Critical Infrastructure Protection
OMB Leadership Needed to Strengthen Agency Planning Efforts to Protect Federal Cyber Assets
Gao ID: GAO-10-148 October 15, 2009
Because the nation's critical infrastructure relies on information technology systems and data, the security of those assets is critical to ensuring national security and public safety. In 2003, the President directed federal agencies to (1) develop plans for the protection of their computer-related (cyber) critical infrastructure assets and (2) submit them for approval to the Office of Management and Budget (OMB) by July 31, 2004. To help agencies do this, OMB issued guidance with 19 criteria deemed essential for effective cyber critical infrastructure protection planning that were required to be included in the plans. GAO was asked to determine (1) the extent to which agencies developed their plans and whether they submitted them to OMB by the deadline and (2) whether the plans met criteria in OMB's guidance. To do this, GAO reviewed plans from 24 agencies, many of which own and operate key government cyber and other critical infrastructure; reviewed OMB documentation; interviewed officials; and compared submitted plans to relevant criteria.
Key federal agencies developed and submitted cyber critical infrastructure protection plans or related documentation to OMB in response to the President's direction (Homeland Security Presidential Directive 7) and associated OMB guidance. Specifically, of the 24 agencies, 18 submitted plans, while the remaining 6, as allowed by the guidance, provided documentation in lieu of plans stating that they neither owned nor operated any of the nation's cyber critical infrastructure. The agencies submitted their plans and documentation to OMB by the July 31, 2004, deadline. Agencies' plans, in large part, did not fully address the 19 cyber and related requirements specified in OMB's guidance. Specifically, only 4 of the 18 plans fully addressed all the criteria. While the other 14 plans fully addressed at least 8 or more criteria, they only partially addressed or did not address others--such as prioritizing key assets and documenting a strategy to protect them--that are essential for effectively planning for the protection of cyber assets. Since the development of these plans, 8 agencies whose plans did not fully meet OMB's criteria have engaged in other critical infrastructure protection planning and related efforts that addressed some, but not all, of their shortfalls. The shortfalls in meeting OMB's guidance are attributable, in part, to OMB not making these plans a priority and managing them as such by, for example, following up on a regular basis to assess whether agencies are updating their plans to fully address the requirements and are effectively implementing them. When agencies submitted their initial plans, OMB reviewed and provided feedback on their adequacy, but did not follow up to verify that agencies had revised their plans to incorporate OMB feedback or to determine whether planning was being implemented and institutionalized. OMB attributed this to its attention being focused on other competing issues. In addition, OMB did not direct agencies to periodically update their plans. Without more sustained leadership, management, and oversight in this area, there is an increased risk that federal agencies individually, and the federal government collectively, will not effectively identify, prioritize, and protect their critical cyber assets, leaving them vulnerable to efforts to destroy, incapacitate, or exploit them.
Recommendations
Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.
Director:
Team:
Phone:
GAO-10-148, Critical Infrastructure Protection: OMB Leadership Needed to Strengthen Agency Planning Efforts to Protect Federal Cyber Assets
This is the accessible text file for GAO report number GAO-10-148
entitled 'Critical Infrastructure Protection: OMB Leadership Needed to
Strengthen Agency Planning Efforts to Protect Federal Cyber Assets'
which was released on November 16, 2009.
This text file was formatted by the U.S. Government Accountability
Office (GAO) to be accessible to users with visual impairments, as part
of a longer term project to improve GAO products' accessibility. Every
attempt has been made to maintain the structural and data integrity of
the original printed product. Accessibility features, such as text
descriptions of tables, consecutively numbered footnotes placed at the
end of the file, and the text of agency comment letters, are provided
but may not exactly duplicate the presentation or format of the printed
version. The portable document format (PDF) file is an exact electronic
replica of the printed version. We welcome your feedback. Please E-mail
your comments regarding the contents or accessibility features of this
document to Webmaster@gao.gov.
This is a work of the U.S. government and is not subject to copyright
protection in the United States. It may be reproduced and distributed
in its entirety without further permission from GAO. Because this work
may contain copyrighted images or other material, permission from the
copyright holder may be necessary if you wish to reproduce this
material separately.
Report to Congressional Requesters:
United States Government Accountability Office:
GAO:
October 2009:
Critical Infrastructure Protection:
OMB Leadership Needed to Strengthen Agency Planning Efforts to Protect
Federal Cyber Assets:
GAO-10-148:
GAO Highlights:
Highlights of GAO-10-148, a report to congressional requesters.
Why GAO Did This Study:
Because the nation‘s critical infrastructure relies on information
technology systems and data, the security of those assets is critical
to ensuring national security and public safety. In 2003, the President
directed federal agencies to (1) develop plans for the protection of
their computer-related (cyber) critical infrastructure assets and (2)
submit them for approval to the Office of Management and Budget (OMB)
by July 31, 2004. To help agencies do this, OMB issued guidance with 19
criteria deemed essential for effective cyber critical infrastructure
protection planning that were required to be included in the plans. GAO
was asked to determine (1) the extent to which agencies developed their
plans and whether they submitted them to OMB by the deadline and (2)
whether the plans met criteria in OMB‘s guidance. To do this, GAO
reviewed plans from 24 agencies, many of which own and operate key
government cyber and other critical infrastructure; reviewed OMB
documentation; interviewed officials; and compared submitted plans to
relevant criteria.
What GAO Found:
Key federal agencies developed and submitted cyber critical
infrastructure protection plans or related documentation to OMB in
response to the President‘s direction (Homeland Security Presidential
Directive 7) and associated OMB guidance. Specifically, of the 24
agencies, 18 submitted plans, while the remaining 6, as allowed by the
guidance, provided documentation in lieu of plans stating that they
neither owned nor operated any of the nation‘s cyber critical
infrastructure. The agencies submitted their plans and documentation to
OMB by the July 31, 2004, deadline.
Agencies‘ plans, in large part, did not fully address the 19 cyber and
related requirements specified in OMB‘s guidance. Specifically, only 4
of the 18 plans fully addressed all the criteria. While the other 14
plans fully addressed at least 8 or more criteria, they only partially
addressed or did not address others”such as prioritizing key assets and
documenting a strategy to protect them”that are essential for
effectively planning for the protection of cyber assets. Since the
development of these plans, 8 agencies whose plans did not fully meet
OMB‘s criteria have engaged in other critical infrastructure protection
planning and related efforts that addressed some, but not all, of their
shortfalls.
The shortfalls in meeting OMB‘s guidance are attributable, in part, to
OMB not making these plans a priority and managing them as such by, for
example, following up on a regular basis to assess whether agencies are
updating their plans to fully address the requirements and are
effectively implementing them. When agencies submitted their initial
plans, OMB reviewed and provided feedback on their adequacy, but did
not follow up to verify that agencies had revised their plans to
incorporate OMB feedback or to determine whether planning was being
implemented and institutionalized. OMB attributed this to its attention
being focused on other competing issues. In addition, OMB did not
direct agencies to periodically update their plans. Without more
sustained leadership, management, and oversight in this area, there is
an increased risk that federal agencies individually, and the federal
government collectively, will not effectively identify, prioritize, and
protect their critical cyber assets, leaving them vulnerable to efforts
to destroy, incapacitate, or exploit them.
What GAO Recommends:
GAO is recommending that OMB (1) direct agencies to update cyber plans
to fully address OMB requirements and (2) follow up to see that
agencies make sure plans meet requirements and are being implemented.
In commenting on a draft of this report, OMB agreed with the first
recommendation; it agreed with the second after GAO revised it to
better clarify OMB and agency follow up responsibilities.
View [hyperlink, http://www.gao.gov/products/GAO-10-148] or key
components. For more information, contact Dave Powner at (202) 512-9286
or pownerd@gao.gov.
[End of section]
Contents:
Letter:
Conclusions:
Recommendations for Executive Action:
Agency Comments and Our Evaluation:
Appendix I: Briefing to Staff of Congressional Committees:
Appendix II: GAO Contact and Staff Acknowledgments:
Abbreviations:
CIP: critical infrastructure protection DOD Department of Defense:
DOE: Department of Energy:
DOI: Department of Interior:
DOJ: Department of Justice:
DOT: Department of Transportation:
EPA: Environmental Protection Agency:
FISMA: Federal Information Security Management Act:
HHS: Health and Human Services HSPD-7Homeland Security Presidential
Directive 7:
IT: information technology:
NASA: National Aeronautics and Space Administration:
OMB: Office of Management and Budget:
OPM: Office of Personnel Management:
SBA: Small Business Administration:
SSA: Social Security Administration:
VA: Department of Veterans Affairs:
[End of section]
United States Government Accountability Office:
Washington, DC 20548:
October 15, 2009:
The Honorable Yvette D. Clarke:
Chairwoman:
Subcommittee on Emerging Threats, Cybersecurity, and Science and
Technology:
Committee on Homeland Security:
House of Representatives:
The Honorable Sheila Jackson-Lee:
Chairwoman:
Subcommittee on Transportation Security and Infrastructure Protection:
Committee on Homeland Security:
House of Representatives:
The Honorable James R. Langevin:
House of Representatives:
Because the nation's critical infrastructure[Footnote 1] relies
extensively on computerized information technology (IT) systems and
electronic data, the security of those systems and data is essential to
our nation's security, economy, and public health and safety. Providing
continuity of government requires ensuring the safety of the
government's own critical computer-related (cyber) infrastructure and
assets that are essential to support key missions and services.
To address increasing threats to the cyber infrastructure and assets of
the federal government, the President, in December 2003, issued
Homeland Security Presidential Directive 7 (HSPD-7), which called for
federal departments and agencies to identify, prioritize, and protect
the United States' critical infrastructure and key resources[Footnote
2] (hereafter referred to as "critical infrastructure"). Specifically,
HSPD-7 required, among other things, that federal departments and
agencies develop and submit to the Office of Management and Budget
(OMB) for approval, plans for protecting the cyber and other (e.g.,
physical) critical infrastructure that they own or operate. HSPD-7 also
required that these plans (1) address identification, prioritization,
protection, and contingency planning, including recovery of essential
capabilities and (2) be submitted to OMB by July 31, 2004.
To aid federal agencies in this effort, OMB issued a memorandum in June
2004 (referred to as M-04-15), instructing agencies on how these plans
were to be developed. The directive also included 19 criteria OMB
deemed essential for preparing an effective cyber critical
infrastructure protection (CIP) plan that were required to be included
in the plans. While these plans are key to protecting federally owned
or operated critical infrastructure, OMB stated that another goal of
the plans was to initiate and, ultimately, institutionalize cyber CIP
planning across the federal government.
This report responds to your request that we determine (1) the extent
to which federal agencies have developed plans for protecting their
cyber critical infrastructure and whether they have submitted them to
OMB, as required by HSPD-7, and (2) whether the submitted plans met the
criteria in OMB's instructions and related guidance. To carry out these
objectives we, among other things, requested and reviewed the cyber
critical infrastructure plans and related documentation of 24 major
executive branch agencies,[Footnote 3] reviewed OMB documentation, and
interviewed OMB officials. We compared the plans against the 19 cyber-
related criteria contained in OMB's M-04-15 memorandum to determine
whether they fully addressed, partially addressed, or did not address
the criteria. We interviewed agency officials to verify our
understanding of their plans and to validate the accuracy of our
analysis; in cases where agencies stated that they owned no nationally
critical cyber infrastructure, we reviewed documentation submitted to
OMB in lieu of a plan to assess its reasonableness.
We performed this performance audit in the Washington, D.C.,
metropolitan area from October 2008 to September 2009, in accordance
with generally accepted government auditing standards. Those standards
require that we plan and perform the audit to obtain sufficient,
appropriate evidence to provide a reasonable basis for our findings and
conclusions based on our audit objectives. We believe that the evidence
obtained provides a reasonable basis for our findings and conclusions
based on our audit objectives.
On September 3, 2009, we briefed your staffs on the results of our
review. This report summarizes and transmits the (1) presentation
slides we used to brief the staff and (2) recommendations to the
Director of OMB that are part of those slides. The full briefing
materials, including details on our scope and methodology, are
reprinted as appendix I.
In summary, we made the following major points:
* Major federal agencies developed and submitted cyber CIP plans or
related documentation to OMB in response to HSPD-7 and associated OMB
instructions. Specifically, of the 24 major agencies, 18 submitted
plans; the remaining 6, as allowed by the directives, provided
documentation in lieu of plans, stating that they neither owned nor
operated any of the nation's cyber critical infrastructure. The
agencies submitted their plans and documentation to OMB by the July 31,
2004, deadline.
* Agencies' initial plans largely did not fully address the 19 cyber
and related requirements specified in OMB's instructions. Specifically,
only 4 of the 18 plans fully addressed all the criteria. While the
other 14 plans fully addressed at least 8 or more criteria, they only
partially addressed or did not address others--such as prioritizing key
assets and documenting a strategy to protect them--that are essential
to effectively plan for the protection of cyber assets. In addition,
the agencies have not updated their plans since 2004. However, 8
agencies whose plans did not fully meet OMB's criteria have engaged in
other CIP planning and related efforts that addressed some, but not
all, of their shortfalls.
* The shortfalls in meeting OMB's guidance are attributable, in part,
to the fact that OMB has not made these plans a priority and managed
them as such by, for example, following up on a regular basis to assess
whether agencies have updated their plans to fully address OMB
requirements and are effectively implementing them. When agencies
submitted their initial plans, OMB reviewed them and provided feedback
on their adequacy, but did not follow up to verify that agencies had
revised their plans to incorporate OMB feedback or to determine whether
planning was being implemented and institutionalized. OMB attributed
this to its attention being focused on other, competing issues. In
addition, OMB did not direct agencies to periodically update their
plans.
Conclusions:
The major federal agencies' 2004 cyber CIP plans were an initial step
toward the goals of (1) securing and protecting critical infrastructure
and assets vital to carrying out the government's mission-critical
operations and (2) implementing and institutionalizing cyber CIP
planning governmentwide. While none of the 2004 plans have since been
updated, subsequent cyber CIP planning efforts by one-third of the
agencies have yielded additional steps toward these goals. However,
continuing shortfalls in these planning efforts highlight that more
remains to be done to ensure cyber CIP plans are developed in a
comprehensive manner. These shortfalls are attributable, in part, to
OMB not making these plans a priority, including not effectively
overseeing agencies' efforts to make sure OMB requirements are
addressed in agency plans and the plans are being implemented. Without
more sustained leadership, management, and oversight in this area,
there is an increased risk that federal agencies individually, and the
federal government collectively, will not, among other things,
effectively identify, prioritize, and protect their cyber critical
assets, thus leaving them potentially vulnerable to deliberate efforts
to destroy, incapacitate, or exploit them.
Recommendations for Executive Action:
We are recommending that the Director of OMB provide leadership and
oversight in directing federal cyber critical infrastructure planning
efforts and make them a management priority by:
* directing the federal agencies to expeditiously update their plans to
fully address OMB's cyber critical infrastructure planning
requirements, and:
* following up, as appropriate, to see that agencies are making sure
updated plans fully meet OMB requirements and are being effectively
implemented. At a minimum, this should include having agency heads
report to OMB when updated plans have been completed and that the plans
fully meet OMB requirements and are being effectively implemented.
Agency Comments and Our Evaluation:
In oral comments on a draft of this report--which were provided by the
Lead Information Technology Policy Analyst from the Office of E-
Government and Information Technology--OMB agreed with our findings and
first recommendation and discussed issuing a clarifying memorandum to
direct agencies to update their plans. With regard to our second
recommendation, OMB agreed with it in principle but expressed concern
that the recommendation (as worded in the draft) would be interpreted
to mean that OMB is solely responsible for following up when it is a
key responsibility of the agencies to follow up to make sure their
plans are effectively updated and implemented. We concur that agencies
have a key role to play in updating and implementing these plans due to
their intimate knowledge of their respective cyber CIP environments
and, therefore, know how best to secure and protect them. To better
clarify OMB and agency responsibilities, we slightly revised the second
recommendation, and OMB agreed with it as reworded. This revision does
not change the fact that OMB, as discussed in this report and in our
presentation slides, also has an important role to play in periodically
following up with the agencies to, among other things, assess the
status and progress of their cyber CIP planning efforts.
As we agreed with your offices, unless you publicly announce the
contents of this report earlier, we plan no further distribution until
30 days from the report date. At that time we will send copies of this
report to interested congressional committees, OMB, and other
interested parties. We will also make copies available to others on
request. In addition, the report will be available at no charge on the
GAO Web site at [hyperlink, http://www.gao.gov].
If you or your staffs have questions about matters discussed in this
report, please contact me at (202) 512-9286 or pownerd@gao.gov. Contact
points for our Offices of Congressional Relations and Public Affairs
may be found on the last page of this report. GAO staff who made key
contributions to this report are listed in appendix II.
Signed by:
David A. Powner:
Director, Information Technology Management Issues:
[End of section]
Appendix I: Briefing to Staff of Congressional Committees:
Critical Infrastructure Protection: OMB Leadership Needed to Strengthen
Agency Planning Efforts to Protect Federal Cyber Assets:
Briefing for Staff Members of the Subcommittee on Emerging Threats,
Cybersecurity, and Science and Technology:
House Committee on Homeland Security and the Subcommittee on
Transportation Security and Infrastructure Protection:
House Committee on Homeland Security:
August 27, 2009:
Outline of Briefing:
Introduction:
Objectives, Scope, and Methodology:
Results in Brief:
Background:
Results:
Objective 1:
Objective 2:
Conclusions:
Recommendations for Executive Action:
Agency Comments and Our Evaluation:
Introduction:
Because the nation's critical infrastructure[Footnote 4] relies
extensively on computerized information technology (IT) systems and
electronic data, the security of those systems and information is
essential to our nation‘s security, economy, and public health and
safety. Providing continuity of government requires ensuring the safety
of the
government‘s own cyber infrastructure and assets that are essential to
supporting key missions and services.
In particular, the cyber infrastructure and assets of the federal
government are under an increasing threat. U.S. intelligence officials
have stated publicly that, as the government continues to move to
network operations, the threat to these systems will continue to grow.
These officials have also commented that nation-states and criminals
target federal and other sectors‘ IT networks to gain commercial
competitive advantage and terrorist groups have expressed the desire to
do the same as a means of attacking the United States.
To address these threats, the President, in December 2003, issued
Homeland Security Presidential Directive 7 (HSPD-7), which called for
federal departments and agencies to identify, prioritize, and protect
the United States‘ critical infrastructure and key resources[Footnote
5] (hereinafter referred to as ’critical infrastructure“).
Specifically, HSPD-7 required, among other things, that federal
departments and agencies develop and submit to the Office of Management
and Budget (OMB) plans for protecting the cyber and other (e.g.,
physical)
critical infrastructure that they own or operate. The presidential
directive also required that these plans:
(1) address identification, prioritization, protection, and contingency
planning, including recovery of essential capabilities and;
(2) be submitted to OMB by July 31, 2004.
To aid federal agencies in this effort, OMB issued a memorandum in June
2004 (referred to as Memorandum M-04-15) instructing agencies on how
these plans were to be developed; the directive also included 19 cyber
and related criteria to be addressed that OMB deemed essential to
preparing an effective cyber protection plan.
Objectives, Scope, and Methodology:
As requested, our objectives were to determine:
* the extent to which federal agencies have developed plans for
protecting their cyber critical infrastructure and whether they have
submitted them to OMB as required by HSPD-7, and;
* whether the submitted plans met the criteria in OMB‘s instructions
and related guidance.
For objective 1, we contacted 24 major executive branch departments and
agencies[Footnote 6] to request their cyber critical infrastructure
protection (CIP) plans submitted to comply with HSPD-7 and OMB
memorandum M-04-15. We focused on these agencies because they own and
operate key cyber and other critical infrastructure essential to
carrying out the government‘s mission-critical functions. We also
reviewed OMB documentation and interviewed OMB officials to confirm
which federal agencies had submitted CIP plans as required.
For objective 2, we analyzed OMB‘s M-04-15 memorandum and identified
the 19 cyber and related criteria that agencies were to use in
developing their plans. These criteria, taken as a whole, called for
the agencies to address the following key topics: whether the agencies
had (1) existing capabilities, including dedicated human capital and
funding resources, to protect their cyber critical infrastructure
assets, (2) a prioritized inventory of such assets, and (3) a
documented strategy to protect them. (See slides 19-20 for the 19
criteria organized by these key topics.) We then analyzed the plans of
the 24 major agencies using the 19 criteria to determine whether there
were variances. If there were, we reviewed documentation and
interviewed appropriate agency officials to identify causes and any
impacts. In analyzing the plans against the 19 criteria, we used the
following categories to describe the extent to which the plans
addressed each criterion:
* fully addressed: the plan specifically addressed the criterion;
* partially addressed: the plan addressed some but not all parts of the
criterion;
* not addressed: the plan did not specifically address the criterion.
Further, we also interviewed responsible agency officials to, among
other things, verify our understanding of their cyber and related plans
and to validate the accuracy of our analyses of the extent to which the
criteria had been addressed in the plans. For agencies stating that
they owned no nationally critical cyber infrastructure, we reviewed
documentation they submitted to OMB (in lieu of a report) to assess its
reasonableness.
We conducted this performance audit in the Washington, D.C.,
metropolitan area from October 2008 to June 2009 in accordance with
generally accepted government auditing standards. Those standards
require that we plan and perform the audit to obtain sufficient,
appropriate evidence to provide a reasonable basis for our findings and
conclusions based on our audit objectives. We believe that the evidence
obtained provides a reasonable basis for our findings and conclusions
based on our audit objectives.
Results in Brief:
Major federal agencies developed and submitted cyber critical
infrastructure protection plans or related documentation to OMB in
response to HSPD-7 and associated OMB instructions. Specifically, of
the 24 major agencies,18 submitted such plans; the remaining 6, as
allowed by the directives, provided documentation”in lieu of a detailed
plan”stating that they neither owned nor operated any of the nation‘s
cyber critical infrastructure. The agencies submitted their plans and
documentation to OMB by the July 31, 2004, deadline specified in the
directives.
In developing their initial plans, the agencies in large part did not
fully address the 19 cyber and related requirements specified in OMB‘s
instructions. Specifically, only 4 of the 18 plans submitted to OMB
fully addressed all criteria. In addition, while the other 14 plans
fully addressed at least 8 or more criteria, they only partially
addressed or did not address at all other criteria”such as including a
prioritized inventory of cyber critical infrastructure assets and a
documented strategy to protect them”that are essential to effectively
planning for the protection of cyber assets. For example, four agencies
did not include a cyber critical infrastructure asset inventory, and
eight did address whether they had a cyber protection strategy. Since
the development of these plans, eight agencies”whose plans did not
fully meet OMB requirements”have engaged in other CIP planning and
related efforts that addressed some but not all of their OMB
requirement shortfalls.
The shortfalls in meeting OMB‘s requirements are attributable in part
to the fact that OMB has not made these plans a priority and managed
them as such by, for example, following up on a regular basis to assess
whether agencies are updating their plans to fully address the
requirements and are effectively implementing them. OMB attributed this
to its attention being focused on other competing issues. When agencies
submitted their initial plans, OMB reviewed and provided feedback on
the adequacy of the plans but did not follow up to verify that the
agencies had revised the plans to incorporate OMB‘s feedback or to
determine whether the planning was being implemented and
institutionalized. Until these shortfalls are fully addressed, there is
an increased risk that the federal government will not effectively
identify, prioritize, and protect its cyber critical assets, leaving
them potentially vulnerable to deliberate efforts to destroy,
incapacitate, or exploit them.
To address this risk, it is essential that OMB provide sustained
leadership, management, and oversight in this area. Accordingly, we are
recommending that the Director of OMB, among other things, provide this
level of management effort in directing federal cyber critical
infrastructure planning and make such planning a priority by (1)
directing the agencies to update their cyber plans to fully address OMB
requirements and (2) following up as appropriate to make sure updated
plans meet requirements and that the plans are being effectively
implemented.
In oral comments on a draft of this briefing, OMB officials, including
the Lead Information Technology Policy Analyst from the Office of E-
Government and Information Technology, agreed with our findings and
first recommendation and discussed issuing a clarifying memorandum to
direct agencies to update their plans. With regard to our second
recommendation, these officials said that it was ultimately the
responsibility of the agencies to follow up to make sure plans are
updated and implemented. We agree that the agencies have a key role to
play in these planning efforts. We also believe OMB plays an important
and unique role in that it is responsible for reviewing and approving
agency plans across the entire federal government. To do this
effectively, OMB should periodically follow up with the agencies to
assess status and progress of cyber CIP planning efforts.
Background: Increased Vulnerabilities Could Expose Federal Systems to
Attack:
As federal IT systems increase their connectivity with other networks
and the Internet and as their system capabilities continue to increase,
these systems will become increasingly vulnerable. For example, we
reported[Footnote 7] in 2008 that the National Vulnerability Database,
the U.S. government repository of standards-based vulnerability
management data, had gathered information on the growing problem,
including the following:
* About 29,000 security vulnerabilities or software defects exist that
can be directly used by a hacker to gain access to a system or network.
* On average, close to 18 new vulnerabilities are added to the database
each day.
* More than 13,000 software products contain security vulnerabilities.
These vulnerabilities become particularly significant when considering
the ease of obtaining and using hacking tools, the steady advances in
the sophistication and effectiveness of attack technology, and the
emergence of new and more destructive attacks. Thus, protecting federal
IT systems and the systems that support critical infrastructures has
never been more important.
Background: Past GAO Work:
We have previously reported[Footnote 8] on agency efforts to protect
their IT systems, including meeting Federal Information Security
Management Act (FISMA)[Footnote 9] requirements and requirements for
federal continuity of operations planning. We found that federal
agencies have made progress in strengthening information security, as
required by FISMA. However, most agencies continue to experience
significant deficiencies that jeopardize the confidentiality,
integrity, and availability of their systems and information. A primary
reason for these problems is that agencies have not fully
institutionalized comprehensive security management programs. We
recently highlighted these issues in our 2009 High Risk report.
[Footnote 10]
In December 2003, the President issued HSPD-7, which called for federal
departments and agencies to identify, prioritize, and protect the
United States‘ critical infrastructure and key resources.[Footnote 11]
Specifically, HSPD-7 required, among other things, that federal
departments and agencies develop and submit to OMB plans for protecting
the cyber and other (e.g., physical) critical infrastructure that they
own or operate. The presidential directive also required that these
plans (1) address identification, prioritization, protection, and
contingency planning, including recovery of essential capabilities and
(2) be submitted to OMB by July 31, 2004.
To help in the development of the plans, OMB issued a directive
(Memorandum 04-15, dated June 17, 2004 and signed by OMB‘s director)
that instructed the departments and agencies on how the plans were to
be developed and reiterated the July 31, 2004, deadline for plan
submission to OMB. The memorandum also stated that agencies that
determined that they did not have cyber and other critical
infrastructures were still required to report this to OMB by the
specified dateline.
While these plans are key to protecting federally owned or operated
critical infrastructure, they are also intended to be an important
input for the Department of Homeland Security (DHS) to use in
developing the National Infrastructure Protection Plan, a plan DHS first
developed in 2006 to establish national priorities, goals, and
requirements for CIP. The National Infrastructure Protection Plan was
to then outline the methodology for determining which government
facilities are priorities for protection. Further, OMB officials stated
that another goal of these plans was to initiate, and ultimately
institutionalize, cyber CIP planning across the federal government.
Results: Objective 1:
All major federal agencies developed and submitted cyber CIP plans or
related documents to OMB.
The 24 major agencies developed and submitted cyber CIP plans or
related documents in response to HSPD-7 and OMB requirements. The
agencies submitted their plans and documentation to OMB by the July 31,
2004, deadline specified in these directives.
The following 18 agencies submitted plans to address protecting their
cyber critical infrastructures:
* Agriculture;
* Commerce;
* Defense;
* Energy;
* Environmental Protection Agency;
* Health and Human Services;
* Homeland Security;
* Interior;
* Justice;
* Labor;
* National Aeronautics and Space Administration;
* Office of Personnel Management;
* Small Business Administration;
* Social Security Administration;
* State;
* Transportation;
* Treasury;
* Veterans Affairs.
These remaining 6 agencies submitted documentation (e.g., memorandum)
stating that they neither owned nor operated cyber infrastructure
critical to the nation:
* Education;
* General Services Administration;
* Housing and Urban Development;
* National Science Foundation;
* Nuclear Regulatory Commission;
* U.S. Agency for International Development.
In reviewing the documentation submitted by these agencies, it appears
the agencies‘ statements that they had no cyber critical
infrastructures are reasonable based on the evidence they provided.
Results: Objective 2:
Initial agency plans in large part did not fully address OMB‘s cyber
CIP planning requirements, and while subsequent agency planning efforts
addressed some requirement shortfalls, they did not address others
essential to effective planning.
In instructing the departments and agencies on how their plans were to
be developed, OMB‘s directive specified 19 cyber and related CIP
planning requirements essential to each agency in developing its plan.
Taken collectively, these criteria called for agencies to address the
following key topics: whether they had (1) existing capabilities,
including dedicated human capital and funding resources, to protect
their cyber critical infrastructure assets; (2) a prioritized inventory
of such cyber assets; and (3) a documented long-term strategy to
protect them, including metrics to measure cyber program performance.
The 19 criteria, grouped by key topic area, are described on the
following slides. Once completed, these plans were intended to be a
blueprint for how agencies are to protect their cyber and other
critical infrastructure, serve as input into the National
Infrastructure Protection Plan, and initiate cyber CIP planning across
the federal government.
OMB Memorandum 04-15 cyber and related CIP planning criteria:
Addressing existing capabilities for protecting federal cyber critical
infrastructure:
* Summarize primary functions of the agency that rely on cyber critical
infrastructure assets;
* Summarize the agency‘s management structure, including the management
responsible for the security of cyber critical infrastructure assets;
* Summarize locations and assets that support the primary functions;
* Describe the agency's current capabilities for identification of
federally owned or operated cyber critical infrastructure assets;
* Describe the agency's current capabilities for assessments of cyber
vulnerabilities and interdependencies;
* Describe the agency's current capabilities for prioritization of
federal cyber assets;
* Describe the agency's current capabilities for adequately protecting
cyber critical infrastructure assets;
* Summarize the agency‘s capability to respond to and recover from
events that impair the ability to perform mission critical functions at
or using federal cyber critical infrastructure assets;
* Summarize the agency‘s ability to identify gaps in carrying out any
of the activities discussed above;
* Describe the agency‘s process for determining budget and personnel
requirements for cyber critical infrastructure activities;
* Describe the agency‘s process for ensuring independent oversight of
cyber CIP programs;
* Describe any corrective actions identified for cyber-related issues
and if follow-on actions were taken;
* Determine whether corrective actions for IT systems considered
critical infrastructure were included in FISMA plans of action and
milestones.
Identifying prioritized list of the agency‘s cyber-related critical
infrastructure:
* Include a prioritized list of the agency‘s cyber-related
infrastructure assets.
Developing a long-term protective strategy:
* Describe the agency‘s long-term protective strategy to protect the
cyber critical infrastructure identified in the plan;
* Describe performance metrics for the CIP program;
* Describe the status of major initiatives that are underway or planned
for addressing cyber-related deficiencies;
* Describe milestones for the initiatives described and target dates
for completing each milestone;
* Discuss any specific management, technical, or operational challenges
with regard to implementation of the plan.
Of the 18 plans submitted to OMB stating that the agency owned or
operated cyber critical infrastructure,
* 4 agencies fully addressed all of the 19 criteria; they are the
Department of Energy, the Environmental Protection Agency, the Social
Security Administration, and the Department of State; and;
* 14 fully addressed some criteria and only partially or did not
address others. The 14 are shown in table 1, along with the number of
criteria their plans fully addressed, partially addressed, or did not
address at all.
Table 1: Agencies Whose Initial Plans Fully Addressed Some Criteria and
Only Partially Addressed or Did Not Address Others at All:
Agency: Agriculture;
Fully addressed[A]: 18;
Partially addressed[B]: 1;
Not addressed[C]: 0.
Agency: Commerce;
Fully addressed[A]: 15;
Partially addressed[B]: 1;
Not addressed[C]: 3.
Agency: Defense;
Fully addressed[A]: 17;
Partially addressed[B]: 0;
Not addressed[C]: 2.
Agency: Health and Human Services;
Fully addressed[A]: 8;
Partially addressed[B]: 0;
Not addressed[C]: 11.
Agency: Homeland Security;
Fully addressed[A]: 17;
Partially addressed[B]: 0;
Not addressed[C]: 2.
Agency: Interior;
Fully addressed[A]: 16;
Partially addressed[B]: 1;
Not addressed[C]: 2.
Agency: Justice;
Fully addressed[A]: 14;
Partially addressed[B]: 0;
Not addressed[C]: 5.
Agency: Labor;
Fully addressed[A]: 12;
Partially addressed[B]: 0;
Not addressed[C]: 7.
Agency: National Aeronautics and Space Administration;
Fully addressed[A]: 18;
Partially addressed[B]: 0;
Not addressed[C]: 1.
Agency: Office of Personnel Management;
Fully addressed[A]: 17;
Partially addressed[B]: 1;
Not addressed[C]: 1.
Agency: Small Business Administration;
Fully addressed[A]: 9;
Partially addressed[B]: 0;
Not addressed[C]: 10.
Agency: Transportation;
Fully addressed[A]: 17;
Partially addressed[B]: 0;
Not addressed[C]: 2.
Agency: Treasury;
Fully addressed[A]: 18;
Partially addressed[B]: 0;
Not addressed[C]: 1.
Agency: Veterans Affairs
Fully addressed[A]: 10;
Partially addressed[B]: 2;
Not addressed[C]: 7.
[A] Fully addressed – the plan specifically addressed the criterion.
[B] Partially addressed – the plan addressed some but not all parts of
the criterion.
[C] Not addressed – the plan did not specifically address the
criterion.
[End of table]
Specifically, while each of the 14 agencies fully addressed at least 8
or more criteria (for example, Health and Human Services plan fully
addressed 8, and Agriculture‘s addressed nearly all, with 18), they
also only partially addressed or did not address other criteria
essential to effectively planning for the protection of cyber assets.
For example, 8 agencies did not address the requirement to describe the
agency's long-term strategy to protect its cyber critical
infrastructure. These agencies were the Departments of Commerce, Health
and Human Services, the Interior, Justice, Labor, and Veterans Affairs,
the Office of Personnel Management, and the Small Business
Administration. Having such a strategy is important because it
establishes, among other things, agencywide direction on improving the
state of cyber protection, what that future state is to be, and how and
when the agency is to get there. Without such a strategy, there is
increased risk that critical cyber assets may be left unprotected and
thus vulnerable to threats such as unauthorized access, theft, or
sabotage.
In addition, the requirement to provide a summary of the agency‘s
mission-supporting cyber assets and their locations was only partially
addressed by 2 agencies (the Department of the Interior and the Office
of Personnel Management) and not addressed at all by 4 (the Departments
of Homeland Security, Health and Human Services, and Transportation and
the National Aeronautics and Space Administration). The 2 that only
partially addressed the requirement did so in that they provided the
locations of their assets but did not identify the specific assets at
the locations. Fully addressing this requirement is important because
locating cyber assets is a key step in identifying and prioritizing
assets to be protected. Without it, there is risk that not all critical
cyber assets will be considered and incorporated into agency protective
plans and thus will be left vulnerable to attack.
Further, 6 agencies did not address the requirement to summarize
whether they had the ability to identify gaps in recovering from
mission-impairing events. The 6 agencies were the Departments of
Commerce, Health and Human Services, Labor, and Veterans Affairs, the
National Aeronautics and Space Administration, and the Small Business
Administration. Having and documenting this capability is important
because it serves as an indicator that agencies are proactively
identifying and managing potential risks to their cyber and other
assets that could impact agency operations. Without this, there is a
risk that agencies are not prepared to recover cyber assets in the
event of an attack.
Moreover, 5 agencies”the Departments of Health and Human Services,
Justice, Labor, and Veterans Affairs, and the Small Business
Administration”did not identify whether they had metrics to measure how
well their cyber CIP program was performing as called for by the
criteria. Having such metrics is important because they provide a basis
for improving program activities and reallocating resources as needed.
Without them, agencies face the risk that cyber CIP program
deficiencies may not be identified and addressed, leaving cyber assets
vulnerable to attack.
Furthermore, 4 agencies”the Departments of Homeland Security, Health
and Human Services, Transportation, and Veterans Affairs”did not
address the requirement to provide a prioritized list of the agency‘s
cyber critical infrastructure assets. Having and documenting such a
list is essential to identifying the critical cyber assets, determining
protection priorities, and implementing protection mechanisms. Without
it, agencies‘ cyber CIP programs may not adequately protect all
critical cyber assets.
Our complete analysis of the criteria and the number of agencies that
partially addressed or did not address them (as well as those
requirements that were fully addressed) is in attachment 1. Our
analysis of how each agency‘s plan compared to the 19 criteria is in
attachment 2.
These shortfalls in meeting OMB‘s cyber and related CIP planning
requirements are attributable in part to OMB not making these plans a
priority and managing them as such. Specifically, officials from OMB‘s
Office of E-Government and Information Technology stated that when the
agencies‘ submitted their initial plans, the office reviewed and
provided feedback on the adequacy of the plans but did not follow up to
verify that the agencies had revised the plans to incorporate OMB‘s
findings or to see whether CIP planning was being implemented and
institutionalized. In addition, according to the officials, when OMB
issued its guidance, it did not require agencies to periodically update
their plans, leaving it up to the agencies‘ discretion as to when and
how to update the plans; consequently, the agencies in large part have
not updated their plans since 2004. The officials also stated that the
lack of follow up on the state of these plans, including assessing
whether they had been updated, was due to their attention being focused
on other competing issues. In addition, they said that, since the
initial plans, they believed the agencies had engaged in other CIP-
related planning efforts that largely addressed the requirement
shortfalls. Our analysis below shows that the agencies did engage in
subsequent planning efforts that addressed some but not all essential
requirement shortfalls.
Specifically, since the initial plans, the following eight agencies”
whose plans did not fully meet OMB requirements”have engaged in other
CIP planning efforts and related activities (e.g., developing IT
security program management plans, establishing corrective action
tracking systems) that addressed some but not all of their OMB
requirement shortfalls:
* In its 2004 plan, the Department of Commerce did not fully address 4
cyber CIP planning requirements, including summarizing its capability
to respond to and recover from events that impair performance or use of
its cyber assets. However, in 2005, the department developed another
CIP plan which fully addressed this criterion. Despite this, the
department‘s 2005 plan did not fully address the 3 other criteria for
which shortfalls were identified in its 2004 plan. These were:
- summarizing its ability to identify response and recovery gaps,
- describing its process for determining budget and personnel
requirements for cyber activities, and,
- describing its long-term protective strategy for protecting cyber
assets.
* With regard to Health and Human Services, it did not address 11
requirements in its 2004 plan, including a summary of its ability to
identify response and recovery gaps, the agency‘s process for ensuring
independent oversight over its CIP program, a prioritized list of the
agency‘s cyber-related critical infrastructure, the agency‘s long-term
protective strategy, a description of major initiatives for addressing
cyber-related deficiencies, and milestones for these initiatives.
However, in 2005 and 2008, the agency developed other plans”both
entitled Secure One HHS Critical Infrastructure Protection Plan”that
included these requirements, increasing the number of fully addressed
requirements to 13. Consequently, the agency has yet to fully address
the 6 other requirements, including describing performance metrics for
the agency‘s CIP program and challenges to implementing the CIP plan.
* The Department of the Interior‘s 2004 plan did not fully address 3
requirements, including (1) providing a summary of locations and assets
supporting primary functions, (2) describing the department‘s process
to identify and track corrective actions for the cyber CIP program, and
(3) describing a long-term protective strategy. Since then, the
department has addressed two of these (e.g., it implemented an
automated tool to track cyber security efforts and developed a long-
term cyber asset protection strategy) but still has not addressed the
third.
* In the Department of Justice‘s 2004 plan, the department did not
fully address 5 of OMB‘s requirements”namely, it did not describe:
- the agency‘s long term protective strategy,
- performance metrics for the agency‘s CIP program,
- the major initiatives for addressing cyber-related deficiencies,
- milestones for these initiatives, and,
- challenges to implementation of the plan.
Since then, the department, via other planning efforts (e.g., its IT
Security Program Management Plan), has addressed all but the last
requirement.
* In its 2004 plan, the National Aeronautics and Space Administration
fully addressed all but the requirements to summarize (1) the locations
and assets supporting primary functions and (2) the agency‘s ability to
identify performance gaps in incident response and recovery activities.
An updated addendum to the CIP plan met the first requirement. However,
the second requirement remains unaddressed.
* The Small Business Administration‘s 2004 plan did not fully address 10
requirements; however, in 2005, the agency addressed one of the missing
requirements (i.e., determining whether corrective actions for IT
systems considered critical infrastructure were included in FISMA plans
of action and milestones) as part of other CIP planning efforts.
However, these efforts did not fully address the 9 other criteria
shortfalls identified in the agency‘s 2004 plan, such as describing the
agency‘s ability to protect its cyber-related critical assets and its
long-term protective strategy.
* Although the Department of Transportation‘s 2004 plan fully addressed
17 of the 19 requirements, it did not address the requirements to
summarize the locations and assets that support the primary functions
and include a prioritized list of the agency‘s cyber-related
infrastructure assets. In 2008, the department developed a FISMA report
that provided a summary of the location and assets supporting the
primary functions; however, the requirement to provide a prioritized
list of the agency‘s cyber-related infrastructure assets was not
addressed.
* In its 2004 plan, the Department of Veterans Affairs fully addressed
10 OMB requirements but did not address others such as providing:
- a description of the department‘s capabilities for identifying,
assessing vulnerabilities for, and prioritizing its cyber CIP assets;
- a summary of its ability to identify performance gaps in incident
response and recovery activities;
- a description of its long-term protective strategy;
- CIP program performance metrics;
- milestones for major cyber initiatives; and;
- a discussion of challenges to implementing the plan.
In a December 2008 update of the plan and related documentation, the
department addressed 3 of the above requirements (i.e., performance
metrics, milestones, and plan implementation challenges) but has yet to
address the others.
The above recent efforts are steps in the right direction, but until
all the plans have been updated to fully address the OMB criteria,
there is an increased risk that the federal government will not have
effectively identified, prioritized, and protected its cyber critical
assets, leaving them potentially vulnerable to deliberate efforts to
destroy, incapacitate, or exploit them. This also raises questions
about the usefulness of these partially-completed plans as input into
the National Infrastructure Protection Plan and as a tool for initiating
and institutionalizing cyber CIP planning governmentwide.
Conclusions:
The major federal agencies‘ 2004 cyber CIP plans were an initial step
toward the goals of (1) securing and protecting critical infrastructure
and assets vital to carrying out the government‘s mission-critical
operations and (2) implementing and institutionalizing cyber planning
governmentwide. While none of the 2004 plans have since been updated,
subsequent cyber CIP planning efforts by a third of the agencies have
yielded additional steps toward these goals. However, continuing
shortfalls in these planning efforts highlight that more remains to be
done to ensure cyber CIP plans are developed in a comprehensive manner.
These shortfalls are attributable in part to OMB not making these plans
a priority, including not effectively overseeing agencies‘ efforts to
make sure OMB requirements are addressed in agency plans and the plans
are being implemented. Without more sustained leadership, management,
and oversight in this area, there is an increased risk that federal
agencies individually, and the federal government collectively, will
not, among other things, effectively identify, prioritize, and protect
their cyber critical assets, thus leaving them potentially vulnerable
to deliberate efforts to destroy, incapacitate, or exploit them.
Recommendations for Executive Action:
Accordingly, we recommend that the Director of the Office of Management
and Budget provide leadership and oversight in directing federal cyber
critical infrastructure planning efforts and make them a management
priority by:
* directing the agencies to expeditiously update their plans to fully
address the office‘s cyber critical infrastructure planning
requirements, and;
* following up with the agencies as appropriate to make sure updated
plans fully meet OMB requirements and are being effectively
implemented. At a minimum, this should include having agency heads
report to OMB when updated plans have been completed and that the plans
fully meet OMB requirements and are being effectively implemented.
Agency Comments and Our Evaluation:
In oral comments on a draft of this briefing, OMB officials, including
the Lead Information Technology Policy Analyst from the Office of E-
Government and Information Technology, agreed with our findings and
first recommendation and discussed issuing a clarifying memorandum to
direct agencies to update their plans. With regard to our second
recommendation, these officials said that it was ultimately the
responsibility of the agencies to follow up to make sure plans are
effectively updated and implemented. We concur that agencies have a key
role to play in updating and implementing these plans due to their
knowledge of their cyber CIP environments and, therefore, know how best
to secure and protect them. This notwithstanding, as previously
discussed, OMB has an important role of reviewing and approving agency
plans across the entire federal government to ensure that they are
consistently developed, updated, and implemented. To do this
effectively, OMB should periodically follow up with the agencies to
assess the status and progress of cyber CIP planning efforts.
Attachment 1: Overall Summary Analysis of Criteria and the 2004 Plans:
The following table illustrates the number of plans that fully,
partially, and did not address each criterion (organized by key topic
area).
Addressing existing capabilities for protecting federal cyber critical
infrastructure:
Criteria by key topic area: Summarize primary functions of the agency
that rely on cyber critical infrastructure assets;
No. of plans that fully addressed: 18;
No. of plans that partially addressed: 0;
No. of plans that did not address: 0.
Criteria by key topic area: Summarize the agency‘s management
structure, including the management responsible for the security of
cyber critical assets;
No. of plans that fully addressed: 18;
No. of plans that partially addressed: 0;
No. of plans that did not address: 0.
Criteria by key topic area: Summarize locations and assets that support
the primary functions;
No. of plans that fully addressed: 12;
No. of plans that partially addressed: 2;
No. of plans that did not address: 4.
Criteria by key topic area: Describe the agency's current capabilities
for identification of federally owned or operated cyber critical
infrastructure assets;
No. of plans that fully addressed: 17;
No. of plans that partially addressed: 1;
No. of plans that did not address: 0.
Criteria by key topic area: Describe the agency's current capabilities
for assessments of cyber vulnerabilities and interdependencies;
No. of plans that fully addressed: 17;
No. of plans that partially addressed: 1;
No. of plans that did not address: 0.
Criteria by key topic area: Describe the agency's current capabilities
for prioritization of federal cyber assets;
No. of plans that fully addressed: 15;
No. of plans that partially addressed: 1;
No. of plans that did not address: 2.
Criteria by key topic area: Describe the agency's current capabilities
for adequately protecting cyber critical infrastructure assets;
No. of plans that fully addressed: 17;
No. of plans that partially addressed: 0;
No. of plans that did not address: 1.
Criteria by key topic area: Summarize the agency‘s capability to
respond to and recover from events that impair the ability to perform
mission critical functions at or using federal cyber critical
infrastructure assets;
No. of plans that fully addressed: 17;
No. of plans that partially addressed: 0;
No. of plans that did not address: 1.
Criteria by key topic area: Summarize the agency‘s ability to identify
gaps in carrying out any of the activities discussed above;
No. of plans that fully addressed: 12;
No. of plans that partially addressed: 0;
No. of plans that did not address: 6.
Criteria by key topic area: Describe the agency‘s process for
determining budget and personnel requirements for cyber critical
infrastructure activities;
No. of plans that fully addressed: 16;
No. of plans that partially addressed: 1;
No. of plans that did not address: 1.
Criteria by key topic area: Describe the agency‘s process for ensuring
independent oversight of cyber CIP programs;
No. of plans that fully addressed: 14;
No. of plans that partially addressed: 0;
No. of plans that did not address: 4.
Criteria by key topic area: Describe any corrective actions identified
for cyber-related issues and if follow-on actions were taken;
No. of plans that fully addressed: 13;
No. of plans that partially addressed: 0;
No. of plans that did not address: 5.
Criteria by key topic area: Determine whether corrective actions for IT
systems considered critical infrastructure were included in Federal
Information Security Management Act (FISMA) plans of action and
milestones;
No. of plans that fully addressed: 14;
No. of plans that partially addressed: 0;
No. of plans that did not address: 4.
Prioritized list of the agency‘s cyber-related critical
infrastructure:
Criteria by key topic area: Include a prioritized list of the agency‘s
cyber-related critical infrastructure;
No. of plans that fully addressed: 14;
No. of plans that partially addressed: 0;
No. of plans that did not address: 4.
Developing a long-term protective strategy:
Criteria by key topic area: Describe the agency's long-term protective
strategy to protect the cyber critical infrastructure identified in the
plan;
No. of plans that fully addressed: 10;
No. of plans that partially addressed: 0;
No. of plans that did not address: 8.
Criteria by key topic area: Describe performance metrics for the CIP
program;
No. of plans that fully addressed: 13;
No. of plans that partially addressed: 0;
No. of plans that did not address: 5.
Criteria by key topic area: Describe the status of major initiatives
that are underway or planned for addressing cyber-related deficiencies;
No. of plans that fully addressed: 16;
No. of plans that partially addressed: 0;
No. of plans that did not address: 2.
Criteria by key topic area: Describe milestones for the initiatives
described and target dates for completing each milestone;
No. of plans that fully addressed: 15;
No. of plans that partially addressed: 0;
No. of plans that did not address: 3.
Criteria by key topic area: Discuss any specific management, technical,
or operational challenges with regard to implementation of the plan;
No. of plans that fully addressed: 13;
No. of plans that partially addressed: 0;
No. of plans that did not address: 5.
Source: GAO analysis of agency plans.
[End of table]
Attachment 2: Criteria Met by 2004 Cyber CIP Plans of Major Federal
Agencies:
Agriculture–Justice:
Addressing existing capabilities for protecting federal cyber critical
infrastructure:
Criteria (by key topic area): Summarize primary functions of the agency
that rely on cyber critical infrastructure assets;
USDA: fully addressed;
DOC: fully addressed;
DOD: fully addressed;
DHS: fully addressed;
DOE: fully addressed;
EPA: fully addressed;
HHS: fully addressed;
DOI: fully addressed;
DOJ: fully addressed.
Criteria (by key topic area): Summarize the agency‘s management
structure, including the management responsible for the security of
cyber critical assets;
USDA: fully addressed;
DOC: fully addressed;
DOD: fully addressed;
DHS: fully addressed;
DOE: fully addressed;
EPA: fully addressed;
HHS: fully addressed;
DOI: fully addressed;
DOJ: fully addressed.
Criteria (by key topic area): Summarize the locations and assets that
support the primary functions;
USDA: fully addressed;
DOC: fully addressed;
DOD: fully addressed;
DHS: not addressed;
DOE: fully addressed;
EPA: fully addressed;
HHS: not addressed;
DOI: partially[A] addressed;
DOJ: fully addressed.
Criteria (by key topic area): Describe the agency's current
capabilities for identification of federally owned or operated cyber
critical infrastructure assets;
USDA: fully addressed;
DOC: fully addressed;
DOD: fully addressed;
DHS: fully addressed;
DOE: fully addressed;
EPA: fully addressed;
HHS: fully addressed;
DOI: fully addressed;
DOJ: fully addressed.
Criteria (by key topic area): Describe the agency's current
capabilities for assessments of cyber vulnerabilities and
interdependencies;
USDA: fully addressed;
DOC: fully addressed;
DOD: fully addressed;
DHS: fully addressed;
DOE: fully addressed;
EPA: fully addressed;
HHS: fully addressed;
DOI: fully addressed;
DOJ: fully addressed.
Criteria (by key topic area): Describe the agency's current
capabilities for prioritization of federal cyber assets;
USDA: partially[B] addressed;
DOC: fully addressed;
DOD: fully addressed;
DHS: fully addressed;
DOE: fully addressed;
EPA: fully addressed;
HHS: fully addressed;
DOI: fully addressed;
DOJ: fully addressed.
Criteria (by key topic area): Describe the agency's current
capabilities for adequately protecting cyber critical infrastructure
assets;
USDA: fully addressed;
DOC: fully addressed;
DOD: fully addressed;
DHS: fully addressed;
DOE: fully addressed;
EPA: fully addressed;
HHS: fully addressed;
DOI: fully addressed;
DOJ: fully addressed.
Criteria (by key topic area): Summarize the agency‘s capability to
respond to and recover from events that impair the ability to perform
mission critical functions at or using federal cyber critical
infrastructure assets;
USDA: fully addressed;
DOC: not addressed;
DOD: fully addressed;
DHS: fully addressed;
DOE: fully addressed;
EPA: fully addressed;
HHS: fully addressed;
DOI: fully addressed;
DOJ: fully addressed.
Criteria (by key topic area): Summarize the agency‘s ability to
identify gaps in carrying out any of the activities discussed above;
USDA: fully addressed;
DOC: not addressed;
DOD: fully addressed;
DHS: fully addressed;
DOE: fully addressed;
EPA: fully addressed;
HHS: not addressed;
DOI: fully addressed;
DOJ: fully addressed.
Criteria (by key topic area): Describe the agency‘s process for
determining budget and personnel requirements for cyber critical
infrastructure activities;
USDA: fully addressed;
DOC: partially[C] addressed;
DOD: fully addressed;
DHS: fully addressed;
DOE: fully addressed;
EPA: fully addressed;
HHS: fully addressed;
DOI: fully addressed;
DOJ: fully addressed.
Criteria (by key topic area): Describe the agency‘s process for
ensuring independent oversight of cyber CIP programs;
USDA: fully addressed;
DOC: fully addressed;
DOD: not addressed;
DHS: fully addressed;
DOE: fully addressed;
EPA: fully addressed;
HHS: not addressed;
DOI: fully addressed;
DOJ: fully addressed.
Criteria (by key topic area): Describe any corrective actions
identified for cyber-related issues and if follow-on actions were
taken;
USDA: fully addressed;
DOC: fully addressed;
DOD: fully addressed;
DHS: fully addressed;
DOE: fully addressed;
EPA: fully addressed;
HHS: not addressed;
DOI: not addressed;
DOJ: fully addressed.
Criteria (by key topic area): Determine whether corrective actions for
IT systems considered critical infrastructure were included in Federal
Information Security Management Act (FISMA) plans of action and
milestones;
USDA: fully addressed;
DOC: fully addressed;
DOD: not addressed;
DHS: fully addressed;
DOE: fully addressed;
EPA: fully addressed;
HHS: not addressed;
DOI: fully addressed;
DOJ: fully addressed.
Prioritized list of agency-owned or operated critical infrastructure:
Criteria (by key topic area): Include a prioritized list of the
agency‘s cyber-related critical infrastructure;
USDA: fully addressed;
DOC: fully addressed;
DOD: fully addressed;
DHS: not addressed;
DOE: fully addressed;
EPA: fully addressed;
HHS: not addressed;
DOI: fully addressed;
DOJ: fully addressed.
Long-term protective strategy:
Criteria (by key topic area): Describe the agency's long-term
protective strategy to protect the cyber critical infrastructure
identified in the plan;
USDA: fully addressed;
DOC: not addressed;
DOD: fully addressed;
DHS: fully addressed;
DOE: fully addressed;
EPA: fully addressed;
HHS: not addressed;
DOI: not addressed;
DOJ: not addressed.
Criteria (by key topic area): Describe the performance metrics for the
CIP program;
USDA: fully addressed;
DOC: fully addressed;
DOD: fully addressed;
DHS: fully addressed;
DOE: fully addressed;
EPA: fully addressed;
HHS: not addressed;
DOI: fully addressed;
DOJ: not addressed.
Criteria (by key topic area): Describe the status of major initiatives
that are underway or planned for addressing cyber-related deficiencies;
USDA: fully addressed;
DOC: fully addressed;
DOD: fully addressed;
DHS: fully addressed;
DOE: fully addressed;
EPA: fully addressed;
HHS: not addressed;
DOI: fully addressed;
DOJ: not addressed.
Criteria (by key topic area): Describe the milestones for the
initiatives described and target dates for completing each milestone;
USDA: fully addressed;
DOC: fully addressed;
DOD: fully addressed;
DHS: fully addressed;
DOE: fully addressed;
EPA: fully addressed;
HHS: not addressed;
DOI: fully addressed;
DOJ: not addressed.
Criteria (by key topic area): Discuss any specific management,
technical, or operational challenges with regard to implementation of
the plan;
USDA: fully addressed;
DOC: fully addressed;
DOD: fully addressed;
DHS: fully addressed;
DOE: fully addressed;
EPA: fully addressed;
HHS: not addressed;
DOI: fully addressed;
DOJ: not addressed.
Labor–Veterans Affairs:
Addressing existing capabilities for protecting federal cyber critical
infrastructure:
Criteria (by key topic area): Summarize primary functions of the agency
that rely on cyber critical infrastructure assets;
Labor: fully addressed;
NASA: fully addressed;
OPM: fully addressed;
SBA: fully addressed;
SSA: fully addressed;
State: fully addressed;
DOT: fully addressed;
Treasury: fully addressed;
VA: fully addressed.
Criteria (by key topic area): Summarize the agency‘s management
structure, including the management responsible for the security of
cyber critical assets;
Labor: fully addressed;
NASA: fully addressed;
OPM: fully addressed;
SBA: fully addressed;
SSA: fully addressed;
State: fully addressed;
DOT: fully addressed;
Treasury: fully addressed;
VA: fully addressed.
Criteria (by key topic area): Summarize the locations and assets that
support the primary functions;
Labor: fully addressed;
NASA: not addressed;
OPM: partially addressed[D];
SBA: fully addressed;
SSA: fully addressed;
State: fully addressed;
DOT: not addressed;
Treasury: fully addressed;
VA: fully addressed.
Criteria (by key topic area): Describe the agency's current
capabilities for identification of federally owned or operated cyber
critical infrastructure assets;
Labor: fully addressed;
NASA: fully addressed;
OPM: fully addressed;
SBA: fully addressed;
SSA: fully addressed;
State: fully addressed;
DOT: fully addressed;
Treasury: fully addressed;
VA: partially addressed[E].
Criteria (by key topic area): Describe the agency's current
capabilities for assessments of cyber vulnerabilities and
interdependencies;
Labor: fully addressed;
NASA: fully addressed;
OPM: fully addressed;
SBA: fully addressed;
SSA: fully addressed;
State: fully addressed;
DOT: fully addressed;
Treasury: fully addressed;
VA: partially addressed[F].
Criteria (by key topic area): Describe the agency's current
capabilities for prioritization of federal cyber assets;
Labor: fully addressed;
NASA: fully addressed;
OPM: fully addressed;
SBA: not addressed;
SSA: fully addressed;
State: fully addressed;
DOT: fully addressed;
Treasury: fully addressed;
VA: not addressed.
Criteria (by key topic area): Describe the agency's current
capabilities for adequately protecting cyber critical infrastructure
assets;
Labor: fully addressed;
NASA: fully addressed;
OPM: fully addressed;
SBA: not addressed;
SSA: fully addressed;
State: fully addressed;
DOT: fully addressed;
Treasury: fully addressed;
VA: fully addressed.
Criteria (by key topic area): Criteria (by key topic area): Summarize
the capability to respond to and recover from events that impair the
ability to perform mission critical functions at or using federal cyber
critical infrastructure assets;
Labor: fully addressed;
NASA: fully addressed;
OPM: fully addressed;
SBA: fully addressed;
SSA: fully addressed;
State: fully addressed;
DOT: fully addressed;
Treasury: fully addressed;
VA: fully addressed.
Criteria (by key topic area): Summarize the ability to identify gaps in
carrying out any of the activities discussed above;
Labor: not addressed;
NASA: not addressed;
OPM: fully addressed;
SBA: not addressed;
SSA: fully addressed;
State: fully addressed;
DOT: fully addressed;
Treasury: fully addressed;
VA: not addressed.
Criteria (by key topic area): Describe the agency‘s process for
determining budget and personnel requirements for cyber critical
infrastructure activities;
Labor: fully addressed;
NASA: fully addressed;
OPM: fully addressed;
SBA: not addressed;
SSA: fully addressed;
State: fully addressed;
DOT: fully addressed;
Treasury: fully addressed;
VA: fully addressed.
Criteria (by key topic area): Describe the agency‘s process for
ensuring independent oversight of cyber CIP programs;
Labor: not addressed;
NASA: fully addressed;
OPM: fully addressed;
SBA: not addressed;
SSA: fully addressed;
State: fully addressed;
DOT: fully addressed;
Treasury: fully addressed;
VA: fully addressed.
Criteria (by key topic area): Describe any corrective actions
identified for cyber-related issues and if follow-on actions were
taken;
Labor: not addressed;
NASA: fully addressed;
OPM: fully addressed;
SBA: not addressed;
SSA: fully addressed;
State: fully addressed;
DOT: fully addressed;
Treasury: not addressed;
VA: fully addressed.
Criteria (by key topic area): Determine whether corrective actions for
IT systems considered critical infrastructure were included in Federal
Information Security Management Act (FISMA) plans of action and
milestones;
Labor: not addressed;
NASA: fully addressed;
OPM: fully addressed;
SBA: not addressed;
SSA: fully addressed;
State: fully addressed;
DOT: fully addressed;
Treasury: fully addressed;
VA: fully addressed.
Prioritized list of agency-owned or operated critical
infrastructure:
Criteria (by key topic area): Include a prioritized list of agency
cyber-related critical infrastructure;
Labor: fully addressed;
NASA: fully addressed;
OPM: fully addressed;
SBA: fully addressed;
SSA: fully addressed;
State: fully addressed;
DOT: not addressed;
Treasury: fully addressed;
VA: not addressed.
Long-term protective strategy:
Criteria (by key topic area): Describe the agency's long-term
protective strategy to protect the cyber critical infrastructure
identified in the plan;
Labor: not addressed;
NASA: fully addressed;
OPM: not addressed;
SBA: not addressed;
SSA: fully addressed;
State: fully addressed;
DOT: fully addressed;
Treasury: fully addressed;
VA: not addressed.
Criteria (by key topic area): Describe the performance metrics for the
CIP program;
Labor: not addressed;
NASA: fully addressed;
OPM: fully addressed;
SBA: not addressed;
SSA: fully addressed;
State: fully addressed;
DOT: fully addressed;
Treasury: fully addressed;
VA: not addressed.
Criteria (by key topic area): Describe the status of major initiatives
that are underway or planned for addressing cyber-related deficiencies;
Labor: fully addressed;
NASA: fully addressed;
OPM: fully addressed;
SBA: fully addressed;
SSA: fully addressed;
State: fully addressed;
DOT: fully addressed;
Treasury: fully addressed;
VA: fully addressed.
Criteria (by key topic area): Describe the milestones for the
initiatives described and target dates for completing each milestone;
Labor: fully addressed;
NASA: fully addressed;
OPM: fully addressed;
SBA: fully addressed;
SSA: fully addressed;
State: fully addressed;
DOT: fully addressed;
Treasury: fully addressed;
VA: not addressed.
Criteria (by key topic area): Discuss any specific management,
technical, or operational challenges with regard to implementation of
the plan;
Labor: not addressed;
NASA: fully addressed;
OPM: fully addressed;
SBA: not addressed;
SSA: fully addressed;
State: fully addressed;
DOT: fully addressed;
Treasury: fully addressed;
VA: not addressed.
Note: Agency abbreviations as follows: Agriculture (USDA), Defense
(DOD), Homeland Security (DHS), Energy (DOE), Environmental
Protection Agency (EPA), Health and Human Services (HHS), Interior
(DOI), and Justice (DOJ).
[A] The Department of the Interior‘s plan discussed the function and
locations but did not identify the assets.
[B] The Department of Agriculture‘s plan described a process but did
not address whether the department had prioritized its cyber assets.
[C] The Department of Commerce‘s plan identified special funding but
did not provide an overall process for determining resources.
[D] The Office of Personnel Management‘s plan summarized the locations
but did not identify the specific assets.
[E] The Department of Veterans Affairs‘ plan described the department‘s
capability to identify assets but did not state how the process
included cyber assets.
[F] The Department of Veterans Affairs‘ plan described departmental
capability to perform vulnerability assessments but did not specify
how the process included cyber assets.
Source: GAO analysis of agency plans.
[End of table]
[End of section]
Appendix II: GAO Contact and Staff Acknowledgments:
GAO Contact:
David A. Powner, (202) 512-9286 or pownerd@gao.gov:
Staff Acknowledgments:
In addition to the individual named above, key contributions were made
to this report by Gary N. Mountjoy, Assistant Director; Nabajyoti
Barkakati; Scott F. Borre; Neil J. Doherty; Michael W. Gilmore;
Barbarol J. James; Kenneth A. Johnson; Kush K. Malhotra; and Lee A.
McCracken.
[End of section]
Footnotes:
[1] Critical infrastructure means IT and non-IT systems and assets,
whether physical or virtual, so vital to the United States that the
incapacity or destruction of such systems and assets would have a
debilitating impact on security, national economic security, national
public health or safety, or any combination of these.
[2] Key resources are publicly or privately controlled resources
essential to the minimal operations of the economy and government
(e.g., nuclear power plants, and certain dams, government facilities,
and commercial facilities).
[3] These are the Departments of Agriculture, Commerce, Defense,
Education, Energy, Health and Human Services, Homeland Security,
Housing and Urban Development, the Interior, Justice, Labor, State,
Transportation, the Treasury, and Veterans Affairs; the Environmental
Protection Agency; General Services Administration; National
Aeronautics and Space Administration; National Science Foundation;
Nuclear Regulatory Commission; Office of Personnel Management; Small
Business Administration; Social Security Administration; and the U.S.
Agency for International Development.
[4] Critical infrastructure means systems and assets, whether physical
or virtual, so vital to the United States that the incapacity or
destruction of such systems and assets would have a debilitating impact
on security, national economic security, national public health
or safety, or any combination of these matters.
[5] Key resources are publicly or privately controlled resources
essential to the minimal operations of the economy and government.
Examples include such facilities as nuclear power plants, dams,
government facilities, and commercial facilities.
[6] These are the Departments of Agriculture, Commerce, Defense,
Education, Energy, Health and Human Services, Homeland Security,
Housing and Urban Development, the Interior, Justice, Labor, State,
Transportation, the Treasury, and Veterans Affairs; the
Environmental Protection Agency, General Services Administration,
National Aeronautics and Space Administration, National Science
Foundation, Nuclear Regulatory Commission, Office of Personnel
Management, Small Business Administration, Social Security
Administration, and the U.S. Agency for International Development.
[7] GAO, Information Security: Progress Reported, but Weaknesses at
Federal Agencies Persist, [hyperlink,
http://www.gao.gov/products/GAO-08-571T] (Washington, DC.: March 12,
2008).
[8] See, for example, GAO, Information Security: Agencies Continue to
Report Progress, but Need to Mitigate Persistent Weaknesses,
[hyperlink, http://www.gao.gov/products/GAO-09-546] (Washington, DC.:
July 17, 2009); Information Security: Progress Reported, but Weaknesses
at Federal Agencies Persist, [hyperlink,
http://www.gao.gov/products/GAO-08-571T] (Washington, DC.: March 12,
2008); and Continuity of Operations: Selected Agencies Tested Various
Capabilities during 2006 Governmentwide Exercise, [hyperlink,
http://www.gao.gov/products/GAO-08-185] (Washington, D.C.: November 19,
2007).
[9] Title III, E-Government Act of 2002, Pub. L. No. 107-347.
[10] GAO, High-Risk Series, An Update, [hyperlink,
http://www.gao.gov/products/GAO-09-271] (Washington, D.C.: January
2009).
[11] Key resources are publicly or privately controlled resources
essential to the minimal operations of the economy and government.
Examples include such facilities as nuclear power plants, dams,
government facilities, and commercial facilities.
[End of section]
GAO's Mission:
The Government Accountability Office, the audit, evaluation and
investigative arm of Congress, exists to support Congress in meeting
its constitutional responsibilities and to help improve the performance
and accountability of the federal government for the American people.
GAO examines the use of public funds; evaluates federal programs and
policies; and provides analyses, recommendations, and other assistance
to help Congress make informed oversight, policy, and funding
decisions. GAO's commitment to good government is reflected in its core
values of accountability, integrity, and reliability.
Obtaining Copies of GAO Reports and Testimony:
The fastest and easiest way to obtain copies of GAO documents at no
cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each
weekday, GAO posts newly released reports, testimony, and
correspondence on its Web site. To have GAO e-mail you a list of newly
posted products every afternoon, go to [hyperlink, http://www.gao.gov]
and select "E-mail Updates."
Order by Phone:
The price of each GAO publication reflects GAO‘s actual cost of
production and distribution and depends on the number of pages in the
publication and whether the publication is printed in color or black and
white. Pricing and ordering information is posted on GAO‘s Web site,
[hyperlink, http://www.gao.gov/ordering.htm].
Place orders by calling (202) 512-6000, toll free (866) 801-7077, or
TDD (202) 512-2537.
Orders may be paid for using American Express, Discover Card,
MasterCard, Visa, check, or money order. Call for additional
information.
To Report Fraud, Waste, and Abuse in Federal Programs:
Contact:
Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]:
E-mail: fraudnet@gao.gov:
Automated answering system: (800) 424-5454 or (202) 512-7470:
Congressional Relations:
Ralph Dawn, Managing Director, dawnr@gao.gov:
(202) 512-4400:
U.S. Government Accountability Office:
441 G Street NW, Room 7125:
Washington, D.C. 20548:
Public Affairs:
Chuck Young, Managing Director, youngc1@gao.gov:
(202) 512-4800:
U.S. Government Accountability Office:
441 G Street NW, Room 7149:
Washington, D.C. 20548: