Critical Infrastructure Protection

Sector-Specific Plans' Coverage of Key Cyber Security Elements Varies Gao ID: GAO-08-64T October 31, 2007

The nation's critical infrastructure sectors--such as banking and finance, information technology, and public health--rely on computerized information and systems to provide services to the public. To fulfill the requirement for a comprehensive plan, including cyber aspects, the Department of Homeland Security (DHS) issued a national plan in June 2006 for the sectors to use as a road map to enhance the protection of critical infrastructure. Lead federal agencies, referred to as sector-specific agencies, are responsible for coordinating critical infrastructure protection efforts such as the development of plans that are specific to each sector. GAO was asked to summarize a report being released today that identifies the extent to which the sector plans addressed key aspects of cyber security, including cyber assets, key vulnerabilities, vulnerability reduction efforts, and recovery plans. In the report, GAO analyzed each sector-specific plan against criteria that were developed on the basis of DHS guidance.

The extent to which the sectors addressed aspects of cyber security in their sector-specific plans varied; none of the plans fully addressed all 30 cyber security-related criteria. Several sector plans--including the information technology and telecommunications sectors--fully addressed many of the criteria, while others--such as agriculture and food and commercial facilities--were less comprehensive. In addition to the variations in the extent to which the plans covered aspects of cyber security, there was also variance among the plans in the extent to which certain criteria were addressed. For example, all plans fully addressed identifying a sector governance structure for research and development, but fewer than half of the plans fully addressed describing any incentives used to encourage voluntary performance of risk assessments. The varying degrees to which each plan addressed the cyber security-related criteria can be attributed in part to the varying levels of maturity in the different sectors. DHS acknowledges the shortcomings in the plans. DHS officials stated that the sector-specific plans represent only the early efforts by the sectors to develop their respective plans. Nevertheless, until the plans fully address key cyber elements, certain sectors may not be prepared to respond to a cyber attack against our nation's critical infrastructure. As the plans are updated, it will be important that DHS work with the sector representatives to ensure that the areas not sufficiently addressed are covered. Otherwise, the plans will remain incomplete and sector efforts will not be sufficient to enhance the protection of their computer-reliant assets.



GAO-08-64T, Critical Infrastructure Protection: Sector-Specific Plans' Coverage of Key Cyber Security Elements Varies This is the accessible text file for GAO report number GAO-08-64T entitled 'Critical Infrastructure Protection: Sector-Specific Plans' Coverage of Key Cyber Security Elements Varies' which was released on October 31, 2007. This text file was formatted by the U.S. Government Accountability Office (GAO) to be accessible to users with visual impairments, as part of a longer term project to improve GAO products' accessibility. Every attempt has been made to maintain the structural and data integrity of the original printed product. Accessibility features, such as text descriptions of tables, consecutively numbered footnotes placed at the end of the file, and the text of agency comment letters, are provided but may not exactly duplicate the presentation or format of the printed version. The portable document format (PDF) file is an exact electronic replica of the printed version. We welcome your feedback. Please E-mail your comments regarding the contents or accessibility features of this document to Webmaster@gao.gov. This is a work of the U.S. government and is not subject to copyright protection in the United States. It may be reproduced and distributed in its entirety without further permission from GAO. Because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately. United States Government Accountability Office: GAO: Testimony: Before Congressional Subcommittees: Committee on Homeland Security: U.S. House of Representatives: For Release on Delivery: Expected at 2:00 p.m. EDT: Wednesday, October 31, 2007: Critical Infrastructure Protection: Sector-Specific Plans' Coverage of Key Cyber Security Elements Varies: Statement of David A. Powner: Director: Information Technology Management Issues: GAO-08-64T: GAO Highlights: Highlights of GAO-08-64T, a testimony before congressional subcommittees, Committee on Homeland Security, U.S. House of Representatives. Why GAO Did This Study: The nation's critical infrastructure sectorsùsuch as banking and finance, information technology, and public healthùrely on computerized information and systems to provide services to the public. To fulfill the requirement for a comprehensive plan, including cyber aspects, the Department of Homeland Security (DHS) issued a national plan in June 2006 for the sectors to use as a road map to enhance the protection of critical infrastructure. Lead federal agencies, referred to as sector- specific agencies, are responsible for coordinating critical infrastructure protection efforts such as the development of plans that are specific to each sector. GAO was asked to summarize a report being released today that identifies the extent to which the sector plans addressed key aspects of cyber security, including cyber assets, key vulnerabilities, vulnerability reduction efforts, and recovery plans. In the report, GAO analyzed each sector-specific plan against criteria that were developed on the basis of DHS guidance. What GAO Found: The extent to which the sectors addressed aspects of cyber security in their sector-specific plans varied; none of the plans fully addressed all 30 cyber security-related criteria. Several sector plansùincluding the information technology and telecommunications sectorsùfully addressed many of the criteria, while othersùsuch as agriculture and food and commercial facilitiesùwere less comprehensive. The following figure summarizes the extent to which each plan addressed the 30 criteria. Graph: Comprehensiveness of Sector-Specific Plans: This figure is a vertical stacked bar graph, depicting seventeen sectors on the horizontal axis in three categories: comprehensive, somewhat comprehensive, and less comprehensive. The vertical axis of the graph represents number of criteria, from 0 to 30. All bars meet the total of 30 criteria, through a stacking of fully addressed, partially addressed and not addressed. The following is an approximation of the number of criteria represented in the graph by sectors: Information technology: Comprehensive; Fully addressed: 28; Partially addressed: 2; Not addressed: 0. Telecommunications: Comprehensive; Fully addressed: 27; Partially addressed: 3; Not addressed: 0. Public health: Comprehensive; Fully addressed: 27; Partially addressed: 1; Not addressed: 2. Energy: Comprehensive; Fully addressed: 24; Partially addressed: 3; Not addressed: 3. Government facilities: Comprehensive; Fully addressed: 24; Partially addressed: 3; Not addressed: 3. Nuclear reactors: Comprehensive; Fully addressed: 23; Partially addressed: 6; Not addressed: 1. Water: Comprehensive; Fully addressed: 23; Partially addressed: 6; Not addressed: 1. Chemical: Comprehensive; Fully addressed: 23; Partially addressed: 6; Not addressed: 1. Dams: Comprehensive; Fully addressed: 23; Partially addressed: 6; Not addressed: 1. Transportation: Comprehensive; Fully addressed: 22; Partially addressed: 6; Not addressed: 2. Emergency services: Comprehensive; Fully addressed: 22; Partially addressed: 4; Not addressed: 4. Postal and shipping: Comprehensive; Fully addressed: 21; Partially addressed: 8; Not addressed: 1. Banking and finance: Somewhat comprehensive; Fully addressed: 19; Partially addressed: 7; Not addressed: 4. Defense industrial base: Somewhat comprehensive; Fully addressed: 18; Partially addressed: 5; Not addressed: 7. National monuments: Somewhat comprehensive; Fully addressed: 17; Partially addressed: 8; Not addressed: 5. Agriculture and food: Less comprehensive; Fully addressed: 10; Partially addressed: 10; Not addressed: 10. Commercial facilities: Less comprehensive; Fully addressed: 8; Partially addressed: 12; Not addressed: 10. Source: GAO analysis of agency data. [End of graph] What GAO Recommends: In its report, GAO recommends that the Secretary of Homeland Security request that, by September 2008, the sector-specific agencies develop plans that fully address all of the cyber-related criteria. In written comments on a draft of the report, DHS concurred with GAOÆs recommendation. To view the full product, including the scope and methodology, click on [hyperlink, http://www.GAO-08-64T]. For more information, contact David Powner at (202) 512-9286 or pownerd@gao.gov. [End of section] Mr. Chairman, Madame Chairwoman, and Members of the Subcommittees: Thank you for the opportunity to join in today's hearing to discuss transitioning critical infrastructure protection sector-specific plans into action. Because the nation's critical infrastructure relies extensively on computerized information systems and electronic data to maintain the nation's security, economy, and public health and safety, the security of those systems and information is essential. To help address critical infrastructure protection, federal policy has established a framework for public-and private-sector partnerships.[Footnote 1] It has also identified 17 critical infrastructure sectors that are largely owned and operated by the private sector, including banking and finance, information technology, telecommunications, energy, and public health and healthcare. Federal policy requires the development of a national plan by the Department of Homeland Security (DHS) to outline national goals, objectives, milestones, and key initiatives as well as the development of individual critical infrastructure sector plans--referred to as sector-specific plans--to outline how a sector's public and private stakeholders will implement the national plan. Lead federal agencies, referred to as sector-specific agencies (including DHS, Department of the Treasury, and the Department of Health and Human Services), are responsible for coordinating critical infrastructure protection efforts with the public and private stakeholders in their respective sectors. DHS issued a National Infrastructure Protection Plan (NIPP) in June 2006 to be used as a road map for how DHS and other relevant stakeholders are to use risk management principles to prioritize protection activities within and across the sectors in an integrated, coordinated fashion. NIPP requires each of the lead federal agencies associated with the 17 critical infrastructure sectors to develop sector-specific plans to address how the sectors' stakeholders would implement the national plan and how they would improve the security of their assets, systems, networks, and functions. These plans are to, among other things, describe how the sector will identify and prioritize its critical assets, including cyber assets, and define approaches the sector will take to assess risks and develop programs to protect those assets. DHS announced the release of the 17 sector plans on May 21, 2007. As requested, our testimony today will summarize our report being released today on the cyber security aspects of the critical infrastructure protection sector-specific plans.[Footnote 2] In the report, we analyzed each sector-specific plan against 30 criteria that we developed based on DHS guidance. The 30 criteria are shown in appendix I. The report contains a detailed overview of the scope and methodology we used. The work on which this testimony is based was performed in accordance with generally accepted government auditing standards. Results in Brief: The extent to which the sectors addressed key aspects of cyber security in their sector-specific plans varied; none of the plans fully addressed all 30 cyber security-related criteria. Several plans-- including those from the information technology and telecommunications sectors--fully addressed many of the criteria, while others--such as those from the agriculture and food and commercial facilities sectors- -were not as comprehensive. In addition to the varying degrees with which the sector-specific plans covered aspects of cyber security, the plans as a whole addressed certain criteria more comprehensively than they did others. For example, all 17 plans fully addressed the criterion to identify a sector governance structure for research and development, while only 7 plans fully addressed the process for identifying the consequences of cyber attacks. Further, only 3 plans fully addressed the criterion to describe incentives used to encourage voluntary performance of risk assessments. The varying degrees to which each plan addressed the cyber security- related criteria can be attributed in part to the varying levels of maturity of the different sectors: that is, sectors where stakeholders had more experience working together on critical infrastructure issues generally had more comprehensive and complete plans than those in which their stakeholders had less prior experience working together. Without comprehensive plans, certain sectors may not be effectively identifying, prioritizing, and protecting the cyber aspects of their critical infrastructure protection efforts. For example, with most sectors lacking a process for identifying the consequences of cyber attacks against their assets, our nation's sectors could be ill- prepared to respond properly to a cyber attack. To assist the sectors in securing their cyber infrastructure, we made a recommendation in our report to the Secretary of Homeland Security to request that by September 2008, the sector-specific agencies' plans address the cyber-related criteria that have not been fully addressed. In written comments on a draft of the report, DHS concurred with our recommendation. Background: Our nation's critical infrastructures--such as banking and finance, information technology, telecommunications, energy, and public health and healthcare--rely extensively on computerized information systems and electronic data to carry out their missions. The security of these systems and data, referred to as cyber critical infrastructure protection, is essential to preventing disruptions in critical operations, fraud, and inappropriate disclosure of sensitive information. Due in part to the importance of and increasing reliance on these electronic systems, we designated cyber critical infrastructure protection, in conjunction with protecting the federal government's information systems, as a high risk area in 2003. In January 2005 and 2007, we identified cyber critical infrastructure protection as a high-risk area because of the continuing concern about risks to information systems from escalating and emerging threats; the ease of obtaining and using hacking tools; the steady advance in the sophistication of attack technology; and the emergence of new and more destructive attacks. As the focal point for critical infrastructure protection, DHS has many cyber security-related roles and responsibilities that are called for in law and policy. In May 2005, we identified 13 key cyber security responsibilities (see table 1).[Footnote 3] These responsibilities are described in more detail in appendix II. Table 1: DHS Key Cyber Security Responsibilities: 1. Develop a comprehensive national plan for critical infrastructure protection, including cyber security. 2. Develop partnerships and coordinate with other federal agencies, state and local governments, and the private sector. 3. Improve and enhance public/private information sharing involving cyber attacks, threats, and vulnerabilities. 4. Develop and enhance national cyber analysis and warning capabilities. 5. Provide and coordinate incident response and recovery planning efforts. 6. Identify and assess cyber threats and vulnerabilities. 7. Support efforts to reduce cyber threats and vulnerabilities. 8. Promote and support research and development efforts to strengthen cyber space security. 9. Promote awareness and outreach. 10. Foster training and certification. 11. Enhance federal, state, and local government cyber security. 12. Strengthen international cyber space security. 13. Integrate cyber security with national security. Source: GAO analysis of the Homeland Security Act of 2002, the Homeland Security Presidential Directive-7, and the National Strategy to Secure Cyberspace. [End of table] In May 2005, we reported that while DHS had initiated multiple efforts to fulfill its responsibilities, it had not fully addressed any of the 13 responsibilities.[Footnote 4] For example, the department established the United States Computer Emergency Readiness Team as a public/private partnership to make cyber security a coordinated national effort and it established forums to build greater trust and information sharing among federal officials who have information security responsibilities and law enforcement entities. However, DHS had not yet developed national cyber threat and vulnerability assessments or government/industry contingency recovery plans for cyber security. In September 2006, we testified that DHS had made progress on its responsibilities, but that none had been completely addressed.[Footnote 5] One of DHS's key cyber security responsibilities is the development of a comprehensive national plan for securing both the physical and cyber aspects of the key resources and critical infrastructure of the United States. The plan is to outline national strategies, activities, and milestones for protecting critical infrastructures. To fulfill this responsibility, in June 2006, DHS issued the National Infrastructure Protection Plan (NIPP) to guide how DHS and other relevant stakeholders are to use risk management principles to prioritize protection activities within and across the sectors in an integrated, coordinated fashion. NIPP requires each of the lead federal agencies associated with the 17 critical infrastructure sectors to develop sector-specific plans to address how the sectors' stakeholders would implement the national plan and how they would improve the security of their assets, systems, networks, and functions. As part of these efforts, DHS provided guidance to the sectors for developing their sector-specific plans, including guidance on cyber aspects. To strengthen DHS's ability to implement its cyber security responsibilities and to resolve underlying challenges, we have made about 25 recommendations over the last several years. These recommendations focus on the need to (1) conduct threat and vulnerability assessments, (2) develop a strategic analysis and warning capability for identifying potential cyber attacks, (3) protect infrastructure control systems, (4) enhance public/private information sharing, and (5) facilitate recovery planning, including recovery of the Internet in case of a major disruption. For example, in May 2005, we recommended, among other things, that DHS prioritize key cyber security responsibilities, including: performing a national cyber threat assessment and facilitating sector cyber vulnerability assessments. DHS has made varying levels of progress on many of these recommendations; however, additional efforts are needed to fully address them. Regarding the protection of infrastructure control systems, we issued a report on September 10, 2007, and testified on October 17, 2007, before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology, House Committee on Homeland Security. In the report, we made a recommendation that DHS develop a strategy for coordinating control systems security efforts and enhance information sharing with control systems stakeholders.[Footnote 6] Collectively, our recommendations provide a high-level road map for the agency to use in improving our nation's cyber security posture. Sector-Specific Plans' Coverage of Key Cyber Security Elements Varies: In May 2007, DHS announced the release of 17 sector-specific plans to fulfill the NIPP requirement for individual sector plans. The extent to which the sectors addressed aspects of cyber security in their plans varied; none of the plans fully addressed all 30 cyber security-related criteria. Several plans--including those from the information technology and telecommunications sectors--fully addressed many of the criteria, while others--such as agriculture and food and commercial facilities--were less comprehensive. Figure 1 summarizes the extent to which each plan addressed the 30 criteria. Figure 1: Comprehensiveness of Sector-Specific Plans: [See PDF for image] This figure is a vertical stacked bar graph, depicting seventeen sectors on the horizontal axis in three categories: comprehensive, somewhat comprehensive, and less comprehensive. The vertical axis of the graph represents number of criteria, from 0 to 30. All bars meet the total of 30 criteria, through a stacking of fully addressed, partially addressed and not addressed. The following is an approximation of the number of criteria represented in the graph by sectors: Information technology: Comprehensive; Fully addressed: 28; Partially addressed: 2; Not addressed: 0. Telecommunications: Comprehensive; Fully addressed: 27; Partially addressed: 3; Not addressed: 0. Public health: Comprehensive; Fully addressed: 27; Partially addressed: 1; Not addressed: 2. Energy: Comprehensive; Fully addressed: 24; Partially addressed: 3; Not addressed: 3. Government facilities: Comprehensive; Fully addressed: 24; Partially addressed: 3; Not addressed: 3. Nuclear reactors: Comprehensive; Fully addressed: 23; Partially addressed: 6; Not addressed: 1. Water: Comprehensive; Fully addressed: 23; Partially addressed: 6; Not addressed: 1. Chemical: Comprehensive; Fully addressed: 23; Partially addressed: 6; Not addressed: 1. Dams: Comprehensive; Fully addressed: 23; Partially addressed: 6; Not addressed: 1. Transportation: Comprehensive; Fully addressed: 22; Partially addressed: 6; Not addressed: 2. Emergency services: Comprehensive; Fully addressed: 22; Partially addressed: 4; Not addressed: 4. Postal and shipping: Comprehensive; Fully addressed: 21; Partially addressed: 8; Not addressed: 1. Banking and finance: Somewhat comprehensive; Fully addressed: 19; Partially addressed: 7; Not addressed: 4. Defense industrial base: Somewhat comprehensive; Fully addressed: 18; Partially addressed: 5; Not addressed: 7. National monuments: Somewhat comprehensive; Fully addressed: 17; Partially addressed: 8; Not addressed: 5. Agriculture and food: Less comprehensive; Fully addressed: 10; Partially addressed: 10; Not addressed: 10. Commercial facilities: Less comprehensive; Fully addressed: 8; Partially addressed: 12; Not addressed: 10. Source: GAO analysis of agency data. [End of figure] In addition to the variations in the extent to which the plans covered aspects of cyber security, there was also variance among the plans in the extent to which certain criteria were addressed. For example, all plans fully addressed (1) identifying a sector governance structure for research and development, (2) describing how the sector- specific agency intends to manage its NIPP responsibilities; and (3) describing the sector's coordinating mechanisms and structures. Also, at least 15 of the plans fully addressed (1) characterizing the sector's infrastructure, including the cyber reliance, (2) identifying stakeholder relationships for securing cyber assets, (3) describing a process for updating, reporting, budgeting, and training, and (4) describing a process for cyber-related information sharing. However, fewer than half of the plans fully addressed: (1) describing a process to identify potential consequences of cyber attacks, (2) describing any incentives used to encourage voluntary performance of risk assessments, (3) developing and using cyber metrics to measure progress, and (4) identifying existing cyber-related projects that support goals and identify gaps. The varying degrees to which each plan addressed the cyber security- related criteria can be attributed in part to the varying levels of maturity of the different sectors. According to DHS officials, the sectors that have been working together longer on critical infrastructure issues generally have developed more comprehensive and complete plans than the sectors with stakeholders that had not previously worked together. For example, the plan for the energy sector was among those categorized as most comprehensive: the chemical sector had worked with DHS to improve the cyber component in its plans and it included most of the key information required for each plan element. Furthermore, the limited amount of time to complete the plans--6 months--was a factor for those sectors that had not previously been working together on critical infrastructure issues and were thus less mature. DHS acknowledges the shortcomings we identified in the plans. Officials stated that the sector-specific plans represent only the early efforts by the sectors to develop their respective plans and anticipate that the plans will improve over time. Nevertheless, until the plans fully address key cyber elements, certain sectors may not be prepared to respond to a cyber attack against our critical infrastructure. As the plans are updated, it will be important that DHS work with the sector representatives to ensure that the areas not sufficiently addressed are covered. Otherwise, the plans will remain incomplete and sector efforts will not be sufficient to enhance the protection of their computer- reliant assets. To assist the sectors in securing their cyber infrastructure, we recommended in our report that the Secretary of Homeland Security direct the Assistant Secretary for Infrastructure Protection and the Assistant Secretary for Cybersecurity and Communications to request that by September 2008, the sector-specific agencies' plans address the cyber-related criteria that were not fully addressed. In written comments on a draft of the report, DHS's Director, Departmental GAO/OIG Liaison, concurred with our recommendation. In addition, he stated that DHS is currently working on an action plan to assist sectors in addressing cyber security issues not adequately addressed in the initial sector-specific plans. In summary, without comprehensive plans, certain sectors may not be effectively identifying, prioritizing, and protecting the cyber aspects of their critical infrastructure. For example, with most sectors lacking a process for identifying the consequences of cyber attacks against their assets, our nation's sectors could be ill- prepared to respond properly to a cyber attack. In addition, without comprehensive plans, DHS cannot adequately identify where it and the rest of the federal government can most effectively assist in enhancing the security of the nation's critical infrastructures that are largely owned and operated by the private sector. Ultimately, our nation needs to move beyond the planning stages of securing our critical infrastructures and public and private sector owners and operators of our nation's critical infrastructure need to effectively implement these plans. Implementation of these plans is more likely if DHS can successfully fulfill its role as a focal point for critical infrastructure protection. To accomplish this, DHS needs to address its 13 key responsibilities and our previous recommendations. For example, if DHS enhanced national cyber analysis and warning capabilities and provided assessments of cyber threats and vulnerabilities, it would be viewed as providing a valuable service to critical infrastructure owners, thus improving our nation's ability to prepare for, respond to, and prevent major cyber attacks from occurring. Mr. Chairman and Madame Chairwoman, this concludes my statement. I would be happy to answer any questions at this time. If you have any questions on matters discussed in this testimony, please contact me at (202) 512-9286 or by e-mail at pownerd@gao.gov. Other key contributors to this testimony include Scott Borre, Michael Gilmore, Nancy Glover, Barbarol James, and Eric Winter. [End of section] Appendix I: Cyber Security Criteria: Section 1: Sector Profile and Goals: * Characterizes cyber aspects; * Identifies stakeholder relationships for securing cyber assets. Section 2: Identify Assets, Systems, Networks, and Functions: * Describes process to identify cyber assets, functions, or elements; * Describes process to identify cyber dependencies/independences. Section 3: Assess Risks: * Describes how the risk assessment process addresses cyber elements; * Describes a screening process for cyber aspects; * Describes methodology to identify potential consequences of cyber attacks; * Describes methodology for vulnerability assessments of cyber aspects; * Describes methodology for threat analyses of cyber aspects; * Describes incentives to encourage voluntary vulnerability assessments. Section 4: Prioritizing Infrastructure: * Identifies entity responsible for prioritization of cyber aspects; * Describes criteria and basis for prioritization of cyber aspects. Section 5: Develop and Implement Protective Programs: * Describes process to develop long-term protective plans for cyber aspects; * Describes process to identify specific cyber-related program needs; * Identifies programs to deter, respond, and recover from cyber attack; * Addresses implementation and maintenance of protective programs. Section 6: Measure Progress: * Ensures that integration of cyber metrics is part of measurement process; * Describes how cyber metrics will be reported to DHS; * Includes developing and using cyber metrics to measure progress; * Describes how to use metrics to guide future cyber projects. Section 7: Critical Infrastructure Protection Research and Development: * Describes how technology developments are related to the sector‘s cyber goals; * Describes process to identify cyber security technology requirements; * Describes process to solicit information on ongoing cyber research and development initiatives; * Identifies existing cyber-related projects that support goals and identifies gaps; * Identifies research and development governance structure. Section 8: Managing Sector-Specific Agency Responsibilities: * Describes sector-specific agency‘s management of NIPP responsibilities; * Describes process for updating, reporting, budgeting, and training; * Describes sector‘s coordination structure; * Describes process for investment priorities; * Describes process for cyber-related information sharing. Source: GAO analysis based on DHS guidance. [End of table] [End of section] Appendix II: Thirteen DHS Cyber Security Responsibilities: Critical infrastructure protection responsibilities with a cyber element: 1. Develop a national plan for critical infrastructure protection that includes cyber security; DHS Responsibilities: Develop a comprehensive national plan for securing the key resources and critical infrastructure of the United States, including information technology and telecommunications systems (including satellites) and the physical and technological assets that support such systems. This plan is to outline national strategies, activities, and milestones for protecting critical infrastructures. Critical infrastructure protection responsibilities with a cyber element: 2. Develop partnerships and coordinate with other federal agencies, state and local governments, and the private sector; DHS Responsibilities: Foster and develop public/private partnerships with and among other federal agencies, state and local governments, the private sector, and others. DHS is to serve as the focal point for the security of cyber space. Critical infrastructure protection responsibilities with a cyber element: 3. Improve and enhance public/private information sharing involving cyber attacks, threats, and vulnerabilities; DHS Responsibilities: Improve and enhance information sharing with and among other federal agencies, state and local governments, the private sector, and others through improved partnerships and collaboration, including encouraging information sharing and analysis mechanisms. DHS is to improve sharing of information on cyber attacks, threats, and vulnerabilities. Responsibilities related to the cyber space strategy's five priorities: 4. Develop and enhance national cyber analysis and warning capabilities; DHS Responsibilities: Provide cyber analysis and warnings, enhance analytical capabilities, and develop a national indications and warnings architecture to identify precursors to attacks. Responsibilities related to the cyber space strategy's five priorities: 5. Provide and coordinate incident response and recovery planning efforts; DHS Responsibilities: Provide crisis management in response to threats to or attacks on critical information systems. This entails coordinating efforts for incident response, recovery planning, exercising cyber security continuity plans for federal systems, planning for recovery of Internet functions, and assisting infrastructure stakeholders with cyber-related emergency recovery plans. Responsibilities related to the cyber space strategy's five priorities: 6. Identify and assess cyber threats and vulnerabilities; DHS Responsibilities: Lead efforts by the public and private sectors to conduct a national cyber threat assessment, to conduct or facilitate vulnerability assessments of sectors, and to identify cross-sector interdependencies. Responsibilities related to the cyber space strategy's five priorities: 7. Support efforts to reduce cyber threats and vulnerabilities; DHS Responsibilities: Lead and support efforts by the public and private sectors to reduce threats and vulnerabilities. Threat reduction involves working with the law enforcement community to investigate and prosecute cyberspace threats. Vulnerability reduction involves identifying and remediating vulnerabilities in existing software and systems. Responsibilities related to the cyber space strategy's five priorities: 8. Promote and support research and development efforts to strengthen cyber space security; DHS Responsibilities: Collaborate and coordinate with members of academia, industry, and government to optimize cyber security-related research and development efforts to reduce vulnerabilities through the adoption of more secure technologies. Responsibilities related to the cyber space strategy's five priorities: 9. Promote awareness and outreach; DHS Responsibilities: Establish a comprehensive national awareness program to promote efforts to strengthen cyber security throughout government and the private sector, including the home user. Responsibilities related to the cyber space strategy's five priorities: 10. Foster training and certification; DHS Responsibilities: Improve cyber security-related education, training, and certification opportunities. Responsibilities related to the cyber space strategy's five priorities: 11. Enhance federal, state, and local government cyber security; DHS Responsibilities: Partner with federal, state, and local governments in efforts to strengthen the cyber security of the nation‘s critical information infrastructure to assist in the deterrence, prevention, preemption of, and response to terrorist attacks against the United States. Responsibilities related to the cyber space strategy's five priorities: 12. Strengthen international cyberspace security; DHS Responsibilities: Work in conjunction with other federal agencies, international organizations, and industry in efforts to promote strengthened cyber security on a global basis. Responsibilities related to the cyber space strategy's five priorities: 13. Integrate cyber security with national security; DHS Responsibilities: Coordinate and integrate applicable national preparedness goals with the National Infrastructure Protection Plan. Source: GAO analysis of the Homeland Security Act of 2002, the Homeland Security Presidential Directive-7, and the National Strategy to Secure Cyberspace. [End of table] [End of section] Footnotes: [1] The White House, Homeland Security Presidential Directive 7 (Washington, D.C.: Dec. 17, 2003). Department of Homeland Security, National Infrastructure Protection Plan, (Washington, D.C.: June 2006). [2] GAO, Critical Infrastructure Protection: Sector-Specific Plans' Coverage of Key Cyber Security Elements Varies, GAO-08-113 (Washington, D.C.: Oct. 31, 2007). [3] GAO, Critical Infrastructure Protection: Department of Homeland Security Faces Challenges in Fulfilling Cybersecurity Responsibilities, GAO-05-434 (Washington, D.C.: May 26, 2005). [4] GAO-05-434. [5] GAO, Critical Infrastructure Protection: DHS Leadership Needed to Enhance Cybersecurity, GAO-06-1087T (Washington, D.C.: Sep. 13, 2006). [6] GAO, Critical Infrastructure Protection: Multiple Efforts to Secure Control Systems Are Under Way, but More Remains to Be Done, GAO-07-1036 (Washington, D.C.: Sept.10, 2007) and Critical Infrastructure Protection: Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain, GAO-08-119T, (Washington, D.C.: Oct. 17, 2007). [End of section] GAO's Mission: The Government Accountability Office, the audit, evaluation and investigative arm of Congress, exists to support Congress in meeting its constitutional responsibilities and to help improve the performance and accountability of the federal government for the American people. GAO examines the use of public funds; evaluates federal programs and policies; and provides analyses, recommendations, and other assistance to help Congress make informed oversight, policy, and funding decisions. GAO's commitment to good government is reflected in its core values of accountability, integrity, and reliability. Obtaining Copies of GAO Reports and Testimony: The fastest and easiest way to obtain copies of GAO documents at no cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each weekday, GAO posts newly released reports, testimony, and correspondence on its Web site. To have GAO e-mail you a list of newly posted products every afternoon, go to [hyperlink, http://www.gao.gov] and select "Subscribe to Updates." Order by Mail or Phone: The first copy of each printed report is free. Additional copies are $2 each. A check or money order should be made out to the Superintendent of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or more copies mailed to a single address are discounted 25 percent. Orders should be sent to: U.S. Government Accountability Office: 441 G Street NW, Room LM: Washington, D.C. 20548: To order by Phone: Voice: (202) 512-6000: TDD: (202) 512-2537: Fax: (202) 512-6061: To Report Fraud, Waste, and Abuse in Federal Programs: Contact: Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]: E-mail: fraudnet@gao.gov: Automated answering system: (800) 424-5454 or (202) 512-7470: Congressional Relations: Gloria Jarmon, Managing Director, JarmonG@gao.gov: (202) 512-4400: U.S. Government Accountability Office: 441 G Street NW, Room 7125: Washington, D.C. 20548: Public Affairs: Chuck Young, Managing Director, youngc1@gao.gov: (202) 512-4800: U.S. Government Accountability Office: 441 G Street NW, Room 7149: Washington, D.C. 20548:

The Justia Government Accountability Office site republishes public reports retrieved from the U.S. GAO These reports should not be considered official, and do not necessarily reflect the views of Justia.