<img src="https://ws.zoominfo.com/pixel/csEHmvjEA1iScHExXGZE" width="1" height="1" style="display: none;">

CISA's Updated Cybersecurity Performance Goals:  NDR’s Indispensable Role in Securing Critical Infrastructure

When CISA released version 2.0 of its Cross-Sector Cybersecurity Performance Goals last week, the update reflected three years of hard-won lessons from critical infrastructure organizations attempting to implement the original 2022 framework. The changes are telling: a new "Govern" category emphasizing C-suite accountability, consolidated IT/OT guidance, and sharpened focus on supply chain risks and incident response.

For security leaders at water treatment facilities, hospitals, energy providers, and other critical infrastructure organizations, these updates arrive at a pivotal moment. The question isn't whether to adopt these goals. It's how to implement them effectively without overwhelming already-stretched security teams.

The Visibility Gap in Performance Goals

What stands out in CISA's updated framework is the implicit acknowledgment that effective cybersecurity requires comprehensive visibility across increasingly complex network environments. The consolidation of IT and operational technology (OT) goals into unified guidance recognizes a fundamental truth: attackers don't respect the artificial boundaries we draw between enterprise networks and industrial control systems.

And these critical infrastructure environments include many network infrastructure devices – switches, routers, firewalls, and operational equipment – that create a critical blind spot. These devices cannot run endpoint agents, leaving them invisible to traditional security platforms. Meanwhile, sophisticated threat actors are actively exploiting this gap, compromising thousands of infrastructure devices using known vulnerabilities.

This is where network detection and response (NDR) – which is designed precisely to tackle these challenges – moves from a "nice to have" to essential infrastructure. Consider CISA's new emphasis on supply chain security and zero-trust architecture. Both are impossible to achieve without deep network visibility that extends beyond traditional perimeter defenses.

From Reactive to Proactive: The NDR Advantage

Many organizations approach compliance frameworks reactively, checking boxes on audit requirements. CISA's CPG 2.0 pushes in a different direction, toward outcome-driven guidance that helps organizations actually improve their security posture rather than simply document it.

Clear NDR® from Stamus Networks, built on the Suricata open-source engine, exemplifies this proactive approach. Unlike legacy security tools that generate endless alerts requiring manual triage, modern NDR platforms provide:

  • Continuous Network Monitoring: Real-time visibility into all network traffic, including encrypted communications, IoT devices, and OT systems that traditional endpoint tools can't monitor.
  • Threat Intelligence Integration: Automated correlation of network behaviors against the latest threat intelligence, addressing CISA's emphasis on emerging threat response.
  • Sophisticated Threat Detection: Multiple precision detection mechanisms empower organizations to uncover – and automatically respond to – even the weakest attack signals such as anomalous or unauthorized connections from unmanaged network devices to remote systems. And Clear NDR has specific detection mechanisms designed to identify anomalous activity on network edge devices that remain unprotected by endpoint agents.
  • Incident Response Acceleration: When CISA added specific goals around incident response communications, they recognized that time-to-detection determines breach impact. NDR reduces dwell time from months to hours by surfacing anomalies as they occur.

Addressing the "Govern" Challenge

Perhaps the most significant addition to CPG 2.0 is the "Govern" category, acknowledging that effective cybersecurity requires board-level attention and strategic investment. But here's the challenge: how do you help business leaders understand cybersecurity risks when the language is so technical?

Network detection tells a story that board members can understand. Instead of discussing CVE numbers and patch cycles, you can show them:

  • Which critical assets are communicating with unknown external systems
  • Whether lateral movement patterns suggest reconnaissance activity
  • How quickly your team detects and responds to anomalous behavior
  • Measurable improvements in mean-time-to-detection over time

This translates cybersecurity from a cost center into a measurable risk management capability, exactly what CISA's governance goals demand.

The Open Source Advantage for Critical Infrastructure

Critical infrastructure organizations face unique challenges when implementing security controls. Budget constraints are real, but so are transparency requirements and the need to avoid vendor lock-in for systems that must operate reliably for decades.

Clear NDR's foundation on Suricata provides distinct advantages here:

  • Transparency: Open source means the detection logic is visible and auditable -- crucial for organizations in highly regulated sectors or those requiring security validation.
  • Community-Driven Innovation: Rather than relying on a single vendor's threat research, Suricata benefits from a global community of security researchers constantly improving detection capabilities.
  • Cost Efficiency: As CISA notes in CPG 2.0's improved cost descriptions, organizations need practical guidance on implementation expenses. Open-source foundations dramatically reduce total cost of ownership while maintaining enterprise-grade capabilities.
  • Interoperability: Critical infrastructure environments are notoriously heterogeneous. Open standards and APIs ensure Clear NDR integrates with existing security investments rather than forcing expensive rip-and-replace decisions.

Making CPG 2.0 Actionable

CISA's updated framework is more pragmatic than its predecessor, with clearer language about implementation paths and better descriptions of each goal's cost and complexity. For security leaders mapping their compliance journey, here's how network detection and response intersects with key CPG priorities:

Supply Chain Risk Management: NDR identifies unusual communication patterns with third-party vendors, unauthorized software updates, and other supply chain compromise indicators before they escalate.

Zero Trust Architecture: You can't verify what you can't see. Network visibility is the foundation that makes "never trust, always verify" operationally possible across hybrid environments.

Breaking Down Silos: The consolidation of IT and OT guidance reflects real-world attack patterns. NDR provides unified visibility across these traditionally separate domains, identifying threats that exploit the IT/OT boundary.

Incident Response Communications: When incidents occur, stakeholders need factual information quickly. NDR provides the forensic timeline and evidence base that enables clear, confident communication—both internally and to external parties like CISA's incident reporting requirements.

Beyond Compliance: Building Resilient Infrastructure

The most forward-thinking security leaders view frameworks like CISA's CPGs not as compliance checklists but as roadmaps toward genuinely resilient operations. The updated goals reflect evolving threat landscapes and lessons learned from actual incidents affecting critical infrastructure.

Network detection and response isn't just about meeting today's requirements. It's about building the visibility foundation that allows organizations to adapt as threats evolve, as CISA updates guidance again, and as your infrastructure grows in complexity.

The organizations that will thrive under CPG 2.0 are those that recognize security isn't about implementing individual controls in isolation. It's about building interconnected visibility, detection, and response capabilities that work together, with network traffic analysis serving as the connective tissue that makes everything else more effective.

Moving Forward

CISA's Acting Director Madhu Gottumukkala emphasized in a statement that version 2.0 demonstrates commitment to "practical, outcome-driven guidance that organizations can act on." That practicality matters. Critical infrastructure organizations need solutions that fit their operational realities: tight budgets, limited staff, 24/7 operational requirements, and increasingly sophisticated threat actors.

If your organization is mapping implementation strategies for CISA's updated goals, start by asking: Do we have comprehensive visibility across our entire network environment? Can we detect anomalies in both IT and OT systems? How quickly can we identify and respond to potential incidents?

The answers to these questions will determine not just your compliance posture, but your actual resilience against the threats CISA designed these goals to address.

For more information on our Clear NDR solution, visit our product page or click the demo link, listed below the author bio.

D. Mark Durrett

Mark is the chief marketing officer (CMO) at Stamus Networks, where he has responsibility for go-to-market strategy and execution. Mark started his career as an electrical engineer and worked in digital circuit design of networking and telecom hardware for over a decade. He has over 25 years of experience leading marketing, product management and engineering for technology companies. Mark has served as the senior product and marketing executive at Netsertive, Emerging Threats, Overture Networks, Bell and Howell, Covelight Systems and Hatteras Networks. Mark resides in North Carolina, USA.

Schedule a Demo of Clear NDR

REQUEST A DEMO

Related posts

What the 2025 SANS Detection & Response Survey Reveals: False Positives & Alert Fatigue Are Worsening

Alert fatigue - the condition that arises from being overwhelmed by millions of vague alerts and...

2025 SANS Detection & Response Survey: 5 Trends You Can’t Ignore

Security teams are under tremendous pressure. Cloud complexity, alert fatigue, staffing shortages,...

MCP and Clear NDR: Strategic Enablers for the AI-Powered SOC

Modern security operations face an impossible challenge: the volume and complexity of threats have...