies who hacked into our +national data base, what can they do with the information that +they obtained, or what is possible that they could do with that +information? + Mr. Mandia. That is going to be one of the most complex +questions to answer in this, sir, is that emails and documents +were taken, and, quite frankly, the people targeted, all that +information that was taken, I believe the threat actor is still +learning how they can use that information. It is going to +emerge over years, and it is going to take months and months +for organizations to get their arms around all the possible +uses of the stolen documents. You know, this breach, to me, +from what I can observe, and I was a first-hand victim of it, +wasn't about stealing the information of consumers' PII. This +is about stealing documents that were relevant to the +collection requirements of another nation. + Mr. Johnson. Well, it is national security secrets that can +affect the lives and indeed the freedom of Americans and the +safety of Americans, the physical well-being of Americans. +Isn't that correct? + Mr. Mandia. What can happen from this breach is yet to be +told. Each victim had a different---- + Mr. Johnson. A lot of damage to our national security could +have been done and probably was done as a result of this +breach. What standard should we build for our most precious +infrastructure, like our voting systems, our hospitals, our +electricity grids, our government secrets? What kind of +national standards should there be in place to protect those +secrets and guard against successful attacks like this one that +are bound to occur in the future? + Mr. Mandia. That is the question for me. You know, when you +think about modern cyberdefense, first and foremost, every +airplane has a data flight recorder. Overall, if you capture +everything all the time, which is very hard to do, mind you, +with encryption and other things, but it is always good to have +something there that recorded everything in case something gets +missed. Modern cyberdefense is going to take learning systems-- +AI--and it is going to take machine learning, and it is going +to take expertise on the frontlines constantly being automated +by systems. We are going through that transformation, sir, now +in the industry. The bottom line is we can't have stagnant +defense. We have to have defense that evolves at computer +speed, not the signatures of yesterday, but the AI of tomorrow. + Mr. Johnson. Thank you. I yield back. + Ms. Norton. The gentleman's time has expired. I thank him +for his questions. Mrs. Cammack of Florida. + Mrs. Cammack. Thank you so much, Madam Chair. Good +afternoon. Thank you to our witnesses for hanging in there. I +know it has been a lengthy day, but I do appreciate your candid +comments and your patience as we work through this. Just a few +weeks ago, the Homeland Security hearing that we had, we looked +at cybersecurity threats facing our Nation today and how we +must improve our resilience in this area. The SolarWinds attack +was one of the issues discussed in that hearing, so I am very +glad that you are all with us here today to discuss this again. + As you all know, cybersecurity is only growing in +importance for our national security as more of our everyday +lives move into a cyber world, such as committee hearings. +Normal operations for areas ranging from critical +infrastructure to consumer products are all moving to +cyberspace, especially in the wake of the COVID-19 pandemic. +This shift simultaneously exposes all of these operations to +greater cybersecurity threats. So, I want to focus now on the +relationship between the Federal Government and the private +sector with regards to cybersecurity. In this area, +cybersecurity is a unique landscape for private/public +partnerships in information sharing and collaboration, which +depends on mutual coordination. All levels of government and +the private sector are targets now for our adversaries, non- +state actors, and several of you have touched on the need for a +national strategy to share intelligence between government and +U.S. businesses. + So, I want to open this up to the panel. You all have +touched on the importance of intelligence sharing between the +public and private sector moving forward and the barriers in +this area. So, in short, how can we make this information +sharing easier for businesses, but also for government? What +concrete steps can we take as legislators to facilitate this +process? And I will start with Mr. Brad Smith with Microsoft. + Mr. Smith. No, it is a really important question, and I +think, to some degree, it starts with identifying who needs to +report, what they need to report, to whom they need to report +it, and how. I do think one thing that is worth touching upon +that we really haven't perhaps talked about at this hearing is +the critical need to enable people who have this information to +report it easily and in a streamlined manner, because we are +acting as the first responders. And, in a sense, when an +incident is unfolding, you know, we are fighting a fire, and +you don't want to take people away from the fire so they are +filling out a lot of forms and doing things that are going to +detract from their ability to respond. So, I would hope that +one design principle that would be built into this would be the +need to do it simply, efficiently, and in a manner that is +sensitive to the work that is needed while an incident is +unfolding. + Mrs. Cammack. Excellent. Thank you, Mr. Smith. And as you +know, government is not known for their efficiency or their +ability for data bases across agencies to talk to one another, +so I appreciate your comments and actually would love to +followup with you at a later time, but I am short on time. So, +Kevin, can you elaborate on that a bit? + Mr. Mandia. Yes, I think Mr. Smith got it right. I would +add to it the confidentiality of it. If it is not confidential +threat intelligence sharing, people are going to be worried +about the liabilities to it, period. And, by the way, whether +you did everything right on security or everything wrong, +everybody's security program, to some extent, is a Maginot +Line, period. And what we have learned with this one is hacking +the supply chain was the blitzkrieg around the Maginot Line in +the United States, so we will widen the line. We will broaden +it. We will create our learning systems. Tech is getting better +every single day. But whether somebody deserves to be +compromised or not, however people interpret that, it takes +time to figure out what you lost, so that confidentiality of +the threat intelligence data sharing is critical. + Mrs. Cammack. Excellent. Thank you. I have got about a +minute remaining, so really quickly, and again, I will open +this up to the panel. What specific supply chain +vulnerabilities should be addressed to limit exposure to these +threats that we are seeing in cyberspace? Total free-for-all. +Go for it. + Mr. Ramakrishna. I would be happy to start on this one +because we are in a unique position to apply our learnings to +the broader industry here. And we have defined some very +specific things that need to be done in the context of secure +software development as it relates to the supply chain issues +that we discussed in this hearing, and we plan to publish those +as well. It is not one specific thing that may impact the +supply chain, and we need to look at it holistically across the +build environments, and also stress test our methodologies to +date of delivering integrity in software and improve those. I +am happy to share the details of those. We have published +those, but we will share more details with you offline. + Mrs. Cammack. I appreciate that. Thank you so much. And I +know I am out of time, so with that, I yield back. Thank you. + Ms. Norton. I thank the gentlelady for her questions. Ms. +Barragan of California. + Ms. Barragan. Thank you, Madam Chairwoman, for holding this +very important hearing. Mr. Smith, Microsoft has stated that it +has spent over $1 billion in security investments annually, but +you recently also stated in an interview with the New York +Times that you first learned of the attack when you were +contacted by FireEye. How did Microsoft miss this attack, and +how can customers like the U.S. Government trust Microsoft to +uncover future vulnerabilities when Microsoft missed the worst +intrusion of U.S. Government agencies, as quoted by Reuters? + Mr. Smith. Well, I think to put it in its simplest terms, +all 60 of the Microsoft customers who were attacked had their +networks penetrated on premise, meaning in their server room in +their building. It was not in our cloud services. It is like, +you know, if someone broke into your house, but not my house, I +would not know until you told me, or, in this case, what they +did was they went into your house, they found the keys, the +passwords, so that they could go into the service in the cloud. +Once they got that, once they stole your keys, once they +entered our cloud service, we saw them, and then we called you, +and we said, ``Did you know that they are in your house? Did +you know that they have stolen your keys? Did you know that +they have now entered the service that we can see, and did you +know that, unlike AWS, unlike even, I think, Google, at +Microsoft we let you know as soon as we find out that someone +has penetrated your network?'' And it doesn't matter whether it +had anything to do with our service. + Ms. Barragan. Well then, Mr. Smith, if it had nothing to do +with Microsoft, what did the billion dollars that you spent go +to? + Mr. Smith. Oh, it goes to better technology to protect the +Microsoft products that you use. It goes to the Microsoft +Threat Intelligence Center so that we can find these kinds of +services. It goes to the Microsoft Detection and Response Team. +It goes to the Microsoft Digital Crimes Unit. It goes to all +the work that we do to protect the cybersecurity of our +customers, of this country, and of the other countries that we +support. And believe me, the billion dollars a year, that is +just scratching the surface. We spend more than that every +year. + Ms. Barragan. Thank you, Mr. Smith. You know, I represent +the Port of Los Angeles, and cybersecurity is very important, +and one disturbing fact from this breach is that Microsoft and +FireEye products and services exist in most organizations. This +breach and security could happen to the many thousands of other +entities that utilize the software. Mr. Smith, you are now +saying, ``It wasn't us, it was somebody else,'' and so it kind +of begs the question, you know, what have Microsoft and FireEye +done to ensure that source codes are not compromised? + Mr. Smith. Well, we do work every day to protect every +aspect of cybersecurity. The first thing I would say is, +fundamentally, cybersecurity today does not turn on the secrecy +of source code. Most source code is published. It is in open- +source form, and even when a company like ours uses source code +that isn't published publicly, we make it widely available, so +there are a wide variety of other practices that are critical +for cybersecurity. And I think the message for the Port of Los +Angeles---- + Ms. Barragan. OK. Mr. Smith, I don't want to interrupt you. +I do want to give a chance for Mr. Mandia to chime in here. Has +FireEye done any anything to ensure that the source codes are +not compromised? Given Mr. Smith's answer, I don't think I got +one to the source code question. Do you have anything to add on +this? + Mr. Mandia. Yes, in our intrusion, the primary focus from +this attacker was all about the documents and the +communications of folks that did work for the U.S. Government, +and our red team tools, which do proactive security +assessments. We, like many companies, do everything we can to +safeguard all our information, not just our source code, but +our email and everything else. + And I would like to remind folks that this was a foreign +intelligence service that hacked into 17,000 different +organizations. I would ask the Members of Congress to think, is +it reasonable for our companies to defend themselves from a +foreign intelligence services, is that the bar that we want to +set for this Nation's private sector? + Ms. Barragan. Well, thank you. It is important that we find +out what happened, and where the issue is, and what we can do +because, as Congress, we need to ensure that we are finding out +that information to say, hey, something needs to be fixed, +something needs to be done better. Sure, we are going to have +those outside threats, but we also need to look to see where it +went wrong. And I appreciate the discussion today and look +forward to working with everybody to make sure we are able to +secure, you know, the software and our agency data. With that, +Madam Chairwoman, I yield back. + Ms. Norton. The gentlelady's time has expired. Ms. Pfluger +of Texas. I recognize Ms. Pfluger of Texas for five minutes. + Mr. Pfluger. Thank you, Madam Chairwoman. Thanks for the-- +-- + Ms. Norton. I am sorry. Mr. Pfluger. + Mr. Pfluger. That is OK. I don't take offense to that right +at this second. Thank you very much. You know, thank you all +for a good discussion on this. As a military officer for two +decades, you know, protecting every single piece of your +architecture obviously is very, very difficult. I do want to +talk a little bit, however, about our national strategy, and +specifically I want to take it back to my own home district +where we have a Cyber Center of Excellence that is in +development at one of the universities, Angelo State +University, led by a former general officer in the Air Force, +Ronnie Hawkins, who is doing amazing things in a Hispanic- +serving institution, minority-serving institution in a very +rural part of our country. So, I would like you from the +corporate side to comment on what role education plays in our +national strategy to make sure that we have the right people +that are learning the skills that they need to learn to enter +the work force and be a part of cybersecurity. So, we will just +go down the line and start with Mr. Smith. + Mr. Smith. Well, I would say two things. First, I think the +kind of initiative that you have recently pursued at Angelo +State points the way for the role that a number of colleges and +universities and community colleges can play, you know. So, +what you have been doing there around the cybersecurity +intelligence program, I think it can be built and expanded and +help us get the cybersecurity work force the Nation needs. The +other thing I would point to is this extraordinary resource +that we have as a Nation in terms of veterans coming out of the +military every year. You know, every year there are about +200,000 people who leave the military. They enter the private +work force. + One of the things that we have done at Microsoft is create, +in partnership with the Department of Defense, what we call the +Microsoft Software and Systems Academy. And so it has already +worked with more than 2,000 individuals leaving the military. +We have worked with partners across the industry. We provide +education in the last couple of months, say, of somebody's tour +of duty, and it guarantees an individual a job interview, a job +interview with one of 600 partners that we have brought +together. So, that is another way, I think, to add to the +cybersecurity work force of the country. + Mr. Pfluger. Thank you very much. Mr. Ramakrishna, do you +have any thoughts on whether or not you believe that our +college graduates, are we resource limited right now on the +number of graduates who have the requisite skills? + Mr. Ramakrishna. Congressman Pfluger, first of all, I hope +everyone in your family and your community is safe given the +events in Texas. Related to your question, I would say that +looking at only college grads in this context is restrictive. I +was mentioning earlier that the internet has to be made more +available to every child, every person that is interested in +learning and accessing, especially focused on inner-city kids +and socioeconomically backward populations, because there is a +lot of talent in those circles that need to be unleashed and +exposed to these types of topics so that we can have a more +aware and a more diverse work force and a set of people that +can be brought into society at a higher level from a capability +and contribution perspective. I think that is our contribution +or our responsibility as private sectors as well. + One specific thing that I would like to offer up there is +that as the government facilitates those, as part of the +private sector, we could have a buddy system that we could +provide to some of those young children to give them better +exposure to these technologies and techniques, get them into +internships and potentially into employment as well, and not +hold the degree requirements on them because not everybody may +be able to, or be able to afford afford, to go to colleges. + Mr. Pfluger. Thank you very much. I appreciate that, and I +also want to make sure that we acknowledge the fact that access +to internet in the form of rural broadband is extremely +important in communities like mine that may not have that +ability. Very quickly, 30 seconds, Mr. Thompson, your thoughts +on this issue? + Mr. Thompson. One of the challenges that we have had in the +past, we have tried to work with colleges and universities on +different programs to provide skill sets that we are in +shortage of in the technology field in the United States. I +think one of the challenges we had is just the speed at which +colleges and universities can move. Getting them to add a new +program because of the bureaucracy they have to go through is +quite a lengthy process. So, I think if we can find a way to +accelerate that and let them develop a cybersecurity training +program or a data intelligence program, we need to do that +quickly to be able to get more sophisticated workers in the +work force to help solve these problems. + Mr. Pfluger. Thank you very much, and with that, I yield +back. Thank you. + Ms. Norton. The gentleman's time has expired. I thank him +for his questions. Next would be Ms. Bush of Missouri. + Ms. Bush. Thank you, Chairs Maloney and Thompson, for +convening this hearing, and I want to start off. So, the number +of SolarWinds customers who were potentially affected in this +attack, it is extremely concerning. At least 18,000 customers +downloaded this malicious update to the SolarWinds product that +infiltrated their devices. One concern coming out of the +SolarWinds hack is that the attackers could use the foothold +that they gained inside these companies and these agencies to +then access other companies and, in turn, people. As we have +been discussing, the risk is not theoretical. Mr. Mandia, as I +understand it, FireEye first disclosed the breach. Chairman +Thompson and others have mentioned that cyberbreach +notification legislation is urgently needed, and we see that, +but I want to be sure I understand. Were you required by law to +do so, to disclose? + Mr. Mandia. Right now, ma'am, most of the disclosure laws +protect the personal identifiable information of American +citizens, which is not something that we lost. So by law, we +weren't, but I just want folks to know that literally within +the first 36 to 48 hours, we were telling our government +customers we have got a challenge here. We call it Ring Zero. +Who do you go to first when you know there is something? As I +was first briefed on the intrusion into FireEye, I recognized I +doubt we were the first pick. And, in fact, the number in my +head was we are probably the 40th organization compromised by +this group, so who else is at risk. We did go to the intel +communities. We did go to the DOD. We did go to CISA. Long +before we went public with public disclosure, we were working +with the U.S. Government. + Ms. Bush. So, do you think that you should be required by +law to do so? + Mr. Mandia. I think if you are a first responder, like we +are, to intrusions, because we recognized right away, you know, +we are set up for this sort of thing, and it happened to us. +You know, I took the oath to defend the Constitution of United +States, you know, I think 30 years ago. It just hits you. I +didn't even want the government to communicate with me at that +point. I didn't know the scope and scale of this. But I think +for first responders, absolutely getting the threat +intelligence, because at the time we were telling people about +it, ma'am, we really didn't know what had happened other than +something had happened. But that was enough that we had to tell +the government entities that we work with. + Ms. Bush. So, the answer is no basically. So, would you +say---- + Mr. Mandia. Yes, we didn't have a legal disclosure to, but +we felt an obligation to. + Ms. Bush. OK. So now, would you say anything has changed +since the hack that would make us trust private companies like +SolarWinds more now? + Mr. Mandia. Well, I think when you see a breach like this, +you don't want the attacker to win twice once they broke in. +Well, actually, it would be three times. They broke into +SolarWinds. They had what looks to be a very successful deep +blast zone type of cyberespionage campaign, and then they +harmed American companies both in shareholder lawsuits, +liabilities, and investigations. It is like a trifecta for the +adversary against us. + Ms. Bush. Yes. + Mr. Mandia. So, we got to think of a way where we play team +ball as a Nation where we all come together. And I do believe +the fastest thing we can do, we have been talking about a lot +today, ma'am, get the threat intelligence into an agency in the +government, and then from there it gets pushed out to the +security community so we can go shields-up a lot faster. Best +we can do, ma'am, is maybe somebody is a victim, but we are all +as secure as the very last victim in cybercrime. + Ms. Bush. Thank you. Given that this hack has been traced +back from many months, it may be possible that other companies +knew about this and didn't tell anyone because they didn't have +to. So, Mr. Smith, are you aware of any other companies that +may have known about this breach and did not report it? + Mr. Smith. We notified 60 Microsoft customers, and we have +said that 50 percent of those, so call it 30, are +communications and technology firms. And we provided that +information first to them, so we told them, and we have shared +that information to the government. But most of those companies +have not disclosed publicly that they were attacked in this +way. And, in fact, you have other companies, some of the +largest companies in our industry, that are well known to have +been involved in this that still have not spoken publicly about +what they know. There is no indication that they even informed +customers, and I am worried that, to some degree, some other +customers or some other companies, some of our competitors even +just didn't look very hard. If you don't look, you won't find, +and you will go to bed every night being blissfully ignorant +thinking you don't have a problem when, in fact, you do. + Ms. Bush. Thank you, and I yield back. + Ms. Norton. The gentlewoman's time has expired. I am +passing it over now to Ms. Porter to continue to chair the +committee. + Ms. Porter. Thank you, Ms. Norton. I am going to hand it +back to you. I believe we have no more members to recognize. +Does anyone else wish to be recognized? + Ms. Norton. Well, we have been here for a long time, and +unless someone speaks up with this double hearing, of this +hearing involving two committees, I am about to sign off and +thank our witnesses for testifying. I find members who had to +come back and forth, but it looks like we have reached the +limit of members who wish to testify. I want to thank the +witnesses again, and at this point---- + Ms. Porter. Ms. Norton? + Ms. Norton. Yes? Yes, indeed, Ms. Porter. + Ms. Porter. I see that my colleague, Mr. Torres, has +joined. + Ms. Norton. Ms. Porter, will you take over the hearing from +here? + Ms. Porter. Yes, ma'am. + Ms. Norton. All right. + Ms. Porter. [Presiding.] Mr. Torres, the gentleman from New +York, is now recognized. + Mr. Torres. Thank you, Madam Chair. I have a question for +the new CEO of SolarWinds. Has your company conducted a post- +mortem of what went wrong, the mistakes that your company might +have made, and the lessons learned from those mistakes? + Mr. Ramakrishna. Congressman, thank you for the questions. +As I came into the company, given my cybersecurity experience +from previous companies and having had to deal with cyber +incidents in the past, I had to first look at our cyber hygiene +and cybersecurity posture as well as our cybersecurity +investments. As Mr. Thompson highlighted previously, this did +not appear to be or does not appear to be an investment issue. +We spent enough on cybersecurity, in fact, more than the +average company---- + Mr. Torres. Just in the interest of time constraints, so +you have done a post-mortem, but in your judgments, do you +believe your company made mistakes? Yes or no. + Mr. Ramakrishna. I think there are opportunities to +improve, Congressman. + Mr. Torres. It is a straightforward question. I am a +straightforward person. It is a straightforward question. Did +you make mistakes? Yes or no. You can say no, but---- + Mr. Ramakrishna. We all make mistakes and---- + Mr. Torres. OK. You made mistakes. Tell me, what mistakes +did you make? + Mr. Ramakrishna. As I look at what we have done in the +past, and I am looking at it from the standpoint of where we go +from here. I haven't looked at specifically---- + Mr. Torres. We have to learn from past mistakes in order to +know how to move forward so---- + Mr. Ramakrishna. Yes. + Mr. Torres. We want to concrete examples. Is it true that +SolarWinds had no chief information security officer in the +lead-up to the SolarWinds breach? + Mr. Ramakrishna. So, the way we have organized ourselves is +that instead of calling the person a chief information security +officer, we call him a VP of security for a very specific +reason. Instead of looking at only infrastructure security, +that person is also responsible for looking at product +security. That way we are able to get the best of both worlds +and help us all build products as well as take care of our +infrastructure. So, it is a---- + Mr. Torres. So, I just want to be clear, you had a VP for +security in the lead-up to the SolarWinds breach? + Mr. Ramakrishna. Absolutely, and we have had it since 2017. + Mr. Torres. You know, so here is the concern I have. The +cybersecurity failure of SolarWinds led to a supply chain +breach that compromised nine Federal agencies. It is arguably +the greatest cybersecurity failure in the history of the United +States, and your company is at the heart of it. Given the +seismic nature of that cybersecurity failure, can your company +be trusted to ever do business with the Federal Government? + Mr. Ramakrishna. Congressman, we take the security and +protection of our customers very, very seriously. This +particular issue was much more than just SolarWinds. It was a +very sophisticated nation-state attack, as we have been +discussing here. It has got very little relevance to a security +hygiene of a particular company or the security investments of +a particular company. It was a coordinated, patient, persistent +attack that neither one company, no matter large it is or how +many resources it is deploying, or one Federal Government +agency is able to coordinate it, which is the subject of +today's hearing that we came here to apply our learnings and +contribute our learning. + Mr. Torres. I am going to move on. So, I have a question +for FireEye. FireEye managed to do something that the entire +cybersecurity apparatus of the Federal Government failed to do. +You detected SolarWinds. So, my question for the CEO of +FireEye, what does the Federal Government need to do to be more +effective at detecting breaches like SolarWinds? + Mr. Mandia. Well, I think, first, it is team ball. You +know, we had talked about the area of responsibility for some +of the best capabilities we have, like the NSA's, outside of +the Nation. All the fingerprints of this attack actually were +inside the Nation. So, you have to expect that the government +is going to detect some things, the private sector is going to +detect some things, hence, all the dialog, sir, to bring it to +one entity that has got purview into both sides of the fence. + I think the government was catching a whiff of it. They +were seeing streams of smoke because when I started talking to +government agencies, no one was surprised. They were starting +to go, oh, I get it. We were all piecing together the same +crime scene, but we all had different pieces of evidence. It +took us finding the SolarWinds implant and Microsoft's help +from the top down, cloud down, looking to start scoping this +thing. + Mr. Torres. I just want to squeeze this in because we have +the EINSTEIN system, which operates on a data base of known +cyber threats, right? + Mr. Mandia. Yes, right. + Mr. Torres. Do you have technology that is effective at +detecting anomalous threats that could benefit the Federal +Government---- + Mr. Mandia. We do, and there is a lot of other technologies +that do as well, but the problem was, you have to have a little +bit more visibility than that. So, there were blips on the +radar sir, but nobody could tell what they meant without more +context. The implant, when we found that, that was kind of the +homerun for context and everybody went ``aha.'' That was the +eureka moment. + Mr. Torres. Thank you. Thank you, Madam Chair. + Ms. Porter. Thank you, sir. With that, I want to thank our +panelists for their remarks, and I want to commend my +colleagues for participating in this important hearing. + With that, without objection, all members will have five +legislative days within which to submit additional written +questions for the witnesses to the chair, which will be +forwarded to the witnesses for their response. I ask our +witnesses to please respond as promptly as you are able. + Ms. Porter. This hearing is adjourned. + [Whereupon, at 2:01 p.m., the committee was adjourned.] + ++