Critical Infrastructure Protection
Sector-Specific Plans' Coverage of Key Cyber Security Elements Varies
Gao ID: GAO-08-113 October 31, 2007
The nation's critical infrastructure sectors--such as public health, energy, water, and transportation--rely on computerized information and systems to provide services to the public. To fulfill the requirement for a comprehensive plan, including cyber aspects, the Department of Homeland Security (DHS) issued a national plan in June 2006 for the sectors to use as a road map to enhance the protection of critical infrastructure. Lead federal agencies, referred to as sector-specific agencies, are responsible for coordinating critical infrastructure protection efforts, such as the development of plans that are specific to each sector. In this context, GAO was asked to determine if these sector-specific plans address key aspects of cyber security, including cyber assets, key vulnerabilities, vulnerability reduction efforts, and recovery plans. To accomplish this, GAO analyzed each sector-specific plan against criteria that were developed on the basis of DHS guidance.
The extent to which the sectors addressed aspects of cyber security in their sector-specific plans varied; none of the plans fully addressed all 30 cyber security-related criteria. Several sector plans--including the information technology and telecommunications sectors--fully addressed many of the criteria, while others--such as agriculture and food and commercial facilities--were less comprehensive. The following figure summarizes the extent to which each plan addressed the 30 criteria. In addition to the variations in the extent to which the plans covered aspects of cyber security, there was also variance among the plans in the extent to which certain criteria were addressed. For example, all plans fully addressed identifying a sector governance structure for research and development, but fewer than half of the plans fully addressed describing any incentives used to encourage voluntary performance of risk assessments. The varying degrees to which each plan addressed the cyber security-related criteria can be attributed in part to the varying levels of maturity in the different sectors. DHS acknowledges the shortcomings in the plans, and officials stated that the sector-specific plans represent only the early efforts by the sectors to develop their respective plans. Nevertheless, until the plans fully address key cyber elements, stakeholders within the infrastructure sectors may not adequately identify, prioritize, and protect their critical assets. As the plans are updated, it will be important that DHS work with the sector representatives to ensure that the areas not sufficiently addressed are covered. Otherwise, the plans will remain incomplete and sector efforts will not be sufficient to enhance the protection of their computer-reliant assets.
Recommendations
Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.
Director:
Team:
Phone:
GAO-08-113, Critical Infrastructure Protection: Sector-Specific Plans' Coverage of Key Cyber Security Elements Varies
This is the accessible text file for GAO report number GAO-08-113
entitled 'Critical Infrastructure Protection: Sector-Specific Plans'
Coverage of Key Cyber Security Elements Varies' which was released on
October 31, 2007.
This text file was formatted by the U.S. Government Accountability
Office (GAO) to be accessible to users with visual impairments, as part
of a longer term project to improve GAO products' accessibility. Every
attempt has been made to maintain the structural and data integrity of
the original printed product. Accessibility features, such as text
descriptions of tables, consecutively numbered footnotes placed at the
end of the file, and the text of agency comment letters, are provided
but may not exactly duplicate the presentation or format of the printed
version. The portable document format (PDF) file is an exact electronic
replica of the printed version. We welcome your feedback. Please E-mail
your comments regarding the contents or accessibility features of this
document to Webmaster@gao.gov.
This is a work of the U.S. government and is not subject to copyright
protection in the United States. It may be reproduced and distributed
in its entirety without further permission from GAO. Because this work
may contain copyrighted images or other material, permission from the
copyright holder may be necessary if you wish to reproduce this
material separately.
United States Government Accountability Office: GAO:
Report to Congressional Requesters:
October 2007:
Critical Infrastructure Protection: Sector-Specific Plans' Coverage of
Key Cyber Security Elements Varies:
GAO-08-113:
GAO Highlights:
Highlights of GAO-08-113, a report to congressional requesters.
Why GAO Did This Study:
The nation's critical infrastructure sectors”such as public health,
energy, water, and transportation”rely on computerized information and
systems to provide services to the public. To fulfill the requirement
for a comprehensive plan, including cyber aspects, the Department of
Homeland Security (DHS) issued a national plan in June 2006 for the
sectors to use as a road map to enhance the protection of critical
infrastructure. Lead federal agencies, referred to as sector-specific
agencies, are responsible for coordinating critical infrastructure
protection efforts, such as the development of plans that are specific
to each sector. In this context, GAO was asked to determine if these
sector-specific plans address key aspects of cyber security, including
cyber assets, key vulnerabilities, vulnerability reduction efforts, and
recovery plans. To accomplish this, GAO analyzed each sector-specific
plan against criteria that were developed on the basis of DHS guidance.
What GAO Found:
The extent to which the sectors addressed aspects of cyber security in
their sector-specific plans varied; none of the plans fully addressed
all 30 cyber security-related criteria. Several sector plansùincluding
the information technology and telecommunications sectorsùfully
addressed many of the criteria, while othersùsuch as agriculture and
food and commercial facilitiesùwere less comprehensive. The following
figure summarizes the extent to which each plan addressed the 30
criteria.
Graph: Comprehensiveness of Sector-Specific Plans:
This figure is a vertical stacked bar graph, depicting seventeen
sectors on the horizontal axis in three categories: comprehensive,
somewhat comprehensive, and less comprehensive. The vertical axis of
the graph represents number of criteria, from 0 to 30. All bars meet
the total of 30 criteria, through a stacking of fully addressed,
partially addressed and not addressed. The following is an
approximation of the number of criteria represented in the graph by
sectors:
Information technology: Comprehensive;
Fully addressed: 28;
Partially addressed: 2;
Not addressed: 0.
Telecommunications: Comprehensive;
Fully addressed: 27;
Partially addressed: 3;
Not addressed: 0.
Public health: Comprehensive;
Fully addressed: 27;
Partially addressed: 1;
Not addressed: 2.
Energy: Comprehensive;
Fully addressed: 24;
Partially addressed: 3;
Not addressed: 3.
Government facilities: Comprehensive;
Fully addressed: 24;
Partially addressed: 3;
Not addressed: 3.
Nuclear reactors: Comprehensive;
Fully addressed: 23;
Partially addressed: 6;
Not addressed: 1.
Water: Comprehensive;
Fully addressed: 23;
Partially addressed: 6;
Not addressed: 1.
Chemical: Comprehensive;
Fully addressed: 23;
Partially addressed: 6;
Not addressed: 1.
Dams: Comprehensive;
Fully addressed: 23;
Partially addressed: 6;
Not addressed: 1.
Transportation: Comprehensive;
Fully addressed: 22;
Partially addressed: 6;
Not addressed: 2.
Emergency services: Comprehensive;
Fully addressed: 22;
Partially addressed: 4;
Not addressed: 4.
Postal and shipping: Comprehensive;
Fully addressed: 21;
Partially addressed: 8;
Not addressed: 1.
Banking and finance: Somewhat comprehensive;
Fully addressed: 19;
Partially addressed: 7;
Not addressed: 4.
Defense industrial base: Somewhat comprehensive;
Fully addressed: 18;
Partially addressed: 5;
Not addressed: 7.
National monuments: Somewhat comprehensive;
Fully addressed: 17;
Partially addressed: 8;
Not addressed: 5.
Agriculture and food: Less comprehensive;
Fully addressed: 10;
Partially addressed: 10;
Not addressed: 10.
Commercial facilities: Less comprehensive;
Fully addressed: 8;
Partially addressed: 12;
Not addressed: 10.
Source: GAO analysis of agency data.
[End of graph]
What GAO Recommends:
To assist the sectors in securing their cyber infrastructure, GAO
recommends that the Secretary of Homeland Security request that, by
September 2008, the sector-specific agencies develop plans that address
all of the cyber-related criteria. In written comments on a draft of
this report, DHS concurred with GAO‘s recommendation and provided
technical comments that have been addressed as appropriate.
To view the full product, including the scope and methodology, click on
[hyperlink, http://www.GAO-08-11]. For more information, contact David
Powner at (202) 512-9286 or pownerd@gao.gov.
[End of section]
Contents:
Letter:
Compliance with Aspects of Cyber Security Criteria:
Conclusions:
Recommendation for Executive Action:
Agency Comments and Our Evaluation:
Appendix I: Briefing for Congressional Staff:
Appendix II: Comments from the Department of Homeland Security:
Appendix III: GAO Contacts and Staff Acknowledgments:
Figure:
Figure 1: Comprehensiveness of Sector-Specific Plans:
[End of section]
United States Government Accountability Office:
Washington, DC 20548:
October 31, 2007:
The Honorable Joseph I. Lieberman:
Chairman:
The Honorable Susan M. Collins:
Ranking Member:
Committee on Homeland Security and Governmental Affairs:
United States Senate:
The Honorable James R. Langevin:
Chairman:
Subcommittee on Emerging Threats, Cybersecurity, and Science and
Technology:
Committee on Homeland Security:
House of Representatives:
Because the nation's critical infrastructure relies extensively on
computerized information systems and electronic data, the security of
those systems and information is essential to our nation's security,
economy, and public health and safety. To help address critical
infrastructure protection, federal policy has established a framework
for public and private sector partnerships and identified 17 critical
infrastructure sectors, including banking and finance, information
technology, telecommunications, energy, and public health and
healthcare.[Footnote 1]
The Department of Homeland Security (DHS) is a key player in these
partnerships. The agency issued a National Infrastructure Protection
Plan (NIPP) in June 2006 to be used as a road map for how DHS and other
relevant stakeholders are to use risk management principles to
prioritize protection activities within and across the sectors in an
integrated, coordinated fashion. Lead federal agencies, referred to as
sector-specific agencies (including DHS, the Department of the
Treasury, and the Department of Health and Human Services), are
responsible for coordinating critical infrastructure protection efforts
with the public and private stakeholders in their respective sectors.
The NIPP requires each of the lead federal agencies associated with the
17 critical infrastructure sectors to develop plans to address how the
sectors' stakeholders would implement the national plan and how they
would improve the security of their assets, systems, networks, and
functions. These sector-specific plans are to, among other things,
describe how the sector will identify and prioritize its critical
assets, including cyber assets, and define approaches the sector will
take to assess risks and develop programs to protect these assets.
As agreed, our objective was to determine if the sector-specific plans
address key aspects of cyber security, including cyber assets, key
vulnerabilities, vulnerability reduction efforts, and recovery plans.
To accomplish this objective, we analyzed each sector-specific plan
against 30 criteria that were developed on the basis of DHS guidance.
On August 7 and 20, 2007, we presented a briefing to the staffs of the
House Subcommittee on Emerging Threats, Cybersecurity, and Science and
Technology, Committee on Homeland Security, and the Senate Committee on
Homeland Security and Governmental Affairs, respectively. This report
transmits the presentation slides we used to brief the staffs and the
recommendation that we made to the Secretary of Homeland Security. The
full briefing, including our scope and methodology, is reprinted in
appendix I. In commenting on a draft of this report, the Director, DHS
Departmental GAO/OIG Liaison, concurred with our recommendation. In
addition, DHS provided technical comments that have been addressed in
this report as appropriate.
Compliance with Aspects of Cyber Security Criteria:
The extent to which the sectors addressed aspects of cyber security in
their sector-specific plans varied; none of the plans fully addressed
all 30 cyber security-related criteria. Several plans--including those
from the information technology and telecommunications sectors--fully
addressed many of the criteria, while others--such as agriculture and
food and commercial facilities--were less comprehensive. Figure 1
summarizes the extent to which each plan addressed the 30 criteria.
Figure 1: Comprehensiveness of Sector-Specific Plans:
[See PDF for image]
Comprehensiveness of Sector-Specific Plans:
This figure is a vertical stacked bar graph, depicting seventeen
sectors on the horizontal axis in three categories: comprehensive,
somewhat comprehensive, and less comprehensive. The vertical axis of
the graph represents number of criteria, from 0 to 30. All bars meet
the total of 30 criteria, through a stacking of fully addressed,
partially addressed and not addressed. The following is an
approximation of the number of criteria represented in the graph by
sectors:
Information technology: Comprehensive;
Fully addressed: 28;
Partially addressed: 2;
Not addressed: 0.
Telecommunications: Comprehensive;
Fully addressed: 27;
Partially addressed: 3;
Not addressed: 0.
Public health: Comprehensive;
Fully addressed: 27;
Partially addressed: 1;
Not addressed: 2.
Energy: Comprehensive;
Fully addressed: 24;
Partially addressed: 3;
Not addressed: 3.
Government facilities: Comprehensive;
Fully addressed: 24;
Partially addressed: 3;
Not addressed: 3.
Nuclear reactors: Comprehensive;
Fully addressed: 23;
Partially addressed: 6;
Not addressed: 1.
Water: Comprehensive;
Fully addressed: 23;
Partially addressed: 6;
Not addressed: 1.
Chemical: Comprehensive;
Fully addressed: 23;
Partially addressed: 6;
Not addressed: 1.
Dams: Comprehensive;
Fully addressed: 23;
Partially addressed: 6;
Not addressed: 1.
Transportation: Comprehensive;
Fully addressed: 22;
Partially addressed: 6;
Not addressed: 2.
Emergency services: Comprehensive;
Fully addressed: 22;
Partially addressed: 4;
Not addressed: 4.
Postal and shipping: Comprehensive;
Fully addressed: 21;
Partially addressed: 8;
Not addressed: 1.
Banking and finance: Somewhat comprehensive;
Fully addressed: 19;
Partially addressed: 7;
Not addressed: 4.
Defense industrial base: Somewhat comprehensive;
Fully addressed: 18;
Partially addressed: 5;
Not addressed: 7.
National monuments: Somewhat comprehensive;
Fully addressed: 17;
Partially addressed: 8;
Not addressed: 5.
Agriculture and food: Less comprehensive;
Fully addressed: 10;
Partially addressed: 10;
Not addressed: 10.
Commercial facilities: Less comprehensive;
Fully addressed: 8;
Partially addressed: 12;
Not addressed: 10.
Source: GAO analysis of agency data.
[End of figure]
In addition to the variations in the extent to which the plans covered
aspects of cyber security, there was also variance among plans in the
extent to which certain criteria were addressed. For example, all plans
fully addressed identifying a sector governance structure for research
and development, while fewer than half of the plans fully addressed
describing any incentives used to encourage voluntary performance of
risk assessments.
Without comprehensive plans, certain sectors may not be effectively
identifying, prioritizing, and protecting the cyber aspects of their
critical infrastructure protection efforts. For example, with most
sectors lacking a process for identifying the consequences of cyber
attacks against their assets, our nation's sectors could be ill-
prepared to respond properly to a cyber attack.
The varying degrees to which each plan addressed the cyber security-
related criteria can be attributed in part to the varying levels of
maturity of the different sectors. According to DHS officials, the
sectors that have been working together longer on critical
infrastructure issues generally have developed more comprehensive and
complete plans than the sectors with stakeholders that had not
previously worked together. For example, the plan for the energy sector
included most of the key information required for each plan element,
and the chemical sector had worked with DHS to improve the cyber
component in its plans; this sector's plan was among those categorized
as comprehensive. Furthermore, for those sectors that had not been
previously working together on critical infrastructure issues and were
thus less mature, the limited amount of time to complete the plans--6
months--was a factor in their plans being less comprehensive and
complete.
DHS acknowledges the GAO-identified shortcomings in the plans. DHS
officials stated that the sector-specific plans represent only the
early efforts by the sectors to develop their respective plans and
anticipate that the plans will improve over time. Nevertheless, until
the plans fully address key cyber elements, certain sectors may not be
prepared to respond to a cyber attack against our nation's critical
infrastructure.
Conclusions:
The sector-specific plans varied in how comprehensively they addressed
the cyber security aspects of their sectors. Without comprehensive
plans, stakeholders within the infrastructure sectors may not
adequately identify, prioritize, and protect their critical assets,
systems, networks, and functions; be prepared to respond to a
significant attack; or identify the cyber risks they face. As the plans
are updated, it will be important that DHS work with the sector
representatives to ensure that the areas not sufficiently addressed are
covered. Otherwise, the plans will remain incomplete and selected
sectors' efforts will remain insufficient to enhance the protection of
their computer-reliant assets.
Recommendation for Executive Action:
To assist the sectors in securing their cyber infrastructure, we
recommended that the Secretary of Homeland Security direct the
Assistant Secretary for Infrastructure Protection and the Assistant
Secretary for Cybersecurity and Communications to request that by
September 2008, the sector-specific agencies' plans address the cyber-
related criteria that were only partially addressed or not addressed at
all.
Agency Comments and Our Evaluation:
We received written comments on a draft of this report from DHS (see
app. II). In the response, the Director, Departmental GAO/OIG Liaison,
concurred with our recommendation. The director also proposed replacing
the term "cyber assets" with "cyber infrastructure" to broaden the
recommendation and update the Assistant Secretary's title. We agreed
and addressed his comments accordingly. In addition, the director
stated that DHS is currently working on an action plan to assist
sectors in addressing cyber security issues not adequately addressed in
the initial sector specific plans. Furthermore, DHS provided technical
comments that have been addressed in this report as appropriate.
We are sending copies of this report to interested congressional
committees, the Secretary of Homeland Security, and other interested
parties. We also will make copies available to others upon request. In
addition, this report will be available at no charge on GAO's Web site
at [hyperlink, http://www.gao.gov].
Should you or your staffs have any questions on matters discussed in
this report, please contact Dave Powner at (202) 512-9286 or
pownerd@gao.gov, or Keith Rhodes at (202) 512-6412, or rhodesk@gao.gov.
Contact points for our Offices of Congressional:
Relations and Public Affairs may be found on the last page of this
report. GAO staff who made key contributions to this report are listed
in appendix III.
Signed by:
David A. Powner:
Director:
Information Technology Management Issues:
Signed by:
Keith A. Rhodes:
Chief Technologist:
Applied Research and Methods:
Center for Technology and Engineering:
[End of section]
Appendix I: Briefing for Congressional Staff:
Critical Infrastructure Protection: Sector-Specific Plans'
Coverage of Key Cyber Security Elements Varies:
Briefing for the House Committee on Homeland Security, Subcommittee on
Emerging Threats, Cybersecurity, and Science and Technology:
August 7, 2007:
and the Senate Committee on Homeland Security and Governmental Affairs:
August 20, 2007:
Table of Contents:
* Introduction:
* Objectives, Scope, and Methodology:
* Results in Brief:
* Background:
* Cyber Security Aspects of Sector-Specific Plans:
* Conclusions:
* Recommendation for Executive Action:
* Agency Comments:
* Attachment 1. Summary Analysis of Individual Sector-Specific Plans:
* Attachment 2. Overall Summary Analysis of Sector-Specific Plans:
Introduction:
Because the nation's critical infrastructure relies extensively on
computerized information systems and electronic data, the security of
those systems and information is essential to our nation's security,
economy, and public health and safety. To help address critical
infrastructure protection, federal policy established a framework for
public and private sector partnerships and identified 17 critical
infrastructure sectors, including banking and finance, information
technology, telecommunications, energy, and public health and
healthcare.
The Department of Homeland Security (DHS) is a key player in these
partnerships and is responsible for developing a National
Infrastructure Protection Plan (NIPP) as a road map for how DHS and
other relevant stakeholders are to enhance the protection of critical
infrastructure. Lead federal agencies, referred to as sector-specific
agencies (including DHS, Treasury, and Health and Human Services), are
responsible for coordinating critical infrastructure protection efforts
with the public and private stakeholders in their respective sectors.
DHS issued NIPP in June 2006. It is a base plan that is to serve as a
road map for how DHS and other relevant stakeholders should use risk
management principles to prioritize protection activities within and
across the sectors in an integrated, coordinated fashion.
NIPP required each of the lead federal agencies associated with the 17
critical infrastructure sectors to develop plans to address how the
sectors' stakeholders would implement the national plan and how they
would improve the security of their assets and functions. These plans
are to, among other things, describe how the sector will identify and
prioritize its critical assets, including cyber assets, and define
approaches the sector will take to assess risks and develop programs to
protect these assets.
Two DHS organizations that have responsibilities associated with the
NIPP and sector-specific plans:
* The Office of Infrastructure Protection (OIP) has responsibility for
overseeing and coordinating the development of the plans and tracking
and reporting on the progress of implementation. In addition, OIP is
responsible for 5 sectors (chemical, commercial facilities, dams,
emergency services, and nuclear).
* The Office of Cyber Security and Communication (CS&C) has
responsibility for developing, maintaining, and updating the cyber
aspects of the NIPP and providing assistance to all sector-specific
agencies in developing and implementing the cyber aspects of their
respective sector-specific plans. In addition, CS&C is responsible, as
the designated sector-specific agency, for the information technology
and communications sectors.
Objectives, Scope, and Methodology:
As requested, our objective was to determine if the sector-specific
plans address key aspects of cyber security, including cyber assets,
key vulnerabilities, vulnerability reduction efforts, and recovery
plans.
We analyzed DHS's guidance provided to the critical infrastructure
sectors that stated how the sectors should address cyber aspects in
their sector-specific plans which were to be structured in eight major
sections. From this analysis, we identified 30 cyber-related criteria
within the 8 sections. DHS officials from CS&C generally agreed with
the criteria we developed. Table 1 on the following slide shows the 8
major sections and the 30 associated criteria.
Table 1: Cyber-Related Sections:
Section 1: Sector Profile and Goals:
* Characterizes cyber aspects;
* Identifies stakeholder relationships for securing cyber assets.
Section 2: Identify Assets, Systems, Networks, and Functions:
* Describes process to identify cyber assets, functions, or elements;
* Describes process to identify cyber dependencies/independences.
Section 3: Assess Risks:
* Describes how the risk assessment process addresses cyber elements;
* Describes a screening process for cyber aspects;
* Describes methodology to identify potential consequences of cyber
attacks;
* Describes methodology for vulnerability assessments of cyber aspects;
* Describes methodology for threat analyses of cyber aspects;
* Describes incentives to encourage voluntary vulnerability
assessments.
Section 4: Prioritizing Infrastructure:
* Identifies entity responsible for prioritization of cyber aspects;
* Describes criteria and basis for prioritization of cyber aspects.
Section 5: Develop and Implement Protective Programs:
* Describes process to develop long-term protective plans for cyber
aspects;
* Describes process to identify specific cyber-related program needs;
* Identifies programs to deter, respond, and recover from cyber attack;
* Addresses implementation and maintenance of protective programs.
Section 6: Measure Progress:
* Ensures that integration of cyber metrics is part of measurement
process;
* Describes how cyber metrics will be reported to DHS;
* Includes developing and using cyber metrics to measure progress;
* Describes how to use metrics to guide future cyber projects.
Section 7: Critical Infrastructure Protection Research and Development:
* Describes how technology developments are related to the sector‘s
cyber goals;
* Describes process to identify cyber security technology requirements;
* Describes process to solicit information on ongoing cyber research
and development initiatives;
* Identifies existing cyber-related projects that support goals and
identifies gaps;
* Identifies research and development governance structure.
Section 8: Managing Sector-Specific Agency Responsibilities:
* Describes sector-specific agency‘s management of NIPP
responsibilities;
* Describes process for updating, reporting, budgeting, and training;
* Describes sector‘s coordination structure;
* Describes process for investment priorities;
* Describes process for cyber-related information sharing.
[End of table]
We then analyzed the sector-specific plans of the 17 critical
infrastructures to determine the extent to which each plan addressed
the 30 cyber-related criteria. The following categories were used:
* fully addressed: the plan specifically addressed the cyber-related
criteria;
* partially addressed: the plan addressed parts of the criteria or did
not clearly address the cyber-related criteria;
* not addressed: the plan did not specifically address the cyber-
related criteria.
We met with DHS/CS&C officials to discuss their review and analysis of
the plans, as well as our review and analysis of the plans. In
addition, DHS/OIP and CS&C officials provided information related to
their initiatives to improve the plans. We did not interview officials
from the sector-specific agencies or sector representatives or review
the adequacy of the sector's actions to address cyber security within
their respective sectors.
Our work was performed at DHS/CS&C in Arlington, Virginia, from
February 2007 to July 2007 in accordance with generally accepted
government auditing standards.
Results in Brief:
The extent to which the sectors addressed key aspects of cyber security
in their sector-specific plans varied; none of the plans fully
addressed all 30 cyber security-related criteria. Several
plans”including the information technology and telecommunications
sectors”fully addressed many of the criteria, while others”such as the
agriculture and food and commercial facilities sectors”were not as
comprehensive.
In addition to the varying degrees with which the sector-specific plans
addressed the 30 section criteria, the plans as a whole addressed
certain criteria more comprehensively than they did others. For
example, all 17 plans fully addressed the criterion to identify a
sector governance structure for research and development, while only 7
plans fully addressed the process for identifying the consequences of
cyber attacks. Further, only 3 plans fully addressed the criterion to
describe incentives used to encourage voluntary performance of risk
assessments.
Without comprehensive plans, certain sectors may not be adequately
identifying, prioritizing, and protecting the cyber aspects of their
critical infrastructure protection efforts. Specifically, with most
sectors lacking a process for identifying the consequences of cyber
attacks against their assets, our nation's sectors could be ill
prepared to respond properly to a cyber attack.
The varying degrees to which each plan addressed the cyber security-
related criteria can be attributed in part to the varying level of
maturity of the different sectors: that is, sectors whose stakeholders
had more experience working together on critical infrastructure issues
generally had more comprehensive and complete plans than those with
less prior experience.
To assist the sectors in securing their cyber assets, we are
recommending that the Secretary of Homeland Security direct the
Assistant Secretary for Infrastructure Protection and the Assistant
Secretary for Cyber Security and Communication to request that by
September 2008 the sector-specific agencies' plans address the cyber-
related criteria that were only partially addressed or not addressed.
Background:
Consistent with the Homeland Security Act of 2002, Homeland Security
Presidential Directive-7 (1) established DHS as the principal federal
agency to lead, integrate, and coordinate implementation of efforts to
protect critical infrastructure and key resources and (2) identified
lead federal agencies, referred to as sector-specific agencies, that are
responsible for coordinating critical infrastructure protection efforts
with the public and private stakeholders in their respective sectors.
It also required DHS to develop a comprehensive and integrated plan by
December 2004 that outlines national goals, objectives, milestones, and
key initiatives necessary for fulfilling its responsibilities for
physical and cyber critical infrastructure protection.
In 2005, we reported on the status of DHS's key cyber security
responsibilities, which included developing a NIPP.[Footnote 2] During
this time, DHS had issued an interim NIPP for improving critical
infrastructure protection that included cyber security, but that this
plan was not yet comprehensive and complete. For example, we reported
that the plan did not include sector-specific cyber security plans,
lacked required milestones, and was not yet final. We recommended that
the Secretary of Homeland Security strengthen the department's ability
to implement key cyber security responsibilities.
In June 2006, DHS issued a final NIPP. This base plan is to serve as a
road map for how DHS and other relevant stakeholders should use risk
management principles to prioritize protection activities within and
across sectors in an integrated, coordinated fashion. Further, NIPP
required the lead agencies of the 17 critical infrastructure sectors to
develop sector-specific plans to address how the sector's stakeholders
would implement the national plan and how each sector would improve the
security of its assets systems, networks, and functions. The sector-
specific plans are to be developed by the designated sector-specific
agencies in coordination with relevant government and private-sector
representatives.
The plans are important because they are to:
* describe how the sector will identify and prioritize its critical
assets, including cyber assets such as networks;
* identify the approaches the sector will take to assess risks and
develop programs to manage and mitigate risk;
* define the security roles and responsibilities of members of the
sector; and;
* establish the methods that members will use to interact and share
information related to the protection of critical infrastructure.
DHS is to use these individual plans to evaluate whether any gaps exist
in the protection of critical infrastructures on a national level and,
if so, to work with the sectors to address them. The plans are an
important step in identifying risk management practices to be
implemented, which could improve the security of our nation's cyber-
reliant critical infrastructure. These plans do not identify the actual
assets and vulnerabilities. Instead, the plans identify the approaches
the sector will take to protect their critical cyber infrastructure.
DHS announced the release of the plans for the 17 sectors on May 21,
2007; 7 have been released publicly.[Footnote 3] The sectors were to
provide status updates to DHS by July 1, 2007. DHS plans to incorporate
these status reports into an overall critical infrastructure/key
resources (Cl/KR) report, the "National Cl/KR Protection Annual
Report," which is due by September 1 of every year to the Executive
Office of the President.
Cyber Security Aspects of Sector-Specific Plans:
The extent to which the sectors addressed aspects of cyber security in
their sector-specific plans varied; none of the plans fully addressed
all 30 cyber security-related criteria. Several plans”including the
information technology and telecommunications sectors”fully addressed
many of the criteria and others”such as agriculture and food and
commercial facilities”were less comprehensive. Figure 1 summarizes the
extent to which each plan addressed the 30 criteria.
Figure 1: Comprehensiveness of Sector-Specific Plans
[See PDF for image]
This figure is a vertical stacked bar graph, depicting seventeen
sectors on the horizontal axis in three categories: comprehensive,
somewhat comprehensive, and less comprehensive. The vertical axis of
the graph represents number of criteria, from 0 to 30. All bars meet
the total of 30 criteria, through a stacking of fully addressed,
partially addressed and not addressed. The following is an
approximation of the number of criteria represented in the graph by
sectors:
Information technology: Comprehensive;
Fully addressed: 28;
Partially addressed: 2;
Not addressed: 0.
Telecommunications: Comprehensive;
Fully addressed: 27;
Partially addressed: 3;
Not addressed: 0.
Public health: Comprehensive;
Fully addressed: 27;
Partially addressed: 1;
Not addressed: 2.
Energy: Comprehensive;
Fully addressed: 24;
Partially addressed: 3;
Not addressed: 3.
Government facilities: Comprehensive;
Fully addressed: 24;
Partially addressed: 3;
Not addressed: 3.
Nuclear reactors: Comprehensive;
Fully addressed: 23;
Partially addressed: 6;
Not addressed: 1.
Water: Comprehensive;
Fully addressed: 23;
Partially addressed: 6;
Not addressed: 1.
Chemical: Comprehensive;
Fully addressed: 23;
Partially addressed: 6;
Not addressed: 1.
Dams: Comprehensive;
Fully addressed: 23;
Partially addressed: 6;
Not addressed: 1.
Transportation: Comprehensive;
Fully addressed: 22;
Partially addressed: 6;
Not addressed: 2.
Emergency services: Comprehensive;
Fully addressed: 22;
Partially addressed: 4;
Not addressed: 4.
Postal and shipping: Comprehensive;
Fully addressed: 21;
Partially addressed: 8;
Not addressed: 1.
Banking and finance: Somewhat comprehensive;
Fully addressed: 19;
Partially addressed: 7;
Not addressed: 4.
Defense industrial base: Somewhat comprehensive;
Fully addressed: 18;
Partially addressed: 5;
Not addressed: 7.
National monuments: Somewhat comprehensive;
Fully addressed: 17;
Partially addressed: 8;
Not addressed: 5.
Agriculture and food: Less comprehensive;
Fully addressed: 10;
Partially addressed: 10;
Not addressed: 10.
Commercial facilities: Less comprehensive;
Fully addressed: 8;
Partially addressed: 12;
Not addressed: 10.
Source: GAO analysis of agency data.
[End of figure]
Attachment 1 contains the detailed results of our analysis showing to
what extent each sector plan addressed each criterion.
In addition to the variation in the extent to which the plans covered
aspects of cyber security, there was also variance among plans in the
extent to which certain criteria were addressed.
All of the plans fully addressed the following criteria:
* identifying a sector governance structure for research and
development;
* describing how the sector-specific agency intends to manage its NIPP
responsibilities; and;
* describing the sector's coordinating mechanisms and structures.
At least 15 of the plans fully addressed the following criteria:
* characterizing the sector's infrastructure, including the cyber
reliance;
* identifying stakeholder relationships for securing cyber assets;
* describing a process for updating, reporting, budgeting, and
training; and;
* describing a process for cyber-related information sharing.
Fewer than half of the plans fully addressed the following criteria:
* describing a process to identify potential consequences of cyber
attacks;
* describing any incentives used to encourage voluntary performance of
risk assessments;
* developing and using cyber metrics to measure progress; and;
* identifying existing cyber-related projects that support goals and
identify gaps.
Attachment 2 contains the detailed results of our analysis and shows to
what extent the sector-specific plans address each of the 30 criteria.
Without comprehensive plans, certain sectors may not be effectively
identifying, prioritizing, and protecting the cyber aspects of their
critical infrastructure protection efforts. For example, with most
sectors lacking a process for identifying the consequences of cyber
attacks against their assets, our nation's sectors could be ill-
prepared to respond properly to a cyber attack.
The varying degrees to which each plan addressed the cyber security-
related criteria can be attributed in part to the varying level of
maturity of the different sectors. According to DHS officials, the
sectors that have been working together longer on critical
infrastructure issues generally have more comprehensive and complete
plans than the sectors with stakeholders without prior experience
working together for a common goal. For example, the plan for the
energy sector included most of the key information required for each
plan element. This is a result of this sector having a history of
working to plan and accomplish many of the same activities that are
being required for the sector-specific plans. In addition, according to
DHS officials, the chemical sector had worked with DHS to improve the
cyber component in its plans; this sector's plan was among those
categorized as comprehensive.
Further, for those sectors that had not been working together earlier
on critical infrastructure issues and were thus less mature, the
limited amount of time to complete the plans was a factor in their
plans being less comprehensive and complete. The sectors had 6 months
from the time the NIPP was completed”June 2006”and when plans were
to be completed”December 2006.
