Cyber Analysis and Warning

DHS Faces Challenges in Establishing a Comprehensive National Capability Gao ID: GAO-08-588 July 31, 2008

Cyber analysis and warning capabilities are critical to thwarting computer-based (cyber) threats and attacks. The Department of Homeland Security (DHS) established the United States Computer Emergency Readiness Team (US-CERT) to, among other things, coordinate the nation's efforts to prepare for, prevent, and respond to cyber threats to systems and communications networks. GAO's objectives were to (1) identify key attributes of cyber analysis and warning capabilities, (2) compare these attributes with US-CERT's current capabilities to identify whether there are gaps, and (3) identify US-CERT's challenges to developing and implementing key attributes and a successful national cyber analysis and warning capability. To address these objectives, GAO identified and analyzed related documents, observed operations at numerous entities, and interviewed responsible officials and experts.

Cyber analysis and warning capabilities include (1) monitoring network activity to detect anomalies, (2) analyzing information and investigating anomalies to determine whether they are threats, (3) warning appropriate officials with timely and actionable threat and mitigation information, and (4) responding to the threat. GAO identified 15 key attributes associated with these capabilities. While US-CERT's cyber analysis and warning capabilities include aspects of each of the key attributes, they do not fully incorporate all of them. For example, as part of its monitoring, US-CERT obtains information from numerous external information sources; however, it has not established a baseline of our nation's critical network assets and operations. In addition, while it investigates if identified anomalies constitute actual cyber threats or attacks as part of its analysis, it does not integrate its work into predictive analyses. Further, it provides warnings by developing and distributing a wide array of notifications; however, these notifications are not consistently actionable or timely. US-CERT faces a number of newly identified and ongoing challenges that impede it from fully incorporating the key attributes and thus being able to coordinate the national efforts to prepare for, prevent, and respond to cyber threats. The newly identified challenge is creating warnings that are consistently actionable and timely. Ongoing challenges that GAO previously identified, and made recommendations to address, include employing predictive analysis and operating without organizational stability and leadership within DHS, including possible overlapping roles and responsibilities. Until US-CERT addresses these challenges and fully incorporates all key attributes, it will not have the full complement of cyber analysis and warning capabilities essential to effectively performing its national mission.

Recommendations

Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.

Director: Team: Phone:


GAO-08-588, Cyber Analysis and Warning: DHS Faces Challenges in Establishing a Comprehensive National Capability This is the accessible text file for GAO report number GAO-08-588 entitled 'Cyber Analysis And Warning: DHS Faces Challenges in Establishing a Comprehensive National Capability' which was released on September 16, 2008. This text file was formatted by the U.S. Government Accountability Office (GAO) to be accessible to users with visual impairments, as part of a longer term project to improve GAO products' accessibility. Every attempt has been made to maintain the structural and data integrity of the original printed product. Accessibility features, such as text descriptions of tables, consecutively numbered footnotes placed at the end of the file, and the text of agency comment letters, are provided but may not exactly duplicate the presentation or format of the printed version. The portable document format (PDF) file is an exact electronic replica of the printed version. We welcome your feedback. Please E-mail your comments regarding the contents or accessibility features of this document to Webmaster@gao.gov. This is a work of the U.S. government and is not subject to copyright protection in the United States. It may be reproduced and distributed in its entirety without further permission from GAO. Because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately. Report to the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology, Committee on Homeland Security, House of Representatives: United States Government Accountability Office: GAO: July 2008: Cyber Analysis And Warning: DHS Faces Challenges in Establishing a Comprehensive National Capability: GAO-08-588: GAO Highlights: Highlights of GAO-08-588, a report to the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology, Committee on Homeland Security, House of Representatives. Why GAO Did This Study: Cyber analysis and warning capabilities are critical to thwarting computer-based (cyber) threats and attacks. The Department of Homeland Security (DHS) established the United States Computer Emergency Readiness Team (US CERT) to, among other things, coordinate the nation‘s efforts to prepare for, prevent, and respond to cyber threats to systems and communications networks. GAO‘s objectives were to (1) identify key attributes of cyber analysis and warning capabilities, (2) compare these attributes with US-CERT‘s current capabilities to identify whether there are gaps, and (3) identify US-CERT‘s challenges to developing and implementing key attributes and a successful national cyber analysis and warning capability. To address these objectives, GAO identified and analyzed related documents, observed operations at numerous entities, and interviewed responsible officials and experts. What GAO Found: Cyber analysis and warning capabilities include (1) monitoring network activity to detect anomalies, (2) analyzing information and investigating anomalies to determine whether they are threats, (3) warning appropriate officials with timely and actionable threat and mitigation information, and (4) responding to the threat. GAO identified 15 key attributes associated with these capabilities, as shown in the following table: Table: Key Attributes of Cyber Analysis and Warning: Capability: Monitoring; Attribute: * Establish a baseline understanding of network assets and normal network traffic volume and flow; * Assess risks to network assets; * Obtain internal information on network operations via technical tools and user reports; * Obtain external information on threats, vulnerabilities, and incidents; * Detect anomalous activities. Capability: Analysis; Attribute: * Verify that an anomaly is an incident (threat of attack or actual attack); * Investigate the incident to identify the type of cyber attack, estimate impact, and collect evidence; * Identify possible actions to mitigate the impact of the incident; * Integrate results into predictive analysis of broader implications or potential future attack. Capability: Warning; Attribute: * Develop attack and other notifications that are targeted and actionable; * Provide notifications in a timely manner; * Distribute notifications using appropriate communications methods Capability: Response; Attribute: * Contain and mitigate the incident; * Recover from damages and remediate vulnerabilities; * Evaluate actions and incorporate lessons learned. Source: GAO analysis. [End of table] While US-CERT‘s cyber analysis and warning capabilities include aspects of each of the key attributes, they do not fully incorporate all of them. For example, as part of its monitoring, US-CERT obtains information from numerous external information sources; however, it has not established a baseline of our nation‘s critical network assets and operations. In addition, while it investigates if identified anomalies constitute actual cyber threats or attacks as part of its analysis, it does not integrate its work into predictive analyses. Further, it provides warnings by developing and distributing a wide array of notifications; however, these notifications are not consistently actionable or timely. US-CERT faces a number of newly identified and ongoing challenges that impede it from fully incorporating the key attributes and thus being able to coordinate the national efforts to prepare for, prevent, and respond to cyber threats. The newly identified challenge is creating warnings that are consistently actionable and timely. Ongoing challenges that GAO previously identified, and made recommendations to address, include employing predictive analysis and operating without organizational stability and leadership within DHS, including possible overlapping roles and responsibilities. Until US-CERT addresses these challenges and fully incorporates all key attributes, it will not have the full complement of cyber analysis and warning capabilities essential to effectively performing its national mission. What GAO Recommends: GAO is making 10 recommendations to the Secretary of Homeland Security to implement key attributes and address challenges. DHS concurred with 9 recommendations. It took exception to GAO‘s recommendation to ensure distinct and transparent lines of authority and responsibilities between its organizations, stating it had done this in a concept-of- operations document. However, this document is still in draft, and DHS has not established a date for it to be finalized and implemented. To view the full product, including the scope and methodology, click on [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-08-588]. For more information, contact Dave Powner at 202-512-9286 or pownerd@gao.gov. [End of section] Contents: Letter: Results in Brief: Background: Fifteen Key Attributes Essential to Establishing Cyber Analysis and Warning Capabilities: US-CERT's Capabilities Include Some but Not All Aspects of Key Attributes: US-CERT Faces New and Ongoing Challenges to Fulfilling Its Mission: Conclusions: Recommendations for Executive Action: Agency Comments and Our Evaluation: Appendix I: Objectives, Scope, and Methodology: Appendix II: Comments from the Department of Homeland Security: Appendix III: GAO Contacts and Staff Acknowledgments: Tables: Table 1: Attributes of Cyber Analysis and Warning: Table 2: Sources of Emerging Cybersecurity Threats: Table 3: Types of Cyber Attacks: Table 4: Key Attributes of the Cyber Analysis and Warning Capabilities: Table 5: Common Types of Technology Used for Internal Monitoring: Table 6: US-CERT Capabilities Includes Most but Not All Aspects of Monitoring: Table 7: US-CERT Incorporates Some but Not All Aspects of Analysis: Table 8: US-CERT Exhibits Some but Not All Aspects of Warning: Table 9: US-CERT Warning Products, Fiscal Year 2007: Table 10: Quantity of US-CERT Warning Products, Fiscal Year 2007: Table 11: US-CERT Satisfies Some but Not All Aspects of Response: Figures: Figure 1: Department of Homeland Security Organizational Chart: Figure 2: US-CERT Organizational Structure: Figure 3: A Simplified View of How Cyber Analysis and Warning Capabilities Are Executed: Abbreviations: CERT/CC: CERT Coordination Center: DHS: Department of Homeland Security: DOD: Department of Defense: HITRAC: Homeland Infrastructure Threat and Risk Analysis Center: HSPD: Homeland Security Presidential Directive: ISAC: information sharing and analysis center: NCRCG: National Cyber Response Coordination Group: NCSD: National Cyber Security Division: NIST: National Institute of Standards and Technology: OMB: Office of Management and Budget: US-CERT: United States Computer Emergency Readiness Team: [End of section] United States Government Accountability Office: Washington, DC 20548: July 31, 2008: The Honorable James R. Langevin: Chairman: The Honorable Michael T. McCaul: Ranking Member: Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology: Committee on Homeland Security: House of Representatives: The rapid increase in computer connectivity has revolutionized the way that our government, our nation, and much of the world communicate and conduct business. While the benefits have been enormous, this widespread interconnectivity also poses significant risks to our nation's computer-reliant critical operations. Establishing analytical and warning capabilities is essential to thwarting computer-based, or cyber, threats and attacks. Cyber analysis and warning capabilities include (1) monitoring network activity to detect anomalies, (2) analyzing information and investigating anomalies to determine whether they are threats, (3) warning appropriate officials with timely and actionable threat and mitigation information, and (4) responding to the threat. Federal law and policy direct the Department of Homeland Security (DHS) to establish such capabilities for our nation. To fulfill this requirement, the department established the United States Computer Emergency Readiness Team (US-CERT) to develop and implement these capabilities and, in doing so, coordinate the nation's efforts to prepare for, prevent, and respond to cyber threats and attacks. Our objectives were to (1) identify key attributes of cyber analysis and warning capabilities, (2) compare these attributes with US-CERT's current analysis and warning capabilities to identify whether there are gaps, and (3) identify US-CERT's challenges to developing and implementing key attributes and a successful national cyber analysis and warning capability. To identify key attributes, we identified and analyzed relevant laws, strategies, policies, reports, and studies; observed cyber analysis and warning operations at numerous entities; and interviewed responsible officials and experts from federal and nonfederal entities[Footnote 1]. To determine US-CERT's current capabilities and related challenges, we analyzed DHS's policies, procedures, and program plans and interviewed relevant officials. Appendix I provides further details on our objectives, scope, and methodology. We conducted this performance audit from June 2007 to July 2008 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Results in Brief: Cyber analysis and warning typically encompasses four key capabilities: monitoring, analysis, warning, and response. Monitoring system and communication networks includes activities to detect cyber threats, attacks, and vulnerabilities. Analysis involves taking the information gathered from monitoring and hypothesizing about what the threat or attack might be, investigating it, and identifying any impact and, if necessary, mitigation steps. Warning includes alerting recipients about potential or imminent, as well as ongoing, cyber threats or attacks. Response includes containing and recovering from cyber incidents that occur. Our research and past experience identified 15 key attributes associated with these cyber analysis and warning capabilities, as shown in the following table: Table 1: Attributes of Cyber Analysis and Warning: Capability: Monitoring; Attribute: * Establish a baseline understanding of network assets and normal network traffic volume and flow; * Assess risks to network assets; * Obtain internal information on network operations via technical tools and user reports; * Obtain external information on threats, vulnerabilities, and incidents; * Detect anomalous activities. Capability: Analysis; Attribute: * Verify that an anomaly is an incident (threat of attack or actual attack); * Investigate the incident to identify the type of cyber attack, estimate impact, and collect evidence; * Identify possible actions to mitigate the impact of the incident; * Integrate results into predictive analysis of broader implications or potential future attack. Capability: Warning; Attribute: * Develop attack and other notifications that are targeted and actionable; * Provide notifications in a timely manner; * Distribute notifications using appropriate communications methods Capability: Response; Attribute: * Contain and mitigate the incident; * Recover from damages and remediate vulnerabilities; * Evaluate actions and incorporate lessons learned. Source: GAO analysis. [End of table] While US-CERT's cyber analysis and warning capabilities include aspects of each of the key attributes, they do not fully incorporate all of them. For example, as part of its monitoring, US-CERT obtains information from numerous external information sources; however, it has not established a comprehensive baseline of our nation's critical computer-reliant critical assets and network operations. In addition, while it investigates if identified anomalies constitute actual cyber threats or attacks as part of its analysis, the organization does not integrate its work into predictive analyses, nor does it have the analytical or technical resources to analyze multiple, simultaneous cyber incidents. The organization also provides warnings by developing and distributing a wide array of attack and other notifications; however, these notifications are not consistently actionable or timely- -providing the right information to the right persons or groups as early as possible to give them time to take appropriate action. Further, while it responds to a limited number of affected entities in their efforts to contain and mitigate an attack, recover from damages, and remediate vulnerabilities, the organization does not possess the resources to handle multiple events across the nation. US-CERT faces a number of newly identified and ongoing challenges that impede it from fully implementing the key attributes and in turn establishing cyber analysis and warning capabilities essential to coordinating the national effort to prepare for, prevent, and respond to cyber threats. The newly identified challenge is creating warnings that are actionable and timely--US-CERT does not consistently issue warning and other notifications that its customers find useful. Ongoing challenges that we previously identified and made recommendations to address are: * employing predictive cyber analysis--the organization has not established the ability to determine broader implications from ongoing network activity, predict or protect against future threats, or identify emerging attack methods; * developing more trusted relationships to encourage information sharing--federal and nonfederal entities are reluctant to share information because US-CERT and these parties have yet to develop close working and trusted relationships that would allow the free flow of information; * having sufficient analytical and technical capabilities--the organization has difficulty hiring and retaining adequately trained staff and acquiring supporting technology tools to handle a steadily increasing workload; and: * operating without organizational stability and leadership within DHS-- the department has not provided the sustained leadership to make cyber analysis and warning a priority. This is due in part to frequent turnover in key management positions that currently also remain vacant. In addition, US-CERT's role as the central provider of cyber analysis and warning may be diminished by the creation of a new DHS center at a higher organizational level. Until DHS addresses these challenges and fully incorporates all key attributes into its capabilities, it will not have the full complement of cyber analysis and warning capabilities essential to effectively performing its national mission. Accordingly, we are making 10 recommendations to the Secretary of Homeland Security to improve DHS's cyber analysis and warning capabilities by implementing key cyber analysis and warning attributes and addressing the challenges, including: * developing close working and more trusted relationships with federal and nonfederal entities that would allow the free flow of information, * expeditiously hiring sufficiently trained staff and acquiring supporting technology tools to handle the steadily increasing workload, * ensuring consistent notifications that are actionable and timely, * filling key management positions to provide organizational stability and leadership, and: * ensuring that there are distinct and transparent lines of authority and responsibility assigned to DHS organizations with cybersecurity roles and responsibilities. In written comments on a draft of this report (see app. II), the department concurred with 9 of our 10 recommendations. It also described actions planned and under way to implement these recommendations. DHS took exception to 1 recommendation, stating that it had developed a concept-of-operations document that clearly defined roles and responsibilities for key DHS organizations. However, this document is still in draft, and the department has yet to establish a date for it to be finalized and implemented. Background: Increasing computer interconnectivity--most notably growth in the use of the Internet--has revolutionized the way that our government, our nation, and much of the world communicate and conduct business. While the benefits have been enormous, they are accompanied by significant risks to the nation's computer systems and to the critical operations and infrastructures that those systems support.[Footnote 2] Cyber Threats and Incidents Adversely Affect the Nation's Critical Infrastructure: Different types of cyber threats from numerous sources may adversely affect computers, software, a network, an agency's operations, an industry, or the Internet itself. Cyber threats can be unintentional or intentional. Unintentional threats can be caused by software upgrades or maintenance procedures that inadvertently disrupt systems. Intentional threats include both targeted and untargeted attacks. A targeted attack occurs when a group or individual specifically attacks a cyber asset. An untargeted attack occurs when the intended target of the attack is uncertain, such as when a virus, worm, or malware is released on the Internet with no specific target. Threats to the Nation's Critical Infrastructure Are Proliferating: There is increasing concern among both government officials and industry experts regarding the potential for a cyber attack on the national critical infrastructure, including the infrastructure's control systems. The Department of Defense (DOD) and the Federal Bureau of Investigation, among others, have identified multiple sources of threats to our nation's critical infrastructure, including foreign nation states engaged in information warfare, domestic criminals, hackers, virus writers, and disgruntled employees working within an organization. In addition, there is concern about the growing vulnerabilities to our nation as the design, manufacture, and service of information technology have moved overseas.[Footnote 3] For example, according to media reports, technology has been shipped to the United States from foreign countries with viruses on the storage devices. [Footnote 4] Further, U.S. authorities are concerned about the prospect of combined physical and cyber attacks, which could have devastating consequences. For example, a cyber attack could disable a security system in order to facilitate a physical attack. Table 2 lists sources of threats that have been identified by the U.S. intelligence community and others. Table 2: Sources of Emerging Cybersecurity Threats: Threat: Bot-network operators; Description: Bot-network operators take over multiple systems in order to coordinate attacks and to distribute phishing schemes, spam, and malware attacks (See Table 3 for definitions). The services of these networks are sometimes made available on underground markets (e.g., purchasing a denial-of-service attack or servers to relay spam or phishing attacks). Threat: Criminal groups; Description: Criminal groups seek to attack systems for monetary gain. Specifically, organized crime groups are using spam, phishing, and spyware/malware to commit identity theft and online fraud. International corporate spies and organized crime organizations also pose a threat to the United States through their ability to conduct industrial espionage and large-scale monetary theft and to hire or develop hacker talent. Threat: Foreign intelligence services; Description: Foreign intelligence services use cyber tools as part of their information-gathering and espionage activities. In addition, several nations are aggressively working to develop information warfare doctrine, programs, and capabilities. Such capabilities enable a single entity to have a significant and serious impact by disrupting the supply, communications, and economic infrastructures that support military power--impacts that could affect the daily lives of U.S. citizens across the country. Threat: Hackers; Description: Hackers break into networks for the thrill of the challenge or for bragging rights in the hacker community. While gaining unauthorized access once required a fair amount of skill or computer knowledge, hackers can now download attack scripts and protocols from the Internet and launch them against victim sites. Thus, while attack tools have become more sophisticated, they have also become easier to use. According to the Central Intelligence Agency, the large majority of hackers do not have the requisite expertise to threaten difficult targets such as critical U.S. networks. Nevertheless, the worldwide population of hackers poses a relatively high threat of an isolated or brief disruption causing serious damage. Threat: Insiders; Description: The disgruntled organization insider is a principal source of computer crime. Insiders may not need a great deal of knowledge about computer intrusions because their knowledge of a target system often allows them to gain unrestricted access to cause damage to the system or to steal system data. The insider threat includes contractors hired by the organization as well as employees who accidentally introduce malware into systems. Threat: Phishers; Description: Individuals, or small groups, execute phishing schemes in an attempt to steal identities or information for monetary gain. Phishers may also use spam and spyware/malware to accomplish their objectives. Threat: Spammers; Description: Individuals or organizations distribute unsolicited e-mail with hidden or false information in order to sell products, conduct phishing schemes, distribute spyware/malware, or attack organizations (i.e., denial of service). Threat: Spyware/malware authors; Description: Individuals or organizations with malicious intent carry out attacks against users by producing and distributing spyware and malware. Several destructive computer viruses and worms have harmed files and hard drives, including the Melissa Macro Virus, the Explore.Zip worm, the CIH (Chernobyl) Virus, Nimda, Code Red, Slammer, and Blaster. Threat: Terrorists; Description: Terrorists seek to destroy, incapacitate, or exploit critical infrastructures in order to threaten national security, cause mass casualties, weaken the U.S. economy, and damage public morale and confidence. Terrorists may use phishing schemes or spyware/malware in order to generate funds or gather sensitive information. Source: GAO analysis based on data from the Federal Bureau of Investigation, the Central Intelligence Agency, and the Software Engineering Institute's CERT® Coordination Center. [End of table] The nation's critical infrastructure operates in an environment of increasing and dynamic threats, and adversaries are becoming more agile and sophisticated. Terrorists, transnational criminals, and intelligence services use various cyber tools that can deny access, degrade the integrity of, intercept, or destroy data and jeopardize the security of the nation's critical infrastructure (see table 3). Table 3: Types of Cyber Attacks: Type of attack: Denial of service; Description: A method of attack from a single source that denies system access to legitimate users by overwhelming the target computer with messages and blocking legitimate traffic. It can prevent a system from being able to exchange data with other systems or use the Internet. Type of attack: Distributed denial of service; Description: A variant of the denial-of-service attack that uses a coordinated attack from a distributed system of computers rather than from a single source. It often makes use of worms to spread to multiple computers that can then attack the target. Type of attack: Exploit tools; Description: Publicly available and sophisticated tools that intruders of various skill levels can use to determine vulnerabilities and gain entry into targeted systems. Type of attack: Logic bombs; Description: A form of sabotage in which a programmer inserts code that causes the program to perform a destructive action when some triggering event occurs, such as terminating the programmer's employment. Type of attack: Phishing; Description: The creation and use of e-mails and Web sites--designed to look like those of well-known legitimate businesses, financial institutions, and government agencies--in order to deceive Internet users into disclosing their personal data, such as bank and financial account information and passwords. The phishers then use that information for criminal purposes, such as identity theft and fraud. Type of attack: Sniffer; Description: Synonymous with packet sniffer. A program that intercepts routed data and examines each packet in search of specified information, such as passwords transmitted in clear text. Type of attack: Trojan horse; Description: A computer program that conceals harmful code. A Trojan horse usually masquerades as a useful program that a user would wish to execute. Type of attack: Virus; Description: A program that infects computer files, usually executable programs, by inserting a copy of itself into the file. These copies are usually executed when the infected file is loaded into memory, allowing the virus to infect other files. Unlike a computer worm, a virus requires human involvement (usually unwitting) to propagate. Type of attack: Vishing; Description: A method of phishing based on voice-over-Internet Protocol technology and open-source call center software that have made it inexpensive for scammers to set up phony call centers and criminals to send e-mail or text messages to potential victims, saying there has been a security problem and they need to call their bank to reactivate a credit or debit card, or send text messages to cell phones, instructing potential victims to contact fake online banks to renew their accounts. Type of attack: War driving; Description: A method of gaining entry into wireless computer networks using a laptop, antennas, and a wireless network adaptor that involves patrolling locations to gain unauthorized access. Type of attack: Worm; Description: An independent computer program that reproduces by copying itself from one system to another across a network. Unlike computer viruses, worms do not require human involvement to propagate. Type of attack: Zero-day exploit; Description: A cyber threat taking advantage of a security vulnerability on the same day that the vulnerability becomes known to the general public and for which there are no available fixes. Source: GAO analysis of data from GAO and industry reports. [End of table] Cyber Incidents Have Caused Serious Damage: The growing number of known vulnerabilities increases the potential number of attacks. By exploiting software vulnerabilities, hackers and others who spread malicious code can cause significant damage, ranging from defacing Web sites to taking control of entire systems and thereby being able to read, modify, or delete sensitive information; disrupt operations; launch attacks against other organizations' systems; or destroy systems. Reports of attacks involving critical infrastructure demonstrate that a serious attack could be devastating, as the following examples illustrate. * In June 2003, the U.S. government issued a warning concerning a virus that specifically targeted financial institutions. Experts said the BugBear.b virus was programmed to determine whether a victim had used an e-mail address for any of the roughly 1,300 financial institutions listed in the virus's code. If a match was found, the software attempted to collect and document user input by logging keystrokes and then provide this information to a hacker, who could use it in attempts to break into the banks' networks.[Footnote 5] * In August 2006, two Los Angeles city employees hacked into computers controlling the city's traffic lights and disrupted signal lights at four intersections, causing substantial backups and delays. The attacks were launched prior to an anticipated labor protest by the employees. [Footnote 6] * In October 2006, a foreign hacker penetrated security at a water filtering plant in Harrisburg, Pennsylvania. The intruder planted malicious software that was capable of affecting the plant's water treatment operations.[Footnote 7] * In May 2007, Estonia was the reported target of a denial-of-service cyber attack with national consequences. The coordinated attack created mass outages of its government and commercial Web sites.[Footnote 8] * In March 2008, the Department of Defense reported that in 2007 computer networks operated by Defense, other federal agencies, and defense-related think tanks and contractors were targets of cyber warfare intrusion techniques. Although those responsible were not definitively substantiated, the attacks appeared to have originated in China.[Footnote 9] As these examples illustrate, attacks resulting in the incapacitation or destruction of the nation's critical infrastructures could have a debilitating impact on national and economic security and on public health and safety. Federal Law and Policy Establish the Need for National Cyber Analysis and Warning: To protect the nation's critical computer-dependent infrastructures against cyber threats and attacks, federal law and policy have identified the need to enhance cybersecurity and establish cyber analytical and warning capabilities, which are sometimes referred to as "indications and warnings." The laws and policies include (1) the Homeland Security Act of 2002, (2) the National Strategy to Secure Cyberspace, (3) Homeland Security Presidential Directive 7, and (4) the National Response Framework. In addition, the President issued in January 2008 Homeland Security Presidential Directive 23, which, according to US-CERT officials, has provisions that affect cyber analysis and warning efforts of the federal government. Homeland Security Act of 2002: The Homeland Security Act of 2002 established the Department of Homeland Security and gave it lead responsibility for preventing terrorist attacks in the United States, reducing the vulnerability of the United States to terrorist attacks, and minimizing the damage and assisting in recovery from attacks that do occur.[Footnote 10] The act assigned the department, among other things, a number of critical infrastructure protection responsibilities, including gathering of threat information, including cyber-related, from law enforcement, intelligence sources, and other agencies of the federal, state, and local governments and private sector entities to identify, assess, and understand threats; carrying out assessments of the vulnerabilities of key resources to determine the risks posed by attacks; and integrating information, analyses, and vulnerability assessments in order to identify priorities for protection. In addition, the department is responsible for disseminating, as appropriate, information that it analyzes--both within the department and to other federal, state, and local government agencies and private sector entities--to assist in the deterrence, prevention, preemption of, or response to terrorist acts. National Strategy to Secure Cyberspace: The National Strategy to Secure Cyberspace proposes that a public/ private architecture be provided for analyzing, warning, and managing incidents of national significance.[Footnote 11] The strategy states that cyber analysis includes both (1) tactical analytical support during a cyber incident and (2) strategic analyses of threats. Tactical support involves providing current information on specific factors associated with incidents under investigation or specific identified vulnerabilities. Examples of tactical support include analysis of (1) a computer virus delivery mechanism to issue immediate guidance on ways to prevent or mitigate damage related to an imminent threat or (2) a specific computer intrusion or set of intrusions to determine the perpetrator, motive, and method of attack. Strategic analysis is predictive in that it looks beyond one specific incident to consider a broader set of incidents or implications that may indicate a potential future threat of national importance. For example, strategic analyses may identify long-term vulnerability and threat trends that provide advance warnings of increased risk, such as emerging attack methods. Strategic analyses are intended to provide policymakers with information that they can use to anticipate and prepare for attacks, thereby diminishing the damage from such attacks. Homeland Security Presidential Directive 7: Homeland Security Presidential Directive 7 (HSPD 7) directs DHS to, among other things, serve as the focal point for securing cyberspace. This includes analysis, warning, information sharing, vulnerability reduction, mitigation, and recovery efforts for critical infrastructure information systems.[Footnote 12] It also directs DHS to develop a national indications and warnings architecture for infrastructure protection and capabilities, including cyber, that will facilitate an understanding of baseline infrastructure operations, the identification of indicators and precursors to an attack, and create a surge capacity for detecting and analyzing patterns of potential attacks. In May 2005, we reported that DHS has many cybersecurity-related roles and responsibilities, including developing and enhancing national cyber analysis and warning capabilities.[Footnote 13] However, we found that DHS had not fully addressed all its cybersecurity-related responsibilities and that it faced challenges that impeded its ability to fulfill its responsibilities. These challenges included having organizational stability and authority, hiring employees, establishing information sharing and effective partnerships, and developing strategic analysis and warning. We made recommendations to the Secretary of Homeland Security to engage appropriate stakeholders to prioritize key cybersecurity responsibilities, develop a prioritized list of key activities to addressing underlying challenges, and identify performance measures and milestones for fulfilling its responsibilities and for addressing its challenges. We did not make new recommendations regarding cyber-related analysis and warning because our previous recommendations had not been fully implemented. Specifically, in 2001, we recommended that responsible executive branch officials and agencies establish a capability for strategic analysis of computer-based threats, including developing a methodology, acquiring expertise, and obtaining infrastructure data.[Footnote 14] National Response Framework: The National Response Framework, issued by DHS in January 2008, provides guidance to coordinate cyber incident response among federal entities and, upon request, state and local governments and private sector entities.[Footnote 15] Specifically, the Cyber Incident Annex describes the framework for federal cyber incident response in the event of a cyber-related incident of national significance affecting the critical national processes. Further, the annex formalizes the National Cyber Response Coordination Group (NCRCG). As established under the preceding National Response Plan, the NCRCG continues to be cochaired by DHS's National Cyber Security Division (NCSD), the Department of Justice's Computer Crime and Intellectual Property Section, and the DOD. It is to bring together officials from all agencies that have responsibility for cybersecurity and the sector- specific agencies identified in HSPD 7. The group coordinates intergovernmental and public/private preparedness and response to and recovery from national-level cyber incidents and physical attacks that have significant cyber-related consequences. During and in anticipation of such an incident, the NCRCG's senior-level membership is responsible for providing subject matter expertise, recommendations, and strategic policy support and ensuring that the full range of federal capabilities is deployed in a coordinated and effective fashion. Homeland Security Presidential Directive 23: In January 2008, the President issued HSPD 23--also referred to as National Security Presidential Directive 54 and the President's "Cyber Initiative"--to improve the federal government's cybersecurity efforts, including protecting against intrusion attempts and better anticipating future threats.[Footnote 16] While the directive is a classified document, US-CERT officials stated that it includes steps to enhance cyber analysis related efforts, such as requirements that federal agencies implement a centralized monitoring tool and that the federal government reduce the number of connections to the Internet, referred to as Trusted Internet Connections. DHS Established US-CERT to Provide National Cyber Analysis and Warning: To help protect the nation's information infrastructure, DHS established the US-CERT. It is currently positioned within the NCSD of DHS's Office of Cybersecurity and Communications. Figure 1 shows the position of these offices within DHS's organizational structure. Figure 1: Department of Homeland Security Organizational Chart: [Refer to PDF for image] This figure is an illustration of the Department of Homeland Security Organizational Chart, as follows: DHS Secretary: * National Cybersecurity Center; U.S. Secret Service; * Transportation Security Administration; * Intelligence and Analysis; * U.S. Customs and Border Control; * U.S. Immigration Customs Enforcement; * Multiple other directorates reporting to DHS Secretary; * National Protection and Programs: - US-VISIT; - Office of Risk Management and Analysis; - Office of Infrastructure Protection; - Office of Intergovernmental Programs; - Office of Cyber Security and Communications: - Office of Emergency Communications; - National Communications System; - National Cyber Security Division: - Strategic Initiatives; - US-CERT; - Outreach and Awareness. Source: GAO based on DHS data. [End of figure] US-CERT is to serve as a focal point for the government's interaction with federal and nonfederal entities on a 24-hour-a-day, 7-day-a-week basis regarding cyber-related analysis, warning, information sharing, major incident response, and national-level recovery efforts.[Footnote 17] It is charged with aggregating and disseminating cybersecurity information to improve warning of and response to incidents, increasing coordination of response information, reducing vulnerabilities, and enhancing prevention and protection. In addition, the organization is to collect incident reports from all federal agencies and assist agencies in their incident response efforts. It is also to accept incident reports when voluntarily submitted by other public and private entities and assist them in their response efforts, as requested. US-CERT is composed of five branches, as shown in figure 2: Operations, Situational Awareness, Law Enforcement and Intelligence, Future Operations, and Mission Support. Each branch has specific responsibilities: * The Operations branch is to receive and respond to incidents, disseminate reasoned and actionable cybersecurity information, and analyze various types of data to improve overall understanding of current or emerging cyber threats affecting the nation's critical infrastructure. * The Situational Awareness branch is to identify, analyze, and comprehend broad network activity and to support incident handling and analysis of cybersecurity trends for federal agencies so that they may increase their own situational awareness and reduce cyber threats and vulnerabilities. As part of its responsibilities, the branch is responsible for managing the information garnered from the US-CERT Einstein program, which obtains network flow data from federal agencies, and analyzing the traffic patterns and behavior. This information is then combined with other relevant data to (1) detect potential deviations and identify how Internet activities are likely to affect federal agencies and (2) provide insight into the health of the Internet and into suspicious activities. * The Law Enforcement and Intelligence branch is to facilitate information sharing and collaboration among law enforcement agencies, the intelligence community, and US-CERT through the presence of liaisons from those organizations at US-CERT. * The Future Operations branch was established in January 2007 to lead or participate in the development of related policies, protocols, procedures, and plans to support US-CERT's coordination of national response to cyber incidents. * The Mission Support branch is to manage US-CERT's communications mechanisms, including reports, alerts, notices, and its public and classified Web site content. Figure 2: US-CERT Organizational Structure: [Refer to PDF for image] This figure is an illustration of the US-CERT Organizational Structure, as follows: US-CERT: * Operations: - Incident handling program; - Production program; - Analysis program, including: Network analysis; Malware analysis; Digital media analysis; Information sharing and analysis center (ISAC) partnerships; * Situational Awareness: - Einstein program; - Mission operating environment; - Internet health service; * Law Enforcement and Intelligence: - Cyber cop portal; * Future Operations: - Develop programs, and processes that enable and support a fully integrated national cyber incident response capability; * Mission Support: - Administrative support; - Personnel security; - Contract management; - Budget; - Information services; - Procurement. Source: GAO based on DHS data. [End of figure] Cyber Analysis and Warning Encompasses Four Key Capabilities: Our research and observations at federal and nonfederal entities show that cyber analysis and warning typically encompasses four key capabilities: * Monitoring--detecting cyber threats, attacks, and vulnerabilities and establishing a baseline of system and communication network assets and normal traffic. * Analysis--using the information or intelligence gathered from monitoring to hypothesize about what the threat might be, investigate it with technical and contextual expertise and identify the threat and its impact, and determine possible mitigation steps. Analysis may be initiated in reaction to a detected anomaly. This is a tactical approach intended to triage information during a cyber incident and help make decisions. It may also be predictive, proactively reviewing data collected during monitoring to look at cyber events and the network environment to find trends, patterns, or anomaly correlations that indicate more serious attacks or future threats. * Warning--developing and issuing informal and formal notifications that alert recipients in advance of potential or imminent, as well as ongoing, cyber threats or attacks. Warnings are intended to alert entities to the presence of cyber attack, help delineate the relevance and immediacy of cyber attacks, provide information on how to remediate vulnerabilities and mitigate incidents, or make overall statements about the health and welfare of the Internet. * Response--taking actions to contain an incident, manage the protection of network operations, and recover from damages when vulnerabilities are revealed or when cyber incidents occur. In addition, response includes lessons learned and cyber threat data being documented and integrated back into the capabilities to improve overall cyber analysis and warning. Through our consultations with experts, we found that the terminology may vary, but the functions of these capabilities are fairly consistent across cyber analysis and warning entities. Figure 3 depicts the basic process of cyber analysis and warning capabilities. Figure 3: A Simplified View of How Cyber Analysis and Warning Capabilities Are Executed: [Refer to PDF for image] This figure is an illustration of how cyber analysis and warning capabilities are executed. Monitoring is a constant, and the following process is followed: Anomaly detected: Analysis (interaction with monitoring); Identify threat; Warning (interaction with monitoring); Issue alert; Response (interaction with monitoring). Source: GAO analysis. [End of figure] Typically, cyber analysis and warning is executed, or managed, from a central focal point known as an operation center or watch center. Such centers can serve a single organization or a number of organizations. Centers generally include physically and electronically connected multidisciplinary teams with access to a variety of communication and software tools. The teams are made up of specialized analysts, sometimes referred to as watch standers, with a combination of expertise in information security, intelligence, and cyber forensics. Teams may also include subject area experts with specialized expertise in certain critical infrastructure sectors, industries, or technologies. The centers operate tools that integrate data and facilitate analysis by the watch standers. The data come from a multitude of sources, including internal or external monitoring, human or signals intelligence, analytical results, warnings from other entities, and information collected from previous threat responses. Centers decide when and how to issue formal and informal warnings that contribute to further analysis or provide information that aids in decisions about how to respond to an incident. Depending on the size and organizational structure of an organization, the analysis and warning team may work with incident response teams during a cyber incident. The incident response team manages the decisions required for handling an incident using information discovered during monitoring, analysis, and warning. The team may also coordinate with those responsible for information security for the organization in order to assess risks, remediate vulnerabilities, and prepare for and respond to attacks. Fifteen Key Attributes Essential to Establishing Cyber Analysis and Warning Capabilities: Our research and past experience at federal and nonfederal entities identified 15 key attributes associated with the cyber analysis and warning capabilities of monitoring, analysis, warning, and response. These attributes are displayed in table 4, which is followed by a detailed description by capability of each attribute. Table 4: Key Attributes of the Cyber Analysis and Warning Capabilities: Capability: Monitoring; Attribute: Establish a baseline understanding of network assets and normal network traffic volume and flow; Assess risks to network assets; Obtain internal information on network operations via technical tools and user reports; Obtain external information on threats, vulnerabilities, and incidents through various relationships, alerts, and other sources; Detect anomalous activities. Capability: Analysis; Attribute: Verify that an anomaly is an incident (threat of attack or actual attack); Investigate the incident to identify the type of cyber attack, estimate impact, and collect evidence; Identify possible actions to mitigate the impact of the incident; Integrate results into predictive analysis of broader implications or potential future attack. Capability: Warning; Attribute: Develop attack and other notifications that are targeted and actionable; Provide notifications in a timely manner; Distribute notifications using appropriate communications methods. Capability: Response; Attribute: Contain and mitigate the incident; Recover from damages and remediate vulnerabilities; Evaluate actions and incorporate lessons learned. Source: GAO analysis. [End of table] Monitoring: Monitoring provides the data used to understand one's operating environment and detect changes that indicate the presence of anomalies that may be cyber attacks. It encompasses five key attributes: 1. Establishing a baseline understanding of network assets and normal network traffic volume and flow: In order to detect unusual activity in network traffic or changes in an operating environment, organizations require knowledge of ordinary traffic and environmental conditions. This knowledge forms the baseline against which changes or anomalies can be detected, identified, and mitigated. A baseline is established through activities such as creating an accurate inventory of systems, prioritizing resources and assets, maintaining an understanding of the expected volume and nature of network traffic, and instituting operational procedures such as procedures for handling incidents. Without a baseline, it may be difficult to effectively detect threats or respond to a warning with the appropriate resources. 2. Assessing risks to network assets: Assessments should be conducted to determine what risks are posed by combinations of threats and vulnerabilities and inform the monitoring capability so that it is focused on the most critical assets. According to CERT® Coordination Center (CERT/CC) officials,[Footnote 18] having a baseline knowledge of networks and systems and their associated risks in advance helps individual organizations understand what threats they may be susceptible to, what resources are at risk, and what the potential damage of an attack might be. Risks should be prioritized and mitigated until a reasonable acceptable level of risk is reached. 3. Obtain internal information on network operations via technical tools and user reports: Another key attribute is monitoring traffic on internal networks using (1) network and information security-related technology tools and (2) reports on network activity. As table 5 shows, various technologies can be used for internal network monitoring to help compile and identify patterns in network data. Each type of technology may detect anomalies that the other types of software cannot. Table 5: Common Types of Technology Used for Internal Monitoring: Technology: Antivirus software; Function: Provides protection against malicious code, such as viruses, worms, and Trojan horses. Technology: Firewalls; Function: Control access to and from a network or computer. Technology: Intrusion detection systems; Function: Detect inappropriate, incorrect, or anomalous activity on a network or computer system. Technology: Intrusion prevention systems; Function: Build on intrusion detection systems to detect attacks on a network and take action to prevent them from being successful. Technology: Signature-based tools; Function: Compare files or packets to a list of "signatures"--patterns of specific files or packets that have been identified as a threat. Each signature is the unique arrangement of zeros and ones that make up the file. Technology: Security event correlation tools; Function: Monitor and document actions on network devices and analyze the actions to determine if an attack is ongoing or has occurred. Enable an organization to determine if ongoing system activities are operating according to its security policy. Technology: Scanners; Function: Analyze computers or networks for security vulnerabilities. Source: GAO. [End of table] These technologies can be used to examine data logs from networks on a 24-hour-a-day, 7-day-a-week schedule in an effort to identify (1) precursors and indicators of cyber threats or other anomalies and (2) the occurrence of known attacks. The data logged from these technologies are typically prepared using automated tools to help analysts observe or detect a single anomaly or to discover patterns in data over time. According to several federal and nonfederal entities, hands-on monitoring by trained analysts is essential because it can be difficult for automated tools to identify anomalies and incidents. For example, some automated signature-based tools focus on known threats and may not automatically recognize or alert analysts to new attack patterns or new threat delivery techniques. Other intrusion detection systems can produce large numbers of alerts indicating a problem when one does not exist (false positives); therefore, an analyst must look into anomalies more closely to see if detected intrusions are indications of a threat or simply an equipment malfunction. 4. Obtaining external information on threats, vulnerabilities, and incidents through various relationships, alerts, and other sources: External monitoring includes observing and receiving information that is either publicly or not publicly available for the purpose of maintaining environmental or situational awareness, detecting anomalies, and providing data for analysis, warning, and response. External sources of information include: * formal relationships, such as with and between critical infrastructure sector-related information sharing and analysis centers (ISAC); [Footnote 19] federal agencies, including military, civilian, law enforcement, and intelligence agencies; international computer emergency response team organizations; the CERT/CC and vendors under contract for services; * informal relationships established on a personal basis between analysts located at different operations centers; * alerts issued by federal, state, and local governments; * alerts issued by commercial external sources such as network security and antivirus software vendors; * vulnerability databases, standards, and frameworks such as the National Vulnerability Database,[Footnote 20] the Common Vulnerability and Exposures List,[Footnote 21] Common Vulnerability Scoring System, [Footnote 22] and the Open Vulnerability Assessment Language;[Footnote 23] * media outlets, such as television news and newspapers; and: * Web sites, such as law enforcement entities' sites, known hacker and criminal sites and chat rooms, and cooperative cyber analysis and warning services.[Footnote 24] 5. Detecting anomalous activities: Continuous monitoring occurs in order to detect significant changes from the baseline operations or the occurrence of an attack through an already known threat or vulnerability. It is ultimately the detection of an anomaly--observed internally or received from external information--and the recognition of its relevance that triggers analysis of the incident to begin. Analysis: Analysis uses technical methods in combination with contextual expertise to hypothesize about the threat and associated risks concerning an anomaly and, if necessary, determine mitigation solutions. It encompasses four key attributes: 1. Verifying that an anomaly is an incident: Once an anomaly is detected, it should be verified whether it is a genuine cyber incident by determining that the data are from a trusted source and are accurate. For example, if the anomaly was identified by an internal sensor, analysts start by confirming that the sensor was working correctly and not indicating a false positive. If the anomaly was reported by an external source, analysts try to determine the trustworthiness of that source and begin to identify internal and external corroborating sources. Anomalies that are verified may require in-depth investigation and incident handling or more observation through monitoring. 2. Investigating the incident to identify the type of cyber attack, estimate impacts, and collect evidence: Once the anomaly is verified as a potential, impending, or occurring incident, analysts should combine information from multiple sources and/or perform investigative testing using available tools. Analysis often occurs through collaboration between analysts, the exchange of notifications and warnings, and the use of analytical research techniques. Analysts use these techniques to investigate the type of attack, its source (where it originates), its target (whom it affects), and the immediate risk to network assets and mission performance. In addition, these techniques are used to compile evidence for law enforcement. Techniques for investigation include: * comparing and correlating additional monitoring data available with the anomaly to determine what other internal and external entities are experiencing; * comparing data about the anomaly with standardized databases to determine if the threats are known; and: * performing investigations, such as cyber forensic examinations, [Footnote 25] reverse engineering, malware analysis, and isolating anomalies in a test environment such as a honeypot or a sandbox. [Footnote 26] 3. Identifying possible actions to mitigate the impact of the incident: Analysis should culminate in identifying essential details about an anomaly such as what specific vulnerabilities are exploited or what impacts are expected for a specific incident. Steps should then be taken to identify alternative courses of action to mitigate the risks of the incident according to the severity of the exploit, available resources, and mission priorities. Such steps may include isolating the affected system to prevent further compromise, disabling the affected service that is being exploited, or blocking the connections providing the attacker a route into the network environment.[Footnote 27] These courses of action may lead to more analysis or be used to support the warning capability. 4. Integrating results into predictive analysis of broader implications or potential future attacks: Information resulting from analysis of an individual incident should be used to determine any broader implications and predict and protect against future threats. This type of effort, or predictive analysis, should look beyond one specific incident to consider a broader set of incidents or implications that may indicate a potential threat of importance. For example, it may include detailed trend analysis of threats that have occurred over a certain period of time that is issued in public reports that discuss current trends, predict future incident activity, or emerging attack methods. However, according to many experts, this type of predictive analysis is complex and it is still difficult to predict future threats with current data. Warning: Warnings are intended to alert entities to the presence of anomalies, help delineate the relevancy and immediacy of cyber attacks, provide information on how to remediate vulnerabilities and mitigate incidents, or make overall statements about the health and welfare of the Internet. Warning includes three key attributes: 1. Developing notifications that are targeted and actionable: Warning messages should be targeted to the appropriate audience and provide details that are accurate, specific, and relevant enough to be acted upon. Developing actionable notifications requires providing the right incident information to the right person or group. If a single group is the only target of a threat, a warning directly to it may be more appropriate than a general public announcement. In addition, warnings are tailored to address technical or nontechnical recipients. Some warnings may be more appropriate for chief information officers, while other may include technical details for network administrators. Although notifications and warnings are delivered throughout incident handling, it is important to reach a balance between releasing actionable information and disclosing warnings too often, which can overwhelm the recipients and stretch limited resources. By addressing the specific audience, warnings avoid overwhelming recipients with extraneous or irrelevant information. Also, recipients of notifications and warnings need to be able to use them to protect or defend their networks against cyber attacks. For example, many organizations have designated thresholds that determine how and when warnings are issued. To do so, the messages must include specific and accurate information about the incident as it relates to the recipient's monitoring, analysis, or response capabilities. An actionable warning may also include recommendations about how to respond to an incident. Federal and nonfederal entities also noted that sensitivity of information and privacy are key considerations when trying to develop an actionable warning. Warnings are sanitized or stripped of identifying or proprietary information in order to protect the privacy of individuals or entities involved in the incident. In addition, the federal government and its private sector partners must also adhere to procedures to make sure that they share useful information at the appropriate clearance level. 2. Providing notifications in a timely manner: Warnings are intended to give information to recipients as early as possible--preferably in advance of a cyber attack--to give them time to take appropriate action. In addition, the National Institute of Standards and Technology (NIST) provides guidance to federal agencies that describes when incidents are considered reportable and how long they may take to report them to US-CERT.[Footnote 28] Similarly, several ISACs stated that they have procedures that determine when and how warnings are issued and when and how members should report incidents. 3. Distributing notifications using the most appropriate communications methods: Once a warning is developed, it is important to determine the best method for getting that message out without overwhelming the public or incident handlers. Warnings can be provided both informally and formally. Informal warnings between colleagues with established trusted relationships can happen quickly and without significant regard to the organizational structure. Formal warnings, which are typically held to a higher standard of accuracy by recipients than informal warnings, come in many forms, such as e-mail bulletins, vulnerability alerts, Web postings, targeted warnings to a specific entity, or broad security notices to the general public. In addition to specific formal warnings, operations centers that perform analysis and warning for multiple organizations, such as the ISACs and commercial vendors, use level- based or color-coded alert systems on their Web sites to quickly notify members and the public of the general threat status of the infrastructure or Internet. Changing from one level or color to another indicates that the threat level is increasing or decreasing. These same organizations send alerts about threats and vulnerabilities to members only or may issue specific warnings to a single organization that has been identified through analysis as being targeted by a cyber threat. Response: Response includes actions to contain an incident, manage the protection of network operations, and recover from damages when vulnerabilities are revealed or when cyber incidents occur. It encompasses three key attributes: 1. Containing and mitigating the incident: When an incident is identified, immediate steps should be taken to protect network assets. Decisions are made to control further impacts on the network and then eliminate the threat. These actions may include installing a software patch, blocking a port known to be used by a particular threat, or deploying other appropriate network resources. In the case of a serious threat, the decision may be to turn off the network gateway and temporarily isolate the network from the Internet, depending upon what assets are at risk. One industry expert noted that investigation may occur before any mitigation steps are taken in order to consider the necessity of law enforcement involvement. On the other hand, if little is known about a threat and it does not appear to endanger critical assets, a decision might be made to watch the threat emerge in a contained area to allow for further monitoring and analysis. Decisions to act or not are based on acceptable risks, available resources, and ability to remedy the known threat. In addition, decisions must be made in the context of the impact that actions will have on other related efforts, such as a law enforcement investigation. 2. Recovering from damage and remediating vulnerabilities: Once an incident is contained and mitigated, restoring damaged areas of the network to return it to its baseline becomes a priority. To understand the damage, a cyber damage or loss assessment may be conducted to identify, among other things, how the incident was discovered, what network(s) were affected, when the incident occurred, who attacked the network and by what methods, what was the intention of the attacker, what occurred during the attack, and what is the impact or severity of the incident. The recovery efforts may involve restoring or reinstalling computers, network devices, applications, or systems that have been compromised. Taking action to remediate vulnerabilities in a network may also result from analysis and incident management. Entities work to discover and reduce the number of vulnerabilities in their computers, network devices, applications, or systems. 3. Evaluating actions and incorporating lessons learned: Entities should ensure that threat data, results, and lessons learned are evaluated and appropriately incorporated to improve the overall cyber analysis and warning capability. For example, teams can be used to simulate network threats by purposefully attacking a network in order to see how the network responds. From these simulations, an evaluation can be made about the response, and recommendations on how to improve can be developed. In addition, cyber simulations allow critical infrastructure organizations to prepare for threat scenarios and to test analysis, warning, and response capabilities. NIST guidance also states that holding lessons learned meetings after major incidents is helpful in improving security measures and the incident handling process itself.[Footnote 29] US-CERT's Capabilities Include Some but Not All Aspects of Key Attributes: US-CERT has established cyber analysis and warning capabilities that include aspects of each of the key attributes. However, they do not fully incorporate all of them. Monitoring Capability Includes Most but Not All Aspects of Key Attributes: US-CERT has established capabilities that include aspects of key attributes of monitoring. For example, it obtains internal network operation information via technical tools and Einstein; obtains external information on threats, vulnerabilities, and incidents; and detects anomalous activities based on the information it receives. However, its capabilities do not fully incorporate all of the key attributes of monitoring. For example, it has not established a baseline of our nation's critical infrastructure information systems. Table 6 shows our analysis of its monitoring capability. Table 6: US-CERT Capabilities Includes Most but Not All Aspects of Monitoring: Attribute: Establish a baseline understanding of network assets and normal network traffic volume and flow; Aspects incorporated: The organization has a limited baseline understanding of network assets and normal network traffic volume through the 16 federal participants in its situational awareness tool, US-CERT Einstein. In addition, it receives additional network flow information through contracts with information security vendors; Aspects not incorporated: It does not have a comprehensive national- level baseline across the nation's computer-reliant critical infrastructure, including the information systems of federal civilian and military entities, state and local governments, the private sector, and other entities. For example, under Einstein, the organization monitors 16 agencies, a practice that does not provide an overall view of federal network traffic. In addition, the tool's current capabilities are manually driven, thereby complicating and slowing the collection and compilation of data. Attribute: Assess risks to network assets; Aspects incorporated: [Empty]; Aspects not incorporated: Though US-CERT is involved in cyber-related risk assessment efforts being performed by other DHS organizations and the private sector, it does not perform risk assessments. Attribute: Obtain internal information on network operations via technical tools and user reports; Aspects incorporated: The organization obtains internal information using security tools and user reports regarding its presence on the Internet and its internal network operations; Aspects not incorporated: Its ability to obtain real-time internal traffic information is reduced by Einstein's limitation of requiring manually intensive analysis. Attribute: Obtain external information on threats, vulnerabilities, and incidents; Aspects incorporated: US-CERT monitors a variety of external information sources, including network traffic data, incident reports, and threat reports from federal, state, local, and foreign governments and the private sector, such as the following: * federal agencies providing an enhanced view of their networks through participation in Einstein; * various vendors providing Internet operational data;; the Homeland Infrastructure Threat and Risk Analysis Center (HITRAC),[A] law enforcement, and the intelligence community, providing threat information and other data; * federal agencies reporting information security incidents to the organization, as required by the Federal Information Security Management Act;[B] * nonfederal entities voluntarily reporting incidents, malware, and other information; * foreign governments providing information on cyber incidents; * CERT/CC providing vulnerability information; and; * other analysis and warning entities, including the Financial Services- ISAC, Multistate ISAC, the Internet Storm Center, and information security vendors, sharing incident and other situational awareness information; Aspects not incorporated: Its information does not encompass all critical infrastructure information networks. For example, by monitoring only 16 agencies, Einstein does not provide an overall view of federal network traffic. Also, the Department of Energy and DOD use their own similar situational awareness tools, but their data are not currently combined with Einstein's data to provide a more complete view of federal traffic. There are efforts under way to develop automated information exchanges between DOD's system and Einstein, but as of March 2008, this had not been finalized. Regarding nonfederal entities, the organization does not directly monitor any private sector networks, nor are nonfederal entities required to report to it incidents or anomalous activity. Typically, nonfederal entities, including the ISACs, that report incident and other data filter sensitive details from the data reported. Attribute: Detect anomalous activities; Aspects incorporated: The organization detects anomalies based on its monitoring of network traffic flow. Einstein provides network flow data from 16 agencies with the primary goal of looking for unique activity that may indicate a cyber attack or other undesirable activity.[C] According to US-CERT officials, Einstein provides the participating agencies a capability to compare their network traffic data with activity at other federal agencies and against law enforcement and intelligence agencies' threat data to determine if they are the victim of serious attacks. In addition, it works with its various partners in the private sector as well as other federal, state, and local governments to determine the extent of abnormal behavior. For example, the organization receives limited information from certain computer security vendors regarding Internet traffic flow of their respective customer bases; Aspects not incorporated: The organization does not detect anomalies across the nation's computer-reliant critical infrastructure. For example, it does not directly monitor any private sector networks, nor are nonfederal entities required to report incidents or anomalous activity. Source: GAO analysis. [A] HITRAC is a fusion center of intelligence analysts from DHS's Office of Intelligence and Analysis and subject matter experts from the National Protection and Programs Directorate working together to analyze threats, vulnerabilities, and risks to the 18 Critical Infrastructure/Key Resource sectors of the United States. Additionally, HITRAC focuses solely on analyzing and identifying the threat aspect of cybersecurity incidents as they occur. HITRAC shares these threat data with numerous customers, including US-CERT. [B] The Federal Information Security Management Act requires the operation of a central federal information security incident center. 44 U.S.C. 3546. The act also requires agencies to report incidents to the organization, in addition to law enforcement agencies, relevant offices of inspector general, and other designated entities. 44 U.S.C. 3544(b)(7). [C] These data are analyzed for traffic patterns and behavior; this information can be combined with other relevant data to (1) detect potential deviations and identify how Internet activities are likely to affect federal agencies and (2) provide insight into the health of the Internet and suspicious activities. [End of table] As part of the President's Cyber Initiative, DHS has a lead role for several provisions that, if implemented appropriately, could address key monitoring deficiencies, such as not having a comprehensive national baseline and sufficient external information on threats, vulnerabilities, and incidents. According to testimony by the Under Secretary for the National Protection and Programs Directorate, the initiative makes the Einstein program mandatory across all federal agencies. In addition, DHS plans to enhance Einstein's capabilities to be a real-time intrusion detection and situational awareness system. Further, DHS, along with the Office of Management and Budget (OMB), is responsible for working with federal agencies to reduce the number of Trusted Internet Connections used by the federal government. According to DHS and OMB officials, these initiatives will enhance the ability of the US-CERT to monitor federal systems for cyber attacks and other threats. According to US-CERT officials, the reduction in Trusted Internet Connections, along with the positioning of Einstein in front of those connections to the Internet, will help provide a governmentwide baseline and view of the traffic entering and leaving federal networks as well as access to the content of the traffic. In addition, according to the Assistant Secretary for Cybersecurity and Communications, the recently announced National Cybersecurity Center, which reports directly to the Secretary of Homeland Security, will be responsible for ensuring coordination among the cyber-related efforts across the federal government, including improving the sharing of incident and threat information. However, the efforts to use Einstein, reduce Internet connections, and implement the National Cybersecurity Center are in their early stages and have not yet been fully planned or implemented, so whether these efforts will fully address all five of the monitoring attributes is not known at this time. Analysis Capability Does Not Fully Incorporate All Aspects of Key Attributes: US-CERT has established capabilities that include key attributes of analysis. For example, it verifies anomalies, performs investigations, and identifies possible courses of action. However, its capabilities do not fully incorporate other attributes because of technical and human resource constraints and the gaps in the monitoring capability. Table 8 shows our analysis of the organization's analysis capability. Table 7: US-CERT Incorporates Some but Not All Aspects of Analysis: Attribute: Verify that an anomaly is an incident (threat of attack or actual attack); Aspects incorporated: When an anomaly is detected or reported, US-CERT works directly with its various public and private sector partners to determine whether the anomaly is an incident. For example, it notifies federal agencies when it observes abnormal activities. In turn, federal agencies take the information provided and are to verify whether the activity constitutes a cybersecurity incident and if any support is required from US-CERT; Aspects not incorporated: The lack of a robust monitoring capability negatively affects the organization's ability to verify and investigate anomalies and to identify threats. Specifically, although the Einstein flow data are collected in real time, the actual analysis is manually intensive and does not occur simultaneously or in real time. Another limiting factor of Einstein data is that the organization is unable to analyze the content of the potentially malicious traffic. Attribute: Investigate the incident to identify the type of cyber attack, estimate impacts, and collect evidence; Aspects incorporated: The organization investigates incidents through network and malware analysis. For example, it correlates Einstein network traffic data with known vulnerabilities and threats to identify abnormal activity, and then it focuses on identifying emerging threats, ongoing trends, and intrusions that have already occurred. According to agency officials, through the implementation of Einstein, the amount of time needed to discover and understand a potential cyber attack and communicate it to agencies has been significantly reduced from 4 to 5 days to 4 to 5 hours. In addition, according to US-CERT officials, its malware analysis focuses on reverse engineering malicious code to determine how the code works, its effect on a network or system, and potentially who developed it. The organization receives the malware code from a variety of sources, including its own monitoring, anonymous submissions, and formal submissions from affected entities, such as federal agencies, Internet service providers, and other entities. For example, according to agency officials, they receive on average between 5,000 and 24,000 individual pieces of malware in a 24-hour period. Additionally as of April 2008, officials stated that the organization had conducted analysis on 1,520,022 samples of malware code during fiscal year 2008; To do this work, the organization has established a segregated facility, or malware laboratory, that provides a controlled environment to conduct detailed analysis on infected computer hardware and software. According to officials, its malware capability has provided value to federal and nonfederal partners because it can analyze the potential impact of malware with the known threat information received from its partners in the law enforcement and intelligence communities; Aspects not incorporated: The number of incidents that can be analyzed at one time is limited. Attribute: Identify possible actions to mitigate the impact of the incident; Aspects incorporated: US-CERT's analysts develop alternative actions for stopping or controlling the threat. These alternatives are based on risk, required resources, mission priorities, and existing network requirements and limitations. Its network analysts work with all US- CERT partners to identify possible courses of action and methods to respond to cyber incidents. For example, in January 2008, an analysis of malware discovered at a targeted federal agency led to the identification of three zero-day exploits and a subsequent alert issued to federal and nonfederal entities; Aspects not incorporated: The organization's ability to develop possible actions to mitigate the identified threat is limited by its inability to engage other partners in analysis efforts because the information may be sensitive or classified. Attribute: Integrate results into predictive analysis of broader implications or potential future attack; Aspects incorporated: According to NCSD officials, the organization is engaged in activities with other NCSD entities to develop more strategic views of the nation's critical cyber infrastructures; Aspects not incorporated: The organization does not possess the capability to integrate its work into predictive analysis. Source: GAO analysis. [End of table] As part of the Cyber Initiative, the organization has received additional resources to develop the next version of the Einstein situational awareness tool. According to US-CERT officials, this new version, referred to as Einstein 2.0, will provide real-time intrusion detection monitoring, a content analysis capability, and automated analysis functions that are currently manual. In addition, it has received authorization for an additional 30 government and 50 contractor employee full-time equivalents. According to US-CERT officials, they plan to fill the additional positions by leveraging graduates of the Scholarship for Service program, which provides cybersecurity-related scholarships to students willing to serve the federal government for a time commitment. However, these efforts are in their early stages and have not yet been fully planned or implemented. Consequently, whether these efforts will fully address all four of the analysis attributes is not known at this time. Warning Capability Exhibits Some but Not All Characteristics of Key Attributes: The organization has established capabilities that include key attributes of warning. For example, it develops and distributes a number of attack and other notifications targeted to different audiences with varying frequency. However, according to customers, these warning products are not consistently actionable and timely. Table 8 shows our analysis of the organization's warning capability. Tables 9 and 10 show types of warning products and the quantity of products issued during fiscal year 2007. Table 8: US-CERT Exhibits Some but Not All Aspects of Warning: Attribute: Develop attack and other notifications that are targeted and actionable; Aspects incorporated: As tables 9 and 10 depict, the organization develops various attack and other notifications for a varied set of customers; Aspects not incorporated: Officials from entities with robust cyber analysis and warning capabilities, such as the ISACs, DOD, and the Department of Energy, stated that the organization's notifications typically did not offer new or additional information beyond their own efforts. Attribute: Provide notifications in a timely manner; Aspects incorporated: The organization is occasionally able to provide notifications to certain customers in a timely manner. For example, officials from organizations with limited cyber analysis and warning capabilities stated that certain US-CERT notifications, especially those warnings with For Official Use Only (FOUO) information, were extremely timely; Aspects not incorporated: The organization is not consistently able to provide notifications in a timely manner. Its ability to disseminate timely notifications is hindered by a number of factors. First, as the national cyber analysis and warning organization, it must ensure a high level of accuracy in the products it releases. In order to avoid disseminating incomplete or inaccurate information, its warning products are subjected to a review process, which can prevent their rapid dissemination. Further, the sensitivity of information can be a hindrance. Specifically, highly sensitive information must be coordinated with other components as part of the review process, which can add days to the release time. Finally, dissemination efforts are limited by lack of performance measures that assess or provide feedback on the value of US-CERT products. Attribute: Distribute notifications using appropriate communications methods; Aspects incorporated: As table 9 depicts, the organization distributes a wide array of attack and other "warning" products through various mechanisms to a diverse set of customers; Aspects not incorporated: According to NSCD officials, the organization is refining its distribution lists and collaborating with various federal and nonfederal user groups to better ensure appropriate officials (those having the understanding and ability to appropriately respond) receive its notifications. Source: GAO analysis. [End of table] Table 9: US-CERT Warning Products, Fiscal Year 2007: Product audience: Situational awareness report; Product audience: Federal government: [Check]; Product audience: GFIRST[A]: [Check]; Product audience: Select international partners[B]: [Check]; Product audience: ISACs[C]: [Check]; Product audience: General public: [Empty]; Distribution mechanism: US-CERT Web site: [Check]; Distribution mechanism: US-CERT HSDN Web site[D]: [Check]; Distribution mechanism: US-CERT HSIN portal[E]: [Empty]; Distribution mechanism: NCAS[F]: [Empty]; Distribution mechanism: E-mail distribution: [Empty]; Distribution mechanism: RSS feeds[G]: [Empty]; Frequency: Daily: [Empty]; Frequency: Weekly: [Empty]; Frequency: Every other week: [Empty]; Frequency: Monthly: [Check]; Frequency: Quarterly: [Empty]; Frequency: As needed: [Check]. US-CERT products: Federal information notice; Product audience: White House: [Check]; Product audience: Federal government: [Check]; Product audience: GFIRST[A]: [Check]; Product audience: Select international partners[B]: Product audience: ISACs[C]: [Empty]; Product audience: General public: [Empty]; Distribution mechanism: US-CERT Web site: [Empty]; Distribution mechanism: US-CERT HSDN Web site[D]: [Check]; Distribution mechanism: US-CERT HSIN portal[E]: [Check]; Distribution mechanism: NCAS[F]: [Empty]; Distribution mechanism: E-mail distribution: [Check]; Distribution mechanism: RSS feeds[G]: [Empty]; Frequency: Daily: [Empty]; Frequency: Weekly: [Empty]; Frequency: Every other week: [Empty]; Frequency: Monthly: [Empty]; Frequency: Quarterly: [Empty]; Frequency: As needed: [Check]. US-CERT products: Critical infrastructure information notice; Product audience: White House: [Check]; Product audience: Federal government: [Empty]; Product audience: GFIRST[A]: [Empty]; Product audience: Select international partners[B]: [Check]; Product audience: ISACs[C]: [Check]; Product audience: General public: [Empty]; Distribution mechanism: US-CERT Web site: [Empty]; Distribution mechanism: US-CERT HSDN Web site[D]: [Check]; Distribution mechanism: US-CERT HSIN portal[E]: [Check]; Distribution mechanism: NCAS[F]: [Empty]; Distribution mechanism: E-mail distribution: [Check]; Distribution mechanism: RSS feeds[G]: [Empty]; Frequency: Daily: [Empty]; Frequency: Weekly: [Empty]; Frequency: Every other week: [Empty]; Frequency: Monthly: [Empty]; Frequency: Quarterly: [Empty]; Frequency: As needed: [Check]. US-CERT products: Public trends and analysis report; Product audience: White House: [Empty]; Product audience: Federal government: [Check]; Product audience: GFIRST[A]: [Check]; Product audience: Select international partners[B]: [Check]; Product audience: ISACs[C]: [Check]; Product audience: General public: [Check]; Distribution mechanism: US-CERT Web site: [Check]; Distribution mechanism: US-CERT HSDN Web site[D]: [Check]; Distribution mechanism: US-CERT HSIN portal[E]: [Check]; Distribution mechanism: NCAS[F]: [Empty]; Distribution mechanism: E-mail distribution: [Empty]; Distribution mechanism: RSS feeds[G]: [Empty]; Frequency: Daily: [Empty]; Frequency: Weekly: [Empty]; Frequency: Every other week: [Empty]; Frequency: Monthly: [Empty]; Frequency: Quarterly: [Check]; Frequency: As needed: [Empty]. US-CERT products: Technical information paper; Product audience: White House: [Check]; Product audience: Federal government: [Check]; Product audience: GFIRST[A]: [Check]; Product audience: Select international partners[B]: [Check]; Product audience: ISACs[C]: [Check]; Product audience: General public: [Check]; Distribution mechanism: US-CERT Web site: [Check]; Distribution mechanism: US-CERT HSDN Web site[D]: [Check]; Distribution mechanism: US-CERT HSIN portal[E]: [Check]; Distribution mechanism: NCAS[F]: [Empty]; Distribution mechanism: E-mail distribution: [Empty]; Distribution mechanism: RSS feeds[G]: [Empty]; Frequency: Daily: [Empty]; Frequency: Weekly: [Empty]; Frequency: Every other week: [Empty]; Frequency: Monthly: [Empty]; Frequency: Quarterly: [Empty]; Frequency: As needed: [Check]. US-CERT products: Cyber daily briefing; Product audience: White House: [Empty]; Product audience: Federal government: [Empty]; Product audience: GFIRST[A]: [Check]; Product audience: Select international partners[B]: [Empty]; Product audience: ISACs[C]: [Check]; Product audience: General public: [Empty]; Distribution mechanism: US-CERT Web site: [Empty]; Distribution mechanism: US-CERT HSDN Web site[D]: [Empty]; Distribution mechanism: US-CERT HSIN portal[E]: [Check]; Distribution mechanism: NCAS[F]: [Empty]; Distribution mechanism: E-mail distribution: [Check]; Distribution mechanism: RSS feeds[G]: [Empty]; Frequency: Daily: [Check]; Frequency: Weekly: [Empty]; Frequency: Every other week: [Empty]; Frequency: Monthly: [Empty]; Frequency: Quarterly: [Empty]; Frequency: As needed: [Empty]. US-CERT products: Non-technical alerts; Product audience: White House: [Empty]; Product audience: Federal government: [Empty]; Product audience: GFIRST[A]: [Empty]; Product audience: Select international partners[B]: [Empty]; Product audience: ISACs[C]: [Empty]; Product audience: General public: [Check]; Distribution mechanism: US-CERT Web site: [Check]; Distribution mechanism: US-CERT HSDN Web site[D]: [Check]; Distribution mechanism: US-CERT HSIN portal[E]: Distribution mechanism: NCAS[F]: [Check]; Distribution mechanism: E-mail distribution: [Check]; Distribution mechanism: RSS feeds[G]: Frequency: Daily: [Empty]; Frequency: Weekly: [Empty]; Frequency: Every other week: [Empty]; Frequency: Monthly: [Empty]; Frequency: Quarterly: [Empty]; Frequency: As needed: [Check]. US-CERT products: Technical alerts; Product audience: White House: [Check]; Product audience: Federal government: [Check]; Product audience: GFIRST[A]: [Check]; Product audience: Select international partners[B]: [Check]; Product audience: ISACs[C]: [Check]; Product audience: General public: [Check]; Distribution mechanism: US-CERT Web site: [Check]; Distribution mechanism: US-CERT HSDN Web site[D]: [Check]; Distribution mechanism: US-CERT HSIN portal[E]: Distribution mechanism: NCAS[F]: [Check]; [Empty]; Distribution mechanism: E-mail distribution: [Check]; Distribution mechanism: RSS feeds[G]: [Check]; Frequency: Daily: [Empty]; Frequency: Weekly: [Check]; Frequency: Every other week: [Empty]; Frequency: Monthly: [Empty]; Frequency: Quarterly: [Empty]; Frequency: As needed: [Check]. US-CERT products: Security bulletins; Product audience: White House: [Check]; Product audience: Federal government: [Check]; Product audience: GFIRST[A]: [Check]; Product audience: Select international partners[B]: [Check]; Product audience: ISACs[C]: [Check]; Product audience: General public: [Check]; Distribution mechanism: US-CERT Web site: [Check]; Distribution mechanism: US-CERT HSDN Web site[D]: [Check]; Distribution mechanism: US-CERT HSIN portal[E]: Distribution mechanism: NCAS[F]: [Check]; Distribution mechanism: E-mail distribution: [Check]; Distribution mechanism: RSS feeds[G]: [Check]; Frequency: Daily: [Empty]; Frequency: Weekly: [Check]; Frequency: Every other week: [Empty]; Frequency: Monthly: [Empty]; Frequency: Quarterly: [Empty]; Frequency: As needed: [Empty]. US-CERT products: Security tips; Product audience: White House: [Empty]; Product audience: Federal government: [Empty]; Product audience: GFIRST[A]: [Empty]; Product audience: Select international partners[B]: [Empty]; Product audience: ISACs[C]: [Empty]; Product audience: General public: [Check]; Distribution mechanism: US-CERT Web site: [Check]; Distribution mechanism: US-CERT HSDN Web site[D]: Distribution mechanism: US-CERT HSIN portal[E]: Distribution mechanism: NCAS[F]: [Check]; [Empty]; Distribution mechanism: E-mail distribution: [Check]; Distribution mechanism: RSS feeds[G]: [Check]; Frequency: Daily: [Empty]; Frequency: Weekly: [Empty]; Frequency: Every other week: [Check]; Frequency: Monthly: [Empty]; Frequency: Quarterly: [Empty]; Frequency: As needed: [Empty]. US-CERT products: Current activity; Product audience: White House: [Check]; Product audience: Federal government: [Check]; Product audience: GFIRST[A]: [Check]; Product audience: Select international partners[B]: [Check]; Product audience: ISACs[C]: [Check]; Product audience: General public: [Check]; Distribution mechanism: US-CERT Web site: [Check]; Distribution mechanism: US-CERT HSDN Web site[D]: [Check]; Distribution mechanism: US-CERT HSIN portal[E]: Distribution mechanism: NCAS[F]: [Empty]; Distribution mechanism: E-mail distribution: [Check]; Distribution mechanism: RSS feeds[G]: [Check]; Frequency: Daily: [Check]; Frequency: Weekly: [Empty]; Frequency: Every other week: [Empty]; Frequency: Monthly: [Empty]; Frequency: Quarterly: [Empty]; Frequency: As needed: [Check]. US-CERT products: Vulnerability notes; Product audience: White House: [Check]; Product audience: Federal government: [Check]; Product audience: GFIRST[A]: [Check]; Product audience: Select international partners[B]: [Check]; Product audience: ISACs[C]: [Check]; Product audience: General public: [Check]; Distribution mechanism: US-CERT Web site: [Check]; Distribution mechanism: US-CERT HSDN Web site[D]: [Check]; Distribution mechanism: US-CERT HSIN portal[E]: Distribution mechanism: NCAS[F]: [Empty]; Distribution mechanism: E-mail distribution: [Check]; Distribution mechanism: RSS feeds[G]: [Check]; Frequency: Daily: [Empty]; Frequency: Weekly: [Empty]; Frequency: Every other week: [Empty]; Frequency: Monthly: [Empty]; Frequency: Quarterly: [Empty]; Frequency: As needed: [Check]. Source: US-CERT: [A] Government Forum of Incident Response and Security Teams (GFIRST) is a group of technical and tactical practitioners from government agency security response teams responsible for securing government information technology systems. [B] Select international partners including Australia, Canada, New Zealand, and the United Kingdom. [C] Information sharing and analysis center. [D] Homeland Secure Data Network (HSDN) is a secure portal that provides the ability to share information at the Secret category level among other federal, state, and local government entities. [E] DHS considers the Homeland Security Information Network (HSIN) to be its primary communication application for transmitting sensitive but unclassified information. According to DHS, this network is an encrypted, unclassified, Web-based communications application that serves as DHS's primary nationwide information-sharing and collaboration tool. It is intended to offer both real-time chat and instant messaging capability, as well as a document library that contains reports from multiple federal, state, and local sources. [F] DHS established the National Cyber Alert System (NCAS) to deliver targeted, timely, and actionable information to the public on how to secure computer systems. Information provided by the alert system is designed to be understandable by all computer users, both technical and nontechnical. [G] Really Simple Syndication (RSS) is a format for gathering and making available content from Web sites. RSS can be used to provide any kind of information that can be broken down into discrete items and put into RSS format, typically called an RSS feed. Software is available that can periodically check RSS feeds for changes, download new items, and make them available to the users. [End of table] Table 10: Quantity of US-CERT Warning Products, Fiscal Year 2007: Product: Public trends and analysis reports; Quantity: 4; Interval: Quarterly. Product: Vulnerability notes; Quantity: 353; Interval: As needed. Product: Situational awareness reports (SAR); Quantity: 83; Interval: As needed. Product: Federal information notices (FIN); Quantity: 7; Interval: As needed. Product: Technical information papers (TIP); Quantity: 8; Interval: As needed. Product: Critical infrastructure information notices (CIIN); Quantity: 9; Interval: As needed. Product: Security bulletins; Quantity: 52; Interval: Weekly. Product: Technical alerts; Quantity: 39; Interval: As needed. Product: Nontechnical alerts; Quantity: 27; Interval: As needed. Product: Current activity; Quantity: 260; Interval: As needed. Product: Cyber daily briefings; Quantity: 356; Interval: Daily. Source: US-CERT. [End of table] As part of the Cyber Initiative, the enhancements to the Einstein program, as well as the reduction in the number of Trusted Internet Connections can lead to more complete data. According to US-CERT officials, the improved data will lead to an enhanced warning capability that could provide the ability to issue targeted and actionable alerts in advance of actual cyber attacks. However, these efforts are in their early stages and have not yet been fully planned or implemented; thus, it is not clear whether these efforts will fully address the three warning attributes. Response Capability Satisfies Some but Not All Aspects of Key Attributes: US-CERT possesses a limited response capability to assist other entities in the containment, mitigation, and recovery from significant cyber incidents. For example, while it provides on-site assistance to various entities, its ability to provide response at the national level is hindered by limitations in the resources available and authority over affected entities. Table 11 shows our analysis of its response capability. Table 11: US-CERT Satisfies Some but Not All Aspects of Response: Attribute: Contain and mitigate the incident; Aspects incorporated: The organization assists entities in federal, state, and local governments as well as the private sector with the containment and mitigation of cybersecurity incidents as they occur, on a requested basis. According to agency officials, the US-CERT routinely deploys its two digital media analysis teams to perform on-site response to serious incidents. These teams have the capabilities and depth of knowledge to perform detailed analysis on compromised media (e.g., hard drives and thumb drives). For example, as of April 2008, the organization had provided on-site incident response eight times for fiscal year 2008, making about 30 visits to various federal agencies to address incidents dealing with unauthorized access, malware activity, as well as misconfigured network devices. Also, in November 2007, the organization deployed at least one response team to each of five different federal agencies over 5 consecutive days; In addition, the Law Enforcement and Intelligence branch works with organizations such as the Federal Bureau of Investigation and United States Secret Service to contain incidents on a global scale using established relationships with other nations. According to officials, the organization has also assisted at the international level, most recently deploying officials to Estonia to help its government improve its cybersecurity posture after suffering a major cyber attack; Further, DHS, in conjunction with DOD and the Department of Justice, formed the NCRCG to coordinate the federal response to cyber incidents of national significance. During a significant national incident, the NCRCG is to provide subject matter expertise, recommendations, and strategic policy support to the Secretary of Homeland Security. At the time of our review, the senior- level membership had coordinated and communicated about incidents; however, there had not been a cyber incident of national significance to activate these procedures; Aspects not incorporated: Though the organization is responsible for responding to national-level incidents, it does not possess the authority to compel an agency or organization to take action. Attribute: Recover from damages and remediate vulnerabilities; Aspects incorporated: The organization routinely deploys its two digital media analysis teams to perform on-site response to serious incidents at federal agencies. According to agency officials, these teams focus on serious incidents, typically involving advanced threats, such as those propagated by nation states as well as advanced malware attacks; Aspects not incorporated: To handle a cyber attack that affects multiple entities across the nation, officials stated that the organization would need at least three additional digital media analysis teams. Attribute: Evaluate actions and incorporate lessons learned; Aspects incorporated: US-CERT has identified shortcomings in its processes, communications methods, and policies by conducting exercises that simulate a national-level incident. For example, once a digital media team has completed its on-site response assistance, it generates an after-action report that summarizes what steps were taken and any further suggested actions for the affected organization. In addition, during Cyber Storm II, which occurred in March 2008, the organization identified a number of issues for improvement that will be addressed in after-action reports and tracked to ensure changes occur; Aspects not incorporated: While it measures certain items, such as the number and type of products it distributes, the organization has not established performance measures to determine the effectiveness of its efforts. According to US-CERT officials, other than an occasional statement of appreciation from other organizations, they do not know who benefits from their efforts or who uses their products. Source: GAO analysis. [End of table] To improve the organization's response capability, US-CERT officials stated that they needed to perform internal exercises that test its national-level response capability more often than every 2 years, as is the case with the Cyber Storm exercise.[Footnote 30] It plans to develop "tabletop" exercises to more frequently test its response capabilities. In addition, according to NCSD officials, they are working collaboratively with other federal and nonfederal working groups to improve their performance measures so that they can understand the value and use of their products and make continuous improvements. However, until they do so, it is not clear whether these efforts will lead to US-CERT fully addressing the three response attributes. US-CERT Faces New and Ongoing Challenges to Fulfilling Its Mission: US-CERT faces a number of newly identified and ongoing challenges that impede it from fully implementing the key attributes and in turn establishing cyber analysis and warning capabilities essential to coordinating the national effort to prepare for, prevent, and respond to cyber threats. The new challenge is creating warnings that are actionable and timely--it does not consistently issue warning and other notifications that its customers find useful. In addition, US-CERT continues to face four challenges that we previously identified: (1) employing predictive cyber analysis, (2) developing more trusted relationships to encourage information sharing, (3) having sufficient analytical and technical capabilities, and (4) operating without organizational stability and leadership within DHS. Until DHS addresses these challenges and fully incorporates all key attributes into its capabilities, it will not have the full complement of cyber analysis and warning capabilities essential to effectively performing its national mission. New Challenge Involves Creating Warnings That Are Actionable and Timely: Developing and disseminating cyber threat warnings to enable customers to effectively mitigate a threat in advance of an attack can be challenging for the US-CERT. According to the organization's Acting Deputy Director, it serves as the nation's cyber analysis and warning center and must ensure that its warnings are accurate. In addition, owners of classified or law enforcement information must review and agree to the release of related information. Therefore, the organization's products are subjected to a stringent review and revision process that could adversely affect the timeliness of its products--potentially adding days to the release if classified or law enforcement information must be removed from the product. For example, an official from a cybersecurity-focused organization at a university stated that the alerts from US-CERT generally arrive a day or two after they might have been helpful. An official from another private entity stated that the bureaucratic process US-CERT must follow prevents it from providing useful alerts in a timely manner and that as a result, it does not have the credibility to drive a reaction when an alert is finally issued. Another private sector official stated that, in some cases, the organization gets information on cyber incidents and attacks faster from media sources than US-CERT because its analysts need time to verify the reliability of the data they receive. In addition, according to federal officials responsible for determining cyber-related threats, US-CERT, as well as other organizations with cybersecurity-related responsibilities, must also balance the need to develop and release warnings with the activities of other organizations, such as law enforcement and intelligence support, to identify and mitigate cyber threats. For example, the release of a warning to address a threat or attack may also alert the intruders that their methods have been discovered and cause them to change their methods prior to the completion of an investigation about their activities. Further, when there is sensitive information to share, US-CERT officials stated that on numerous occasions, they were unable to share the details of threats to customers' networks because no one within the federal agency or nonfederal entity possessed a security clearance high enough to receive the information. In some organizations, the individuals who do possess security clearances are in the upper echelons of the organization and do not possess a cyber or information security background. As a result, they are not always able to accurately comprehend and relay the threat information to those who would actually handle the mitigation efforts. In September 2007, we reported that DHS lacked a rapid, efficient process for disseminating sensitive information to private industry owners and operators of critical infrastructures.[Footnote 31] We recommended that DHS establish a rapid and secure process for sharing sensitive vulnerability information with critical infrastructure stakeholders, including vendors, owners, and operators; however, DHS has not yet fulfilled this recommendation. To provide actionable information to its customers, the organization attempts to combine incident information with related cyber threat information to determine the seriousness of the attack. However, according to the Acting Director of US-CERT, its efforts are limited by other federal entities' abilities to determine specific cyber threats to the nation's critical infrastructure. One reason for the lack of cyber threat data is that the task is complex and difficult and there are no established, generally accepted methodologies for performing such analysis. In addition, such entities are hampered by the limited number of analysts dedicated to cyber threat identification. For example, in January 2008, the Director of HITRAC stated that only 5 percent of HITRAC's total number of analyst positions was focused on analyzing and identifying cyber threats to our nation's critical information infrastructure. According to the director, it had received approval to double the number of cyber-related analysts and was in the process of filling those positions. In addition, the director stated that HITRAC's primary focus is on identifying physical threats. Ongoing Challenges Involve Establishing Predictive Analysis, Trusted Relationships, Analytical and Technical Capabilities, and a Stable Organization: US-CERT faces ongoing challenges that we identified in previous reports as impeding DHS's ability to fulfill its cyber critical infrastructure protection responsibilities. Employing predictive cyber analysis--US-CERT has been unable to establish the solid foundation needed to perform predictive cyber analysis that would enable it to determine any broader implications from ongoing network activity, predict or protect against future threats, or identify emerging attack methods prior to an attack. Since 2001, we have identified the challenges associated with establishing strategic, predictive analysis and warning and have made recommendations that responsible executive branch officials and agencies establish such capabilities, including developing methodologies.[Footnote 32] According to the Acting Director of US- CERT, it has not been able to establish such capabilities because there is not a generally accepted methodology for performing predictive cyber analysis and warning. In addition, officials from US-CERT and other federal and nonfederal entities with cyber analysis and warning capabilities stated that while they can determine the motivations for the various threat sources to use cyber attacks, it is a formidable task to foresee prior to attacks how those threats would actually conduct attacks and to establish indicators to recognize that such cyber attacks are about to occur. Also, the relative newness of the cyber analysis and warning discipline and immaturity of the related methodologies and tools add to the complexity. Developing more trusted relationships to encourage information sharing- -Implementing cyber analysis and warning capabilities, including all of the key attributes, requires that entities be willing and able to share information, including details about incidents, threats, vulnerabilities, and network operations. However, US-CERT continues to be challenged to develop relationships with external sources that would encourage information sharing. For example, nonfederal entities do not consistently fully disclose incident and other data--they filter sensitive details from the data reported, thus reducing its value to US- CERT. The lack of such relationships negatively affects the organization's cyber analysis and warning capability. In 2005, we reported that entities within critical infrastructure sectors possess an inherent disincentive to share cybersecurity information with DHS.[Footnote 33] Much of their concern was that the potential release of sensitive information could increase the threat they face. In addition, when information was shared, it was not clear whether the information would be shared with other entities, such as other federal entities, state and local entities, law enforcement, or various regulators, or how it would be used or protected from disclosure. Alternatively, sector representatives expressed concerns that DHS was not effectively communicating information with them and had not matched private sector efforts to share valuable information with a corresponding level of trusted information sharing. We also identified information sharing in support of homeland security as a high-risk area in 2005, and we noted that establishing an effective two- way exchange of information to help detect, prevent, and mitigate potential terrorist attacks requires an extraordinary level of cooperation and perseverance among federal, state, and local governments and the private sector.[Footnote 34] Federal and nonfederal officials raised similar concerns about the ability to develop trusted relationships and share information with and between cyber analysis and warning entities, including US-CERT. For example, frequent staff turnover at NCSD and US-CERT hindered the ability to build trusted relationships with both public and private entities. Federal and nonfederal officials stated that reliance was placed on personal relationships to support sharing of sensitive information about cybersecurity and cyber incidents. However, according to the NCSD director, six senior staff members within the Office of Cybersecurity and Communications (the national focal point for addressing cybersecurity issues) were leaving for various reasons, affecting the ability to develop such relationships. In addition, private sector officials stated that their organizations continued to be hesitant to share information on vulnerabilities and threats because of the fear that such sharing might negatively affect their financial bottom line. For example, private sector officials stated that it was difficult to share unfiltered information with their respective infrastructure sector ISAC because a competitor operated the ISAC, thus negatively affecting the information received by US-CERT. Having sufficient analytical and technical capabilities--Obtaining and retaining adequately trained cyber analysts and acquiring up-to-date technological tools to implement the analysis capability attributes is an ongoing challenge to US-CERT and other analysis and warning centers, hindering their ability to respond to increasingly fast, nimble, and sophisticated cyber attacks. As we have reported, NCSD has had difficulty hiring personnel to fill vacant positions.[Footnote 35] We reported that once it found qualified candidates, some candidates decided not to apply or withdrew their applications because it took too long to be hired. This is still a concern because current staff has limited organizational backup and, in some cases, performs multiple roles. In addition, a private sector official stated that it is not clear whether or not the government has the number of technical analysts necessary to perform analysis on large and complex data sets that are generated whether or not an incident is in progress or not. Keeping cyber analysts trained and up to date on the latest cybersecurity tools and techniques can be difficult. For example, a DOD official representing one of its cyber analysis and warning centers stated that its analysts must develop their expertise on the job because there is no formal training program available that teaches them how to detect and perform analysis of an anomaly or intrusion. A private sector official stated that while analysts are often trained to use existing tools, their understanding of the key attributes of analysis is often limited, resulting in a solution too late to be helpful. Analysts also need the appropriate technological tools to handle the volume, velocity, and variety of malicious data and activity they are faced with, according to federal officials. For example, although the Einstein flow data are collected in real time, the actual analysis is manually intensive and does not occur simultaneously or in real time. Another limiting factor of Einstein data is that US-CERT is unable to analyze the content of the potentially malicious traffic and must rely on the affected agency to perform any analysis of the content of the traffic. Thus both the reaction time to determine the intent of the anomalous activity and the necessary actions to address it are significantly slowed. In addition, officials from one private sector entity questioned if agencies can sufficiently protect their networks using the tools they are mandated to use. As part of the efforts to address the President's Cyber Initiative, US- CERT recently received approval to fill 80 new positions--30 government and 50 contractor--and is attempting to fill these analytical positions by extending offers to candidates in the National Science Foundation's Scholarship for Service Program. However, these positions have yet to be completely filled with qualified candidates. Operating without organizational stability and authority--We have identified challenges regarding DHS's organizational stability, leadership, and authority that affect US-CERT's ability to successfully perform its mission. In the past, we have reported that the lack of stable leadership has diminished NCSD's ability to maintain trusted relationships with its infrastructure partners and has hindered its ability to adequately plan and execute activities.[Footnote 36] While DHS has taken steps to fill key positions, organizational instability among cybersecurity officials continues to affect NCSD and thus US- CERT. For example, at least six senior staff members were leaving DHS's Office of Cybersecurity and Communications, including the NCSD Director. Losing senior staff members in such large numbers has negatively affected the agency's long-term planning and hampered the ability of NCSD/US-CERT to establish trusted relationships with public and private entities and to build adequate functions to carry out its mission, including expanded cyber analysis and warning capabilities, according to the official. Furthermore, when new senior leadership has joined DHS, NCSD/US-CERT's objectives were reassessed and redirected, thus affecting NCSD's ability to have a consistent long-term strategy, according to the former official. For example, senior officials wanted to broaden the role and focus of US-CERT by having it provide centralized network monitoring for the entire federal government on a 24-hour-a-day, 7-day- a-week basis. However, the Director of NCSD disagreed with this strategy, stating that each federal agency should have its own 24-hour- a-day, 7-day-a-week incident-handling capability (either in-house or contracted out) to respond to incidents affecting its own network. He viewed US-CERT as a fusion center that would provide analysis and warning for national-level incidents, support federal agency incident- handling capabilities during crisis situations, and offer a mechanism for federal agencies to coordinate with law enforcement. The organization's future position in the government's efforts to establish a national-level cyber analysis and warning capability is uncertain. Specifically, Homeland Security Presidential Directive 23, which is classified, creates questions about US-CERT's future role as the focal point for national cyber analysis and warning. In addition, DHS established a new National Cybersecurity Center at a higher organizational level, which may diminish the Assistant Secretary of Cyber Security and Communications' authority as the focal point for the federal government's cybersecurity-related critical infrastructure protection efforts, and thus US-CERT's role as the central provider of cyber analysis and warning capabilities across federal and nonfederal critical infrastructure entities. As stated above, we did not make new recommendations in 2005 regarding cyber analysis and warning because our previous recommendations had not yet been fully implemented. At the time, we did recommend that the Secretary of Homeland Security require NCSD to develop a prioritized list of key activities for addressing the underlying challenges related to information sharing, hiring staff with appropriate capabilities, and organizational stability and authority. In addition, we recommended that performance measures and milestones for performing activities to address these challenges be identified. However, since that time, DHS has not provided evidence that it has taken actions on these activities. Conclusions: In seeking to counter the growing cyber threats to the nation's critical infrastructures, DHS has established a range of cyber analysis and warning capabilities, such as monitoring federal Internet traffic and the issuance of routine warnings to federal and nonfederal customers. However, while DHS has actions under way aimed at helping US- CERT better fulfill attributes identified as critical to demonstrating a capability, US-CERT still does not exhibit aspects of the attributes essential to having a truly national capability. It lacks a comprehensive baseline understanding of the nation's critical information infrastructure operations, does not monitor all critical infrastructure information systems, does not consistently provide actionable and timely warnings, and lacks the capacity to assist in mitigation and recovery in the event of multiple, simultaneous incidents of national significance. Planned actions could help to mitigate deficiencies. For example, as part of the Cyber Initiative, US-CERT plans to enhance its Einstein situational awareness tool so that it has real-time intrusion detection monitoring, a content analysis capability, and automated analysis functions. By placing the tool in front of Trusted Internet Connections, officials expect to obtain a governmentwide baseline view of the traffic and content entering and leaving federal networks. US- CERT also plans to hire 80 additional cyber analysts and to increase the frequency of exercises that test its national-level response capability. However, at this point, it is unclear whether these actions will help US-CERT--or whatever organizational structure is ultimately charged with coordinating national cyber analysis and warning efforts--achieve the objectives set forth in policy. DHS faces a number of challenges that impede its ability to achieve its objectives, including fostering trusted relationships with critical infrastructure sectors, hiring and retaining skilled cyber analysts, ensuring that US-CERT warning products provide useful information in advance of attacks, enhancing predictive analysis, and ensuring that any changes brought about by HSPD 23 are marked by well-defined and transparent lines of authority and responsibility. We identified most of these challenges in our prior reviews and made broad recommendations to address them. DHS's actions to address these challenges have not been adequate. Because of this, addressing these challenges is as critical as ever to overcome the growing and formidable threats against our nation's critical cyber infrastructure. If these challenges are not addressed, US-CERT will not be able to provide an effective national cyber analysis and warning capability. Recommendations for Executive Action: We recommend that the Secretary of Homeland Security take four actions to fully establish a national cyber analysis and warning capability. Specifically, the Secretary should address deficiencies in each of the attributes identified for: * monitoring, including establish a comprehensive baseline understanding of the nation's critical information infrastructure and engage appropriate nonfederal stakeholders to support a national-level cyber monitoring capability; * analysis, including expanding its capabilities to investigate incidents; * warning, including ensuring consistent notifications that are targeted, actionable, and timely; and: * response, including ensuring that US-CERT provides assistance in the mitigation of and recovery from simultaneous severe incidents, including incidents of national significance. We also recommend that the Secretary address the challenges that impede DHS from fully implementing the key attributes, including the following 6 items: * engaging appropriate stakeholders in federal and nonfederal entities to determine ways to develop closer working and more trusted relationships; * expeditiously hiring sufficiently trained cyber analysts and developing strategies for hiring and retaining highly qualified cyber analysts; * identifying and acquiring technological tools to strengthen cyber analytical capabilities and handling the steadily increasing workload; * developing predictive analysis capabilities by defining terminology, methodologies, and indicators, and engaging appropriate stakeholders in other federal and nonfederal entities; * filling key management positions and developing strategies for hiring and retaining those officials; and: * ensuring that there are distinct and transparent lines of authority and responsibility assigned to DHS organizations with cybersecurity roles and responsibilities, including the Office of Cybersecurity and Communications and the National Cybersecurity Center. Agency Comments and Our Evaluation: In written comments on a draft of this report (see app. II), signed by the Director of DHS's GAO/OIG Liaison Office, the department concurred with 9 of our 10 recommendations. It also described actions planned and under way to implement the 9 recommendations. In particular, the department said that to fully establish a cyber analysis and warning capability, it plans to continue expansion of the Einstein intrusion detection system and increase US-CERT's staffing. In addition, to address the challenges that impede DHS from fully implementing key cyber analysis and warning attributes, the department stated that it plans to continue to build new relationships and grow existing ones with stakeholders. Further, to strengthen its analysis and warning capability and develop its predictive analysis capability, the department cited, among other things, its planned implementation of an upgraded version of Einstein. DHS took exception to our last recommendation, stating that the department had developed a concept-of-operations document that clearly defined roles and responsibilities for the National Cybersecurity Center and NCSD. However, this concept-of-operations document is still in draft, and the department could not provide a date for when the document would be finalized and implemented. DHS also commented on the report's description of US-CERT as "the center." Specifically, DHS was concerned that referring to US-CERT as the center might lead to confusion with the department's newly established National Cybersecurity Center. DHS requested that we remove references to US-CERT as the center. We agree with this comment and have incorporated it in the report where appropriate. In addition to its written response, the department provided technical comments that have been incorporated in the report where appropriate. We also incorporated technical comments provided by other entities involved in this review. As agreed with your office, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies of this report to interested congressional committees, the Secretary of Homeland Security, and other interested parties. We also will make copies available to others upon request. In addition, this report will be available at no charge on GAO's Web site at [hyperlink, http://www.gao.gov]. If you or your staff have any questions about this report, please contact David Powner at (202) 512-9286, or pownerd@gao.gov, or Dr. Nabajyoti Barkakati at (202) 512-4499, or barkakatin@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Major contributors to this report are listed in appendix III. Signed by: David A. Powner: Director, Information Technology Management Issues: Signed by: Dr. Nabajyoti Barkakati: Acting Chief Technologist: [End of section] Appendix I: Objectives, Scope, and Methodology: Our objectives were to (1) identify key attributes of cyber analysis and warning capabilities, (2) compare these attributes with the United States Computer Emergency Readiness Team's (US-CERT) current analysis and warning capabilities to identify whether there are gaps, and (3) identify US-CERT's challenges to developing and implementing key attributes and a successful national cyber analysis and warning capability. To identify key attributes of cyber analysis and warning capabilities, we identified entities based on our previous work related to cyber critical infrastructure protection, information security, and information sharing and analyzed relevant laws, strategies, and policies. In addition, we solicited suggestions from a variety of sources familiar with cyber analysis and warning organizations, including GAO's chief information technology officer and members of our Executive Council on Information Management and Technology, which is a group of executives with extensive experience in information technology management who advise us on major information management issues affecting federal agencies. On the basis of the entities identified, we selected those that were relevant and agreed to participate. We then gathered and analyzed policies, reports, and surveys; made site visits to observe the operation of cyber analysis and warning capabilities; conducted structured interviews; and received written responses to structured interview questions. These activities were performed, as appropriate, at the following entities: * Department of Defense: Commander and Deputy Commander of the Joint Task Force--Global Network Operations and Director of the Defense Information Systems Agency; Commanding Officer, Navy Cyber Defense Operations Command; Chief Information Officer and Electronic Data Service officials of the Navy's Global Network Operations Center. We also toured the Joint Task Force's Global Network Operations Center; the Navy's Cyber Defense Operation Command Center; and the Navy Marine Corps Intranet Network's Operations Center, Computer Incident Response Team Laboratory, Request Management Center, and Enterprise Global Networks Operations Center. * Department of Energy: the Associate Chief Information Officer for Cyber Security for the Department of Energy and other relevant officials, and the Chief Information Officer of the National Nuclear Security Administration and other relevant officials. * Department of Homeland Security: the Director of the National Cyber Security Division, the Acting Director of the National Cyber Security Division, and the Acting Director of US-CERT. * National Institute of Standards and Technology: the Director of the Information Technology Laboratory and officials from the Information Technology Laboratory's Computer Security Division. * Private sector: Carnegie Mellon University's CERT® Coordination Center, Internet Storm Center, LUMETA, Microsoft, MITRE, National Association of State Chief Information Officers, SANS Institute, SRI International, and Symantec. * Information sharing and analysis centers representing the following sectors: financial services, information technology, states, surface transportation, and research and education. * Federal agencies in the intelligence community. On the basis of the evidence gathered and our observations regarding each entity's capabilities and operations, we determined the key common attributes of cyber analysis and warning capabilities. To verify the attributes we identified, we solicited comments from each entity regarding the attributes identified and incorporated the comments as appropriate. To determine US-CERT's current national analysis and warning capabilities and compare them with the attributes identified to determine whether there were any gaps, we gathered and analyzed a variety of US-CERT policies, procedures, and program plans to identify the organization's key activities related to cyber analysis and warning. We also observed US-CERT operations. In addition, we held interviews with key US-CERT officials, including the Director and Acting Director of the National Cyber Security Division, the Acting Director and Deputy Director of the US-CERT, and other relevant officials, to further clarify and confirm the key initiatives we identified through our analysis of the aforementioned documents. In addition, we interviewed the Director of Intelligence for the Department of Homeland Security's Homeland Infrastructure Threat and Risk Analysis Center to determine that organization's interaction with US-CERT and its role regarding identifying cyber threats. We also interviewed the Deputy Director of the Department of Homeland Security's National Cybersecurity Center to obtain information about its concept-of-operations document. We then compared those activities to the key attributes of cyber analysis and warning capabilities in order to determine US-CERT's ability to provide cyber analysis and warning and identify any related gaps. To identify US-CERT's challenges to developing and implementing the key attributes and a successful national cyber analysis and warning capability, we gathered and analyzed relevant documents, such as past GAO reports and studies by various cybersecurity-related entities, and interviewed key federal and nonfederal officials regarding the challenges associated with cyber analysis and warning. On the basis of the information received and our knowledge of the issues, we determined the major challenges to developing and implementing the key attributes and a successful national cyber analysis and warning capability. We performed this performance audit between June 2007 and July 2008 in the Washington, D.C., metropolitan area; Atlanta, Georgia; Bloomington, Indiana; Pittsburgh, Pennsylvania; and Norfolk, Virginia; in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. [End of section] Appendix II: Comments from the Department of Homeland Security: U.S. Department of Homeland Security: Washington, DC 20528: [hyperlink, http://www.dhs.gov] July 2, 2008: Mr. David Powner: Director: Information Technology Management Issues: United States Government Accountability Office: 441 G Street, N.W. Washington, DC 20001: Dear Mr. Powner: Re: Draft Report GAO-08-588, Cyber Analysis and Warning: DHS Faces Challenges in Establishing a Comprehensive National Capability (GAO Job Code 310851): The Department of Homeland Security (DHS) appreciates the opportunity to review and comment on the subject draft report. We recognize that cyber threats are growing and are increasing in sophistication and accuracy. We also realize that as technology advances and our dependence on an interconnected cyberspace grows, the risks associated with cyber threats increase. The Department's National Protection and Programs Directorate (NPPD) National Cyber Security Division (NCSD) and its United States Computer Emergency Readiness Team (US-CERT) [Footnote 37] are significantly changing and growing to address these cyber threats. The federal government has undertaken a National Cybersecurity Initiative (NCI), which includes programs that strengthen US-CERT's capabilities for analyzing malicious activity, issuing warnings, and responding to incidents. With its newly expanded mission, budget and staff and a more customer-driven and outcome oriented culture, US-CERT will continue to increase its cyber analysis and warning capabilities. As US-CERT moves forward, the organization will work to address various recommendations set forth by GAO. US-CERT is continually working to establish more effective outcome measures that will inform our program delivery and focus our resources on the most prevalent and highest risk issues. In addition to metrics analysis, US-CERT will continue to work with partners to determine how we can address the deficiencies identified by the GAO. GAO Recommendation 1: We recommend that the Secretary of Homeland Security-to fully establish a national cyber analysis and warning capability-specifically address deficiencies in monitoring, including establish a comprehensive baseline understanding of the nation's critical information infrastructure and engage appropriate nonfederal stakeholders to support a national-level cyber monitoring capability. Response: US-CERT concurs with this recommendation. Under the NCI, US- CERT is expanding its initial EINSTEIN program, referred to as EINSTEIN 1. The expanded program, referred to as EINSTEIN 2, is a 24x7 intrusion detection system that gathers network flow data from federal agencies and analyzes traffic patterns and behaviors. To improve US-CERT's capability to maintain situational awareness, all federal executive agencies, in accordance with the Office of Management and Budget (OMB) November 20, 2007, Memorandum M-08-05, Implementation of Trusted Internet Connection, will be required to use EINSTEIN 2. This expanded use of EINSTEIN 2 enables the US-CERT to gain increased situational awareness from all the federal executive agencies and fulfill its mandate to act as a central point for computer network security of the federal enterprise. US-CERT does not directly monitor malicious activity involving nonfederal networks. However, NPPD and US-CERT actively reach out to private sector partners via various mechanisms to develop a baseline understanding of the nation's critical information infrastructure. NPPD Protective Security Advisors (PSAs) within the Office of Infrastructure Protection are located in field offices across the country and regularly conduct site visits to assess vulnerabilities, including cyber vulnerabilities, at Critical Infrastructure/Key Resource (CIKR) facilities. Further, NCSD co-chairs the Cross Sector Cyber Security Working Group under the National Infrastructure Protection Plan (NIPP) Framework, which includes representatives from all CIKR sectors and provides a monthly venue for engagement, collaboration and information sharing on cyber security issues. A specific example of how the Department identifies specific vulnerabilities in the Nation's critical information infrastructure is the AURORA scenario, which involves the protective control systems used in the Nation's electric power grid. As soon as DHS identified this vulnerability, a Tiger Team of subject matter experts from government and industry was convened to determine the scope, potential consequences of this vulnerability, and to develop a better system for guiding private industry efforts to secure control systems. DHS is currently working with its government and industry partners to closely monitor this vulnerability, asses the risk it poses, and take appropriate proactive measures. GAO Recommendation 2: We recommend that the Secretary of Homeland Security-to fully establish a national cyber analysis and warning capability-specifically address deficiencies in analysis, including expanding its capabilities to investigate incidents. Response: We concur and are actively implementing improvements that will address the recommendation. Since January 2008, there has been an increase in funding of $115M in Fiscal Year 2008 for US-CERT. This funding includes salaries and benefits for 35 additional federal personnel and related costs, which will allow US-CERT to increase its cyber analysis and warning capabilities. Much of the increased funding will be focused on developing and deploying EINSTEIN 2. EINSTEIN 2, like EINSTEIN 1, will continue to passively observe network traffic to and from participating federal executive agencies' networks. In addition, EINSTEIN 2 will alert when specific malicious network activity is detected and provide US-CERT with increased insight into the nature of that activity. Through EINSTEIN 2, US-CERT will be able to analyze malicious activity occurring across the federal IT networks resulting in improved computer network security situational awareness. This increase in situational awareness can then be shared with federal executive agencies in an effort to reduce and prevent computer network vulnerabilities. EINSTEIN 2 adds to EINSTEIN 1 a network intrusion detection technology that will monitor for malicious activity in network traffic to and from participating federal executive agencies. EINSTEIN 2 will alert US-CERT when the system identifies malicious network traffic occurring in a federal executive agencies' network in response to specific predefined signatures. By scanning communications during transmission, EINSTEIN 2 identifies harmful communications that warrant analysis. A US-CERT analyst may then query that specific information in EINSTEIN 2 to analyze the potentially harmful network traffic identified by the alert. EINSTEIN 2 is to augment -- not replace or reduce -- the current computer network security practices of participating federal executive agencies. Participating agencies will continue to operate their own intrusion detection and prevention systems, perform network monitoring, and use other information security technologies. EINSTEIN 2 enables US- CERT to correlate activity across the entire federal enterprise. With the enhanced correlation capability, US-CERT achieves increased situational awareness of federal executive agency computer networks which is required to perform the computer network security responsibilities assigned to DHS. GAO Recommendation 3: We recommend that the Secretary of Homeland Security-to fully establish a national cyber analysis and warning capability-specifically address deficiencies in warning, including ensuring consistent notifications that are targeted, actionable, and timely. Response: We concur with the recommendation. A key goal of US-CERT is to ensure that alerts-Critical Infrastructure Information Notices (CIINs) in particular-reach the appropriate stakeholders. US-CERT recognizes the importance of targeted information sharing and is working with NCSD's Outreach and Awareness Program and other cross sector working groups to increase awareness and communication channels. The following communication channels are currently used for notification and activation in the event of a Cyber Incident: * The National Cyber Alert System: This system provides an infrastructure, managed by US-CERT, for relaying timely and actionable computer security updates and warning information to all users. * National Operations Center: This is the primary national-level hub for domestic incident management communications and operations. * Homeland Security Information Network (HSIN) Critical Sector (CS): This communications network provides States and critical infrastructure owners and operators with real-time interactive connectivity to the National Operations Center (NOC) on a Sensitive-but-Unclassified (SBU) level to all users. HSIN-CS is the NOC's primary suite of tools for information sharing, coordination, planning, mitigation, and response. * US-CERT Portal: This secure collaboration tool enables private and public sectors to actively share information about cyber security vulnerabilities, exploits, and incidents in a trusted and secure environment among members. * US-CERT Public Web Site: [hyperlink, http://www.uscert.gov] provides the primary means for US-CERT to convey information to the public at large. The site includes relevant information on cyber security issues, cyber activity, and vulnerability resources. * Information Sharing and Analysis Centers (ISACs): Through secure websites and secure e-mail, information on infrastructure threats and vulnerabilities is provided to the members. We do not agree with the report's repeated description of US-CERT's warnings and notifications as "not consistently actionable or timely (i.e., providing the right information to the right person or group when needed)." We believe this statement inaccurately generalizes all US-CERT products. While US-CERT is charged with analyzing cyber threats and disseminating warning information, it relies on other stakeholders and entities such as ISACs, State, local, and tribal entities to review and maintain an accurate list of members who disseminate information to the correct personnel within their organization.[Footnote 38] GAO Recommendation 4: We recommend that the Secretary of Homeland Security-to fully establish a national cyber analysis and warning capability-specifically address deficiencies in response, including ensuring that US-CERT provides assistance in the mitigation and recovery from simultaneous severe incidents, including incidents of national significance. Response: We concur and are actively implementing improvements for addressing the recommendation. While the Department is constantly enhancing its capabilities and currently increasing its budget and staffing, we do have recent examples of success in mitigating the effects of cyber incidents. The GAO report mentioned the May 2007 denial-of-service cyber attack in Estonia; US-CERT successfully mitigated the effects of this attack. Bot- networks were flooding Estonia's IT systems with traffic, causing a denial of service for many of their government sites. US-CERT coordinated with its federal, international, and private sector partners to identify over 2,500 unique sources from 21 NATO countries participating in the attacking botnets on Estonia. The information was shared with military, intelligence, law enforcement, and US-CERT personnel from NATO member nations. The GAO report also mentioned the Cyber Storm II exercise. The Cyber Storm II exercise, hosted by the Department of Homeland Security, helped participating organizations-public and private-prepare for, respond to, and mitigate cyber attacks that could affect their ability to deliver critical services. This exercise is one of DHS's primary methods for enhancing crisis management and improving risk management across all participating organizations and highlights the interdependencies that exist between cyber and physical infrastructure. The exercise included elements of the private sector in the transportation, chemical, information technology, and communications sectors as well as federal agencies and departments and several international partners. Also, EINSTEIN has proven successful in enhancing security within the federal government. Through the Department of Transportation's (DOT's) participation in the EINSTEIN program, US-CERT was able to quickly detect malicious activity and prevent it from infecting other government computers. In this case, a computer worm had infected an unsecured government computer in a U.S. Government agency. When the worm attempted to attack DOT's network, EINSTEIN detected the unusual traffic, and the subsequent US-CERT investigation uncovered the worm and worked with the affected departments and agencies to prevent its spread. GAO Recommendation 5: We recommend that the Secretary address the challenges that impede DHS from fully implementing the key attributes, including engaging appropriate stakeholders in federal and nonfederal entities to determine ways to develop closer working and more trusted relationships. Response: We concur and are actively implementing approaches for addressing the recommendation. Significant progress has been made in establishing or strengthening relationships with stakeholders, both internationally and domestically. The Department will continue to build new relationships and grow existing ones. US-CERT coordinates information sharing and incident response activities with international partners to improve cyber incident response at the international level. US-CERT representatives participate in conferences to enhance international cyber coordination. US-CERT also meets individually with other countries' CERTs to discuss cyber incident mitigation and response strategies. NCSD is committed to providing timely and actionable information on cyber incidents so that State cyber security responders can take appropriate action. Also, the information provided by State/local partners supplies important situational awareness for NCSD. There are channels in place that DHS uses to disseminate cyber information to State and local homeland security stakeholders. * Government Forum of Incident Response and Security Teams (GFIRST): NCSD recently extended GFIRST membership to State and local governments. This is very significant as it links technical cyber experts in federal agencies with their counterparts in State/local governments and provides State/local governments access to tools and additional technical analysis. The GFIRST forum provides these technical experts with a collaborative space that will increase States' situational awareness of cyber incident response activity. US-CERT products and alerts are sent via the US-CERT-managed GFIRST portal. * Multi-State Information Sharing and Analysis Center (MS-ISAC): The MS- ISAC membership is comprised of cyber officials from all States. NCSD provides funding to the MS-ISAC to assist with State/local coordination and information sharing on operational and other cyber security activities. NCSD provides a dedicated secure compartment within the US- CERT portal to enable collaboration among the State/local community and with NCSD/US-CERT. NCSD uses the Portal to both coordinate cyber awareness activities and initiatives, as well as disseminate critical cyber alerts and information. The MS-ISAC also maintains a distribution list of State and local points of contact, which allows NCSD to reach out to State/local decision makers regarding challenges, needs, and opportunities. In addition, NCSD participates in monthly calls with MS- ISAC membership and provides updates on Department activities and works with State/local representatives through established working groups that meet via monthly conference calls. * Lessons Learned Information Sharing: NCSD has created a cyber security page on the LLIS.GOV site, which all homeland security personnel at the State and local level can access. NCSD populated this page with information regarding exercise after action reports, awareness materials, policies, plans, and other information on cyber security. States can post their best practices and materials here as well. * Direct Contact: NCSD/US-CERT maintains positive relationships with numerous State points of contact and communicates/collaborates with them directly on a variety of topics. GAO Recommendation 6: We recommend that the Secretary address the challenges that impede DHS from fully implementing the key attributes, including expeditiously hiring sufficiently trained cyber analysts and developing strategies for hiring and retaining highly qualified cyber analysts. Response: We concur with the recommendation, and a strategy is already in place to address this need. DHS has recently entered into a contract to develop and implement a recruitment strategy to assist with cyber- related vacancies. NPPD has established an agreement with the Office of Personnel Management (OPM) to put a contracted human capital team in place to support the hiring requirement. Vacancies are posted through a variety of internal and external mechanisms, including less traditional federal government venues, such as recruiting websites and various local newspapers. DHS and US-CERT participate in various career fairs and accepts referrals from other agencies and employees. Graduating students are also targeted through the Scholarship for Service program. GAO Recommendation 7: We recommend that the Secretary address the challenges that impede DHS from fully implementing the key attributes, including identifying and acquiring technological tools to strengthen cyber analytical capabilities and handling the steadily increasing workload. Response: We concur and are actively implementing approaches that address the recommendation. As described above, US-CERT is implementing an upgraded version of Einstein. Einstein 2 is an automated process for collecting, correlating, analyzing, and sharing computer security information across the Federal government so that Federal agencies are aware, in near real-time, of threats to infrastructure and can act swiftly to take corrective measures. It will incorporate network intrusion detection technology capable of alerting US-CERT to the presence of malicious or potentially harmful computer network activity in Federal executive agencies' network traffic. In addition to implementing US-CERT's Einstein 2, DHS' Office of Science and Technology (S&T) and CS&C collaborate on cyber research and development (R&D) priorities to identify and develop technological tools to strengthen cyber analytical capabilities. Specifically, S&T created an Integrated Product Team (IPT) process to ensure proponents of R&D requirements, such as CS&C, are able to provide their requirements to S&T (i.e., existing capability shortfalls). A Research, Development, Test and Evaluation (RDT&E) program was established by S&T to address these requirements. CS&C developed a list of cyber security RDT&E requirements for the NCI which are in the process of being forwarded to S&T. These cyber related RDT&E requirements for critical infrastructures have been developed in a government-industry consensus process and are specified in the R&D portions of the Communications and IT Sector Specific Plans. GAO Recommendation 8: We recommend that the Secretary address the challenges that impede DHS from fully implementing the key attributes, including developing predictive analysis capabilities by defining terminology, methodologies, and indicators, and engaging appropriate stakeholders in other federal and nonfederal entities. Response: We concur and are actively implementing approaches that address the recommendation. EINSTEIN 2 uses anomaly-based detection methods to identify harmful or malicious computer network incidents. Anomaly-based detection, as defined in NIST Special Publication 800-94, is defined as "the process of comparing definitions of what activity is considered normal against observed events to identify significant deviations." While an intrusion detection system uses a defined set of rules or filters that have been crafted to catch a specific, malicious event, the EINSTEIN 2 anomaly detection capability utilizes the network flow data and alerts to focus on the system's baseline of normal activity. As described above, behavior that varies from this standard is noted. Intrusion detection systems look for a misuse signature and anomaly detection looks for a strange event. NCSD is also working with other Departmental and Interagency components to develop the strategic analysis of the Nation's critical cyber infrastructure, integrating all relevant and appropriate sources of information to support predictive analysis. NCSD is also seeking to engage stakeholders in other federal and nonfederal agencies to provide them with actionable information based on this predictive analysis. GAO Recommendation 9: We recommend that the Secretary address the challenges that impede DHS from fully implementing the key attributes, including filling key management positions and developing strategies for hiring and retaining those officials. Response: We concur with this recommendation. However, it is important to note that since the Exit Conference NCSD has filled several key management positions, including the positions of NCSD Director, US-CERT Director of Operations, and NCSD Chief of Staff. Further, DHS has recently entered into a contract to develop and implement a recruitment strategy to assist with cyber-related vacancies. NPPD has established an agreement with the Office of Personnel Management (OPM) to put a contracted human capital team in place to support the hiring requirement. GAO Recommendation 10: We recommend that the Secretary address the challenges that impede DHS from fully implementing the key attributes, including ensuring that there are distinct and transparent lines of authority and responsibility assigned to DHS organizations with cybersecurity roles and responsibilities, including the Office of Cyber Security and Communications and the National Cyber Security Center. Response: We do not concur with this recommendation. During the time period that GAO conducted their Cyber Analysis and Warning review, extensive interagency collaboration and coordination took place. This resulted in a NCSC Concept of Operations (CONOPS) with clearly defined roles and responsibilities for NCSC and NCSD. NCSC coordinates cyber security efforts and improves situational awareness and information sharing to support the entities defending government networks, such as US-CERT. US-CERT's ability to synthesize information and provide situational awareness will be enhanced through its work with the NCSC. The NCSC does not duplicate the roles and responsibilities of the participating organizations, such as US-CERT, but supports them in their mission and ensures coordination and shared cyber security situational awareness across these organizations. Sincerely, Signed by: Jerald E. Levine: Director: Departmental GAO/OIG Liaison Office [End of section] Appendix III: GAO Contacts and Staff Acknowledgments: GAO Contacts: David A. Powner, (202) 512-9286 or pownerd@gao.gov Dr. Nabajyoti Barkakati, (202) 512-4499 or barkakatin@gao.gov: Staff Acknowledgments: In addition to the persons named above, Neil Doherty, Michael Gilmore, Barbarol James, Kenneth A. Johnson, Kush K. Malhotra, Gary Mountjoy, Jennifer Stavros-Turner, and Amos Tevelow made key contributions to this report. [End of section] Footnotes: [1] Nonfederal entities include state and local governments, private sector entities, and academic institutions. [2] Critical infrastructure is systems and assets, whether physical or virtual, so vital to the United States that their incapacity or destruction would have a debilitating impact on national security, national economic security, national public health or safety, or any combination of those matters. There are 18 critical infrastructure sectors: agriculture and food, banking and finance, chemical, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, government facilities, information technology, national monuments and icons, nuclear reactors, materials and waste, postal and shipping, public health and health care, transportation systems, and water. [3] Statement of the Director of National Intelligence before the Senate Select Committee on Intelligence, Annual Threat Assessment of the Director of National Intelligence for the Senate Select Committee on Intelligence (Feb. 5, 2008). [4] Robert McMillan, "Seagate Ships Virus-Laden Hard Drives," InfoWorld (San Francisco, California: InfoWorld Media Group, Nov. 12, 2007), [hyperlink, http://www.infoworld.com/article/07/11/12/Seagate-ships- virus-laden-hard-drives_1.html] (accessed Apr. 9, 2008). [5] GAO, Critical Infrastructure Protection: Department of Homeland Security Faces Challenges in Fulfilling Cybersecurity Responsibilities, [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-05-434] (Washington, D.C.: May 26, 2005). [6] GAO, Critical Infrastructure Protection: Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain, [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-08-119T] (Washington, D.C.: Oct. 17, 2007). [7] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-08-119T]. [8] Computer Emergency Response Team of Estonia, "Malicious Cyber Attacks Against Estonia Come from Abroad," April 29, 2007, and Remarks by Homeland Security Secretary Michael Chertoff to the 2008 RSA Conference, April 8, 2008. [9] Office of the Secretary of Defense, Annual Report to Congress: Military Power of the People's Republic of China 2008. [10] Homeland Security Act of 2002, Pub. L. 107-296 (Nov. 25, 2002). [11] The White House, The National Strategy to Secure Cyberspace (Washington, D.C.: February 2003). [12] The White House, Homeland Security Presidential Directive 7, Critical Infrastructure Identification, Prioritization, and Protection (Washington, D.C.: Dec. 17, 2003). [13] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-05-434]. [14] GAO, Critical Infrastructure Protection: Significant Challenges in Developing National Capabilities, [hyperlink, http://www.gao.gov/cgi- bin/getrpt?GAO-01-323] (Washington, D.C.: Apr. 25, 2001). [15] Department of Homeland Security, National Response Framework (Washington, D.C.: January 2008). [16] The White House, National Security Presidential Directive 54/ Homeland Security Presidential Directive 23 (Washington, D.C.: Jan. 8, 2008). [17] Nonfederal entities include state and local governments, private sector entities, and individuals. [18] The CERT Coordination Center is a center of Internet security expertise at the Software Engineering Institute, a federally funded research and development center operated by the Carnegie Mellon University. CERT Coordination Center is registered in the U.S. Patent and Trademark Office by Carnegie Mellon University. [19] ISACs are to facilitate the private sector's participation in critical infrastructure protection efforts by serving as mechanisms for gathering and analyzing information and sharing it among the critical infrastructure sectors and between the private sector and government. ISACs have been established for many sectors, including financial services, electricity, information technology, research and education, the states, and telecommunications. [20] According to the National Institute of Standards and Technology, the National Vulnerability Database is the U.S. government repository of standards-based vulnerability management data. These data enable automation of vulnerability management, security measurement, and compliance (e.g., to meet the requirements of the Federal Information Security Management Act). This database includes databases of security checklists, security-related software flaws, misconfigurations, product names, and impact metrics. [21] According to MITRE, the Common Vulnerabilities and Exposures (CVE®) list is a dictionary of common names (i.e., CVE Identifiers) for publicly known information security vulnerabilities. CVE's common identifiers make it easier to share data across separate information security databases and tools, and provide a baseline for evaluating the coverage of an organization's security tools. [22] According to NIST, the Common Vulnerability Scoring System (CVSS) is an open framework for communicating the characteristics and impacts of IT vulnerabilities. Specifically, CVSS provides a standard measurement system for industries, organizations, and governments that need accurate and consistent vulnerability impact scores. [23] According to MITRE, Open Vulnerability and Assessment Language (OVAL™) is an international information security community standard to promote open and publicly available security content, and to standardize the transfer of this information across the entire spectrum of security tools and services. [24] The SANS Internet Storm Center (ISC) is an example of a cooperative cyber analysis and warning center. The ISC provides free analysis and warning services for those who monitor the Web site. Participation is voluntary. In addition, the SANS Institute sponsors intrusion detection software that acts as a monitoring sensor for data collection from which threat information and data trends can be analyzed. [25] Computer forensics is the practice of gathering, retaining, and analyzing computer-related data for investigative purposes in a manner that maintains the integrity of the data. [26] A honeypot is an intentionally underprotected computer host that is designed to collect data on suspicious activity. It generally has no authorized users other than its administrators. A sandbox is an isolated computer host used by analysts to let them observe cyber threats in order to gather data about how a specific threat might act. It is used to observe threats without endangering a live network and proprietary data. [27] NIST, Computer Security Incident Handling Guide: Recommendations of the National Institute of Standards and Technology, Special Publication 800-61 Revision 1 (Gaithersburg, Maryland: March 2008). This guide was issued to assist organizations in establishing computer security incident response capabilities and in handling incidents efficiently and effectively. [28] NIST Special Pub. 800-61 Rev. 1. [29] NIST Special Pub. 800-61, Rev. 1. [30] Cyber Storm is a biennial national-level exercise to test the ability of federal and nonfederal stakeholders, including federal, state, and local agencies; private sector entities; and foreign governments, to respond to major cyber attacks. The last exercise, referred to as Cyber Storm II, was held in March 2008. [31] GAO, Critical Infrastructure Protection: Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain, [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-1036] (Washington, D.C.: Sept. 10, 2007). [32] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-01-323]. [33] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-05-434]. [34] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-05-207]. [35] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-05-434]. [36] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-05-434]. [37] Note: The Department requests that GAO use the acronym, "US-CERT," when referring to the United States Computer Emergency Readiness Team and remove any references to it as "the center." US-CERT is not classified or defined as a center by the Department or any other entity. The GAO's use of the term "the center" can be confusing because the report also refers to the National Cyber Security Center (NCSC), which is an organization separate from NCSD. The NCSC will not duplicate the roles and responsibilities of the participating organizations, such as US-CERT, but will support them and ensure coordination and shared cyber security situational awareness across these organizations. [38] With regard to targeted dissemination of US-CERT's vetted products [e.g., Federal Information Notices (FINs), US-CERT CIINs issued via the Homeland Security Information Network - Critical Sectors (HSIN-CS) portal, and Situational Awareness Reports (SARs) US-CERT only vets the membership for the Government Forum of Incident Response and Security Teams (GFIRST)]. [End of section] GAO's Mission: The Government Accountability Office, the audit, evaluation and investigative arm of Congress, exists to support Congress in meeting its constitutional responsibilities and to help improve the performance and accountability of the federal government for the American people. GAO examines the use of public funds; evaluates federal programs and policies; and provides analyses, recommendations, and other assistance to help Congress make informed oversight, policy, and funding decisions. GAO's commitment to good government is reflected in its core values of accountability, integrity, and reliability. Obtaining Copies of GAO Reports and Testimony: The fastest and easiest way to obtain copies of GAO documents at no cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each weekday, GAO posts newly released reports, testimony, and correspondence on its Web site. To have GAO e-mail you a list of newly posted products every afternoon, go to [hyperlink, http://www.gao.gov] and select "E-mail Updates." Order by Mail or Phone: The first copy of each printed report is free. Additional copies are $2 each. A check or money order should be made out to the Superintendent of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or more copies mailed to a single address are discounted 25 percent. Orders should be sent to: U.S. Government Accountability Office: 441 G Street NW, Room LM: Washington, D.C. 20548: To order by Phone: Voice: (202) 512-6000: TDD: (202) 512-2537: Fax: (202) 512-6061: To Report Fraud, Waste, and Abuse in Federal Programs: Contact: Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]: E-mail: fraudnet@gao.gov: Automated answering system: (800) 424-5454 or (202) 512-7470: Congressional Relations: Ralph Dawn, Managing Director, dawnr@gao.gov: (202) 512-4400: U.S. Government Accountability Office: 441 G Street NW, Room 7125: Washington, D.C. 20548: Public Affairs: Chuck Young, Managing Director, youngc1@gao.gov: (202) 512-4800: U.S. Government Accountability Office: 441 G Street NW, Room 7149: Washington, D.C. 20548:

The Justia Government Accountability Office site republishes public reports retrieved from the U.S. GAO These reports should not be considered official, and do not necessarily reflect the views of Justia.