Critical Infrastructure Protection

Current Cyber Sector-Specific Planning Approach Needs Reassessment Gao ID: GAO-09-969 September 24, 2009

The nation's critical infrastructure sectors (e.g., energy, banking) rely extensively on information technology systems. The Department of Homeland Security (DHS) issued guidance in 2006 that instructed lead federal agencies, referred to as sector-specific agencies, to develop plans for protecting the sector's critical cyber and other (physical) infrastructure. These agencies issued plans in 2007, but GAO found that none fully addressed all 30 cyber security-related criteria identified in DHS's guidance and recommended that the plans be updated to address it by September 2008. GAO was asked to determine the extent to which sector plans have been updated to fully address DHS's cyber security requirements and assess whether these plans and related reports provide for effective implementation. To do this, GAO analyzed documentation, interviewed officials, and compared sector plans and reports with DHS cyber criteria.

Although DHS reported many efforts under way and planned to improve the cyber content of sector-specific plans, sector-specific agencies have yet to update their respective sector-specific plans to fully address key DHS cyber security criteria. For example, of the 17 sector-specific plans, only 9 have been updated. Of these 9 updates, just 3 addressed missing cyber criteria, and those 3 involved only a relatively small number (3 or fewer) of the criteria in question. Recently DHS issued guidance specifically requesting that the sectors address cyber criteria shortfalls in their 2010 sector-specific plan updates. Until the plans are issued, it is not clear whether they will fully address cyber requirements. Accordingly, the continuing lack of plans that fully address key cyber criteria has reduced the effectiveness of the existing sector planning approach and thus increases the risk that the nation's cyber assets have not been adequately identified, prioritized, and protected. Most sector-specific agencies developed and identified in their 2007 sector plans those actions--referred to by DHS as implementation actions--essential to carrying out the plans; however, since then, most agencies have not updated the actions and reported progress in implementing them as called for by DHS guidance. Specifically, in response to 2006 guidance that called for agencies to address three key implementation elements (action descriptions, completion milestones, and parties responsible), most sectors initially developed implementation actions that fully addressed the key elements. However, while 2008 guidance called for implementation actions to be updated and for sector reports to include progress reporting against implementation action milestone commitments, only five sectors updated their plans and reported on progress against implementation actions. DHS attributed this in part to the department not following up and working to ensure that all sector plans are fully developed and implemented in accordance with department guidance. The lack of complete updates and progress reports are further evidence that the sector planning process has not been effective and thus leaves the nation in the position of not knowing precisely where it stands in securing cyber critical infrastructures. Not following up to address these conditions also shows DHS is not making sector planning a priority. Further, recent studies by a presidential working group--which resulted in the President establishing the White House Office of Cybersecurity Coordinator--and an expert commission also identified shortfalls in the effectiveness of the current public-private partnership approach and related sector planning and offered options for improving the process. Such options include (1) prioritizing sectors to focus planning efforts on those with the most important cyber assets and (2) streamlining existing sectors to optimize their capacity to identify priorities and develop plans. Given this, it is essential that DHS and the to-be-appointed Cybersecurity Coordinator determine whether the current process as implemented should continue to be the national approach and thus worthy of further investment.

Recommendations

Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.

Director: Team: Phone:


GAO-09-969, Critical Infrastructure Protection: Current Cyber Sector-Specific Planning Approach Needs Reassessment This is the accessible text file for GAO report number GAO-09-969 entitled 'Critical Infrastructure Protection: Current Cyber Sector- Specific Planning Approach Needs Reassessment' which was released on October 28, 2009. This text file was formatted by the U.S. Government Accountability Office (GAO) to be accessible to users with visual impairments, as part of a longer term project to improve GAO products' accessibility. Every attempt has been made to maintain the structural and data integrity of the original printed product. Accessibility features, such as text descriptions of tables, consecutively numbered footnotes placed at the end of the file, and the text of agency comment letters, are provided but may not exactly duplicate the presentation or format of the printed version. The portable document format (PDF) file is an exact electronic replica of the printed version. We welcome your feedback. Please E-mail your comments regarding the contents or accessibility features of this document to Webmaster@gao.gov. This is a work of the U.S. government and is not subject to copyright protection in the United States. It may be reproduced and distributed in its entirety without further permission from GAO. Because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately. Report to Congressional Requesters: United States Government Accountability Office: GAO: September 2009: Critical Infrastructure Protection: Current Cyber Sector-Specific Planning Approach Needs Reassessment: GAO-09-969: GAO Highlights: Highlights of GAO-09-969, a report to congressional requesters. Why GAO Did This Study: The nation‘s critical infrastructure sectors (e.g., energy, banking) rely extensively on information technology systems. The Department of Homeland Security (DHS) issued guidance in 2006 that instructed lead federal agencies, referred to as sector-specific agencies, to develop plans for protecting the sector‘s critical cyber and other (physical) infrastructure. These agencies issued plans in 2007, but GAO found that none fully addressed all 30 cyber security-related criteria identified in DHS‘s guidance and recommended that the plans be updated to address it by September 2008. GAO was asked to determine the extent to which sector plans have been updated to fully address DHS‘s cyber security requirements and assess whether these plans and related reports provide for effective implementation. To do this, GAO analyzed documentation, interviewed officials, and compared sector plans and reports with DHS cyber criteria. What GAO Found: Although DHS reported many efforts under way and planned to improve the cyber content of sector-specific plans, sector-specific agencies have yet to update their respective sector-specific plans to fully address key DHS cyber security criteria. For example, of the 17 sector-specific plans, only 9 have been updated. Of these 9 updates, just 3 addressed missing cyber criteria, and those 3 involved only a relatively small number (3 or fewer) of the criteria in question. Recently DHS issued guidance specifically requesting that the sectors address cyber criteria shortfalls in their 2010 sector-specific plan updates. Until the plans are issued, it is not clear whether they will fully address cyber requirements. Accordingly, the continuing lack of plans that fully address key cyber criteria has reduced the effectiveness of the existing sector planning approach and thus increases the risk that the nation‘s cyber assets have not been adequately identified, prioritized, and protected. Most sector-specific agencies developed and identified in their 2007 sector plans those actions”referred to by DHS as implementation actions” essential to carrying out the plans; however, since then, most agencies have not updated the actions and reported progress in implementing them as called for by DHS guidance. Specifically, in response to 2006 guidance that called for agencies to address three key implementation elements (action descriptions, completion milestones, and parties responsible), most sectors initially developed implementation actions that fully addressed the key elements. However, while 2008 guidance called for implementation actions to be updated and for sector reports to include progress reporting against implementation action milestone commitments, only five sectors updated their plans and reported on progress against implementation actions. DHS attributed this in part to the department not following up and working to ensure that all sector plans are fully developed and implemented in accordance with department guidance. The lack of complete updates and progress reports are further evidence that the sector planning process has not been effective and thus leaves the nation in the position of not knowing precisely where it stands in securing cyber critical infrastructures. Not following up to address these conditions also shows DHS is not making sector planning a priority. Further, recent studies by a presidential working group”which resulted in the President establishing the White House Office of Cybersecurity Coordinator”and an expert commission also identified shortfalls in the effectiveness of the current public-private partnership approach and related sector planning and offered options for improving the process. Such options include (1) prioritizing sectors to focus planning efforts on those with the most important cyber assets and (2) streamlining existing sectors to optimize their capacity to identify priorities and develop plans. Given this, it is essential that DHS and the to-be-appointed Cybersecurity Coordinator determine whether the current process as implemented should continue to be the national approach and thus worthy of further investment. What GAO Recommends: GAO recommends that DHS assess whether existing sector-specific planning processes should continue to be the nation‘s approach to securing cyber and other critical infrastructure and consider whether other options would provide more effective results. DHS concurred with the recommendation; however, it took exception with certain report facts and conclusions. GAO addressed these comments, but they did not result in substantive report revisions. View [hyperlink, http://www.gao.gov/products/GAO-09-969] or key components. For more information, contact David Powner, 202-512-9286, pownerd@gao.gov. [End of section] Contents: Letter: Sector-Specific Agencies Have Yet to Update Their Respective Sector- Specific Plans to Fully Address Key Cyber Security Criteria as Called for by DHS Guidance: Sector Plans and Related Reports Do Not Fully Provide For Effective Implementation: Conclusions: Recommendations: Agency Comments and Our Evaluation: Appendix I: Briefing Provided to Staff, Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology, House Committee on Homeland Security: Appendix II: Comments from the Department of Homeland Security: Appendix III: GAO Contact and Staff Acknowledgments: Abbreviations: CIP: critical infrastructure protection: DHS: Department of Homeland Security: IT: information technology: NIPP: National Infrastructure Protection Plan: SSP: sector-specific plan: [End of section] United States Government Accountability Office: Washington, DC 20548: September 24, 2009: The Honorable Yvette D. Clarke: Chairwoman: Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology: Committee on Homeland Security: House of Representatives: The Honorable James R. Langevin: House of Representatives: The nation's critical infrastructure relies extensively on computerized information technology (IT) systems and electronic data. The security of those systems and information is essential to the nation's security, economy, and public health and safety. To help protect critical infrastructure, federal policy established a framework for public and private sector partnerships and identified 18 critical infrastructure sectors such as energy and banking and finance. To implement the framework, the Department of Homeland Security (DHS) issued a 2006 National Infrastructure Protection Plan that along with other DHS guidance, called for lead federal agencies (sector-specific agencies) to develop sector-specific plans and sector annual reports to address how sectors would implement the national plan, including how key cyber infrastructure assets were to be protected--commonly referred to as cyber security. In May 2007, sector-specific agencies issued plans for their sectors; we subsequently reviewed the plans and reported[Footnote 1] that none fully addressed 30 cyber security-related criteria identified in DHS's guidance and recommended that DHS request that the sector-specific agencies' plans address the cyber-related criteria by September 2008. Since then, an expert commission--led by two congressmen and industry officials--studied and reported in late 2008 on the public-private partnership, including sector planning approach and other aspects of U.S. cyber security policy. More recently, the President established (1) a cyber security working group that completed a "60-day" review of federal cyber policy and (2) a Cybersecurity Coordinator (the position has not yet been filled) within the White House to assist in developing new cyber policies and coordinating efforts across the federal government. Both studies identified issues with the current sector planning as well as options to improve it. This report responds to your request that we (1) determine the extent to which sector plans have been updated to fully address DHS cyber security requirements and (2) assess whether these plans and related reports provide for effective implementation. On July 29, 2009, we provided a briefing to staff of the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology, House Committee on Homeland Security. This report summarizes and transmits (1) the presentation slides we used to brief the staff and (2) recommendations to the Secretary of Homeland Security that are part of those slides. The full briefing, including our scope and methodology, is reprinted as appendix I. We conducted this performance audit from October 2008 to September 2009, in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Sector-Specific Agencies Have Yet to Update Their Respective Sector- Specific Plans to Fully Address Key Cyber Security Criteria as Called for by DHS Guidance: Although DHS reported many efforts under way and planned to improve the cyber content of sector-specific plans, sector-specific agencies have yet to update their respective sector-specific plans to fully address key DHS cyber security criteria. For example, of the 17[Footnote 2] sector-specific plans, only 9 have been updated. Of these 9 updates, just 3 addressed missing cyber criteria, and those 3 involved only a relatively small number (3 or fewer) of the criteria in question. Sector-specific agencies did not fully address missing cyber criteria in their plans in large part due to the following: * They were focused more on the physical rather than the cyber security aspects of the criteria in preparing their plans. * They were unaware of the cyber criteria shortfalls identified in 2007. * DHS's guidance on updating sector plans did not specifically request the agencies to update the cyber security aspects of their plans. The continuing lack of plans that fully address key cyber criteria has reduced the effectiveness of the existing sector planning approach and thus increases the risk that the nation's cyber assets have not been adequately identified, prioritized, and protected. Sector Plans and Related Reports Do Not Fully Provide For Effective Implementation: Most sector-specific agencies developed and identified in their 2007 sector plans those actions--referred to by DHS as implementation actions--essential to carrying out the plans; however, since then, most agencies have not updated the actions and reported progress in implementing them as called for by DHS guidance. Specifically, in response to 2006 guidance that called for agencies in developing implementation actions to address three key elements (action descriptions, completion milestones, and responsible parties), most sectors initially developed implementation actions that fully addressed the key elements. However, while 2008 guidance called for implementation actions to be updated and for sector reports to include progress reporting against implementation action milestone commitments, only five sectors updated their plans and reported on implementation progress. DHS attributed this in part to the department not following up and working to ensure that all sector plans are fully developed and implemented in accordance with department guidance. The lack of complete updates and progress reports are further evidence that the sector planning process has not been effective and thus leaves the nation in the position of not knowing precisely where we stand in securing cyber-critical infrastructures. Conclusions: Although DHS reported many efforts under way and planned to improve the cyber content of sector-specific plans, sector-specific agencies have made limited progress in updating their sector-specific plans to fully address key cyber elements. Further, although the agencies produced narratives on sector activities, they have not developed effective implementation actions and reported on whether progress is being made in implementing their sector plans. This means that as a nation, we do not know precisely where we are in implementing sector plans and associated protective measures designed to secure and protect the nation's cyber and other critical infrastructure, despite having invested many years in this effort. This condition is due in part to DHS not making sector planning a priority and as such, not managing it in a way that fully meets DHS guidance. These conclusions, taken as a whole, further raise fundamental questions about whether the current approach to sector planning is worthwhile and whether there are options that would provide better results. Consequently, it is essential that federal cyber security leaders--including DHS and the to-be-appointed Cybersecurity Coordinator--exert their leadership roles in this area by, among other things, determining whether it is worthwhile to continue with the current approach as implemented or consider if proposed options provide more effective results. To do less means the nation's critical infrastructure sectors will continue to be at risk of not being able to adequately protect their cyber and other critical assets or be prepared to identify and respond to cyber threats and vulnerabilities. Recommendations: We recommend that the Secretary of Homeland Security, consistent with any direction from the Office of the Cybersecurity Coordinator, assess whether the existing sector-specific planning process should continue to be the nation's approach to securing cyber and other critical infrastructure and, in doing so, consider whether proposed and other options would provide more effective results. If the existing approach is deemed to be the national approach, we also recommend that the Secretary make it, including the cyber aspects, an agency priority and mange it accordingly. This should include collaborating closely with other sector-specific agencies to develop: * sector-specific plans that fully address cyber-related criteria in the next release of the plans, and: * sector annual reports that (1) include updated implementation actions and associated milestones and (2) report progress against plan commitments and timelines. Agency Comments and Our Evaluation: DHS concurred with our recommendations but took exception with certain report facts and conclusions that it said formed the basis for our recommendations. Specifically, in an email accompanying its written response--which was signed by the Director, Departmental GAO/OIG Liaison Office and is reprinted in appendix II--DHS said it concurred with our recommendation. In its written response, DHS added that it supported continually assessing the effectiveness of the sector approach and identifying and implementing improvements as appropriate. The department also stated in its written response that alternative options can be explored and implemented along with the current sector approach, rather than a binary choice between continuing the existing sector-specific planning approach and other options. We agree such efforts can be pursued in parallel and that doing them in this manner would be consistent with our recommendations. The department also commented that the report does not give due consideration to many of the ongoing sector and cross-sector cyber security activities identified in the annual reports and briefed to us. We recognize that DHS has multiple ongoing efforts to improve critical infrastructure protection (CIP) planning and implementation, and our report conclusions state this point. While our report for the sake of brevity does not include all of DHS's efforts, it does include illustrative examples throughout as part of giving a fair and balanced view of DHS's efforts in this area. Notwithstanding the concurrence discussed above, DHS in its written response took exception with our report's facts and conclusions in nine areas--referred to by DHS as general items. Each of these general items, along with our response, is summarized below. General item 1: With regard to our report section that states that the sector-specific agencies have yet to update their respective plans to fully address key cyber security criteria as called for by DHS, the department commented that it established a risk management framework (as part of the 2006 National Infrastructure Protection Plan or NIPP) which called for cyber and other elements (i.e., human, physical) to be addressed. DHS added that its 2006 SSP guidance did not call for these elements to be addressed separately in the plans and at that time GAO had not identified the 30 cyber criteria in DHS's guidance; therefore, when the 2007 SSPs were issued they did not fully address the 30 cyber criteria (which is consistent with our October 2007 report findings). To address this situation, DHS said it revised the NIPP in early 2009 to, among other things, provide for more robust coverage of cyber security using as a basis the 30 cyber criteria identified by GAO. In addition, in its guidance to the sector agencies in developing their 2010 SSPs, DHS directed the agencies to update their plans using the revised NIPP and in doing so, to fully address the 30 GAO-identified cyber criteria. GAO response: It is a positive development that DHS has issued guidance directing the sector agencies to fully address missing cyber criteria as part of having the sectors rewrite their SSPs in 2010. In addition, while we agree with DHS that its 2006 guidance did not call for cyber to be addressed separately in each SSP section, it is important to point out that DHS's 2006 guidance nonetheless called for the sectors to address in the SSPs how they planned to secure the cyber aspects of their critical infrastructures. Consequently, the 2007 SSPs were to have addressed cyber in order to be in compliance with DHS's guidance. In 2007, we initiated a review to assess the extent to which these plans addressed cyber. As part of that review, we analyzed the 2006 guidance and identified 30 cyber-related criteria that the critical infrastructure sectors were to address in their SSPs. Our analysis of the plans found them to be lacking in the cyber area and we subsequently recommended[Footnote 3] that DHS request that by September 2008, the sector agencies update their SSPs to address missing cyber- related criteria. DHS agreed with this recommendation, and stated that the department had initiated efforts to implement it. However, in following up on this recommendation and analyzing the cyber content of the sectors' 2008 SSP updates (which was the first objective of this report), only 3 of the 17 sectors had updated their plans to address missing criteria. General item 2: Regarding the section of our report stating that the reason sector-specific agencies did not fully address missing cyber criteria in their plans was due in part to the fact that they were unaware of the cyber criteria shortfalls identified in our 2007 report, DHS described several initiatives it had taken to inform the agencies of their planning shortfalls. GAO response: We recognize that DHS has taken actions to inform the agencies of the shortfalls identified in our 2007 report. Accordingly, we cited illustrative examples of such actions throughout our report. Nonetheless, when we interviewed sector agencies officials, several stated that they were unaware of the GAO identified shortfalls, which raises questions about the effectiveness of DHS's efforts. General item 3: DHS stated that while the SSPs have not been fully updated to include ongoing and planned cyber security activities, it does not mean there is a lack of cyber security planning in the sectors or that the planning to date has been ineffective. DHS also reiterated its earlier point that our report does not take into account many of its ongoing activities in the sector related to cyber security. In addition, the department commented that all the sectors reported on their progress in the 2008 annual reports. GAO response: We recognize that DHS has had many ongoing efforts related to improving the cyber content of SSPs and illustrative examples are provided throughout our report. However, the sector- specific agencies' limited progress in addressing missing cyber content in their SSPs indicates a lack of effectiveness of planning. Specifically, of the 17 sector-specific plans, only 9 have been updated. Of these 9 updates, just 3 addressed missing cyber criteria, and those 3 only involved a relatively small number (3 or less) of the criteria in question. In our view, this continuing lack of plans that fully address key cyber criteria has reduced the effectiveness of the existing sector planning approach and thus increased the risk that the nation's cyber assets have not been adequately identified, prioritized, and protected. Further, while we agree with DHS that the sectors reported aspects of progress in the 2008 annual reports, only five sectors updated and reported on the extent of progress in carrying out their implementation actions as called for by DHS guidance, while the other 12 did not. This level of reporting is not sufficient for evaluating sector-wide progress and raises concerns about the effectiveness of these annual reports as a tool to measure progress. General item 4: DHS commented that (1) we expanded the scope of this engagement beyond the initial focus on coverage of cyber security in the SSPs to encompass the entire sector planning approach and that DHS was not asked to provide a broader update on the public-private partnership, and (2) our draft report did not include information on DHS's numerous ongoing activities with the agencies and sectors related to cyber security. GAO response: With regard to the first comment, the focus of our engagement was on the cyber security aspects of the sector-specific plans and progress reporting, which are an important part of the sector planning approach. Consequently, even when taking into consideration DHS's ongoing activities with the agencies and sectors related to cyber security, the planning and reporting shortfalls we identified indicate a lack of effectiveness with the current sector approach. Regarding DHS's second comment, we recognize that DHS has multiple ongoing efforts to improve CIP planning and implementation, and our report includes illustrative examples of DHS's efforts to do so. As a case in point, on July 27, 2009, we briefed DHS using the presentation slides in this report and updated the slides to incorporate examples (in addition to the ones we had already included in the briefing) that DHS described to us during that meeting. Although DHS has many ongoing efforts related to improving the cyber content of SSPs, our analysis showed that there had been limited progress in addressing missing cyber content in the SSPs since our 2007 recommendation; this indicates to us that the planning process lacks effectiveness, which is why we recommended that DHS assess whether improvements are needed to the current process. General item 5: In regard to our report stating that DHS guidance calls for the sector agencies to annually review and update as appropriate their sector plans, which serve as a means to provide an interim snapshot of where agencies stand in addressing their gaps and is why we used it as a basis to assess progress, DHS said the SSPs are intended to be strategic, three-year plans and are not meant to provide a snapshot of where agencies stand in addressing their gaps and should not be used as a basis to assess progress in CIP protection. GAO response: Our report acknowledges that the SSPs are high-level strategic plans and the sector annual reports serve as the primary means of assessing progress in improving CIP protection. Specifically, as stated in our report, the annual reports are used to, among other things, capture changes in sector programs and assess progress made against goals set in the SSPs. However, it should be noted that annual updates to the SSPs also include information on progress being made against SSP goals and as such serve as a source of evidence on where agencies stand in addressing their gaps and provide a basis to assess progress in CIP protection. Specifically, the 2008 updates we reviewed and analyzed included key information on what sector agencies had (or had not) done to address missing cyber security content that we identified in their 2007 SSPs. General item 6: In response to our reporting that most agencies had not updated their implementation actions and reported progress in implementing them as called for by DHS guidance, DHS commented that many of the implementation actions were one-time actions that were completed in 2007 or 2008, and that others are of an ongoing, continuous nature. The department added that since the vast majority of these items were completed, DHS made adjustments in 2009 to the reporting process to more accurately capture the progress of CIP efforts, and that DHS is now working with the sectors toward the development of outcome-based metrics designed to measure the beneficial value of activities in mitigating CIP risks. GAO response: We recognize that many of the implementation actions were one-time or ongoing actions, but DHS's guidance nonetheless called for the sectors to update the actions and report on the extent of progress in achieving the actions. Further, we agree that DHS has made recent positive changes to their reporting processes to more accurately capture progress. However, as noted in our report, most sectors had not reported in their 2008 sector annual reports that their implementation actions were completed, which showed that the existing progress reporting process was not totally effective. General item 7: In response to our reporting that DHS's lack of follow up to address SSP planning shortfalls showed it was not making sector planning a priority, the department stated that it (1) is actively engaged with the agencies and sectors, (2) assists the sectors with planning and reporting on an ongoing basis, and (3) continually evaluates and improves these processes with input from the sectors. GAO response: We recognize that DHS has multiple ongoing efforts to improve CIP planning and implementation, and our report includes illustrative examples of DHS's efforts. Despite these efforts, DHS's limited progress in addressing missing cyber content in the SSPs since our 2007 recommendation and the lack of updated implementation actions and progress reporting--coupled with the department's limited follow up to correct these conditions--led us to conclude that DHS is not making sector planning a priority. General item 8: DHS stated that although our report cited the work and studies of an expert commission and the President's cybersecurity working group, including the issues they raised with the current sector planning approach, we did not discuss the reports with the department. GAO response: On July 27, 2009, we briefed DHS on our findings, conclusions, and recommendations, which included descriptions of the work performed by these two groups. Specifically, in advance of our meeting, we provided the department with a draft of our briefing presentation slides for review and then met to discuss each slide of our presentation, including those addressing the work of these two expert groups. General item 9: In citing our recommendation that calls for DHS to collaborate closely with the sector-specific agencies to develop SSPs that fully address cyber-related criteria, the department stated this collaboration has already begun as part of the department's current effort to have the sector agencies update their SSPs for issuance in 2010. GAO response: This effort to collaborate with the agencies is consistent with our recommendations. As we agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time we will send copies of this report to interested congressional committees, the Secretary of Homeland Security, and other interested parties. We will also make copies available to others on request. In addition, the report will be available at no charge on the GAO Web site at [hyperlink, http://www.gao.gov]. Should you or your staff have any questions concerning this report, please contact Dave Powner at 202-512-9286 or pownerd@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. Signed by: David A. Powner: Director, Information Technology Management Issues: [End of section] Appendix I: Briefing Provided to Staff, Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology, House Committee on Homeland Security: Critical Infrastructure Protection: Current Cyber Sector-Specific Planning Approach Needs Reassessment: Briefing to the Staff of the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology: House Committee on Homeland Security: July 29, 2009: Outline of Briefing: Introduction; Objectives, Scope, and Methodology; Results in Brief; Background; Results: * Objective 1; * Objective 2; Conclusions; Recommendations for Executive Action; Agency Comments and Our Evaluation; Attachment I. Introduction: The nation's critical infrastructure relies extensively on computerized information technology (IT) systems and electronic data. The security of those systems and information is essential to the nation‘s security, economy, and public health and safety. To help address critical infrastructure protection, federal policy established a framework for public and private sector partnerships and identified 18 critical infrastructure sectors (e.g., Banking and Finance; Information Technology; Telecommunications; Energy; Agriculture and Food; and Commercial Facilities). The Department of Homeland Security (DHS) is a key player in these partnerships and is responsible for issuing guidance to direct the sectors to develop plans addressing how key IT systems and data are to be secured, commonly referred to as cyber security. In June 2006, DHS issued the National Infrastructure Protection Plan (NIPP) as a road map for how DHS and other relevant stakeholders are to enhance the protection of critical infrastructure and how they should use risk management principles to prioritize protection activities within and across the sectors in an integrated, coordinated fashion. Lead federal agencies”referred to as sector-specific agencies”are responsible for coordinating critical infrastructure protection efforts with public and private stakeholders within each sector. For example, the Department of Treasury is responsible for the banking and finance sector while the Department of Energy is responsible for the energy sector. Further, the NIPP called for the lead federal agencies to develop sector-specific plans and sector annual reports to address how the sectors would implement the national plan, including how the security of cyber and other (physical) assets and functions was to be improved. More specifically, it stated that the: * sector plans were to, among other things, describe how the sector will identify and prioritize its critical cyber and other assets and define approaches to be taken to assess risks and develop programs to protect these assets; and; * sector annual reports were to provide status and progress on each sector‘s efforts to carry out the sector plans. In response, the sector-specific agencies developed and issued plans for their sectors in May 2007. Subsequently, in examining these initial plans to determine the extent to which they addressed cyber security, we: * reported[Footnote 4] in October 2007, that none of the plans fully addressed all 30 cyber security-related criteria we identified in DHS guidance (in performing that work, we (1) analyzed DHS guidance provided to the critical infrastructure sectors that stated how the sectors should address cyber topics in their sector-specific plans, (2) identified 30 cyber-related criteria, and (3) shared them with responsible DHS officials who largely agreed that these were the correct criteria to use), and; * recommended that DHS request that by September 2008 the sector- specific agencies‘ plans address the cyber-related criteria that were only partially addressed or not addressed at all. Since then, an expert commission”led by two congressmen and industry officials”studied and reported[Footnote 5] in late 2008 on the public- private partnership approach, including sector planning and other aspects of U.S cyber security policy. More recently, the President established a White House cyber security working group that: * conducted and completed a ’60-day“ review of U.S. cyber policy, including public-private partnerships and sector planning, that found that while sector and other groups involved in the partnership performed valuable work, there were alternative approaches for how the federal government could work with the private sector and recommended that these options be explored, and; * recommended, among other things, establishing a Cybersecurity Coordinator‘s position within the White House to develop a new U.S. cyber policy and to coordinate cyber security efforts across the federal government. [End of section] Objectives, Scope, and Methodology: As agreed, our objectives were to: * determine the extent to which sector plans have been updated to fully address cyber security requirements, and; * assess whether these plans and related reports provide for effective implementation. For the first objective, we met with the sector-specific agencies to obtain updates to the May 2007 initial plans issued for the 17[Footnote 6] critical infrastructure sectors. We then analyzed any updated plans using the 30 cyber criteria we identified in DHS guidance on how such plans were to be developed. Attachment I shows the 30 criteria (organized by eight major reporting sections called for in the DHS guidance). In particular, we focused on assessing the cyber criteria not fully addressed in the May 2007 plans. In analyzing the updated plans against the 30 criteria, we categorized the extent to which the plans addressed criteria using the following: * fully addressed: the plan specifically addressed the cyber-related criteria; * partially addressed: the plan addressed parts of the criteria or did not clearly address the cyber-related criteria; * not addressed: the plan did not specifically address the cyber- related criteria. Further, we also interviewed responsible sector-specific agency officials to, among other things, verify our understanding of their updated sector plans and to validate the accuracy of our analyses of the extent to which additional cyber-related criteria had been addressed in them. For the second objective, we: * identified requirements in DHS guidance that specified how the sectors were to update and report on their progress in carrying out planned actions”referred to by the department as implementation actions, and; * compared these requirements to what the sectors had reported in their 2008 annual reports.[Footnote 7] We focused on the implementation actions, because they are important for reporting and assessing the progress and effectiveness of the sector-specific plans. Where gaps existed, we collaborated with the sector officials to obtain any additional information that would fulfill the requirements and to determine the cause and impact of any remaining gaps. We conducted this performance audit from October 2008 to July 2009, in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. [End of section] Results in Brief: Although DHS reported many efforts under way and planned to improve the cyber content of sector-specific plans, sector-specific agencies have yet to update their respective sector-specific plans to fully address key DHS cyber security criteria. For example, of the 17 sector-specific plans, only 9 have been updated. Of these 9 updates, just 3 addressed missing cyber criteria, and those 3 involved only a relatively small number (3 or fewer) of the criteria in question. Sector-specific agencies did not fully address missing cyber criteria in their plans in large part due to the following: * They were focused more on the physical rather than the cyber security aspects of the criteria in preparing their plans; * They were unaware of the cyber criteria shortfalls identified in 2007, and; * DHS‘s guidance on updating sector plans did not specifically request the agencies to update the cyber security aspects of their plans. Recently DHS issued guidance specifically requesting that the sectors address cyber criteria shortfalls in their 2010 sector-specific plan updates. However, until the plans are issued, it is not clear whether they fully address cyber requirements. This notwithstanding, the continuing lack of plans that fully address key cyber criteria has reduced the effectiveness of the existing sector planning approach and thus increases the risk that the nation‘s cyber assets have not been adequately identified, prioritized, and protected. Most sector-specific agencies developed and identified in their 2006 sector plans those actions”referred to by DHS as implementation actions” essential to carrying out the plans; however, since then, most agencies have not updated the actions and reported progress in implementing them as called for by DHS guidance. Specifically, in response to 2006 guidance that called for agencies in developing implementation actions to address three key elements (e.g., action descriptions, completion milestones), most sectors initially developed implementation actions that fully addressed the key elements; however, while 2008 guidance called for implementation actions to be updated and for sector reports to include progress reporting against implementation action milestone commitments, only five sectors updated their plans and reported on progress against implementation actions. DHS attributed this in part to the department not following up and working to ensure that all sector plans are fully developed and implemented in accordance with department guidance. The lack of complete updates and progress reports is further evidence that the sector planning process has not been effective and thus leaves the nation in the position of not knowing precisely where it stands in securing its cyber and other critical infrastructure. Not following up to address these conditions also shows DHS is not making sector planning a priority. Further, the recent studies by the President‘s working group and expert commission also identified shortfalls in the effectiveness of the current public-private partnership approach and related sector planning and offered options for improving the process. Given this, it is essential that DHS determine whether the current process should continue to be the national approach and thus worthy of further investment. Accordingly, we are making recommendations to the Secretary of Homeland Security, consistent with any direction from the Office of the Cybersecurity Coordinator, to assess whether the existing sector- specific planning processes should continue to be the nation‘s approach to securing cyber and other critical infrastructure. If the existing approach is deemed to be the national approach, we also recommend that the Secretary make it an agency priority and manage it accordingly, including collaborating closely with other sector-specific agencies to develop (1) sector plans that fully address cyber-related criteria and (2) sector annual reports that include implementation actions and milestones and progress reporting against plan commitments and timeline. In oral and written comments on a draft of this briefing, DHS officials, including the Director of Infrastructure Protection‘s Partnership and Outreach Division, which is responsible for sector- specific planning, commented on two areas. Specifically, they stated that the sector agencies had made more progress in implementing cyber- related criteria than reported in our briefing due to other ongoing DHS and sector efforts outside the sector plans and sector annual reports (implementation actions), which were the focus of the briefing. For example, DHS officials said its cyber division works regularly with many sectors on cyber assessments, exercises, and information sharing. While on the surface these may appear to improve cyber security, the officials did not show how these activities helped the agencies address missing cyber-related criteria or effectively implement their plans. The officials also said that focusing on the agencies‘ efforts the year after they issued their sector plans is premature as the agencies have until 2010 to rewrite and reissue their next sector plans. This notwithstanding, DHS‘s guidance calls for the sector agencies to annually review and update as appropriate their sector plans, which is a means to provide an interim snapshot of where agencies stand in addressing their gaps and is why we used it as a basis to assess progress. [End of section] Background: Consistent with the Homeland Security Act of 2002, Homeland Security Presidential Directive-7 identified: * DHS as the principal federal agency to lead, integrate, and coordinate implementation of efforts to protect critical infrastructure and key resources; and; * lead federal agencies, referred to as sector-specific agencies, as responsible for coordinating critical infrastructure protection efforts with the public and private stakeholders in their respective sectors. It also required DHS to develop a plan that outlines national goals, objectives, milestones, and key initiatives necessary for fulfilling its responsibilities for physical and cyber critical infrastructure protection. In 2006, DHS issued the plan”commonly referred to as the NIPP”which, in addition to addressing the above, is to serve as a road map for how DHS and other relevant stakeholders are to use risk management principles to prioritize protection activities within and across sectors in an integrated, coordinated fashion. Further, the NIPP required the lead agencies of the 17 critical infrastructure sectors to develop a sector- specific plan (SSP) to address how the sector‘s stakeholders would implement the national plan and how each sector would improve the security of its assets systems, networks, and functions. In addition, as required by the NIPP, the sector-specific agencies are to provide updates on sector progress with their SSPs, including efforts to identify, prioritize, and coordinate the protection of the sector‘s critical infrastructure, to DHS on an annual basis. DHS is responsible for incorporating these reports into an overall critical infrastructure/key resources report, called the National Critical Infrastructure/Key Resources Protection Annual Report, which is due to the Executive Office of the President by September of each year. Sector-specific agencies are to work in coordination with relevant government and private-sector representatives to develop and update the SSPs. Table 1 shows the designated agency for each sector. Table 1: Designated Sector-Specific Agencies: Sector-Specific Agency: Department of Agriculture. Food and Drug Administration; Sector: Agriculture and Food. Sector-Specific Agency: Department of Defense; Sector: Defense Industrial Base. Sector-Specific Agency: Department of Energy; Sector: Energy. Sector-Specific Agency: Department of Health and Human Services; Sector: Public Health and Human Healthcare. Sector-Specific Agency: Department of Homeland Security; Sector: Chemical; Commercial Facilities; Critical Manufacturing; Dams; Emergency Services; Government Facilities; Information Technology; Nuclear Reactors, Materials and Waste; Postal and Shipping; Telecommunication; Transportation. Sector-Specific Agency: Department of the Interior; Sector: National Monument and Icons. Sector-Specific Agency: Department of the Treasury; Sector: Banking and Finance. Sector-Specific Agency: Environmental Protection Agency; Sector: Water. Source: 2009 National Infrastructure Protection Plan. [End of table] The sector-specific plans are to: * describe how the sector will identify and prioritize its critical assets, including cyber assets such as networks; * identify the approaches the sector will take to assess risks and develop programs to manage and mitigate risk; * define the security roles and responsibilities of members of the sector; and; * establish the methods that members will use to interact and share information related to the protection of critical infrastructure. In addition, the plans are to identify risk management practices to be implemented, which could improve the security of the nation‘s cyber- reliant critical infrastructure. They also are to identify the approaches the sector will take to protect their critical cyber infrastructure. In response, the sector-specific agencies developed and issued SSPs for their sectors in May 2007. Subsequently, we examined these plans to determine the extent to which they addressed cyber security and reported[Footnote 8] in October 2007 on the extent to which the sectors addressed aspects of cyber security in their plans. Specifically, we reported that the results varied in that none of the plans fully addressed all 30 cyber security-related criteria. We also reported that several plans”including the information technology and telecommunications sectors”fully addressed many of the criteria and others”such as agriculture and food and commercial facilities”were less comprehensive. Further, we recommended that DHS request that by September 2008 the sector-specific agencies‘ plans address the cyber-related criteria that were only partially addressed or not addressed at all. In its October 2007 response to our report, DHS agreed with our recommendation and stated it had initiated actions to implement it. Since our 2007 report, an expert commission (led by two congressmen and industry officials) and a White House working group (established by the President) studied and reported[Footnote 9] on the public-private partnership approach and related issues such as sector planning as well as other aspects of U.S cyber security policy. Specifically, * In August 2007, a commission”commonly referred to as the Commission on Cybersecurity for the 44th Presidency”was established to examine the (1) adequacy of U.S. cyber strategy, including public-private partnerships and the sector approach and (2) identify areas for improvement. In December 2008, the commission reported, among other things, that the current public-private partnership and sector planning approach had serious shortcomings such as overlapping roles and responsibilities and duplication of effort. The commission made 25 recommendations aimed at addressing these and other shortfalls with the strategy and its implementation. * In February 2009, the President directed the National Security Council and the Homeland Security Council to conduct a comprehensive ’60-day review“ of all U.S. cyber policies and structures. With regard to public-private partnerships, which include sector planning, the councils reported in May 2009 that the sector and other groups involved in this area performed valuable work but that there was a proliferation of plans and recommendations that resulted in government and private sector personnel and resources being spread across a multitude of organizations engaged in sometimes duplicative or inconsistent efforts. The review concluded that there are alternative approaches for how the federal government can work with the sectors and recommended that these options be explored. At this time, the President also created the office of Cybersecurity Coordinator”who is to be part of the White House‘s National Security Staff and National Economic Council”to, among other things, assist in developing a new U.S. cyber policy. The Cybersecurity Coordinator position has not yet been filled. [End of section] Results: Objective 1: Sector-Specific Agencies Have Yet to Update Their Respective Sector- Specific Plans to Fully Address Key Cyber Security Criteria as Called for by DHS Guidance: In response to our recommendation and as part of ongoing DHS efforts, the department initiated multiple efforts to improve the cyber content of their SSPs. Examples include the following: * February 2008, DHS invited all sectors (and nine accepted) to meet with cyber experts within DHS‘s National Cyber Security Division to support the development of increased cyber content in SSPs. * April 2008, DHS issued guidance to agencies on how to report on the progress of annual reviews of the SSPs. * March 2009, DHS released guidance that specifically requested that agencies, as a part of their 2010 SSP rewrites, fully address all cyber- related weaknesses, including those identified in our October 2007 report. In addition to these efforts, DHS officials from the National Cyber Security Division reported that it is engaged in other activities aimed at improving, among other things, the cyber content of SSPs. They include: * working collaboratively with the sectors via a cross-sector working group[Footnote 10] to (1) analyze SSPs to identify cyber security- related gaps, (2) improve information sharing, and (3) develop measures to assess sector progress in implementing cyber security efforts; * having personnel (from its Control Systems Security Program) lead an Industrial Control Systems Joint Working Group to foster information sharing and coordination of activities and programs across government and private sector stakeholders involved in protecting such control systems and assist with development and implementation of sector- specific control system roadmaps to secure such systems within the chemical, dams, nuclear, and water sectors by mitigating vulnerabilities; * working with the sectors in planning and executing cyber security exercises; and; * having personnel from its Software Assurance Program work with public and private sector partners to develop a process for identifying exploitable software before security breaches occur. However, despite these steps, only 9 of the 17 SSPs[Footnote 11] have been updated while 8 have not.[Footnote 12] In addition, of the 9, only 3 have been revised to address missing cyber-related criteria, and those changes only involved addressing a relatively small number (3 or fewer) of missing criteria. Specifically: * In developing the original Chemical sector SSP, DHS had fully or partially addressed 29 criteria but did not address 1. The current version of the SSP fully addressed 1 of the criteria previously assessed as partial. * In developing the original Commercial Facilities sector SSP, DHS had fully or partially addressed 20 criteria and did not address 10. The current version of the SSP fully addressed 1 cyber-related criterion that was previously not addressed and partially addressed 1 cyber- related criterion that was previously not addressed. * In developing the original Water sector SSP, the Environmental Protection Agency had fully or partially addressed 29 criteria and did not address 1. The current version of the SSP fully addressed 1 cyber- related criterion that was not previously addressed and fully addressed 2 cyber-related criteria that were previously partially addressed. Figure 1 summarizes the extent to which each SSP update addresses the 30 criteria. Figure 1: Sector-Specific Plan Updates: [Refer to PDF for image: stacked vertical bar graph] Updated with cyber-related criteria: Sector: Water; Fully addressed: 26; Partially addressed: 4; Not addressed: 0. Sector: Chemical; Fully addressed: 24; Partially addressed: 5; Not addressed: 1. Sector: Commercial facilities; Fully addressed: 9; Partially addressed: 13; Not addressed: 8. Updated, but without updates to cyber-related criteria: Sector: Information technology; Fully addressed: 28; Partially addressed: 2; Not addressed: 0. Sector: Telecommunications; Fully addressed: 27; Partially addressed: 3; Not addressed: 0. Sector: Nuclear reactors; Fully addressed: 23; Partially addressed: 6; Not addressed: 1. Sector: Dams; Fully addressed: 23; Partially addressed: 6; Not addressed: 1. Sector: Emergency services; Fully addressed: 22; Partially addressed: 4; Not addressed: 4. Sector: Agriculture and food; Fully addressed: 10; Partially addressed: 10; Not addressed: 10. Not updates: Sector: Public health; Fully addressed: 27; Partially addressed: 1; Not addressed: 2. Sector: Energy; Fully addressed: 24; Partially addressed: 3; Not addressed: 3 Sector: Government facilities; Fully addressed: 24; Partially addressed: 3; Not addressed: 3. Sector: Transportation; Fully addressed: 22; Partially addressed: 6; Not addressed: 2. Sector: Postal and shipping; Fully addressed: 21; Partially addressed: 8; Not addressed: 1. Sector: Banking and finance; Fully addressed: 19; Partially addressed: 7; Not addressed: 4. Sector: Defense industrial base; Fully addressed: 18; Partially addressed: 5; Not addressed: 7. Sector: National monuments; Fully addressed: 17; Partially addressed: 8; Not addressed: 5. Source: GAO analysis of agency data. [End of figure] The sector-specific agencies did not fully address missing cyber- related criteria in their SSP updates in large part due to the following: * Agency officials said that in developing their plans, they were focused more on specific (physical) threats to the sector than the cyber security aspects. * While DHS began efforts to improve the cyber content of SSPs, sector agency officials stated that DHS did not make them aware of the specific cyber criteria shortfalls we identified and reported on in 2007. * While DHS issued SSP (formatting) guidance in 2008, this guidance did not specifically request updates to cyber security aspects of the plans or provide other substantive-type direction. As previously stated, DHS issued guidance in March 2009 that specifically requested that the sectors address cyber criteria shortfalls in their 2010 sector-specific plan revisions. However, until these plans are issued, it is not clear whether they fully address cyber requirements. This notwithstanding, having sector-specific agencies continue to have SSPs that do not fully address key cyber elements has reduced the effectiveness of the existing sector planning approach and thus increases the risk that the nation‘s critical cyber assets have not been adequately identified, prioritized, and protected. [End of section] Results: Objective 2: Sector Plans and Related Reports Do Not Fully Provide for Effective Implementation: To provide for effective sector plan implementation, DHS issued guidance that called for the sector-specific agencies to provide for such activities in their SSPs and sector annual reports. Specifically, with regard to the SSPs, the department issued March 2006 guidance directing the sector-specific agencies to develop and incorporate in their SSPs actions and activities”referred to as implementation actions”essential to carrying out the plans and achieving the goal of securing the sectors‘ cyber and other assets. According to the guidance, implementation actions are to include (1) a description of the actions necessary to implement the plan, (2) milestones for when the actions are to be accomplished, and (3) the parties responsible for managing and overseeing action execution. Developing and updating implementation actions, including milestones, and responsible parties, is important for reporting and assessing the progress and effectiveness of the sector-specific plans. With regard to sector annual reports, the department issued guidance in March 2008 that called for sector-specific agencies (in their 2008 annual reports to be issued later in 2008) to: (1) update implementation actions,[Footnote 13] and; (2) report on the extent of progress in achieving the actions. Of the 17[Footnote 14] SSPs developed in response to DHS‘s guidance, * 14 included implementation actions that addressed all three elements: - Banking and Finance, - Chemical, - Commercial Facilities, - Dams, - Defense Industrial Base, - Emergency Services, - Government Facilities, - Information Technology, - National Monuments and Icons, - Nuclear Reactors, - Public Health and Healthcare, - Telecommunications, - Transportation, and; - Water. * 2 included implementation actions but each only partially addressed the three elements: - Energy, and; - Postal and Shipping. Of these sectors‘ plans, all identified actions and milestones critical to implementation of the plan but did not identify the parties responsible for the specified actions. * 1 did not include implementation actions: - Agriculture and Food. In addition, with regard to sector annual reporting, * 5 sectors updated and reported on the extent of progress in carrying out their implementation actions, while the other 12 did not.[Footnote 15] Those that did were: - Dams, - Information Technology, - National Monuments and Icons, - Nuclear Reactors,13 and; - Water. Those that did not were: - Agriculture and Food, - Banking and Finance, - Chemical, - Commercial Facilities, - Defense Industrial Base, - Emergency Services, - Energy, - Government Facilities, - Postal and Shipping, - Public Health and Healthcare, - Telecommunications, and, - Transportation. Figure 2 shows by sector, each sector‘s progress in developing and updating actions for effective implementation. Figure 2: Sector Progress in Developing and Updating Implementation Actions: [Refer to PDF for image: table] Sector-Specific Plans: Elements fully addressed; Banking & Finance: Chemical: Commercial Facilities: Dams: Defense Industrial Base: Emergency Services: Government Facilities: Information Technology: National Monuments & Icons: Nuclear Reactors: Public Health & Healthcare: Telecommunications: Transportation: Water: Sector-Specific Plans: Elements partially addressed; Energy: Postal and Shipping: Sector-Specific Plans: No implementation actions; Agriculture & Food: 2008 Annual Reports: Implementation actions updated; Dams: Information Technology: National Monuments & Icons: Nuclear Reactors: Water: Source: GAO analysis of agency data. [End of figure] In addition to these implementation actions, the sectors were to report on sector goals and priorities, sector programs, sector coordination, research and development progress and gaps, funding priorities, sector security practices, and overall progress of critical infrastructure protection efforts. However, these areas, including overall progress, did not specifically address implementation progress with the sector- specific plan. For example, the energy sector reported on, among other things, progress with communicating with sector partners, protecting international energy assets, and collaborations with the Department of Homeland Security. In addition, the communications sector reported on, among other things, progress to narrow key gaps identified in the sector‘s 2007 report, and progress with key programs. Despite this, the reporting was not sufficient for evaluating either sector-wide progress with sector-specific plans, or the effectiveness of these plans. The incomplete implementation updates and progress reports are due in part to DHS not following up and working to ensure that all sector plans were fully developed and implemented in accordance with departmental guidance. Specifically, although DHS issued periodic sector-planning guidance, periodically met with sectors officials, and conducted other planning-related activities as discussed above, department officials said their follow-up and oversight of the sector plans did not always result in the sectors developing plans that fully meet DHS guidance. These officials said this occurs due to the fact that as part of DHS‘s partnership with the private sector, the parties do not always agree on the extent to which DHS guidance is to be addressed in performing sector planning activities. Consistent with this, our past cyber critical infrastructure protection research and extensive experience[Footnote 17] at the sector agencies and their private sector counterparts have shown that the public-private partnership is indeed challenging to manage. That research and work also pointed out that DHS nonetheless has a leadership role and responsibility to make sure (1) the partnership works effectively and (2) the sectors plan for and implement efforts aimed at protecting the nation‘s cyber and other critical infrastructure, including ensuring the current sector approach is still worth pursuing and considering, where appropriate, alternative approaches. More recently (in early 2009), DHS issued 2009 sector annual report guidance that called for the development of metrics and other implementation-related actions to, among other things, better measure progress, identify problems, and improve SSP implementation. According to responsible DHS officials, the 2009 sector reports have been drafted and provided to the department for review with the goal of incorporating a summary of these reports in DHS‘s national critical infrastructure protection annual report to the President by September 1, 2009. However, until DHS improves its follow-up and oversight of sector planning, effectively addresses the above-mentioned challenges of the public-private partnership, and finalizes the plans, there is increased risk that the 2009 plans will suffer from the same shortfalls as the preceding plans with the result being that sector-specific agencies will not fully and effectively report their progress in implementing their SSPs. Moreover, the incomplete implementation updates and progress reports are further evidence that the sector planning process has not been effective. Shortfalls with Current Public-Private Partnership Approach and Related Sector Planning Highlighted in Recent Studies by Expert Commission and Presidential Working Group: In addition to the above briefing results, the recent reports by the Commission on Cybersecurity for the 44th Presidency and President‘s 60- day review also identified shortfalls with the current public-private partnership approach and relating sector planning, that show such planning is not effective. To address the shortfalls, the commission and presidential review identified options to be considered as means to improving sector planning. Examples include: * The cyber security commission recommended simplifying the sector approach by prioritizing sectors in order to focus planning and other activities on the most important sectors”which it identified as Energy, Finance, Information Technology, and Communications”with the most important cyber assets. * The President‘s review identified a number of models of effective public-private partnership and planning (e.g., the processes and structures used by the United Kingdom) and suggested that the positive attributes of these models be applied to the sector agencies and related organizations. It also recommended streamlining existing sector and others organizations involved in the partnerships to optimize their capacity to identify priorities and develop response plans. [End of section] Conclusions: Although DHS reported many efforts under way and planned to improve the cyber content of sector-specific plans, the sector-specific agencies have made limited progress in updating their sector plans to fully address key cyber elements. Further, although the agencies produce extensive reports on sector activities, they have not developed effective implementation actions and reported on whether progress is being made in implementing their sector plans. This means that as a nation, we do not know precisely where we are in implementing sector plans and associated protective measures designed to secure and protect the nation‘s cyber and other critical infrastructure, despite having invested many years in this effort. This condition is due in part to DHS not making sector planning a priority and as such, not managing it in a way that fully meets DHS guidance. These conclusions, taken as a whole, further raise fundamental questions about whether the current approach to sector planning is worthwhile and whether there are options that would provide better results. Consequently, it is essential that federal cyber security leaders”including DHS and the to-be-appointed Cybersecurity Coordinator”exert their leadership role in this area by, among other things, determining whether it is worthwhile to continue with the current approach as implemented or consider if proposed options provide more effective results. To do less means the nation‘s critical infrastructure sectors will continue to be at risk of not being able to adequately protect their cyber and other critical assets or be prepared to identify and respond to cyber threats and vulnerabilities. [End of section] Recommendations for Executive Action: Accordingly, we recommend that the Secretary of Homeland Security, consistent with any direction from the Office of the Cybersecurity Coordinator, assess whether the existing sector-specific planning processes should continue to be the nation‘s approach to securing cyber and other critical infrastructure and, in doing so, consider whether proposed and other options would provide more effective results. If the existing approach is deemed to be the national approach, we also recommend that the Secretary make it, including the cyber aspects, an agency priority and manage it accordingly. This should include collaborating closely with other sector-specific agencies to develop: * sector-specific plans that fully address cyber-related criteria in the next release of the plans, and; * sector annual reports that (1) include updated implementation actions and associated milestones and (2) report progress against plan commitments and timelines. [End of section] Agency Comments and Our Evaluation: In oral and written comments on a draft of this briefing, the Director of Infrastructure Protection‘s Partnership and Outreach Division and other department officials commented on the following two areas: * First, they stated that they believed that the sector agencies had made more progress in implementing cyber-related criteria than reported in our briefing due to other ongoing DHS and sector efforts outside the SSPs and sector annual reports (implementation actions), which were the focus of the briefing. For example, DHS officials said its National Cyber Security Division works regularly with many sectors on cyber assessments, exercises, and information sharing. In addition, DHS cites two cross-sector cyber working groups that play an important role in advancing cyber security. While these and the other examples provided by DHS on the surface appear to improve cyber security, DHS officials did not show how these activities helped the agencies address missing cyber-related criteria in their SSPs or effectively implement their plans. * Second, the officials stated that focusing on the agencies‘ efforts the year after they issued their sector plans is premature as the agencies have until 2010 to rewrite and reissue their next sector plans. While the NIPP calls for the next SSPs to be issued in 2010, it also calls for the sector-specific agencies to annually review and update as appropriate their SSPs, which is a means to provide an interim snapshot of where agencies stand in addressing their gaps and is why we used it as a basis to assess agency progress. DHS officials also provided technical comments, which we have incorporated into the briefing as appropriate. [End of section] Attachment I: Scope and Methodology: Attachment I: DHS‘s Cyber Criteria Organized by Major Reporting Sections: Section 1: Sector Profile and Goals: * Characterizes cyber aspects; * Identifies stakeholder relationships for securing cyber assets. Section 2: Identify Assets, Systems, Networks, and Functions: * Describes process to identify cyber assets, functions, or elements; * Describes process to identify cyber dependencies/independences. Section 3: Assess Risks: * Describes how the risk assessment process addresses cyber elements; * Describes a screening process for cyber aspects; * Describes methodology to identify potential consequences of cyber attacks; * Describes methodology for vulnerability assessments of cyber aspects; * Describes methodology for threat analyses of cyber aspects; * Describes incentives to encourage voluntary vulnerability assessments. Section 4: Prioritizing Infrastructure: * Identifies entity responsible for prioritization of cyber aspects; * Describes criteria and basis for prioritization of cyber aspects. Section 5: Develop and Implement Protective Programs: * Describes process to develop long-term protective plans for cyber aspects; * Describes process to identify specific cyber-related program needs; * Identifies programs to deter, respond, and recover from cyber attack; * Addresses implementation and maintenance of protective programs. Section 6: Measure Progress: * Ensures that integration of cyber metrics is part of measurement process; * Describes how cyber metrics will be reported to DHS * Includes developing and using cyber metrics to measure progress; * Describes how to use metrics to guide future cyber projects. Section 7: Critical Infrastructure Protection Research and Development (R&D): * Describes how technology developments are related to the sector‘s cyber goals; * Describes process to identify cyber security technology requirements; * Describes process to solicit information on ongoing cyber R&D initiatives; * Identifies existing cyber-related projects that support goals and identifies gaps; * Identifies R&D governance structure. Section 8: Managing Sector-Specific Agency Responsibilities: * Describes sector-specific agency‘s management of NIPP responsibilities; * Describes process for updating, reporting, budgeting, and training; * Describes sector‘s coordination structure; * Describes process for investment priorities; * Describes process for cyber-related information sharing. Source: GAO analysis of DHS‘s SSP guidance. [End of attachment] Appendix II: Comments from the Department of Homeland Security: U.S. Department of Homeland Security: Washington, DC 20528: September 11, 2009: Mr. David A. Powner: Director, Information Technology Management Issues: U.S. Government Accountability Office: 441 G Street, NW: Washington, D.C. 20548: Dear Mr. Powner: RE: Draft Report GAO 09-969 (Reference # 310891) Critical Infrastructure Protection: Current Cyber Sector-Specific Planning Approach Needs Reassessment: Thank you for the opportunity to review the draft report concerning critical infrastructure protection. In addition to responding to the recommendations in the Government Accountability Office's (GAO's) draft report, we are providing general comments that address what we believe are errors, misinterpretations, and incorrect conclusions contained in the text of the report and the appendix. Recommendation: "GAO recommends the Secretary of DHS, consistent with any direction from the Office of Cybersecurity Coordinator, assess whether existing sector-specific planning processes should continue to be the nation's approach to securing cyber and other critical infrastructure and, in doing so, consider whether proposed or other options would provide more effective results. If the existing approach is deemed to be the national approach, we also recommend that the Secretary make it, including the cyber aspects, an agency priority and manage it accordingly. This should include collaborating closely with other sector-specific agencies to develop: * sector-specific plans that fully address cyber-related criteria in the next release of the plans, and, * sector annual reports that (1) include updated implementation actions and associated milestones and (2) report progress against plan commitments and timelines." Response: The Department of Homeland Security (DHS) supports the ongoing assessment and improvement of the sector planning approach. DHS continually assesses the effectiveness of this approach and identifies and implements improvements. However, DHS does not concur with some of the conclusions stated in the draft report, which form the basis for GAO's recommendations (see below) and which relate to updates to Sector-Specific Plans (SSPs) and implementation actions in the Sector Annual Reports. The draft report does not give due consideration to many of the ongoing sector and cross-sector cybersecurity activities identified in the annual reports and briefed to GAO. If the recommendation is intended to suggest that there is a binary choice between continuing the existing sector-specific planning approach and other options, DHS disagrees; actions such as prioritization of efforts with or among sectors and use of supplemental approaches (for example, certain planning requirements relevant to cybersecurity are mandatory for parts of the chemical sector) can move forward in parallel with ongoing sector-planning activity. And as stated above, DHS believes we must continue to refine our work with the private sector regarding cybersecurity to enhance the effectiveness of our partnerships. As stated in the Cyberspace Policy Review: Partnerships must evolve to clearly define the nature of the relationship, the roles and responsibilities of various groups and their participants, the expectations of each party's contribution, and accountability mechanisms. The Federal government should streamline, align, and provide resources to existing organizations to optimize their capacity to identify priorities, enable more efficient execution, and develop response and recovery plans. The efforts of DHS, and of the Federal government, to implement this recommendation are ongoing. Finally, as discussed in General Item 5 of our comments, the report confuses elements of the planning and reporting processes under the National Infrastructure Protection Plan (NIPP), leading to inaccurate conclusions. General Comments: General Item: 1; Page: 3: Issue: "Sector-Specific Agencies have yet to update their respective Sector-Specific Plans to fully address key cybersecurity criteria as called for by DHS guidance." DHS Statement: The risk management framework outlined in the 2006 NIPP established the process for combining consequence, vulnerability, and threat information to produce a comprehensive and systematic assessment of national and sector-specific risk that drives Critical Infrastructure and Key Resources (CIKR) protection activities. At each step of the risk management framework, the physical, cyber, and human elements of CIKR are considered. The 2006 guidance for developing the SSPs was based on this NIPP risk management framework and its consideration of all three elements of CIKR. The 2006 SSP guidance did not call for the cyber element to be addressed separately in each section of the SSP; GAO had not identified the 30 cybersecurity criteria at that time. The GAO's 30 cybersecurity criteria were therefore not fully addressed in the 2007 SSPs; however, the physical, cyber, and human elements of CIKR were considered and addressed by each of the individual sectors, in accordance with DHS guidance. In accordance with the NIPP, the NIPP and the SSPs are reviewed on an annual basis for currency and continued relevance to all CIKR partners. The sectors issue SSP Updates as deemed necessary based on the annual review of their SSPs. Nine Sector-Specific Agencies (SSAs) issued 2008 Updates to their SSPs. In 2008, DHS also conducted a comprehensive triennial review and update of the NIPP. Released in early 2009, the revised NIPP captures the evolution and maturation of the processes and programs first outlined in 2006, including more robust coverage of cybersecurity, based on the 30 cyber criteria identified by GAO. The SSAs are currently conducting a comprehensive triennial review and rewrite of their SSPs for reissue in 2010. DHS' guidance for the 2010 SSP rewrites is based on the updated 2009 NIPP and incorporates GAO's cyber criteria. The 2010 SSPs will address cybersecurity more completely based on DHS guidance and a prioritization of risk within each sector. General Item: 2; Page: 4: Issue Summary: Sector-specific agencies did not fully address missing cyber criteria in their plans in part because "they were unaware of the cyber criteria shortfalls identified in 2007." DHS Statement: DHS approached SSAs through multiple avenues to bring the 2007 GAO report to their attention. The National Cyber Security Division (NCSD) invited the SSAs to meet with subject-matter experts regarding their SSPs and Sector Annual Reports. The agenda for the initial meetings included discussion of the 2007 GAO findings, hi addition, NCSD worked collaboratively with public and private partners from the sectors through the Cross-Sector Cyber Security Working Group (CSCSWG) to assist them in analyzing and identifying gaps in their respective SSPs and Sector Annual Reports. General Item: 3; Page: 4: Issue: "The lack of complete updates and progress reports are further evidence that the sector planning process has not been effective and thus leaves the Nation in a position of not knowing precisely where we stand in securing cyber critical infrastructures." DHS Statement: The fact that all the SSPs have not been fully updated yet to include ongoing and planned cybersecurity activities does not correlate to a lack of cybersecurity planning and activities in the sectors or to the lack of effectiveness of planning, nor has GAO demonstrated this correlation in the draft report. The report also does not take into account the many ongoing activities in the sectors related to cybersecurity. These activities are described below. Additionally, all the sectors reported on their CIKR protection progress in the 2008 Sector Annual Reports. General Item: 4; Page: 5: Issue: "Although DHS reported many efforts underway and planned to improve the cyber content of sector-specific plans, sector-specific agencies have yet to update their plans to fully address key DHS cybersecurity criteria. The continuing lack of plans that fully address key cyber criteria has reduced the effectiveness of the existing sector planning approach." DHS Statement: GAO expanded the scope of this engagement beyond the initial focus on coverage of cybersecurity in the SSPs to encompass the entire sector planning approach. DHS was not asked to provide a broader update on the NIPP public-private partnership, and the draft report does not include information previously provided by DHS on the numerous ongoing partnership activities specifically related to cybersecurity, such as: * The CSCSWG, co-chaired by NCSD and private-sector representatives, meets on a monthly basis to address a broad range of cyber-related issues in addition to the SSPs and Sector Annual Reports. The CSCSWG includes public- and private-sector partners with cybersecurity expertise from the CIKR sectors and their SSAs. NCSD's Critical Infrastructure Protection Cybersecurity Program is providing cybersecurity expertise in support of an initiative within the CSCSWG to develop cybersecurity measures for all 18 CIKR sectors. * NCSD provides assistance to the Transportation, Critical Manufacturing, Commercial Facilities, Chemical, Banking & Finance, and Defense Industrial Base (DIB) Sectors and their SSAs in support of the sectors' broader cybersecurity activities, including risk management (e.g., the DIB Sector's Cybersecurity Task Force). * NCSD's Control Systems Security Program leads the Industrial Control Systems Joint Working Group (ICSJWG) to foster information sharing and coordination of activities and programs across government and private- sector stakeholders involved in protecting CIKR. The ICSJWG is a collaborative coordinating body that provides a vehicle for communicating and partnering between Federal agencies and private asset owner/operators of industrial control systems. * NCSD manages the United States Computer Emergency Readiness Team (US- CERT), which has monthly situational awareness conference calls with the Information Technology Information Sharing and Analysis Center (ISAC), Financial Services ISAC, Multi-State ISAC, and members of the Chemical Sector, through the NIPP partnership framework. * During significant events, US-CERT holds conference calls with the private sector regarding recent threats and vulnerabilities and associated mitigation activities through the CSCSWG and ISAC Council distribution. Additionally, during the week of August 24, 2009, a public-private risk assessment of the Information Technology Sector was issued jointly by the IT Sector Coordinating Council and Government Coordinating Council. The Energy Sector recently completed work on a joint public-private Control Systems Roadmap Update, which it plans to issue in the next few months. The framework of trusted relationships built through the NIPP sector partnership is essential to the development of these joint products. The partnership framework continues to evolve and improve, using shared lessons learned across and between all sectors. General Item: 5; Appendix I, slide 14: Issue: "DHS guidance calls for the sector agencies to annually review and update as appropriate their sector plans, which is a means to provide an interim snapshot of where agencies stand in addressing their gaps and is why we used it as a basis to assess progress." DHS Statement: The SSP is a strategic, three-year plan and is not meant to provide a snapshot of where agencies stand in addressing their gaps, nor should it be used as a basis to assess progress in CIKR protection. The Sector Annual Report serves these purposes. The NIPP calls for the sector-specific agencies to review their SSPs on an annual basis and issue updates, as needed, to capture changes in sector programs and processes and maintain currency for all sector partners. General Item: 6; Page: 4: Issue: "Most sector-specific agencies developed and identified in their 2007 sector plans those actions”referred to by DHS as implementation actions”essential to carrying out the plans; however, since then, most agencies have not updated the actions and reported progress in implementing them as called for by DHS guidance." DHS Statement: Implementation actions were identified in DHS' 2006 SSP guidance for the development of the 2007 SSPs; many of the implementation actions were one-time actions that were completed in 2007 or 2008. Others are of an ongoing, continuous nature. In 2008, sectors were asked to review these items and incorporate new and ongoing activities for which progress could be measured. All the sectors reported on their CIKR protection progress in the 2008 Sector Annual Reports; however only some included actual implementation action matrices. Since the vast majority of these items were completed, DHS made adjustments in 2009 to the reporting process to better reflect the maturation of the sectors and more accurately capture the progress of CIKR protection efforts. DHS is now working with the sectors toward the development of outcome metrics designed to measure the beneficial value of activities in mitigating risks to CIKR. General Item: 7; Page: 5: Issue: "Not following up to address these conditions also shows DHS is not making sector planning a priority." DHS Statement: DHS is actively engaged with the SSAs and sectors regarding the implementation of the NIPP. DHS assists the sectors with planning and reporting on an ongoing basis and continually evaluates and improves these processes, with input from the sectors. General Item: 8; Pages: 2, 3; Appendix I, slide 39: Issue Summary: An expert commission and the President's cybersecurity working group conducted studies on cybersecurity and the public-private partnership; both studies identified issues with the current sector planning approach. DHS Statement: GAO did not discuss or reference these studies with DHS' Office of Infrastructure Protection. General Item: 9; Page: 6: Issue: "This should include collaborating closely with other sector- specific agencies to develop sector-specific plans that fully address cyber-related criteria in the next release of the plans." DRS Statement: This effort is well underway as part of the ongoing rewrite of the SSPs for reissuance in 2010. Again, thank you for the opportunity to comment on this Draft Report and we look forward to working with you on future homeland security issues. Sincerely, Signed by: Jacqueline L. Lacasse, for: Jerald E. Levine: Director: Departmental GAO/OIG Liaison Office: [End of section] Appendix III: GAO Contact and Staff Acknowledgments: GAO Contact: David A. Powner at (202) 512-9286 or pownerd@gao.gov: Staff Acknowledgments: In addition to the contact named above, the following staff also made key contributions to this report: Gary Mountjoy, Assistant Director; Scott Borre; Rebecca Eyler; Lori Martinez; and Teresa Smith. [End of section] Footnotes: [1] GAO, Critical Infrastructure Protection: Sector-Specific Plans/ Coverage of Key Cyber Security Elements Varies. [hyperlink, http://www.gao.gov/products/GAO-08-113] (Washington, D.C.: Oct. 31, 2007). [2] Currently, there are 18 sectors; however, one sector (critical manufacturing) was established in 2008 and has not yet completed a sector-specific plan. [3] [hyperlink, http://www.gao.gov/products/GAO-08-113]. [4] GAO, Critical Infrastructure Protection: Sector-Specific Plans/ Coverage of Key Cyber Security Elements Varies, [hyperlink, http://www.gao.gov/products/GAO-08-113] (Washington, D.C.: Oct. 31, 2007). [5] Center for Strategic and International Studies, Securing Cyberspace for the 44th Presidency, A Report of the CSIS Commission on Cybersecurity for the 44th Presidency (Washington, D.C., December 2008); and The White House, Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure (Washington, D.C., May 29, 2009). [6] Currently, there are 18 sectors; however, the critical manufacturing sector was established in 2008 and has not yet completed a sector-specific plan. [7] The critical manufacturing sector did not have any annual reports. [8] GAO, Critical Infrastructure Protection: Sector-Specific Plans/ Coverage of Key Cyber Security Elements Varies, [hyperlink, http://www.gao.gov/products/GAO-08-113] (Washington, D.C.: Oct. 31, 2007). [9] Center for Strategic and International Studies, Securing Cyberspace for the 44th Presidency, A Report of the CSIS Commission on Cybersecurity for the 44th Presidency (Washington, D.C., December 2008); and The White House, Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure (Washington, D.C., May 29, 2009). [10] The group is called the Cross-Sector Cyber Security Working Group. It is co-chaired by DHS (National Cyber Security Division) and private sector partners. The group meets monthly and includes public and private sector security partners with cyber security expertise from each of the sectors. [11] Our analysis includes 17 of the 18 sectors, as the Critical Manufacturing sector was established in 2008 and has not yet finished its sector-specific plan. [12] While the NIPP requires SSPs to be revised and reissued every three years, it also calls for the sector-specific agencies to annually review and update as appropriate their SSPs to reflect progress on actions planned and under way. The guidance allows agencies the option to report progress via an updated plan, a list of updates, or in the case there is no progress to report, a memorandum of no action. These 8 were memorandum of no action. [13] In the 2008 guidance, DHS refers to these actions as an implementation matrix. [14] Currently, there are 18 sectors; however, the critical manufacturing sector was established in 2008 and has not yet completed a sector-specific plan. [15] The Critical Manufacturing sector was not requested to develop an annual report, as the sector was established in early 2008. [16] Implementation actions were updated in one area covered under the Nuclear Reactors sector. [17] See, for example, GAO, Critical Infrastructure Protection: Department of Homeland Security Faces Challenges in Fulfilling Cybersecurity Responsibilities, [hyperlink, http://www.gao.gov/products/GAO-05-434], (Washington, DC.: May 26, 2005); and Critical Infrastructure Protection: Progress Coordinating Government and Private Sector Efforts Varies by Sectors' Characteristics, [hyperlink, http://www.gao.gov/products/GAO-07-39], (Washington, DC.: Oct. 16, 2006). [End of section] GAO's Mission: The Government Accountability Office, the audit, evaluation and investigative arm of Congress, exists to support Congress in meeting its constitutional responsibilities and to help improve the performance and accountability of the federal government for the American people. GAO examines the use of public funds; evaluates federal programs and policies; and provides analyses, recommendations, and other assistance to help Congress make informed oversight, policy, and funding decisions. GAO's commitment to good government is reflected in its core values of accountability, integrity, and reliability. Obtaining Copies of GAO Reports and Testimony: The fastest and easiest way to obtain copies of GAO documents at no cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each weekday, GAO posts newly released reports, testimony, and correspondence on its Web site. To have GAO e-mail you a list of newly posted products every afternoon, go to [hyperlink, http://www.gao.gov] and select "E-mail Updates." Order by Phone: The price of each GAO publication reflects GAO‘s actual cost of production and distribution and depends on the number of pages in the publication and whether the publication is printed in color or black and white. Pricing and ordering information is posted on GAO‘s Web site, [hyperlink, http://www.gao.gov/ordering.htm]. Place orders by calling (202) 512-6000, toll free (866) 801-7077, or TDD (202) 512-2537. Orders may be paid for using American Express, Discover Card, MasterCard, Visa, check, or money order. Call for additional information. To Report Fraud, Waste, and Abuse in Federal Programs: Contact: Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]: E-mail: fraudnet@gao.gov: Automated answering system: (800) 424-5454 or (202) 512-7470: Congressional Relations: Ralph Dawn, Managing Director, dawnr@gao.gov: (202) 512-4400: U.S. Government Accountability Office: 441 G Street NW, Room 7125: Washington, D.C. 20548: Public Affairs: Chuck Young, Managing Director, youngc1@gao.gov: (202) 512-4800: U.S. Government Accountability Office: 441 G Street NW, Room 7149: Washington, D.C. 20548:

The Justia Government Accountability Office site republishes public reports retrieved from the U.S. GAO These reports should not be considered official, and do not necessarily reflect the views of Justia.