DHS acknowledges the GAO-identified shortcomings in the plans. DHS
officials stated that the 17 sector-specific plans represent only the
early efforts by the sectors to develop their respective plans and
anticipate that the plans will improve over time. Nevertheless, until
the plans fully address key cyber elements, certain sectors may not be
prepared to respond to a cyber attack against our nation's critical
infrastructure.
Conclusions:
The sector-specific plans varied in how comprehensively they addressed
the cyber security aspects of their sectors. Without comprehensive
plans, stakeholders within the infrastructure sectors may not
adequately identify, prioritize, and protect their critical assets; be
prepared to respond to a significant attack; or identify the cyber
risks they face. As the plans are updated, it will be important that
DHS work with the sector representatives to ensure that the areas not
sufficiently addressed are covered. Otherwise, the plans will remain
incomplete and selected sectors' efforts will remain insufficient to
enhance the protection of their computer-reliant assets.
Recommendation:
To assist the sectors in securing their cyber assets, we are
recommending that the Secretary of Homeland Security direct the
Assistant Secretary for Infrastructure Protection and the Assistant
Secretary for Cyber Security and Communication to request that by
September 2008 the sector-specific agencies' plans address the cyber-
related criteria that were only partially addressed or not addressed at
all.
Agency Comments:
In commenting on a draft of this briefing, DHS officials generally
agreed with our findings and recommendations. They also provided
technical comments, which we have incorporated into this briefing, as
appropriate.
Attachment 1:
Summary Analysis of Individual Sector Specific Plans:
The following 17 slides summarize our analysis of whether each sector-
specific plan fully, partially, or did not address the 30 cyber
security-related criteria.
Agriculture and Food:
Total amounts:
fully addressed = 10;
partially addressed = 10;
not addressed = 10.
Section 1: Sector Profile and Goals:
* Characterizes cyber aspects: fully addressed;
Identifies stakeholder relationships for securing cyber assets: fully
addressed;
Section 2: Identify Assets, Systems, Networks, and Functions:
* Describes process to identify cyber assets, functions, or elements:
partially addressed;
* Describes process to identify cyber dependencies/independences: not
addressed;
Section 3: Assessing Risks:
* Describes how the risk assessment process addresses cyber elements:
fully addressed;
* Describes a screening process for cyber aspects: partially addressed;
* Describes methodology to identify potential consequences of cyber
attacks: partially addressed;
* Describes methodology for vulnerability assessments of cyber aspects:
partially addressed;
* Describes methodology for threat analyses of cyber aspects: partially
addressed;
* Describes incentives to encourage voluntary vulnerability
assessments: partially addressed.
Section 4: Prioritizing Infrastructure:
* Identifies entity responsible for prioritization of cyber aspects:
fully addressed;
* Describes criteria and basis for prioritization of cyber aspects:
partially addressed.
Section 5: Developing and Implementing Protective Programs:
* Describes process to develop long-term protective-plans for cyber
aspects: fully addressed;
* Describes process to identify specific cyber-related program needs:
partially addressed;
* Identifies programs to deter, respond, and recover from cyber attack:
not addressed;
* Addresses implementation and maintenance of protective programs:
partially addressed.
Section 6: Measuring Progress:
* Ensures that integration of cyber metrics is part of measurement
process: not addressed;
* Describes how cyber metrics will be reported to DHS: not addressed;
* Includes developing and using cyber metrics to measure progress: not
addressed;
* Describes how to use metrics to guide future cyber projects: not
addressed.
Section 7: Critical Infrastructure Protection R&D:
* Describes how technology developments are related to the sector's
cyber: not addressed;
* Describes process to identify cyber security technology requirements:
partially addressed;
* Describes process to solicit information on ongoing cyber R&D
initiatives: not addressed;
* Identifies existing cyber-related projects that support goals and
identifies gaps: not addressed;
* Identifies R&D governance structure: fully addressed.
Section 8: Managing and Coordinating SSA responsibilities:
* Describes sector-specific agency's management of NIPP
responsibilities: fully addressed;
* Describes process for updating, reporting, budgeting, and training:
fully addressed;
* Describes sector's coordination structure: fully addressed;
* Describes process for investment priorities: not addressed;
* Describes process for cyber-related information sharing: fully
addressed.
Banking and Finance:
Total amounts:
fully addressed = 19;
partially addressed = 7;
not addressed = 4.
Section 1: Sector Profile and Goals:
* Characterizes cyber aspects: partially addressed;
Identifies stakeholder relationships for securing cyber assets: fully
addressed.
Section 2: Identify Assets, Systems, Networks, and Functions:
* Describes process to identify cyber assets, functions, or elements:
partially addressed;
* Describes process to identify cyber dependencies/independences:
partially addressed.
Section 3: Assessing Risks:
* Describes how the risk assessment process addresses cyber elements:
fully addressed;
* Describes a screening process for cyber aspects: partially addressed;
* Describes methodology to identify potential consequences of cyber
attacks: fully addressed;
* Describes methodology for vulnerability assessments of cyber aspects:
fully addressed;
* Describes methodology for threat analyses of cyber aspects: fully
addressed;
* Describes incentives to encourage voluntary vulnerability
assessments: fully addressed.
Section 4: Prioritizing Infrastructure:
* Identifies entity responsible for prioritization of cyber aspects:
fully addressed;
* Describes criteria and basis for prioritization of cyber aspects:
fully addressed.
Section 5: Developing and Implementing Protective Programs:
* Describes process to develop long-term protective-plans for cyber
aspects: fully addressed;
* Describes process to identify specific cyber-related program needs:
fully addressed;
* Identifies programs to deter, respond, and recover from cyber attack:
not addressed;
* Addresses implementation and maintenance of protective programs:
fully addressed.
Section 6: Measuring Progress:
* Ensures that integration of cyber metrics is part of measurement
process: fully addressed;
* Describes how cyber metrics will be reported to DHS: fully addressed;
* Includes developing and using cyber metrics to measure progress:
fully addressed;
* Describes how to use metrics to guide future cyber projects:
partially addressed.
Section 7: Critical Infrastructure Protection R&D:
* Describes how technology developments are related to the sector's
cyber: partially addressed;
* Describes process to identify cyber security technology requirements:
fully addressed;
* Describes process to solicit information on ongoing cyber R&D
initiatives: not addressed;
* Identifies existing cyber-related projects that support goals and
identifies gaps: not addressed;
* Identifies R&D governance structure: fully addressed.
Section 8: Managing and Coordinating SSA responsibilities:
* Describes sector-specific agency's management of NIPP
responsibilities: fully addressed;
* Describes process for updating, reporting, budgeting, and training:
partially addressed;
* Describes sector's coordination structure: fully addressed;
* Describes process for investment priorities: not addressed;
* Describes process for cyber-related information sharing: fully
addressed.
Chemical:
Total amounts:
fully addressed = 23;
partially addressed = 6;
not addressed = 1.
Section 1: Sector Profile and Goals:
* Characterizes cyber aspects: fully addressed;
Identifies stakeholder relationships for securing cyber assets: fully
addressed.
Section 2: Identify Assets, Systems, Networks, and Functions:
* Describes process to identify cyber assets, functions, or elements:
fully addressed;
* Describes process to identify cyber dependencies/independences: fully
addressed.
Section 3: Assessing Risks:
* Describes how the risk assessment process addresses cyber elements:
fully addressed;
* Describes a screening process for cyber aspects: fully addressed;
* Describes methodology to identify potential consequences of cyber
attacks: partially addressed;
* Describes methodology for vulnerability assessments of cyber aspects:
fully addressed;
* Describes methodology for threat analyses of cyber aspects: partially
addressed;
* Describes incentives to encourage voluntary vulnerability
assessments: not addressed.
Section 4: Prioritizing Infrastructure:
* Identifies entity responsible for prioritization of cyber aspects:
fully addressed;
* Describes criteria and basis for prioritization of cyber aspects:
fully addressed.
Section 5: Developing and Implementing Protective Programs:
* Describes process to develop long-term protective-plans for cyber
aspects: fully addressed;
* Describes process to identify specific cyber-related program needs:
fully addressed;
* Identifies programs to deter, respond, and recover from cyber attack:
fully addressed;
* Addresses implementation and maintenance of protective programs:
fully addressed.
Section 6: Measuring Progress:
* Ensures that integration of cyber metrics is part of measurement
process: partially addressed;
* Describes how cyber metrics will be reported to DHS: partially
addressed;
* Includes developing and using cyber metrics to measure progress:
partially addressed;
* Describes how to use metrics to guide future cyber projects:
partially addressed.
Section 7: Critical Infrastructure Protection R&D:
* Describes how technology developments are related to the sector's
cyber: fully addressed;
* Describes process to identify cyber security technology requirements:
fully addressed;
* Describes process to solicit information on ongoing cyber R&D
initiatives: fully addressed;
* Identifies existing cyber-related projects that support goals and
identifies gaps: fully addressed;
* Identifies R&D governance structure: fully addressed.
Section 8: Managing and Coordinating SSA responsibilities:
* Describes sector-specific agency's management of NIPP
responsibilities: fully addressed;
* Describes process for updating, reporting, budgeting, and training:
fully addressed;
* Describes sector's coordination structure: fully addressed;
* Describes process for investment priorities: fully addressed;
* Describes process for cyber-related information sharing: fully
addressed.
Commercial Facilities:
Total amounts:
fully addressed = 8;
partially addressed = 12;
not addressed = 10.
Section 1: Sector Profile and Goals:
* Characterizes cyber aspects: fully addressed;
Identifies stakeholder relationships for securing cyber assets:
partially addressed.
Section 2: Identify Assets, Systems, Networks, and Functions:
* Describes process to identify cyber assets, functions, or elements:
not addressed;
* Describes process to identify cyber dependencies/independences: not
addressed.
Section 3: Assessing Risks:
* Describes how the risk assessment process addresses cyber elements:
partially addressed;
* Describes a screening process for cyber aspects: partially addressed;
* Describes methodology to identify potential consequences of cyber
attacks: not addressed;
* Describes methodology for vulnerability assessments of cyber aspects:
not addressed;
* Describes methodology for threat analyses of cyber aspects: not
addressed;
* Describes incentives to encourage voluntary vulnerability
assessments: not addressed.
Section 4: Prioritizing Infrastructure:
* Identifies entity responsible for prioritization of cyber aspects:
partially addressed;
* Describes criteria and basis for prioritization of cyber aspects:
partially addressed.
Section 5: Developing and Implementing Protective Programs:
* Describes process to develop long-term protective-plans for cyber
aspects: not addressed;
* Describes process to identify specific cyber-related program needs:
partially addressed;
* Identifies programs to deter, respond, and recover from cyber attack:
partially addressed;
* Addresses implementation and maintenance of protective programs:
partially addressed.
Section 6: Measuring Progress:
* Ensures that integration of cyber metrics is part of measurement
process: not addressed;
* Describes how cyber metrics will be reported to DHS: partially
addressed;
* Includes developing and using cyber metrics to measure progress: not
addressed;
* Describes how to use metrics to guide future cyber projects: not
addressed.
Section 7: Critical Infrastructure Protection R&D:
* Describes how technology developments are related to the sector's
cyber: partially addressed;
* Describes process to identify cyber security technology requirements:
partially addressed;
* Describes process to solicit information on ongoing cyber R&D
initiatives: fully addressed;
* Identifies existing cyber-related projects that support goals and
identifies gaps: partially addressed;
* Identifies R&D governance structure: fully addressed.
Section 8: Managing and Coordinating SSA responsibilities:
* Describes sector-specific agency's management of NIPP
responsibilities: fully addressed;
* Describes process for updating, reporting, budgeting, and training:
fully addressed;
* Describes sector's coordination structure: fully addressed;
* Describes process for investment priorities: fully addressed;
* Describes process for cyber-related information sharing: fully
addressed.
Dams:
Total amounts:
fully addressed = 23;
partially addressed = 6;
not addressed = 1.
Section 1: Sector Profile and Goals:
* Characterizes cyber aspects: fully addressed;
Identifies stakeholder relationships for securing cyber assets: fully
addressed.
Section 2: Identify Assets, Systems, Networks, and Functions:
* Describes process to identify cyber assets, functions, or elements:
fully addressed;
* Describes process to identify cyber dependencies/independences: fully
addressed.
Section 3: Assessing Risks:
* Describes how the risk assessment process addresses cyber elements:
fully addressed;
* Describes a screening process for cyber aspects: partially addressed;
* Describes methodology to identify potential consequences of cyber
attacks: fully addressed;
* Describes methodology for vulnerability assessments of cyber aspects:
fully addressed;
* Describes methodology for threat analyses of cyber aspects: partially
addressed;
* Describes incentives to encourage voluntary vulnerability
assessments: partially addressed.
Section 4: Prioritizing Infrastructure:
* Identifies entity responsible for prioritization of cyber aspects:
fully addressed;
* Describes criteria and basis for prioritization of cyber aspects:
fully addressed.
Section 5: Developing and Implementing Protective Programs:
* Describes process to develop long-term protective-plans for cyber
aspects: fully addressed;
* Describes process to identify specific cyber-related program needs:
fully addressed;
* Identifies programs to deter, respond, and recover from cyber attack:
fully addressed;
* Addresses implementation and maintenance of protective programs:
fully addressed.
Section 6: Measuring Progress:
* Ensures that integration of cyber metrics is part of measurement
process: fully addressed;
* Describes how cyber metrics will be reported to DHS: partially
addressed;
* Includes developing and using cyber metrics to measure progress: not
addressed;
* Describes how to use metrics to guide future cyber projects:
partially addressed.
Section 7: Critical Infrastructure Protection R&D:
* Describes how technology developments are related to the sector's
cyber: fully addressed;
* Describes process to identify cyber security technology requirements:
fully addressed;
* Describes process to solicit information on ongoing cyber R&D
initiatives: fully addressed;
* Identifies existing cyber-related projects that support goals and
identifies gaps: partially addressed;
* Identifies R&D governance structure: fully addressed.
Section 8: Managing and Coordinating SSA responsibilities:
* Describes sector-specific agency's management of NIPP
responsibilities: fully addressed;
* Describes process for updating, reporting, budgeting, and training:
fully addressed;
* Describes sector's coordination structure: fully addressed;
* Describes process for investment priorities: fully addressed;
* Describes process for cyber-related information sharing: fully
addressed.
Defense Industrial Base:
Total amounts:
fully addressed = 18;
partially addressed = 5;
not addressed = 7.
Section 1: Sector Profile and Goals:
* Characterizes cyber aspects: fully addressed;
Identifies stakeholder relationships for securing cyber assets: fully
addressed.
Section 2: Identify Assets, Systems, Networks, and Functions:
* Describes process to identify cyber assets, functions, or elements:
partially addressed;
* Describes process to identify cyber dependencies/independences: fully
addressed.
Section 3: Assessing Risks:
* Describes how the risk assessment process addresses cyber elements:
fully addressed;
* Describes a screening process for cyber aspects: not addressed;
* Describes methodology to identify potential consequences of cyber
attacks: not addressed;
* Describes methodology for vulnerability assessments of cyber aspects:
not addressed;
* Describes methodology for threat analyses of cyber aspects: not
addressed;
* Describes incentives to encourage voluntary vulnerability
assessments: not addressed.
Section 4: Prioritizing Infrastructure:
* Identifies entity responsible for prioritization of cyber aspects:
partially addressed;
* Describes criteria and basis for prioritization of cyber aspects: not
addressed.
Section 5: Developing and Implementing Protective Programs:
* Describes process to develop long-term protective-plans for cyber
aspects: partially addressed;
* Describes process to identify specific cyber-related program needs:
partially addressed;
* Identifies programs to deter, respond, and recover from cyber attack:
fully addressed;
* Addresses implementation and maintenance of protective programs:
fully addressed.
Section 6: Measuring Progress:
* Ensures that integration of cyber metrics is part of measurement
process: fully addressed;
* Describes how cyber metrics will be reported to DHS: fully addressed;
* Includes developing and using cyber metrics to measure progress:
fully addressed;
* Describes how to use metrics to guide future cyber projects: fully
addressed.
Section 7: Critical Infrastructure Protection R&D:
* Describes how technology developments are related to the sector's
cyber: fully addressed;
* Describes process to identify cyber security technology requirements:
fully addressed;
* Describes process to solicit information on ongoing cyber R&D
initiatives: fully addressed;
* Identifies existing cyber-related projects that support goals and
identifies gaps: not addressed;
* Identifies R&D governance structure: fully addressed.
Section 8: Managing and Coordinating SSA responsibilities:
* Describes sector-specific agency's management of NIPP
responsibilities: fully addressed;
* Describes process for updating, reporting, budgeting, and training:
fully addressed;
* Describes sector's coordination structure: fully addressed;
* Describes process for investment priorities: fully addressed;
* Describes process for cyber-related information sharing: partially
addressed.
Emergency Services:
Total amounts:
fully addressed = 22;
partially addressed = 4;
not addressed = 4.
Section 1: Sector Profile and Goals:
* Characterizes cyber aspects: fully addressed;
Identifies stakeholder relationships for securing cyber assets: fully
addressed.
Section 2: Identify Assets, Systems, Networks, and Functions:
* Describes process to identify cyber assets, functions, or elements:
fully addressed;
* Describes process to identify cyber dependencies/independences: fully
addressed.
Section 3: Assessing Risks:
* Describes how the risk assessment process addresses cyber elements:
partially addressed;
* Describes a screening process for cyber aspects: fully addressed;
* Describes methodology to identify potential consequences of cyber
attacks: partially addressed;
* Describes methodology for vulnerability assessments of cyber aspects:
fully addressed;
* Describes methodology for threat analyses of cyber aspects: fully
addressed;
* Describes incentives to encourage voluntary vulnerability
assessments: not addressed.
Section 4: Prioritizing Infrastructure:
* Identifies entity responsible for prioritization of cyber aspects:
fully addressed;
* Describes criteria and basis for prioritization of cyber aspects:
fully addressed.
Section 5: Developing and Implementing Protective Programs:
* Describes process to develop long-term protective-plans for cyber
aspects: partially addressed;
* Describes process to identify specific cyber-related program needs:
fully addressed;
* Identifies programs to deter, respond, and recover from cyber attack:
not addressed;
* Addresses implementation and maintenance of protective programs:
fully addressed.
Section 6: Measuring Progress:
* Ensures that integration of cyber metrics is part of measurement
process: not addressed;
* Describes how cyber metrics will be reported to DHS: fully addressed;
* Includes developing and using cyber metrics to measure progress:
partially addressed;
* Describes how to use metrics to guide future cyber projects: fully
addressed.
Section 7: Critical Infrastructure Protection R&D:
* Describes how technology developments are related to the sector's
cyber: fully addressed;
* Describes process to identify cyber security technology requirements:
fully addressed;
* Describes process to solicit information on ongoing cyber R&D
initiatives: fully addressed;
* Identifies existing cyber-related projects that support goals and
identifies gaps: not addressed;
* Identifies R&D governance structure: fully addressed.
Section 8: Managing and Coordinating SSA responsibilities:
* Describes sector-specific agency's management of NIPP
responsibilities: fully addressed;
* Describes process for updating, reporting, budgeting, and training:
fully addressed;
* Describes sector's coordination structure: fully addressed;
* Describes process for investment priorities: fully addressed;
* Describes process for cyber-related information sharing: fully
addressed.
Energy:
Total amounts:
fully addressed = 24;
partially addressed = 3;
not addressed = 3.
Section 1: Sector Profile and Goals:
* Characterizes cyber aspects: fully addressed;
Identifies stakeholder relationships for securing cyber assets: fully
addressed.
Section 2: Identify Assets, Systems, Networks, and Functions:
* Describes process to identify cyber assets, functions, or elements:
fully addressed;
* Describes process to identify cyber dependencies/independences: fully
addressed.
Section 3: Assessing Risks:
* Describes how the risk assessment process addresses cyber elements:
fully addressed;
* Describes a screening process for cyber aspects: fully addressed;
* Describes methodology to identify potential consequences of cyber
attacks: fully addressed;
* Describes methodology for vulnerability assessments of cyber aspects:
fully addressed;
* Describes methodology for threat analyses of cyber aspects: fully
addressed;
* Describes incentives to encourage voluntary vulnerability
assessments: not addressed.
Section 4: Prioritizing Infrastructure:
* Identifies entity responsible for prioritization of cyber aspects:
not addressed;
* Describes criteria and basis for prioritization of cyber aspects: not
addressed.
Section 5: Developing and Implementing Protective Programs:
* Describes process to develop long-term protective-plans for cyber
aspects: fully addressed;
* Describes process to identify specific cyber-related program needs:
fully addressed;
* Identifies programs to deter, respond, and recover from cyber attack:
fully addressed;
* Addresses implementation and maintenance of protective programs:
fully addressed.
Section 6: Measuring Progress:
* Ensures that integration of cyber metrics is part of measurement
process: partially addressed;
* Describes how cyber metrics will be reported to DHS: fully addressed;
* Includes developing and using cyber metrics to measure progress:
partially addressed;
* Describes how to use metrics to guide future cyber projects: fully
addressed.
Section 7: Critical Infrastructure Protection R&D:
* Describes how technology developments are related to the sector's
cyber: fully addressed;
* Describes process to identify cyber security technology requirements:
fully addressed;
* Describes process to solicit information on ongoing cyber R&D
initiatives: partially addressed;
* Identifies existing cyber-related projects that support goals and
identifies gaps: fully addressed;
* Identifies R&D governance structure: fully addressed.
Section 8: Managing and Coordinating SSA responsibilities:
* Describes sector-specific agency's management of NIPP
responsibilities: fully addressed;
* Describes process for updating, reporting, budgeting, and training:
fully addressed;
* Describes sector's coordination structure: fully addressed;
* Describes process for investment priorities: fully addressed;
* Describes process for cyber-related information sharing: fully
addressed.
Government Facilities:
Total amounts:
fully addressed = 24;
partially addressed = 3;
not addressed = 3.
Section 1: Sector Profile and Goals:
* Characterizes cyber aspects: partially addressed;
Identifies stakeholder relationships for securing cyber assets:
partially addressed.
Section 2: Identify Assets, Systems, Networks, and Functions:
* Describes process to identify cyber assets, functions, or elements:
fully addressed;
* Describes process to identify cyber dependencies/independences: not
addressed.
Section 3: Assessing Risks:
* Describes how the risk assessment process addresses cyber elements:
fully addressed;
* Describes a screening process for cyber aspects: fully addressed;
* Describes methodology to identify potential consequences of cyber
attacks: fully addressed;
* Describes methodology for vulnerability assessments of cyber aspects:
fully addressed;
* Describes methodology for threat analyses of cyber aspects: fully
addressed;
* Describes incentives to encourage voluntary vulnerability
assessments: not addressed.
Section 4: Prioritizing Infrastructure:
* Identifies entity responsible for prioritization of cyber aspects:
not addressed;
* Describes criteria and basis for prioritization of cyber aspects:
fully addressed.
Section 5: Developing and Implementing Protective Programs:
* Describes process to develop long-term protective-plans for cyber
aspects: fully addressed;
* Describes process to identify specific cyber-related program needs:
fully addressed;
* Identifies programs to deter, respond, and recover from cyber attack:
fully addressed;
* Addresses implementation and maintenance of protective programs:
fully addressed.
Section 6: Measuring Progress:
* Ensures that integration of cyber metrics is part of measurement
process: fully addressed;
* Describes how cyber metrics will be reported to DHS: partially
addressed;
* Includes developing and using cyber metrics to measure progress:
fully addressed;
* Describes how to use metrics to guide future cyber projects: fully
addressed.
Section 7: Critical Infrastructure Protection R&D:
* Describes how technology developments are related to the sector's
cyber: fully addressed;
* Describes process to identify cyber security technology requirements:
fully addressed;
* Describes process to solicit information on ongoing cyber R&D
initiatives: fully addressed;
* Identifies existing cyber-related projects that support goals and
identifies gaps: fully addressed;
* Identifies R&D governance structure: fully addressed.
Section 8: Managing and Coordinating SSA responsibilities:
* Describes sector-specific agency's management of NIPP
responsibilities: fully addressed;
* Describes process for updating, reporting, budgeting, and training:
fully addressed;
* Describes sector's coordination structure: fully addressed;
* Describes process for investment priorities: fully addressed;
* Describes process for cyber-related information sharing: fully
addressed.
Information Technology:
Total amounts:
fully addressed = 28;
partially addressed = 2;
not addressed = 0.
Section 1: Sector Profile and Goals:
* Characterizes cyber aspects: fully addressed;
Identifies stakeholder relationships for securing cyber assets: fully
addressed.
Section 2: Identify Assets, Systems, Networks, and Functions:
* Describes process to identify cyber assets, functions, or elements:
fully addressed;
* Describes process to identify cyber dependencies/independences: fully
addressed.
Section 3: Assessing Risks:
* Describes how the risk assessment process addresses cyber elements:
fully addressed;
* Describes a screening process for cyber aspects: fully addressed;
* Describes methodology to identify potential consequences of cyber
attacks: fully addressed;
* Describes methodology for vulnerability assessments of cyber aspects:
fully addressed;
* Describes methodology for threat analyses of cyber aspects: fully
addressed;
* Describes incentives to encourage voluntary vulnerability
assessments: partially addressed.
Section 4: Prioritizing Infrastructure:
* Identifies entity responsible for prioritization of cyber aspects:
partially addressed;
* Describes criteria and basis for prioritization of cyber aspects:
fully addressed.
Section 5: Developing and Implementing Protective Programs:
* Describes process to develop long-term protective-plans for cyber
aspects: fully addressed;
* Describes process to identify specific cyber-related program needs:
fully addressed;
* Identifies programs to deter, respond, and recover from cyber attack:
fully addressed;
* Addresses implementation and maintenance of protective programs:
fully addressed.
Section 6: Measuring Progress:
* Ensures that integration of cyber metrics is part of measurement
process: fully addressed;
* Describes how cyber metrics will be reported to DHS: fully addressed;
* Includes developing and using cyber metrics to measure progress:
fully addressed;
* Describes how to use metrics to guide future cyber projects: fully
addressed.
Section 7: Critical Infrastructure Protection R&D:
* Describes how technology developments are related to the sector's
cyber: fully addressed;
* Describes process to identify cyber security technology requirements:
fully addressed;
* Describes process to solicit information on ongoing cyber R&D
initiatives: fully addressed;
* Identifies existing cyber-related projects that support goals and
identifies gaps: fully addressed;
* Identifies R&D governance structure: fully addressed.
Section 8: Managing and Coordinating SSA responsibilities:
* Describes sector-specific agency's management of NIPP
responsibilities: fully addressed;
* Describes process for updating, reporting, budgeting, and training:
fully addressed;
* Describes sector's coordination structure: fully addressed;
* Describes process for investment priorities: fully addressed;
* Describes process for cyber-related information sharing: fully
addressed.
National Monuments and Icons:
Total amounts:
fully addressed = 17;
partially addressed = 8;
not addressed = 5.
Section 1: Sector Profile and Goals:
* Characterizes cyber aspects: fully addressed;
Identifies stakeholder relationships for securing cyber assets: fully
addressed.
Section 2: Identify Assets, Systems, Networks, and Functions:
* Describes process to identify cyber assets, functions, or elements:
fully addressed;
* Describes process to identify cyber dependencies/independences: fully
addressed.
Section 3: Assessing Risks:
* Describes how the risk assessment process addresses cyber elements:
fully addressed;
* Describes a screening process for cyber aspects: not addressed;
* Describes methodology to identify potential consequences of cyber
attacks: fully addressed;
* Describes methodology for vulnerability assessments of cyber aspects:
fully addressed;
* Describes methodology for threat analyses of cyber aspects: partially
addressed;
* Describes incentives to encourage voluntary vulnerability
assessments: partially addressed.
Section 4: Prioritizing Infrastructure:
* Identifies entity responsible for prioritization of cyber aspects:
partially addressed;
* Describes criteria and basis for prioritization of cyber aspects:
partially addressed.
Section 5: Developing and Implementing Protective Programs:
* Describes process to develop long-term protective-plans for cyber
aspects: fully addressed;
* Describes process to identify specific cyber-related program needs:
fully addressed;
* Identifies programs to deter, respond, and recover from cyber attack:
fully addressed;
* Addresses implementation and maintenance of protective programs:
fully addressed.
Section 6: Measuring Progress:
* Ensures that integration of cyber metrics is part of measurement
process: not addressed;
* Describes how cyber metrics will be reported to DHS: not addressed;
* Includes developing and using cyber metrics to measure progress: not
addressed;
* Describes how to use metrics to guide future cyber projects: not
addressed.
Section 7: Critical Infrastructure Protection R&D:
* Describes how technology developments are related to the sector's
cyber: fully addressed;
* Describes process to identify cyber security technology requirements:
partially addressed;
* Describes process to solicit information on ongoing cyber R&D
initiatives: fully addressed;
* Identifies existing cyber-related projects that support goals and
identifies gaps: partially addressed;
* Identifies R&D governance structure: fully addressed.
Section 8: Managing and Coordinating SSA responsibilities:
* Describes sector-specific agency's management of NIPP
responsibilities: fully addressed;
* Describes process for updating, reporting, budgeting, and training:
fully addressed;
* Describes sector's coordination structure: fully addressed;
* Describes process for investment priorities: partially addressed;
* Describes process for cyber-related information sharing: partially
addressed.
Nuclear Reactors, Waste, Materials:
Total amounts:
fully addressed = 23;
partially addressed = 6;
not addressed = 1.
Section 1: Sector Profile and Goals:
* Characterizes cyber aspects: fully addressed;
Identifies stakeholder relationships for securing cyber assets: fully
addressed.
Section 2: Identify Assets, Systems, Networks, and Functions:
* Describes process to identify cyber assets, functions, or elements:
fully addressed;
* Describes process to identify cyber dependencies/independences: fully
addressed.
Section 3: Assessing Risks:
* Describes how the risk assessment process addresses cyber elements:
fully addressed;
* Describes a screening process for cyber aspects: fully addressed;
* Describes methodology to identify potential consequences of cyber
attacks: partially addressed;
* Describes methodology for vulnerability assessments of cyber aspects:
fully addressed;
* Describes methodology for threat analyses of cyber aspects: fully
addressed;
* Describes incentives to encourage voluntary vulnerability
assessments: not addressed.
Section 4: Prioritizing Infrastructure:
* Identifies entity responsible for prioritization of cyber aspects:
fully addressed;
* Describes criteria and basis for prioritization of cyber aspects:
fully addressed.
Section 5: Developing and Implementing Protective Programs:
* Describes process to develop long-term protective-plans for cyber
aspects: fully addressed;
* Describes process to identify specific cyber-related program needs:
partially addressed;
* Identifies programs to deter, respond, and recover from cyber attack:
partially addressed;
* Addresses implementation and maintenance of protective programs:
fully addressed.
Section 6: Measuring Progress:
* Ensures that integration of cyber metrics is part of measurement
process: partially addressed;
* Describes how cyber metrics will be reported to DHS: partially
addressed;
* Includes developing and using cyber metrics to measure progress:
fully addressed;
* Describes how to use metrics to guide future cyber projects: fully
addressed.
Section 7: Critical Infrastructure Protection R&D:
* Describes how technology developments are related to the sector's
cyber: fully addressed;
* Describes process to identify cyber security technology requirements:
fully addressed;
* Describes process to solicit information on ongoing cyber R&D
initiatives: fully addressed;
* Identifies existing cyber-related projects that support goals and
identifies gaps: partially addressed;
* Identifies R&D governance structure: fully addressed.
Section 8: Managing and Coordinating SSA responsibilities:
* Describes sector-specific agency's management of NIPP
responsibilities: fully addressed;
* Describes process for updating, reporting, budgeting, and training:
fully addressed;
* Describes sector's coordination structure: fully addressed;
* Describes process for investment priorities: fully addressed;
* Describes process for cyber-related information sharing: fully
addressed.
Postal and Shipping:
Total amounts:
fully addressed = 21;
partially addressed = 8;
not addressed = 1.
Section 1: Sector Profile and Goals:
* Characterizes cyber aspects: fully addressed;
Identifies stakeholder relationships for securing cyber assets: fully
addressed.
Section 2: Identify Assets, Systems, Networks, and Functions:
* Describes process to identify cyber assets, functions, or elements:
fully addressed;
* Describes process to identify cyber dependencies/independences: fully
addressed.
Section 3: Assessing Risks:
* Describes how the risk assessment process addresses cyber elements:
fully addressed;
* Describes a screening process for cyber aspects: partially addressed;
* Describes methodology to identify potential consequences of cyber
attacks: partially addressed;
* Describes methodology for vulnerability assessments of cyber aspects:
fully addressed;
* Describes methodology for threat analyses of cyber aspects: fully
addressed;
* Describes incentives to encourage voluntary vulnerability
assessments: fully addressed.
Section 4: Prioritizing Infrastructure:
* Identifies entity responsible for prioritization of cyber aspects:
fully addressed;
* Describes criteria and basis for prioritization of cyber aspects:
fully addressed.
Section 5: Developing and Implementing Protective Programs:
* Describes process to develop long-term protective-plans for cyber
aspects: fully addressed;
* Describes process to identify specific cyber-related program needs:
fully addressed;
* Identifies programs to deter, respond, and recover from cyber attack:
partially addressed;
* Addresses implementation and maintenance of protective programs:
partially addressed.
Section 6: Measuring Progress:
* Ensures that integration of cyber metrics is part of measurement
process: not addressed;
* Describes how cyber metrics will be reported to DHS: partially
addressed;
* Includes developing and using cyber metrics to measure progress:
partially addressed;
* Describes how to use metrics to guide future cyber projects: fully
addressed.
Section 7: Critical Infrastructure Protection R&D:
* Describes how technology developments are related to the sector's
cyber: fully addressed;
* Describes process to identify cyber security technology requirements:
partially addressed;
* Describes process to solicit information on ongoing cyber R&D
initiatives: fully addressed;
* Identifies existing cyber-related projects that support goals and
identifies gaps: partially addressed;
* Identifies R&D governance structure: fully addressed.
Section 8: Managing and Coordinating SSA responsibilities:
* Describes sector-specific agency's management of NIPP
responsibilities: fully addressed;
* Describes process for updating, reporting, budgeting, and training:
fully addressed;
* Describes sector's coordination structure: fully addressed;
* Describes process for investment priorities: fully addressed;
* Describes process for cyber-related information sharing: fully
addressed.
Public Health and Healthcare:
Total amounts:
fully addressed = 27;
partially addressed = 1;
not addressed = 2.
Section 1: Sector Profile and Goals:
* Characterizes cyber aspects: fully addressed;
Identifies stakeholder relationships for securing cyber assets: fully
addressed.
Section 2: Identify Assets, Systems, Networks, and Functions:
* Describes process to identify cyber assets, functions, or elements:
fully addressed;
* Describes process to identify cyber dependencies/independences: fully
addressed.
Section 3: Assessing Risks:
* Describes how the risk assessment process addresses cyber elements:
fully addressed;
* Describes a screening process for cyber aspects: fully addressed;
* Describes methodology to identify potential consequences of cyber
attacks: partially addressed;
* Describes methodology for vulnerability assessments of cyber aspects:
fully addressed;
* Describes methodology for threat analyses of cyber aspects: fully
addressed;
* Describes incentives to encourage voluntary vulnerability
assessments: not addressed.
Section 4: Prioritizing Infrastructure:
* Identifies entity responsible for prioritization of cyber aspects:
fully addressed;
* Describes criteria and basis for prioritization of cyber aspects:
fully addressed.
Section 5: Developing and Implementing Protective Programs:
* Describes process to develop long-term protective-plans for cyber
aspects: fully addressed;
* Describes process to identify specific cyber-related program needs:
fully addressed;
* Identifies programs to deter, respond, and recover from cyber attack:
not addressed;
* Addresses implementation and maintenance of protective programs:
fully addressed.
Section 6: Measuring Progress:
* Ensures that integration of cyber metrics is part of measurement
process: fully addressed;
* Describes how cyber metrics will be reported to DHS: fully addressed;
* Includes developing and using cyber metrics to measure progress:
fully addressed;
* Describes how to use metrics to guide future cyber projects: fully
addressed.
Section 7: Critical Infrastructure Protection R&D:
* Describes how technology developments are related to the sector's
cyber: fully addressed;
* Describes process to identify cyber security technology requirements:
fully addressed;
* Describes process to solicit information on ongoing cyber R&D
initiatives: fully addressed;
* Identifies existing cyber-related projects that support goals and
identifies gaps: fully addressed;
* Identifies R&D governance structure: fully addressed.
Section 8: Managing and Coordinating SSA responsibilities:
* Describes sector-specific agency's management of NIPP
responsibilities: fully addressed;
* Describes process for updating, reporting, budgeting, and training:
fully addressed;
* Describes sector's coordination structure: fully addressed;
* Describes process for investment priorities: fully addressed;
* Describes process for cyber-related information sharing: fully
addressed.
Telecommunications:
Total amounts:
fully addressed = 27;
partially addressed = 3;
not addressed = 0.
Section 1: Sector Profile and Goals:
* Characterizes cyber aspects: fully addressed;
Identifies stakeholder relationships for securing cyber assets: fully
addressed.
Section 2: Identify Assets, Systems, Networks, and Functions:
* Describes process to identify cyber assets, functions, or elements:
fully addressed;
* Describes process to identify cyber dependencies/independences: fully
addressed.
Section 3: Assessing Risks:
* Describes how the risk assessment process addresses cyber elements:
fully addressed;
* Describes a screening process for cyber aspects: fully addressed;
* Describes methodology to identify potential consequences of cyber
attacks: partially addressed;
* Describes methodology for vulnerability assessments of cyber aspects:
fully addressed;
* Describes methodology for threat analyses of cyber aspects: fully
addressed;
* Describes incentives to encourage voluntary vulnerability
assessments: partially addressed.
Section 4: Prioritizing Infrastructure:
* Identifies entity responsible for prioritization of cyber aspects:
fully addressed;
* Describes criteria and basis for prioritization of cyber aspects:
fully addressed.
Section 5: Developing and Implementing Protective Programs:
* Describes process to develop long-term protective-plans for cyber
aspects: fully addressed;
* Describes process to identify specific cyber-related program needs:
partially addressed;
* Identifies programs to deter, respond, and recover from cyber attack:
fully addressed;
* Addresses implementation and maintenance of protective programs:
fully addressed.
Section 6: Measuring Progress:
* Ensures that integration of cyber metrics is part of measurement
process: fully addressed;
* Describes how cyber metrics will be reported to DHS: fully addressed;
* Includes developing and using cyber metrics to measure progress:
fully addressed;
* Describes how to use metrics to guide future cyber projects: fully
addressed.
Section 7: Critical Infrastructure Protection R&D:
* Describes how technology developments are related to the sector's
cyber: fully addressed;
* Describes process to identify cyber security technology requirements:
fully addressed;
* Describes process to solicit information on ongoing cyber R&D
initiatives: fully addressed;
* Identifies existing cyber-related projects that support goals and
identifies gaps: fully addressed;
* Identifies R&D governance structure: fully addressed.
Section 8: Managing and Coordinating SSA responsibilities:
* Describes sector-specific agency's management of NIPP
responsibilities: fully addressed;
* Describes process for updating, reporting, budgeting, and training:
fully addressed;
* Describes sector's coordination structure: fully addressed;
* Describes process for investment priorities: fully addressed;
* Describes process for cyber-related information sharing: fully
addressed.
Transportation:
Total amounts:
fully addressed = 22;
partially addressed = 6;
not addressed = 2.
Section 1: Sector Profile and Goals:
* Characterizes cyber aspects: fully addressed;
Identifies stakeholder relationships for securing cyber assets: fully
addressed.
Section 2: Identify Assets, Systems, Networks, and Functions:
* Describes process to identify cyber assets, functions, or elements:
fully addressed;
* Describes process to identify cyber dependencies/independences: fully
addressed.
Section 3: Assessing Risks:
* Describes how the risk assessment process addresses cyber elements:
partially addressed;
* Describes a screening process for cyber aspects: not addressed;
* Describes methodology to identify potential consequences of cyber
attacks: partially addressed;
* Describes methodology for vulnerability assessments of cyber aspects:
fully addressed;
* Describes methodology for threat analyses of cyber aspects: fully
addressed;
* Describes incentives to encourage voluntary vulnerability
assessments: partially addressed.
Section 4: Prioritizing Infrastructure:
* Identifies entity responsible for prioritization of cyber aspects:
fully addressed;
* Describes criteria and basis for prioritization of cyber aspects:
fully addressed.
Section 5: Developing and Implementing Protective Programs:
* Describes process to develop long-term protective-plans for cyber
aspects: fully addressed;
* Describes process to identify specific cyber-related program needs:
fully addressed;
* Identifies programs to deter, respond, and recover from cyber attack:
fully addressed;
* Addresses implementation and maintenance of protective programs:
partially addressed.
Section 6: Measuring Progress:
* Ensures that integration of cyber metrics is part of measurement
process: fully addressed;
* Describes how cyber metrics will be reported to DHS: fully addressed;
* Includes developing and using cyber metrics to measure progress:
fully addressed;
* Describes how to use metrics to guide future cyber projects: fully
addressed.
Section 7: Critical Infrastructure Protection R&D:
* Describes how technology developments are related to the sector's
cyber: fully addressed;
* Describes process to identify cyber security technology requirements:
partially addressed;
* Describes process to solicit information on ongoing cyber R&D
initiatives: partially addressed;
* Identifies existing cyber-related projects that support goals and
identifies gaps: not addressed;
* Identifies R&D governance structure: fully addressed.
Section 8: Managing and Coordinating SSA responsibilities:
* Describes sector-specific agency's management of NIPP
responsibilities: fully addressed;
* Describes process for updating, reporting, budgeting, and training:
fully addressed;
* Describes sector's coordination structure: fully addressed;
* Describes process for investment priorities: fully addressed;
* Describes process for cyber-related information sharing: fully
addressed.
Water:
Total amounts:
fully addressed = 23;
partially addressed = 6;
not addressed = 1.
Section 1: Sector Profile and Goals:
* Characterizes cyber aspects: fully addressed;
Identifies stakeholder relationships for securing cyber assets: fully
addressed.
Section 2: Identify Assets, Systems, Networks, and Functions:
* Describes process to identify cyber assets, functions, or elements:
fully addressed;
* Describes process to identify cyber dependencies/independences: fully
addressed.
Section 3: Assessing Risks:
* Describes how the risk assessment process addresses cyber elements:
fully addressed;
* Describes a screening process for cyber aspects: fully addressed;
* Describes methodology to identify potential consequences of cyber
attacks: fully addressed;
* Describes methodology for vulnerability assessments of cyber aspects:
partially addressed;
* Describes methodology for threat analyses of cyber aspects: fully
addressed;
* Describes incentives to encourage voluntary vulnerability
assessments: fully addressed.
Section 4: Prioritizing Infrastructure:
* Identifies entity responsible for prioritization of cyber aspects:
fully addressed;
* Describes criteria and basis for prioritization of cyber aspects:
fully addressed.
Section 5: Developing and Implementing Protective Programs:
* Describes process to develop long-term protective-plans for cyber
aspects: partially addressed;
* Describes process to identify specific cyber-related program needs:
partially addressed;
* Identifies programs to deter, respond, and recover from cyber attack:
not addressed;
* Addresses implementation and maintenance of protective programs:
fully addressed.
Section 6: Measuring Progress:
* Ensures that integration of cyber metrics is part of measurement
process: fully addressed;
* Describes how cyber metrics will be reported to DHS: fully addressed;
* Includes developing and using cyber metrics to measure progress:
partially addressed;
* Describes how to use metrics to guide future cyber projects:
partially addressed.
Section 7: Critical Infrastructure Protection R&D:
* Describes how technology developments are related to the sector's
cyber: fully addressed;
* Describes process to identify cyber security technology requirements:
partially addressed;
* Describes process to solicit information on ongoing cyber R&D
initiatives: fully addressed;
* Identifies existing cyber-related projects that support goals and
identifies gaps: fully addressed;
* Identifies R&D governance structure: fully addressed.
Section 8: Managing and Coordinating SSA responsibilities:
* Describes sector-specific agency's management of NIPP
responsibilities: fully addressed;
* Describes process for updating, reporting, budgeting, and training:
fully addressed;
* Describes sector's coordination structure: fully addressed;
* Describes process for investment priorities: fully addressed;
* Describes process for cyber-related information sharing: fully
addressed.
Attachment 2:
Overall Summary Analysis of Sector Specific Plans:
The following table illustrates the number of plans that fully,
partially, and did not address each criterion.
Criteria:
Section 1: Sector Profile and Goals:
Characterizes the sector infrastructure, including cyber reliance:
No. of plans that fully addressed: 15;
No. of plans that partially addressed: 2;
No. of plans that did not address: 0.
Criteria:
Section 1: Sector Profile and Goals:
Identifies stakeholder relationships for securing cyber assets:
No. of plans that fully addressed: 15;
No. of plans that partially addressed: 2;
No. of plans that did not address: 0.
Criteria:
Section 2: Identify Assets, Systems, Networks, and Functions:
Describes process to identify cyber assets, functions, or elements:
No. of plans that fully addressed: 13;
No. of plans that partially addressed: 3;
No. of plans that did not address: 1.
Criteria:
Section 2: Identify Assets, Systems, Networks, and Functions:
Describes process to identify cyber dependencies/independences:
No. of plans that fully addressed: 13;
No. of plans that partially addressed: 1;
No. of plans that did not address: 3.
Criteria:
Section 3: Assessing Risks
Describes how the risk assessment process addresses cyber elements:
No. of plans that fully addressed: 14;
No. of plans that partially addressed: 3;
No. of plans that did not address: 0.
Criteria:
Section 3: Assessing Risks
Describes a screening process for cyber aspects:
No. of plans that fully addressed: 9;
No. of plans that partially addressed: 5;
No. of plans that did not address: 3.
Criteria:
Section 3: Assessing Risks
Describes methodology to identify potential consequences of cyber
attacks:
No. of plans that fully addressed: 7;
No. of plans that partially addressed: 8;
No. of plans that did not address: 2.
Criteria:
Section 3: Assessing Risks
Describes methodology for vulnerability assessments of cyber aspects:
No. of plans that fully addressed: 13;
No. of plans that partially addressed: 2;
No. of plans that did not address: 2.
Criteria:
Section 3: Assessing Risks
Describes methodology for threat analyses of cyber aspects:
No. of plans that fully addressed: 11;
No. of plans that partially addressed: 4;
No. of plans that did not address: 2.
Criteria:
Section 3: Assessing Risks
Describes incentives to encourage voluntary vulnerability assessments:
No. of plans that fully addressed: 3;
No. of plans that partially addressed: 6;
No. of plans that did not address: 8.
Criteria:
Section 4: Prioritizing Infrastructure
Identifies entity responsible for prioritization of cyber aspects:
No. of plans that fully addressed: 11;
No. of plans that partially addressed: 4;
No. of plans that did not address: 2.
Criteria:
Section 4: Prioritizing Infrastructure
Describes criteria and basis for prioritization of cyber aspects:
No. of plans that fully addressed: 12;
No. of plans that partially addressed: 3;
No. of plans that did not address: 2.
Criteria:
Section 5: Developing and Implementing Protective Programs:
Describes process to develop long-term protective-plans for cyber
aspects:
No. of plans that fully addressed: 13;
No. of plans that partially addressed: 3;
No. of plans that did not address: 1.
Criteria:
Section 5: Developing and Implementing Protective Programs:
Describes process to identify specific cyber-related program needs:
No. of plans that fully addressed: 11;
No. of plans that partially addressed: 6;
No. of plans that did not address: 0.
Criteria:
Section 5: Developing and Implementing Protective Programs:
Identifies programs to deter, respond, and recover from cyber attack:
No. of plans that fully addressed: 9;
No. of plans that partially addressed: 3;
No. of plans that did not address: 5.
Criteria:
Section 5: Developing and Implementing Protective Programs:
Addresses implementation and maintenance of protective programs:
No. of plans that fully addressed: 13;
No. of plans that partially addressed: 4;
No. of plans that did not address: 0.
Criteria:
Section 6: Measuring Progress
Ensures that integration of cyber metrics is part of measurement
process:
No. of plans that fully addressed: 9;
No. of plans that partially addressed: 3;
No. of plans that did not address: 5.
Criteria:
Section 6: Measuring Progress
Describes how cyber metrics will be reported to DHS:
No. of plans that fully addressed: 9;
No. of plans that partially addressed: 6;
No. of plans that did not address: 2.
Criteria:
Section 6: Measuring Progress
Includes developing and using cyber metrics to measure progress:
No. of plans that fully addressed: 8;
No. of plans that partially addressed: 5;
No. of plans that did not address: 4.
Criteria:
Section 6: Measuring Progress
Describes how to use metrics to guide future cyber projects:
No. of plans that fully addressed: 10;
No. of plans that partially addressed: 4;
No. of plans that did not address: 3.
Criteria:
Section 7: Critical Infrastructure Protection R&D
Describes how technology developments are related to the sector's cyber
goals:
No. of plans that fully addressed: 14;
No. of plans that partially addressed: 2;
No. of plans that did not address: 1.
Criteria:
Section 7: Critical Infrastructure Protection R&D
Describes process to identify cyber security technology requirements:
No. of plans that fully addressed: 11;
No. of plans that partially addressed: 6;
No. of plans that did not address: 0.
Criteria:
Section 7: Critical Infrastructure Protection R&D
Describes process to solicit information on ongoing cyber R&D
initiatives:
No. of plans that fully addressed: 13;
No. of plans that partially addressed: 2;
No. of plans that did not address: 2.
Criteria:
Section 7: Critical Infrastructure Protection R&D
Identifies existing cyber-related projects that support goals &
identifies gaps:
No. of plans that fully addressed: 7;
No. of plans that partially addressed: 5;
No. of plans that did not address: 5.
Criteria:
Section 7: Critical Infrastructure Protection R&D
Identifies R&D governance structure:
No. of plans that fully addressed: 17;
No. of plans that partially addressed: 0;
No. of plans that did not address: 0.
Criteria:
Section 8: Managing and Coordinating SSA responsibilities
Describes sector-specific agency's management of NIPP responsibilities:
No. of plans that fully addressed: 17;
No. of plans that partially addressed: 0;
No. of plans that did not address: 0.
Criteria:
Section 8: Managing and Coordinating SSA responsibilities
Describes process for updating, reporting, budgeting, and training:
No. of plans that fully addressed: 16;
No. of plans that partially addressed: 1;
No. of plans that did not address: 0.
Criteria:
Section 8: Managing and Coordinating SSA responsibilities
Describes sector's coordination structure:
No. of plans that fully addressed: 17;
No. of plans that partially addressed: 0;
No. of plans that did not address: 0.
Criteria:
Section 8: Managing and Coordinating SSA responsibilities
Describes process for investment priorities:
No. of plans that fully addressed: 14;
No. of plans that partially addressed: 1;
No. of plans that did not address: 2.
Criteria:
Section 8: Managing and Coordinating SSA responsibilities
Describes process for cyber-related information sharing:
No. of plans that fully addressed: 15;
No. of plans that partially addressed: 2;
No. of plans that did not address: 0.
[End of section]
Appendix II: Comments from the Department of Homeland Security:
U.S. Department of Homeland Security:
Washington, DC 20528:
October 16, 2007:
Mr. David A. Powner:
Director:
Information Technology Management Issues:
Government Accountability Office:
Washington, DC 20548:
Dear Mr. Powner:
Re: Draft Report GAO-07-1191, Critical Infrastructure Protection Sector-
Specific Plans' Coverage of Key Cyber Security Elements Varies.
Thank you for the opportunity to review the draft report.
The following represents the Department's response to the GAO
recommendation.
Recommendation:
To assist the sectors in securing their cyber assets, we recommend that
the Secretary of Homeland Security direct the Assistant Secretary for
Infrastructure Protection and the Assistant Secretary for Cyber
Security and Communication to request that by September 2008 the sector-
specific agencies' plans address the cyber related criteria that were
only partially addressed or not addressed at all.
Response:
Concur. However, we propose a revision to the recommendation as follows
To assist the sectors in securing their cyber infrastructure, we are
recommending that the Secretary of Homeland Security direct the
Assistant Secretary for Infrastructure Protection and the Assistant
Secretary for Cybersecurity and Communications to request that by
September 2008 the sector-specific agencies' plans address the cyber-
related criteria that were only partially addressed or not addressed.
Rationale: Infrastructure is a broader term than assets. Suggest using
infrastructure for consistency with NIPP concept of assets, systems,
networks, and functions.
DHS has adopted the language of Section 514 of the Homeland Security
Act (6 U.S.C. 321c(b)) establishing the position of Assistant Secretary
for "Cybersecurity" and Communications.
The Cybersecurity and Communications National Cyber Security Division
is currently working on an action plan to assist sectors in addressing
cyber security issues not adequately addressed in the initial Sector-
Specific Plans (SSPs).
Sincerely,
Signed by:
Steven J. Pecinovsky:
Director:
Departmental GAO/OIG Liaison Office
[End of section]
Appendix III: GAO Contacts and Staff Acknowledgments:
GAO Contacts:
David A. Powner at (202) 512-9286 or pownerd@gao.gov:
Keith A. Rhodes at (202) 512-6412 or rhodesk@gao.gov:
Staff Acknowledgments:
In addition to the contacts named above, the following also made key
contributions to this report: Scott Borre, Barbara Collier, Neil
Doherty, Michael Gilmore, Nancy Glover, Franklin Jackson, Barbarol
James, and Eric Winter.
[End of section]
Footnotes:
[1] The White House, Homeland Security Presidential Directive 7
(Washington, D.C.: Dec. 17, 2003); and Department of Homeland Security,
National Infrastructure Protection Plan (Washington, D.C.: 2006).
[2] GAO, Critical Infrastructure Protection: Department of Homeland
Security Faces Challenges in Fulfilling Cybersecurity Responsibilities.
GAO-05-434 (Washington, D.C.: May 26, 2005).
[3] New, published versions of the plans are due every 3 years;
however, new internal versions of the plans are to be completed every
year.
[End of section]
GAO's Mission:
The Government Accountability Office, the audit, evaluation, and
investigative arm of Congress, exists to support Congress in meeting
its constitutional responsibilities and to help improve the performance
and accountability of the federal government for the American people.
GAO examines the use of public funds; evaluates federal programs and
policies; and provides analyses, recommendations, and other assistance
to help Congress make informed oversight, policy, and funding
decisions. GAO's commitment to good government is reflected in its core
values of accountability, integrity, and reliability.
Obtaining Copies of GAO Reports and Testimony:
The fastest and easiest way to obtain copies of GAO documents at no
cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each
weekday, GAO posts newly released reports, testimony, and
correspondence on its Web site. To have GAO e-mail you a list of newly
posted products every afternoon, go to [hyperlink, http://www.gao.gov]
and select "E-mail Updates."
Order by Mail or Phone:
The first copy of each printed report is free. Additional copies are $2
each. A check or money order should be made out to the Superintendent
of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or
more copies mailed to a single address are discounted 25 percent.
Orders should be sent to:
U.S. Government Accountability Office:
441 G Street NW, Room LM:
Washington, DC 20548:
To order by Phone: Voice:
(202) 512-6000:
TDD: (202) 512-2537:
Fax: (202) 512-6061:
To Report Fraud, Waste, and Abuse in Federal Programs:
Contact:
Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]:
E-mail: fraudnet@gao.gov:
Automated answering system: (800) 424-5454 or (202) 512-7470:
Congressional Relations:
Gloria Jarmon, Managing Director, jarmong@gao.gov:
(202) 512-4400:
U.S. Government Accountability Office:
441 G Street NW, Room 7125:
Washington, DC 20548:
Public Affairs:
Chuck Young, Managing Director, youngc1@gao.gov:
(202) 512-4800:
U.S. Government Accountability Office:
441 G Street NW, Room 7149:
Washington, DC 20548: