Critical Infrastructure Protection
DHS Needs to Better Address Its Cybersecurity Responsibilities
Gao ID: GAO-08-1157T September 16, 2008
Recent cyber attacks demonstrate the potentially devastating impact these pose to our nation's computer systems and to the federal operations and critical infrastructures that they support. They also highlight that we need to be vigilant against individuals and groups with malicious intent, such as criminals, terrorists, and nation-states perpetuating these attacks. Federal law and policy established the Department of Homeland Security (DHS) as the focal point for coordinating cybersecurity, including making it responsible for protecting systems that support critical infrastructures, a practice commonly referred to as cyber critical infrastructure protection. Since 2005, GAO has reported on the responsibilities and progress DHS has made in its cybersecurity efforts. GAO was asked to summarize its key reports and their associated recommendations aimed at securing our nation's cyber critical infrastructure. To do so, GAO relied on previous reports, as well as two reports being released today, and analyzed information about the status of recommendations.
GAO has reported over the last several years that DHS has yet to fully satisfy its cybersecurity responsibilities. To address these shortfalls, GAO has made about 30 recommendations in the following key areas. Specifically, examples of what GAO reported and recommended are as follows: (1) Cyber analysis and warning--In July 2008, GAO reported that DHS's United States Computer Emergency Readiness Team (US-CERT) did not fully address 15 key cyber analysis and warning attributes. For example, US-CERT provided warnings by developing and distributing a wide array of notifications; however, these notifications were not consistently actionable or timely. Consequently, GAO recommended that DHS address these attribute shortfalls. (2) Cyber exercises--In September 2008, GAO reported that since conducting a cyber attack exercise in 2006, DHS demonstrated progress in addressing eight lessons it learned from this effort. However, its actions to address the lessons had not been fully implemented. GAO recommended that the department schedule and complete all identified corrective activities. (3) Control systems--In a September 2007 report and October 2007 testimony, GAO identified that DHS was sponsoring multiple efforts to improve control system cybersecurity using vulnerability evaluation and response tools. However, the department had not established a strategy to coordinate this and other efforts across federal agencies and the private sector, and it did not effectively share control system vulnerabilities with others. Accordingly, GAO recommended that DHS develop a strategy to guide efforts for securing such systems and establish a process for sharing vulnerability information. While DHS has developed and implemented capabilities to address aspects of these areas, it still has not fully satisfied any of them. Until these and other areas are effectively addressed, our nation's cyber critical infrastructure is at risk of increasing threats posed by terrorists, nation-states, and others.
GAO-08-1157T, Critical Infrastructure Protection: DHS Needs to Better Address Its Cybersecurity Responsibilities
This is the accessible text file for GAO report number GAO-08-57T
entitled 'Critical Infrastructure Protection: DHS Needs to Better
Address Its Cybersecurity Responsibilities' which was released on
September 16, 2008.
This text file was formatted by the U.S. Government Accountability
Office (GAO) to be accessible to users with visual impairments, as part
of a longer term project to improve GAO products' accessibility. Every
attempt has been made to maintain the structural and data integrity of
the original printed product. Accessibility features, such as text
descriptions of tables, consecutively numbered footnotes placed at the
end of the file, and the text of agency comment letters, are provided
but may not exactly duplicate the presentation or format of the printed
version. The portable document format (PDF) file is an exact electronic
replica of the printed version. We welcome your feedback. Please E-mail
your comments regarding the contents or accessibility features of this
document to Webmaster@gao.gov.
This is a work of the U.S. government and is not subject to copyright
protection in the United States. It may be reproduced and distributed
in its entirety without further permission from GAO. Because this work
may contain copyrighted images or other material, permission from the
copyright holder may be necessary if you wish to reproduce this
material separately.
United States Government Accountability Office:
GAO:
Testimony:
Before the Subcommittee on Emerging Threats, Cybersecurity, and Science
and Technology, Committee on Homeland Security, House of
Representatives.
For Release on Delivery:
Expected at 2:00 p.m. (EDT):
Tuesday, September 16, 2008:
Critical Infrastructure Protection:
DHS Needs to Better Address Its Cybersecurity Responsibilities:
Statement of David Powner:
Director, Information Technology Management Issues:
GAO-08-1157T:
GAO Highlights:
Highlights of GAO-08-1157T, a report to Subcommittee on Emerging
Threats, Cybersecurity, and Science and Technology, Committee on
Homeland Security, House of Representatives.
Why GAO Did This Study:
Recent cyber attacks demonstrate the potentially devastating impact
these pose to our nation's computer systems and to the federal
operations and critical infrastructures that they support. They also
highlight that we need to be vigilant against individuals and groups
with malicious intent, such as criminals, terrorists, and nation-states
perpetuating these attacks. Federal law and policy established the
Department of Homeland Security (DHS) as the focal point for
coordinating cybersecurity, including making it responsible for
protecting systems that support critical infrastructures, a practice
commonly referred to as cyber critical infrastructure protection. Since
2005, GAO has reported on the responsibilities and progress DHS has
made in its cybersecurity efforts. GAO was asked to summarize its key
reports and their associated recommendations aimed at securing our
nation‘s cyber critical infrastructure. To do so, GAO relied on
previous reports, as well as two reports being released today, and
analyzed information about the status of recommendations.
What GAO Found:
GAO has reported over the last several years that DHS has yet to fully
satisfy its cybersecurity responsibilities. To address these
shortfalls, GAO has made about 30 recommendations in the following key
areas.
Table: Key Cybersecurity Areas Reviewed by GAO:
1. Bolstering cyber analysis and warning capabilities.
2. Reducing organizational inefficiencies.
3. Completing actions identified during cyber exercises.
4. Developing sector-specific plans that fully address all of the cyber-
related criteria.
5. Improving cybersecurity of infrastructure control systems (which are
computer-based systems that monitor and control sensitive processes and
physical functions).
6. Strengthening DHS‘s ability to help recover from Internet
disruptions.
Source: GAO analysis.
[End of table]
Specifically, examples of what GAO reported and recommended are as
follows:
* Cyber analysis and warning”In July 2008, GAO reported that DHS‘s
United States Computer Emergency Readiness Team (US-CERT) did not fully
address 15 key cyber analysis and warning attributes. For example, US-
CERT provided warnings by developing and distributing a wide array of
notifications; however, these notifications were not consistently
actionable or timely. Consequently, GAO recommended that DHS address
these attribute shortfalls.
* Cyber exercises”In September 2008, GAO reported that since conducting
a cyber attack exercise in 2006, DHS demonstrated progress in
addressing eight lessons it learned from this effort. However, its
actions to address the lessons had not been fully implemented. GAO
recommended that the department schedule and complete all identified
corrective activities.
* Control systems”In a September 2007 report and October 2007
testimony, GAO identified that DHS was sponsoring multiple efforts to
improve control system cybersecurity using vulnerability evaluation and
response tools. However, the department had not established a strategy
to coordinate this and other efforts across federal agencies and the
private sector, and it did not effectively share control system
vulnerabilities with others. Accordingly, GAO recommended that DHS
develop a strategy to guide efforts for securing such systems and
establish a process for sharing vulnerability information.
While DHS has developed and implemented capabilities to address aspects
of these areas, it still has not fully satisfied any of them. Until
these and other areas are effectively addressed, our nation‘s cyber
critical infrastructure is at risk of increasing threats posed by
terrorists, nation-states, and others.
What GAO Recommends:
GAO has previously made about 30 recommendations to help DHS fulfill
its cybersecurity responsibilities and resolve underlying challenges.
DHS in large part concurred with GAO‘s recommendations and in many
cases has actions planned and underway to implement them.
To view the full product, including the scope and methodology, click on
[hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-08-1157T]. For more
information, contact David A. Powner at (202) 512-9286 or
pownerd@gao.gov.
[End of section]
Mr. Chairman and Members of the Subcommittee:
Thank you for the opportunity to join in today's hearing to discuss
efforts in protecting our nation's critical infrastructures from:
cybersecurity threats. The recent computer-based, or cyber, attacks
against nation-states and others demonstrate the potentially
devastating impact these pose to systems and the operations and
critical infrastructures that they support.[Footnote 1] They also
highlight the need to be vigilant against individuals and groups with
malicious intent, such as criminals, terrorists, and nation-states
perpetuating these attacks.
Today, I will discuss the Department of Homeland Security's (DHS)
progress in fulfilling its responsibilities to protect systems that
support critical infrastructures--a practice referred to as cyber
critical infrastructure protection or cyber CIP--as well as its
progress in addressing our related recommendations. Due to concerns
about DHS's efforts to fully implement its CIP responsibilities as well
as known security risks to critical infrastructure systems, we added
cyber CIP as part of our federal information technology systems
security high-risk area in 2003 and have continued to report on its
status since that time[Footnote 2].
As requested, my testimony will summarize our key reports--two of which
are being released today at this hearing--and their associated
recommendations aimed at securing our nation's cyber critical
infrastructure. Specifically, these reports and recommendations focus
on (1) providing cyber analysis and warning capabilities, (2) being
effectively organized to plan for and respond to disruptions on
converged voice and data networks, (3) conducting and coordinating
cyber attack exercises, (4) developing cyber-related sector-specific
critical infrastructure plans, (5) securing control systems--computer-
based systems that monitor and control sensitive processes and physical
functions, and (6) coordinating public/private planning for Internet
recovery from a major disruption.
In preparing for this testimony, we relied on our previous reports on
department efforts to fulfilling its cyber CIP responsibilities. These
reports contain detailed overviews of the scope and methodology we
used. We also obtained and analyzed information about the
implementation status of our recommendations. We conducted our work, in
support of this testimony, from August 2008 through September 2008, in
the Washington, D.C. area. The work on which this testimony is based
was performed in accordance with generally accepted government auditing
standards.
Results In Brief:
Since 2005, we have reported that DHS has yet to fully satisfy its
cybersecurity responsibilities. These reports included nearly 30
recommendations on key areas essential for DHS to address in order to
fully implement its cybersecurity responsibilities. Examples of what
GAO reported and recommended are as follows:
* Cyber analysis and warning--In a report being released today, we
determined[Footnote 3] that DHS's United States Computer Emergency
Readiness Team (US-CERT) did not fully address 15 key cyber analysis
and warning attributes related to (1) monitoring network activity to
detect anomalies, (2) analyzing information and investigating anomalies
to determine whether they are threats, (3) warning appropriate
officials with timely and actionable threat and mitigation information,
and (4) responding to the threat. For example, US-CERT provided
warnings by developing and distributing a wide array of notifications;
however, these notifications were not consistently actionable or
timely. As a result, we recommended that the department address
shortfalls associated with the 15 attributes in order to fully
establish a national cyber analysis and warning capability. DHS agreed
in large part with our recommendations.
* Cyber exercises--In another report[Footnote 4] being issued today, we
concluded that since conducting a major cyber attack exercise, called
Cyber Storm, DHS demonstrated progress in addressing eight lessons it
learned from these efforts. However, its actions to address the lessons
had not been fully implemented. Specifically, while it had completed 42
of the 66 activities identified, the department identified 16
activities as ongoing and 7 as planned for the future. Consequently, we
recommended that it schedule and complete all of the corrective
activities identified so as to strengthen coordination between both
public and private sector participants in response to significant cyber
incidents. DHS concurred with our recommendation.
* Control systems--In a September 2007 report and October 2007
testimony,[Footnote 5] we identified that DHS was sponsoring multiple
control systems security initiatives, including efforts to (1) improve
control systems cybersecurity using vulnerability evaluation and
response tools and (2) build relationships with control systems vendors
and infrastructure asset owners. However, DHS had not established a
strategy to coordinate the various control systems activities across
federal agencies and the private sector, and it did not effectively
share information on control system vulnerabilities with the public and
private sectors. Accordingly, we recommended that DHS develop a
strategy to guide efforts for securing control systems and establish a
rapid and secure process for sharing sensitive control system
vulnerability information to improve federal government efforts to
secure control systems governing critical infrastructure. DHS officials
took our recommendations under advisement and more recently have begun
developing a strategy, which is still a work in process. In addition,
while DHS has begun developing a process to share sensitive
information, it has not provided any evidence that the process has been
implemented or that it is an effective information sharing mechanism.
Background:
The same speed and accessibility that create the enormous benefits of
the computer age can, if not properly controlled, allow individuals and
organizations to inexpensively eavesdrop on or interfere with computer
operations from remote locations for mischievous or malicious purposes,
including fraud or sabotage. In recent years, the sophistication and
effectiveness of cyberattacks have steadily advanced.
Government officials are increasingly concerned about attacks from
individuals and groups with malicious intent, such as criminals,
terrorists, and nation-states. As we reported[Footnote 6] in June 2007,
cybercrime has significant economic impacts and threatens U.S. national
security interests. Various studies and experts estimate the direct
economic impact from cybercrime to be in the billions of dollars
annually. In addition, there is continued concern about the threat that
our adversaries, including nation-states and terrorists, pose to our
national security. For example, intelligence officials have stated that
nation-states and terrorists could conduct a coordinated cyber attack
to seriously disrupt electric power distribution, air traffic control,
and financial sectors. In May 2007, Estonia was the reported target of
a denial-of-service cyber attack with national consequences. The
coordinated attack created mass outages of its government and
commercial Web sites.[Footnote 7]
To address threats posed against the nation's computer-reliant
infrastructures, federal law and policy establishes DHS as the focal
point for cyber CIP. For example, within DHS, the Assistant Secretary
of Cyber Security and Communications is responsible for being the focal
point for national cyber CIP efforts. Under the Assistant Secretary is
NCSD which interacts on a day-to-day basis with federal and nonfederal
agencies and organizations (e.g., state and local governments, private-
sector companies) regarding, among other things, cyber-related
analysis, warning, information sharing, major incident response, and
national-level recovery efforts. Consequently, DHS has multiple
cybersecurity-related roles and responsibilities. In May 2005, we
identified, and reported on, 13 key cybersecurity responsibilities
called for in law and policy.[Footnote 8] These responsibilities are
described in appendix I.
Since then, we have performed detailed work and made recommendations on
DHS's progress in fulfilling specific aspects of the responsibilities,
as discussed in more detail later in this statement.
In addition to DHS efforts to fulfill its cybersecurity
responsibilities, the President in January 2008 issued HSPD 23--also
referred to as National Security Presidential Directive 54 and the
President's "Cyber Initiative"--to improve DHS and the other federal
agencies' cybersecurity efforts, including protecting against intrusion
attempts and better anticipating future threats.[Footnote 9] While the
directive has not been made public, DHS officials stated that the
initiative includes steps to enhance cyber analysis related efforts,
such as requiring federal agencies to implement a centralized network
monitoring tool and reduce the number of connections to the Internet.
DHS Needs to Address Several Key Areas Associated with Its
Cybersecurity Responsibilities:
Over the last several years, we have reported that DHS has yet to
comprehensively satisfy its key cybersecurity responsibilities. These
reports included about 30 recommendations that we summarized into the
following key areas that are essential for DHS to address in order to
fully implement its cybersecurity responsibilities.
Table 1: Key Cybersecurity Areas Reviewed by GAO:
1. Bolstering cyber analysis and warning capabilities.
2. Reducing organizational inefficiencies.
3. Completing actions identified during cyber exercises.
4. Developing sector-specific plans that fully address all of the cyber-
related criteria.
5. Improving cybersecurity of infrastructure control systems.
6. Strengthening DHS's ability to help recover from Internet
disruptions.
Source: GAO analysis.
[End of table]
Bolstering Cyber Analysis and Warning Capabilities:
In July 2008, we identified[Footnote 10] that cyber analysis and
warning capabilities included (1) monitoring network activity to detect
anomalies, (2) analyzing information and investigating anomalies to
determine whether they are threats, (3) warning appropriate officials
with timely and actionable threat and mitigation information, and (4)
responding to the threat. These four capabilities are comprised of 15
key attributes, which are detailed in appendix II.
We concluded that while US-CERT demonstrated aspects of each of the key
attributes, it did not fully incorporate all of them. For example, as
part of its monitoring, US-CERT obtained information from numerous
external information sources; however, it had not established a
baseline of our nation's critical network assets and operations. In
addition, while it investigated if identified anomalies constitute
actual cyber threats or attacks as part of its analysis, it did not
integrate its work into predictive analyses of broader implications or
potential future attacks, nor does it have the analytical or technical
resources to analyze multiple, simultaneous cyber incidents. The
organization also provided warnings by developing and distributing a
wide array of attack and other notifications; however, these
notifications were not consistently actionable or timely--providing the
right information to the right persons or groups as early as possible
to give them time to take appropriate action. Further, while it
responded to a limited number of affected entities in their efforts to
contain and mitigate an attack, recover from damages, and remediate
vulnerabilities, the organization did not possess the resources to
handle multiple events across the nation.
We also concluded that without the key attributes, US-CERT did not have
the full complement of cyber analysis and warning capabilities
essential to effectively perform its national mission. As a result, we
made 10 recommendations to the department to address shortfalls
associated with the 15 attributes in order to fully establish a
national cyber analysis and warning capability. DHS concurred with 9 of
our 10 recommendations.
Reducing Organizational Inefficiencies:
In June 2008, we reported[Footnote 11] on the status of DHS's efforts
to establish an integrated operations center that it agreed to adopt
per recommendations from a DHS-commissioned expert task force. The two
operations centers that were to be integrated were within the
department's National Communication System and National Cyber Security
Division. We determined that DHS had taken the first of three steps
towards integrating the operations centers--called the National
Coordination Center Watch and US-CERT--it uses to plan for and monitor
voice and data network disruptions. While DHS completed the first
integration step by locating the two centers in adjacent space, it had
yet to implement the remaining two steps. Specifically, although called
for in the task force's recommendations, the department had not
organizationally merged the two centers or involved key private sector
critical infrastructure officials in the planning, monitoring, and
other activities of the proposed joint operations center. In addition,
the department lacked a strategic plan and related guidance that
provides overall direction in this area and has not developed specific
tasks and milestones for achieving the two remaining integration steps.
We concluded that until the two centers were fully integrated is
completed, DHS was at risk of being unable to efficiently plan for and
respond to disruptions to communications infrastructure and the data
and applications that travel on this infrastructure, increasing the
probability that communications will be unavailable or limited in times
of need. As a result, we recommended that the department complete its
strategic plan and define tasks and milestones for completing remaining
integration steps so that we are better prepared to provide an
integrated response to disruptions to the communications
infrastructure. DHS concurred with our first recommendation and stated
that it would address the second recommendation as part of finalizing
its strategic plan.
DHS has recently made organizational changes to bolster its
cybersecurity focus. For example, in response to the President's
January 2008 Cyber Initiative, the department established a National
Cybersecurity Center to ensure coordination among cyber-related efforts
across the federal government. DHS placed the center at a higher
organizational level than the Assistant Secretary of Cyber Security and
Communications. As we previously reported,[Footnote 12] this placement
raises questions about, and may in fact, diminish the Assistant
Secretary's authority as the focal point for the federal government's
cyber CIP efforts. It also raises similar questions about NCSD's role
as the primary federal cyber analysis and warning organization.
Completing Corrective Actions Identified During A Cyber Exercise:
In September 2008, we reported[Footnote 13] on a 2006 major DHS-
coordinated cyber attack exercise, called Cyber Storm, that included
large scale simulations of multiple concurrent attacks involving the
federal government, states, foreign governments, and private
industry.We determined that DHS had identified eight lessons learned
from this exercise, such as the need to improve interagency
coordination groups and the exercise program. We also concluded that
while DHS had demonstrated progress in addressing the lessons learned,
more needed to be done. Specifically, while the department completed 42
of the 66 activities identified to address the lessons learned, it
identified 16 activities as ongoing and 7 as planned for the future.
[Footnote 14] In addition, DHS provided no timetable for the completion
dates of the ongoing activities. We noted that until DHS scheduled and
completed its remaining activities, it was at risk of conducting
subsequent exercises that repeated the lessons learned during the first
exercise. Consequently, we recommended that DHS schedule and complete
the identified corrective activities so that its cyber exercises can
help both public and private sector participants coordinate their
responses to significant cyber incidents. DHS agreed with the
recommendation.
Developing Sector-Specific Plans That Fully Address All of the Cyber-
Related Criteria:
In 2007, we reported and testified[Footnote 15] on the cybersecurity
aspects of CIP plans for 17 critical infrastructure sectors, referred
to as sector-specific plans. Specifically, we found that none of the
plans fully addressed the 30 key cybersecurity-related criteria
described in DHS guidance. We also determined that while several
sectors' plans fully addressed many of the criteria, others were less
comprehensive. In addition to the variations in the extent to which the
plans covered aspects of cybersecurity, there was also variance among
the plans in the extent to which certain criteria were addressed. For
example, fewer than half of the plans fully addressed describing (1) a
process to identify potential consequences of cyber attack or (2) any
incentives used to encourage voluntary performance of risk assessments.
We noted that without complete and comprehensive plans, stakeholders
within the infrastructure sectors may not adequately identify,
prioritize, and protect their critical assets. Consequently, we
recommended[Footnote 16] that DHS request that the lead federal
agencies, referred to as sector-specific agencies, that are responsible
for the development of CIP plans for their sectors fully address all
cyber-related criteria by September 2008 so that stakeholders within
the infrastructure sectors will effectively identify, prioritize, and
protect the cyber aspects of their CIP efforts. The updated plans are
due this month.
Improving Cybersecurity of Infrastructure Control Systems:
In a September 2007 report and October 2007 testimony,[Footnote 17] we
identified that federal agencies had initiated efforts to improve the
security of critical infrastructure control systems--computer-based
systems that monitor and control sensitive processes and physical
functions. For example, DHS was sponsoring multiple control systems
security initiatives, including efforts to (1) improve control systems
cybersecurity using vulnerability evaluation and response tools and (2)
build relationships with control systems vendors and infrastructure
asset owners. However, the department had not established a strategy to
coordinate the various control systems activities across federal
agencies and the private sector. Further, it lacked processes needed to
address specific weaknesses in sharing information on control system
vulnerabilities. We concluded that until public and private sector
security efforts are coordinated by an overarching strategy and
specific information sharing shortfalls are addressed, there was an
increased risk that multiple organizations would conduct duplicative
work and miss opportunities to fulfill their critical missions.
Consequently, we recommended[Footnote 18] that DHS develop a strategy
to guide efforts for securing control systems and establish a rapid and
secure process for sharing sensitive control system vulnerability
information to improve federal government efforts to secure control
systems governing critical infrastructure. In response, DHS officials
took our recommendations under advisement and more recently have begun
developing a Federal Coordinating Strategy to Secure Control Systems,
which is still a work in process. In addition, while DHS began
developing a process to share sensitive information; it has not
provided any evidence that the process has been implemented or that it
is an effective information sharing mechanism.
Strengthening DHS's Ability to Help Recovery from Internet Disruptions:
We reported and later testified[Footnote 19] in 2006 that the
department had begun a variety of initiatives to fulfill its
responsibility for developing an integrated public/private plan for
Internet recovery. However, we determined that these efforts were not
comprehensive or complete. As such, we recommended that DHS implement
nine actions to improve the department's ability to facilitate public/
private efforts to recover the Internet in case of a major disruption.
In October 2007, we testified[Footnote 20] that the department had made
progress in implementing our recommendations; however, seven of the
nine have not been completed. For example, it revised key plans in
coordination with private industry infrastructure stakeholders,
coordinated various Internet recovery-related activities, and addressed
key challenges to Internet recovery planning. However, it had not,
among other things, finalized recovery plans and defined the
interdependencies among DHS's various working groups and initiatives.
In other words, it has not completed an integrated private/public plan
for Internet recovery. As a result, we concluded that the nation lacked
direction from the department on how to respond in such a contingency.
We also noted that these incomplete efforts indicated DHS and the
nation were not fully prepared to respond to a major Internet
disruption.
In summary, DHS has developed and implemented capabilities to satisfy
aspects of key cybersecurity responsibilities. However, it still needs
to take further action to fulfill all of these responsibilities. In
particular, it needs to fully address the key areas identified in our
recent reports. Specifically, it will have to bolster cyber analysis
and warning capabilities, address organizational inefficiencies by
integrating voice and data operations centers, enhance cyber exercises
by completing the identified activities associated with the lessons
learned, ensure that cyber-related sector-specific critical
infrastructure plans are completed, improve efforts to address the
cybersecurity of infrastructure control systems by completing a
comprehensive strategy and ensuring adequate mechanisms for sharing
sensitive information, and strengthen its ability to help recover from
Internet disruptions by finalizing recovery plans and defining
interdependencies. Until these steps are taken, our nation's computer-
reliant critical infrastructure remains at unnecessary risk of
significant cyber incidents.
Mr. Chairman, this concludes my statement. I would be happy to answer
any questions that you or members of the subcommittee may have at this
time.
If you have any questions on matters discussed in this testimony,
please contact me at (202) 512-9286, or by e-mail at pownerd@gao.gov.
Other key contributors to this testimony include Camille Chaires,
Michael Gilmore, Rebecca LaPaze, Kush Malhotra, and Gary Mountjoy.
[End of section]
Appendix I: DHS's Key Cybersecurity Responsibilities:
Responsibilities: Develop a national plan for CIP that includes
cybersecurity;
Description of responsibilities:
Developing a comprehensive national plan for securing the key resources
and critical infrastructure of the United States, including information
technology and telecommunications systems (including satellites) and
the physical and technological assets that support such systems. This
plan is to outline national strategies, activities, and milestones for
protecting critical infrastructures.
Responsibilities: Develop partnerships and coordinate with other
federal agencies, state and local governments, and the private sector;
Description of responsibilities:
Fostering and developing public/private partnerships with and among
other federal agencies, state and local governments, the private
sector, and others. DHS is to serve as the "focal point for the
security of cyberspace."
Responsibilities: Improve and enhance public/private information
sharing involving cyber attacks, threats, and vulnerabilities;
Description of responsibilities: Improving and enhancing information
sharing with and among other federal agencies, state and local
governments, the private sector, and others through improved
partnerships and collaboration, including encouraging information
sharing and analysis mechanisms. DHS is to improve sharing of
information on cyber attacks, threats, and vulnerabilities.
Responsibilities: Develop and enhance national cyber analysis and
warning capabilities;
Description of responsibilities:
Providing cyber analysis and warnings, enhancing analytical
capabilities, and developing a national indications and warnings
architecture to identify precursors to attacks.
Responsibilities: Provide and coordinate incident response and recovery
planning efforts;
Description of responsibilities: Providing crisis management in
response to threats to or attacks on critical information systems. This
entails coordinating efforts for incident response, recovery planning,
exercising cybersecurity continuity plans for federal systems, planning
for recovery of Internet functions, and assisting infrastructure
stakeholders with cyber-related emergency recovery plans.
Responsibilities: Identify and assess cyber threats and
vulnerabilities;
Description of responsibilities: Leading efforts by the public and
private sector to conduct a national cyber threat assessment, to
conduct or facilitate vulnerability assessments of sectors, and to
identify cross-sector interdependencies.
Responsibilities: Support efforts to reduce cyber threats and
vulnerabilities;
Description of responsibilities: Leading and supporting efforts by the
public and private sector to reduce threats and vulnerabilities. Threat
reduction involves working with the law enforcement community to
investigate and prosecute cyberspace threats. Vulnerability reduction
involves identifying and remediating vulnerabilities in existing
software and systems.
Responsibilities: Promote and support research and development efforts
to strengthen cyberspace security;
Description of responsibilities: Collaborating and coordinating with
members of academia, industry, and government to optimize cybersecurity-
related research and development efforts to reduce vulnerabilities
through the adoption of more secure technologies.
Responsibilities: Promote awareness and outreach;
Description of responsibilities: Establishing a comprehensive national
awareness program to promote efforts to strengthen cybersecurity
throughout government and the private sector, including the home user.
Responsibilities: Foster training and certification;
Description of responsibilities: Improving cybersecurity-related
education, training, and certification opportunities.
Responsibilities: Enhance federal, state, and local government
cybersecurity;
Description of responsibilities: Partnering with federal, state, and
local governments in efforts to strengthen the cybersecurity of the
nation's critical information infrastructure to assist in the
deterrence, prevention, preemption of, and response to terrorist
attacks against the United States.
Responsibilities: Strengthen international cyberspace security;
Description of responsibilities: Working in conjunction with other
federal agencies, international organizations, and industry in efforts
to promote strengthened cybersecurity on a global basis.
Responsibilities: Integrate cybersecurity with national security;
Description of responsibilities: Coordinating and integrating
applicable national preparedness goals with its National Infrastructure
Protection Plan.
Source: GAO analysis of the Homeland Security Act of 2002, the Homeland
Security Presidential Directive-7, and the National Strategy to Secure
Cyberspace.
[End of table]
[End of section]
Appendix II: Key Attributes of Cyber Analysis and Warning Capabilities:
Capability: Monitoring;
Attribute:
* Establish a baseline understanding of network assets and normal
network traffic volume and flow;
* Assess risks to network assets;
* Obtain internal information on network operations via technical tools
and user reports;
* Obtain external information on threats, vulnerabilities, and
incidents through various relationships, alerts, and other sources;
* Detect anomalous activities.
Capability: Analysis;
Attribute:
* Verify that an anomaly is an incident (threat of attack or actual
attack);
* Investigate the incident to identify the type of cyber attack,
estimate impact, and collect evidence;
* Identify possible actions to mitigate the impact of the incident;
* Integrate results into predictive analysis of broader implications or
potential future attack.
Capability: Warning;
Attribute:
* Develop attack and other notifications that are targeted and
actionable;
* Provide notifications in a timely manner;
* Distribute notifications using appropriate communications methods.
Capability: Response;
Attribute:
* Contain and mitigate the incident;
* Recover from damages and remediate vulnerabilities;
* Evaluate actions and incorporate lessons learned.
Source: GAO analysis.
[End of table]
[End of section]
Footnotes:
[1] Critical infrastructure is systems and assets, whether physical or
virtual, so vital to the United States that their incapacity or
destruction would have a debilitating impact on national security,
national economic security, national public health or safety, or any
combination of those matters. There are 18 critical infrastructure
sectors: agriculture and food, banking and finance, chemical,
commercial facilities, communications, critical manufacturing, dams,
defense industrial base, emergency services, energy, government
facilities, information technology, national monuments and icons,
nuclear reactors, materials and waste, postal and shipping, public
health and health care, transportation systems, and water.
[2] For our most recent high risk report, see GAO, High-Risk Series: An
Update, [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-310]
(Washington, D.C.: January 2007).
[3] GAO, Cyber Analysis and Warning: DHS Faces Challenges in
Establishing a Comprehensive National Capability, [hyperlink,
http://www.gao.gov/cgi-bin/getrpt?GAO-08-588] (Washington, D.C.: July
31, 2008).
[4] GAO, Critical Infrastructure Protection: DHS Needs To Fully Address
Lessons Learned from Its First Cyber Storm Exercise, [hyperlink,
http://www.gao.gov/cgi-bin/getrpt?GAO-08-825] (Washington, D.C.: Sept.
9, 2008).
[5] GAO, Critical Infrastructure Protection: Multiple Efforts to Secure
Control Systems Are Under Way, but Challenges Remain, [hyperlink,
http://www.gao.gov/cgi-bin/getrpt?GAO-07-1036] (Washington, D.C.: Sept.
10, 2007) and Critical Infrastructure Protection: Multiple Efforts to
Secure Control Systems Are Under Way, but Challenges Remain,
[hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-08-119T] (Washington,
D.C.: Oct. 17, 2007).
[6] GAO, Cybercrime: Public and Private Entities Face Challenges in
Addressing Cyber Threats, [hyperlink, http://www.gao.gov/cgi-
bin/getrpt?GAO-07-705] (Washington, D.C.: June 22, 2007).
[7] Computer Emergency Response Team of Estonia, "Malicious Cyber
Attacks Against Estonia Come from Abroad," April 29, 2007, and Remarks
by Homeland Security Secretary Michael Chertoff to the 2008 RSA
Conference, April 8, 2008.
[8] GAO, Critical Infrastructure Protection: Department of Homeland
Security Faces Challenges in Fulfilling Cybersecurity Responsibilities,
[hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-05-434] (Washington,
D.C.: May 26, 2005); Critical Infrastructure Protection: Challenges in
Addressing Cybersecurity, [hyperlink, http://www.gao.gov/cgi-
bin/getrpt?GAO-05-827T] (Washington, D.C.: July 19, 2005); and Critical
Infrastructure Protection: DHS Leadership Needed to Enhance
Cybersecurity. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-06-
1087T] (Washington, D.C.: Sept. 13, 2006).
[9] The White House, National Security Presidential Directive 54/
Homeland Security Presidential Directive 23 (Washington, D.C.: Jan. 8,
2008).
[10] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-08-588].
[11] GAO, Critical Infrastructure Protection: Further Efforts Needed to
Integrate Planning for and Response to Disruption on Converged Voice
and Data Networks, [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-08-
607] (Washington, D.C.: June 26, 2008).
[12] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-08-588].
[13] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-08-825].
[14] DHS reported that one other activity had been completed, but the
department was unable to provide evidence demonstrating its completion.
[15] GAO, Critical Infrastructure Protection: Sector-Specific Plans'
Coverage of Key Cyber Security Elements Varies, [hyperlink,
http://www.gao.gov/cgi-bin/getrpt?GAO-08-64T] (Washington D.C.; October
31, 2007); and Critical Infrastructure Protection: Sector-Specific
Plans' Coverage of Key Cyber Security Elements Varies, [hyperlink,
http://www.gao.gov/cgi-bin/getrpt?GAO-08-113] (Washington D.C.; Oct.
31, 2007).
[16] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-08-113].
[17] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-1036] and
[hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-08-119T].
[18] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-1036].
[19] GAO, Internet Infrastructure: Challenges in Developing a Public/
Private Recovery Plan, [hyperlink, http://www.gao.gov/cgi-
bin/getrpt?GAO-06-863T] (Washington, D.C.: July 28, 2006); and Internet
Infrastructure: DHS Faces Challenges in Developing a Joint
Public/Private Recovery Plan, [hyperlink, http://www.gao.gov/cgi-
bin/getrpt?GAO-06-672] (Washington, D.C.: June 16, 2006).
[20] GAO, Internet Infrastructure: Challenges in Developing a Public/
Private Recovery Plan, [hyperlink, http://www.gao.gov/cgi-
bin/getrpt?GAO-08-212T] (Washington, D.C.: Oct. 23, 2007).
[End of section]
GAO's Mission:
The Government Accountability Office, the audit, evaluation and
investigative arm of Congress, exists to support Congress in meeting
its constitutional responsibilities and to help improve the performance
and accountability of the federal government for the American people.
GAO examines the use of public funds; evaluates federal programs and
policies; and provides analyses, recommendations, and other assistance
to help Congress make informed oversight, policy, and funding
decisions. GAO's commitment to good government is reflected in its core
values of accountability, integrity, and reliability.
Obtaining Copies of GAO Reports and Testimony:
The fastest and easiest way to obtain copies of GAO documents at no
cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each
weekday, GAO posts newly released reports, testimony, and
correspondence on its Web site. To have GAO e-mail you a list of newly
posted products every afternoon, go to [hyperlink, http://www.gao.gov]
and select "E-mail Updates."
Order by Mail or Phone:
The first copy of each printed report is free. Additional copies are $2
each. A check or money order should be made out to the Superintendent
of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or
more copies mailed to a single address are discounted 25 percent.
Orders should be sent to:
U.S. Government Accountability Office:
441 G Street NW, Room LM:
Washington, D.C. 20548:
To order by Phone:
Voice: (202) 512-6000:
TDD: (202) 512-2537:
Fax: (202) 512-6061:
To Report Fraud, Waste, and Abuse in Federal Programs:
Contact:
Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]:
E-mail: fraudnet@gao.gov:
Automated answering system: (800) 424-5454 or (202) 512-7470:
Congressional Relations:
Ralph Dawn, Managing Director, dawnr@gao.gov:
(202) 512-4400:
U.S. Government Accountability Office:
441 G Street NW, Room 7125:
Washington, D.C. 20548:
Public Affairs:
Chuck Young, Managing Director, youngc1@gao.gov:
(202) 512-4800:
U.S. Government Accountability Office:
441 G Street NW, Room 7149:
Washington, D.C. 20548: