This is the accessible text file for GAO report number GAO-09-969 
entitled 'Critical Infrastructure Protection: Current Cyber Sector-
Specific Planning Approach Needs Reassessment' which was released on 
October 28, 2009. 

This text file was formatted by the U.S. Government Accountability 
Office (GAO) to be accessible to users with visual impairments, as part 
of a longer term project to improve GAO products' accessibility. Every 
attempt has been made to maintain the structural and data integrity of 
the original printed product. Accessibility features, such as text 
descriptions of tables, consecutively numbered footnotes placed at the 
end of the file, and the text of agency comment letters, are provided 
but may not exactly duplicate the presentation or format of the printed 
version. The portable document format (PDF) file is an exact electronic 
replica of the printed version. We welcome your feedback. Please E-mail 
your comments regarding the contents or accessibility features of this 
document to Webmaster@gao.gov. 

This is a work of the U.S. government and is not subject to copyright 
protection in the United States. It may be reproduced and distributed 
in its entirety without further permission from GAO. Because this work 
may contain copyrighted images or other material, permission from the 
copyright holder may be necessary if you wish to reproduce this 
material separately. 

Report to Congressional Requesters: 

United States Government Accountability Office: 
GAO: 

September 2009: 

Critical Infrastructure Protection: 

Current Cyber Sector-Specific Planning Approach Needs Reassessment: 

GAO-09-969: 

GAO Highlights: 

Highlights of GAO-09-969, a report to congressional requesters. 

Why GAO Did This Study: 

The nation’s critical infrastructure sectors (e.g., energy, banking) 
rely extensively on information technology systems. The Department of 
Homeland Security (DHS) issued guidance in 2006 that instructed lead 
federal agencies, referred to as sector-specific agencies, to develop 
plans for protecting the sector’s critical cyber and other (physical) 
infrastructure. These agencies issued plans in 2007, but GAO found that 
none fully addressed all 30 cyber security-related criteria identified 
in DHS’s guidance and recommended that the plans be updated to address 
it by September 2008. GAO was asked to determine the extent to which 
sector plans have been updated to fully address DHS’s cyber security 
requirements and assess whether these plans and related reports provide 
for effective implementation. To do this, GAO analyzed documentation, 
interviewed officials, and compared sector plans and reports with DHS 
cyber criteria. 

What GAO Found: 

Although DHS reported many efforts under way and planned to improve the 
cyber content of sector-specific plans, sector-specific agencies have 
yet to update their respective sector-specific plans to fully address 
key DHS cyber security criteria. For example, of the 17 sector-specific 
plans, only 9 have been updated. Of these 9 updates, just 3 addressed 
missing cyber criteria, and those 3 involved only a relatively small 
number (3 or fewer) of the criteria in question. Recently DHS issued 
guidance specifically requesting that the sectors address cyber 
criteria shortfalls in their 2010 sector-specific plan updates. Until 
the plans are issued, it is not clear whether they will fully address 
cyber requirements. Accordingly, the continuing lack of plans that 
fully address key cyber criteria has reduced the effectiveness of the 
existing sector planning approach and thus increases the risk that the 
nation’s cyber assets have not been adequately identified, prioritized, 
and protected. 

Most sector-specific agencies developed and identified in their 2007 
sector plans those actions—referred to by DHS as implementation actions—
essential to carrying out the plans; however, since then, most agencies 
have not updated the actions and reported progress in implementing them 
as called for by DHS guidance. Specifically, in response to 2006 
guidance that called for agencies to address three key implementation 
elements (action descriptions, completion milestones, and parties 
responsible), most sectors initially developed implementation actions 
that fully addressed the key elements. However, while 2008 guidance 
called for implementation actions to be updated and for sector reports 
to include progress reporting against implementation action milestone 
commitments, only five sectors updated their plans and reported on 
progress against implementation actions. DHS attributed this in part to 
the department not following up and working to ensure that all sector 
plans are fully developed and implemented in accordance with department 
guidance. 

The lack of complete updates and progress reports are further evidence 
that the sector planning process has not been effective and thus leaves 
the nation in the position of not knowing precisely where it stands in 
securing cyber critical infrastructures. Not following up to address 
these conditions also shows DHS is not making sector planning a 
priority. Further, recent studies by a presidential working group—which 
resulted in the President establishing the White House Office of 
Cybersecurity Coordinator—and an expert commission also identified 
shortfalls in the effectiveness of the current public-private 
partnership approach and related sector planning and offered options 
for improving the process. Such options include (1) prioritizing 
sectors to focus planning efforts on those with the most important 
cyber assets and (2) streamlining existing sectors to optimize their 
capacity to identify priorities and develop plans. Given this, it is 
essential that DHS and the to-be-appointed Cybersecurity Coordinator 
determine whether the current process as implemented should continue to 
be the national approach and thus worthy of further investment. 

What GAO Recommends: 

GAO recommends that DHS assess whether existing sector-specific 
planning processes should continue to be the nation’s approach to 
securing cyber and other critical infrastructure and consider whether 
other options would provide more effective results. DHS concurred with 
the recommendation; however, it took exception with certain report 
facts and conclusions. GAO addressed these comments, but they did not 
result in substantive report revisions. 

View [hyperlink, http://www.gao.gov/products/GAO-09-969] or key 
components. For more information, contact David Powner, 202-512-9286, 
pownerd@gao.gov. 

[End of section] 

Contents: 

Letter: 

Sector-Specific Agencies Have Yet to Update Their Respective Sector- 
Specific Plans to Fully Address Key Cyber Security Criteria as Called 
for by DHS Guidance: 

Sector Plans and Related Reports Do Not Fully Provide For Effective 
Implementation: 

Conclusions: 

Recommendations: 

Agency Comments and Our Evaluation: 

Appendix I: Briefing Provided to Staff, Subcommittee on Emerging 
Threats, Cybersecurity, and Science and Technology, House Committee on 
Homeland Security: 

Appendix II: Comments from the Department of Homeland Security: 

Appendix III: GAO Contact and Staff Acknowledgments: 

Abbreviations: 

CIP: critical infrastructure protection: 

DHS: Department of Homeland Security: 

IT: information technology: 

NIPP: National Infrastructure Protection Plan: 

SSP: sector-specific plan: 

[End of section] 

United States Government Accountability Office: 
Washington, DC 20548: 

September 24, 2009: 

The Honorable Yvette D. Clarke: Chairwoman:
Subcommittee on Emerging Threats, Cybersecurity, and Science and 
Technology:
Committee on Homeland Security: 
House of Representatives: 

The Honorable James R. Langevin: 
House of Representatives: 

The nation's critical infrastructure relies extensively on computerized 
information technology (IT) systems and electronic data. The security 
of those systems and information is essential to the nation's security, 
economy, and public health and safety. To help protect critical 
infrastructure, federal policy established a framework for public and 
private sector partnerships and identified 18 critical infrastructure 
sectors such as energy and banking and finance. To implement the 
framework, the Department of Homeland Security (DHS) issued a 2006 
National Infrastructure Protection Plan that along with other DHS 
guidance, called for lead federal agencies (sector-specific agencies) 
to develop sector-specific plans and sector annual reports to address 
how sectors would implement the national plan, including how key cyber 
infrastructure assets were to be protected--commonly referred to as 
cyber security. In May 2007, sector-specific agencies issued plans for 
their sectors; we subsequently reviewed the plans and reported[Footnote 
1] that none fully addressed 30 cyber security-related criteria 
identified in DHS's guidance and recommended that DHS request that the 
sector-specific agencies' plans address the cyber-related criteria by 
September 2008. 

Since then, an expert commission--led by two congressmen and industry 
officials--studied and reported in late 2008 on the public-private 
partnership, including sector planning approach and other aspects of 
U.S. cyber security policy. More recently, the President established 
(1) a cyber security working group that completed a "60-day" review of 
federal cyber policy and (2) a Cybersecurity Coordinator (the position 
has not yet been filled) within the White House to assist in developing 
new cyber policies and coordinating efforts across the federal 
government. Both studies identified issues with the current sector 
planning as well as options to improve it. 

This report responds to your request that we (1) determine the extent 
to which sector plans have been updated to fully address DHS cyber 
security requirements and (2) assess whether these plans and related 
reports provide for effective implementation. 

On July 29, 2009, we provided a briefing to staff of the Subcommittee 
on Emerging Threats, Cybersecurity, and Science and Technology, House 
Committee on Homeland Security. This report summarizes and transmits 
(1) the presentation slides we used to brief the staff and (2) 
recommendations to the Secretary of Homeland Security that are part of 
those slides. The full briefing, including our scope and methodology, 
is reprinted as appendix I. We conducted this performance audit from 
October 2008 to September 2009, in accordance with generally accepted 
government auditing standards. Those standards require that we plan and 
perform the audit to obtain sufficient, appropriate evidence to provide 
a reasonable basis for our findings and conclusions based on our audit 
objectives. We believe that the evidence obtained provides a reasonable 
basis for our findings and conclusions based on our audit objectives. 

Sector-Specific Agencies Have Yet to Update Their Respective Sector- 
Specific Plans to Fully Address Key Cyber Security Criteria as Called 
for by DHS Guidance: 

Although DHS reported many efforts under way and planned to improve the 
cyber content of sector-specific plans, sector-specific agencies have 
yet to update their respective sector-specific plans to fully address 
key DHS cyber security criteria. For example, of the 17[Footnote 2] 
sector-specific plans, only 9 have been updated. Of these 9 updates, 
just 3 addressed missing cyber criteria, and those 3 involved only a 
relatively small number (3 or fewer) of the criteria in question. 
Sector-specific agencies did not fully address missing cyber criteria 
in their plans in large part due to the following: 

* They were focused more on the physical rather than the cyber security 
aspects of the criteria in preparing their plans. 

* They were unaware of the cyber criteria shortfalls identified in 
2007. 

* DHS's guidance on updating sector plans did not specifically request 
the agencies to update the cyber security aspects of their plans. 

The continuing lack of plans that fully address key cyber criteria has 
reduced the effectiveness of the existing sector planning approach and 
thus increases the risk that the nation's cyber assets have not been 
adequately identified, prioritized, and protected. 

Sector Plans and Related Reports Do Not Fully Provide For Effective 
Implementation: 

Most sector-specific agencies developed and identified in their 2007 
sector plans those actions--referred to by DHS as implementation 
actions--essential to carrying out the plans; however, since then, most 
agencies have not updated the actions and reported progress in 
implementing them as called for by DHS guidance. Specifically, in 
response to 2006 guidance that called for agencies in developing 
implementation actions to address three key elements (action 
descriptions, completion milestones, and responsible parties), most 
sectors initially developed implementation actions that fully addressed 
the key elements. However, while 2008 guidance called for 
implementation actions to be updated and for sector reports to include 
progress reporting against implementation action milestone commitments, 
only five sectors updated their plans and reported on implementation 
progress. DHS attributed this in part to the department not following 
up and working to ensure that all sector plans are fully developed and 
implemented in accordance with department guidance. The lack of 
complete updates and progress reports are further evidence that the 
sector planning process has not been effective and thus leaves the 
nation in the position of not knowing precisely where we stand in 
securing cyber-critical infrastructures. 

Conclusions: 

Although DHS reported many efforts under way and planned to improve the 
cyber content of sector-specific plans, sector-specific agencies have 
made limited progress in updating their sector-specific plans to fully 
address key cyber elements. Further, although the agencies produced 
narratives on sector activities, they have not developed effective 
implementation actions and reported on whether progress is being made 
in implementing their sector plans. This means that as a nation, we do 
not know precisely where we are in implementing sector plans and 
associated protective measures designed to secure and protect the 
nation's cyber and other critical infrastructure, despite having 
invested many years in this effort. This condition is due in part to 
DHS not making sector planning a priority and as such, not managing it 
in a way that fully meets DHS guidance. These conclusions, taken as a 
whole, further raise fundamental questions about whether the current 
approach to sector planning is worthwhile and whether there are options 
that would provide better results. Consequently, it is essential that 
federal cyber security leaders--including DHS and the to-be-appointed 
Cybersecurity Coordinator--exert their leadership roles in this area 
by, among other things, determining whether it is worthwhile to 
continue with the current approach as implemented or consider if 
proposed options provide more effective results. To do less means the 
nation's critical infrastructure sectors will continue to be at risk of 
not being able to adequately protect their cyber and other critical 
assets or be prepared to identify and respond to cyber threats and 
vulnerabilities. 

Recommendations: 

We recommend that the Secretary of Homeland Security, consistent with 
any direction from the Office of the Cybersecurity Coordinator, assess 
whether the existing sector-specific planning process should continue 
to be the nation's approach to securing cyber and other critical 
infrastructure and, in doing so, consider whether proposed and other 
options would provide more effective results. 

If the existing approach is deemed to be the national approach, we also 
recommend that the Secretary make it, including the cyber aspects, an 
agency priority and mange it accordingly. This should include 
collaborating closely with other sector-specific agencies to develop: 

* sector-specific plans that fully address cyber-related criteria in 
the next release of the plans, and: 

* sector annual reports that (1) include updated implementation actions 
and associated milestones and (2) report progress against plan 
commitments and timelines. 

Agency Comments and Our Evaluation: 

DHS concurred with our recommendations but took exception with certain 
report facts and conclusions that it said formed the basis for our 
recommendations. Specifically, in an email accompanying its written 
response--which was signed by the Director, Departmental GAO/OIG 
Liaison Office and is reprinted in appendix II--DHS said it concurred 
with our recommendation. In its written response, DHS added that it 
supported continually assessing the effectiveness of the sector 
approach and identifying and implementing improvements as appropriate. 
The department also stated in its written response that alternative 
options can be explored and implemented along with the current sector 
approach, rather than a binary choice between continuing the existing 
sector-specific planning approach and other options. We agree such 
efforts can be pursued in parallel and that doing them in this manner 
would be consistent with our recommendations. The department also 
commented that the report does not give due consideration to many of 
the ongoing sector and cross-sector cyber security activities 
identified in the annual reports and briefed to us. We recognize that 
DHS has multiple ongoing efforts to improve critical infrastructure 
protection (CIP) planning and implementation, and our report 
conclusions state this point. While our report for the sake of brevity 
does not include all of DHS's efforts, it does include illustrative 
examples throughout as part of giving a fair and balanced view of DHS's 
efforts in this area. 

Notwithstanding the concurrence discussed above, DHS in its written 
response took exception with our report's facts and conclusions in nine 
areas--referred to by DHS as general items. Each of these general 
items, along with our response, is summarized below. 

General item 1: With regard to our report section that states that the 
sector-specific agencies have yet to update their respective plans to 
fully address key cyber security criteria as called for by DHS, the 
department commented that it established a risk management framework 
(as part of the 2006 National Infrastructure Protection Plan or NIPP) 
which called for cyber and other elements (i.e., human, physical) to be 
addressed. DHS added that its 2006 SSP guidance did not call for these 
elements to be addressed separately in the plans and at that time GAO 
had not identified the 30 cyber criteria in DHS's guidance; therefore, 
when the 2007 SSPs were issued they did not fully address the 30 cyber 
criteria (which is consistent with our October 2007 report findings). 
To address this situation, DHS said it revised the NIPP in early 2009 
to, among other things, provide for more robust coverage of cyber 
security using as a basis the 30 cyber criteria identified by GAO. In 
addition, in its guidance to the sector agencies in developing their 
2010 SSPs, DHS directed the agencies to update their plans using the 
revised NIPP and in doing so, to fully address the 30 GAO-identified 
cyber criteria. 

GAO response: It is a positive development that DHS has issued guidance 
directing the sector agencies to fully address missing cyber criteria 
as part of having the sectors rewrite their SSPs in 2010. 

In addition, while we agree with DHS that its 2006 guidance did not 
call for cyber to be addressed separately in each SSP section, it is 
important to point out that DHS's 2006 guidance nonetheless called for 
the sectors to address in the SSPs how they planned to secure the cyber 
aspects of their critical infrastructures. Consequently, the 2007 SSPs 
were to have addressed cyber in order to be in compliance with DHS's 
guidance. 

In 2007, we initiated a review to assess the extent to which these 
plans addressed cyber. As part of that review, we analyzed the 2006 
guidance and identified 30 cyber-related criteria that the critical 
infrastructure sectors were to address in their SSPs. Our analysis of 
the plans found them to be lacking in the cyber area and we 
subsequently recommended[Footnote 3] that DHS request that by September 
2008, the sector agencies update their SSPs to address missing cyber- 
related criteria. DHS agreed with this recommendation, and stated that 
the department had initiated efforts to implement it. However, in 
following up on this recommendation and analyzing the cyber content of 
the sectors' 2008 SSP updates (which was the first objective of this 
report), only 3 of the 17 sectors had updated their plans to address 
missing criteria. 

General item 2: Regarding the section of our report stating that the 
reason sector-specific agencies did not fully address missing cyber 
criteria in their plans was due in part to the fact that they were 
unaware of the cyber criteria shortfalls identified in our 2007 report, 
DHS described several initiatives it had taken to inform the agencies 
of their planning shortfalls. 

GAO response: We recognize that DHS has taken actions to inform the 
agencies of the shortfalls identified in our 2007 report. Accordingly, 
we cited illustrative examples of such actions throughout our report. 
Nonetheless, when we interviewed sector agencies officials, several 
stated that they were unaware of the GAO identified shortfalls, which 
raises questions about the effectiveness of DHS's efforts. 

General item 3: DHS stated that while the SSPs have not been fully 
updated to include ongoing and planned cyber security activities, it 
does not mean there is a lack of cyber security planning in the sectors 
or that the planning to date has been ineffective. DHS also reiterated 
its earlier point that our report does not take into account many of 
its ongoing activities in the sector related to cyber security. In 
addition, the department commented that all the sectors reported on 
their progress in the 2008 annual reports. 

GAO response: We recognize that DHS has had many ongoing efforts 
related to improving the cyber content of SSPs and illustrative 
examples are provided throughout our report. However, the sector- 
specific agencies' limited progress in addressing missing cyber content 
in their SSPs indicates a lack of effectiveness of planning. 
Specifically, of the 17 sector-specific plans, only 9 have been 
updated. Of these 9 updates, just 3 addressed missing cyber criteria, 
and those 3 only involved a relatively small number (3 or less) of the 
criteria in question. In our view, this continuing lack of plans that 
fully address key cyber criteria has reduced the effectiveness of the 
existing sector planning approach and thus increased the risk that the 
nation's cyber assets have not been adequately identified, prioritized, 
and protected. 

Further, while we agree with DHS that the sectors reported aspects of 
progress in the 2008 annual reports, only five sectors updated and 
reported on the extent of progress in carrying out their implementation 
actions as called for by DHS guidance, while the other 12 did not. This 
level of reporting is not sufficient for evaluating sector-wide 
progress and raises concerns about the effectiveness of these annual 
reports as a tool to measure progress. 

General item 4: DHS commented that (1) we expanded the scope of this 
engagement beyond the initial focus on coverage of cyber security in 
the SSPs to encompass the entire sector planning approach and that DHS 
was not asked to provide a broader update on the public-private 
partnership, and (2) our draft report did not include information on 
DHS's numerous ongoing activities with the agencies and sectors related 
to cyber security. 

GAO response: With regard to the first comment, the focus of our 
engagement was on the cyber security aspects of the sector-specific 
plans and progress reporting, which are an important part of the sector 
planning approach. Consequently, even when taking into consideration 
DHS's ongoing activities with the agencies and sectors related to cyber 
security, the planning and reporting shortfalls we identified indicate 
a lack of effectiveness with the current sector approach. 

Regarding DHS's second comment, we recognize that DHS has multiple 
ongoing efforts to improve CIP planning and implementation, and our 
report includes illustrative examples of DHS's efforts to do so. As a 
case in point, on July 27, 2009, we briefed DHS using the presentation 
slides in this report and updated the slides to incorporate examples 
(in addition to the ones we had already included in the briefing) that 
DHS described to us during that meeting. Although DHS has many ongoing 
efforts related to improving the cyber content of SSPs, our analysis 
showed that there had been limited progress in addressing missing cyber 
content in the SSPs since our 2007 recommendation; this indicates to us 
that the planning process lacks effectiveness, which is why we 
recommended that DHS assess whether improvements are needed to the 
current process. 

General item 5: In regard to our report stating that DHS guidance calls 
for the sector agencies to annually review and update as appropriate 
their sector plans, which serve as a means to provide an interim 
snapshot of where agencies stand in addressing their gaps and is why we 
used it as a basis to assess progress, DHS said the SSPs are intended 
to be strategic, three-year plans and are not meant to provide a 
snapshot of where agencies stand in addressing their gaps and should 
not be used as a basis to assess progress in CIP protection. 

GAO response: Our report acknowledges that the SSPs are high-level 
strategic plans and the sector annual reports serve as the primary 
means of assessing progress in improving CIP protection. Specifically, 
as stated in our report, the annual reports are used to, among other 
things, capture changes in sector programs and assess progress made 
against goals set in the SSPs. However, it should be noted that annual 
updates to the SSPs also include information on progress being made 
against SSP goals and as such serve as a source of evidence on where 
agencies stand in addressing their gaps and provide a basis to assess 
progress in CIP protection. Specifically, the 2008 updates we reviewed 
and analyzed included key information on what sector agencies had (or 
had not) done to address missing cyber security content that we 
identified in their 2007 SSPs. 

General item 6: In response to our reporting that most agencies had not 
updated their implementation actions and reported progress in 
implementing them as called for by DHS guidance, DHS commented that 
many of the implementation actions were one-time actions that were 
completed in 2007 or 2008, and that others are of an ongoing, 
continuous nature. The department added that since the vast majority of 
these items were completed, DHS made adjustments in 2009 to the 
reporting process to more accurately capture the progress of CIP 
efforts, and that DHS is now working with the sectors toward the 
development of outcome-based metrics designed to measure the beneficial 
value of activities in mitigating CIP risks. 

GAO response: We recognize that many of the implementation actions were 
one-time or ongoing actions, but DHS's guidance nonetheless called for 
the sectors to update the actions and report on the extent of progress 
in achieving the actions. Further, we agree that DHS has made recent 
positive changes to their reporting processes to more accurately 
capture progress. However, as noted in our report, most sectors had not 
reported in their 2008 sector annual reports that their implementation 
actions were completed, which showed that the existing progress 
reporting process was not totally effective. 

General item 7: In response to our reporting that DHS's lack of follow 
up to address SSP planning shortfalls showed it was not making sector 
planning a priority, the department stated that it (1) is actively 
engaged with the agencies and sectors, (2) assists the sectors with 
planning and reporting on an ongoing basis, and (3) continually 
evaluates and improves these processes with input from the sectors. 

GAO response: We recognize that DHS has multiple ongoing efforts to 
improve CIP planning and implementation, and our report includes 
illustrative examples of DHS's efforts. Despite these efforts, DHS's 
limited progress in addressing missing cyber content in the SSPs since 
our 2007 recommendation and the lack of updated implementation actions 
and progress reporting--coupled with the department's limited follow up 
to correct these conditions--led us to conclude that DHS is not making 
sector planning a priority. 

General item 8: DHS stated that although our report cited the work and 
studies of an expert commission and the President's cybersecurity 
working group, including the issues they raised with the current sector 
planning approach, we did not discuss the reports with the department. 

GAO response: On July 27, 2009, we briefed DHS on our findings, 
conclusions, and recommendations, which included descriptions of the 
work performed by these two groups. Specifically, in advance of our 
meeting, we provided the department with a draft of our briefing 
presentation slides for review and then met to discuss each slide of 
our presentation, including those addressing the work of these two 
expert groups. 

General item 9: In citing our recommendation that calls for DHS to 
collaborate closely with the sector-specific agencies to develop SSPs 
that fully address cyber-related criteria, the department stated this 
collaboration has already begun as part of the department's current 
effort to have the sector agencies update their SSPs for issuance in 
2010. 

GAO response: This effort to collaborate with the agencies is 
consistent with our recommendations. 

As we agreed with your offices, unless you publicly announce the 
contents of this report earlier, we plan no further distribution until 
30 days from the report date. At that time we will send copies of this 
report to interested congressional committees, the Secretary of 
Homeland Security, and other interested parties. We will also make 
copies available to others on request. In addition, the report will be 
available at no charge on the GAO Web site at [hyperlink, 
http://www.gao.gov]. 

Should you or your staff have any questions concerning this report, 
please contact Dave Powner at 202-512-9286 or pownerd@gao.gov. Contact 
points for our Offices of Congressional Relations and Public Affairs 
may be found on the last page of this report. GAO staff who made key 
contributions to this report are listed in appendix III. 

Signed by: 

David A. Powner: 
Director, Information Technology Management Issues: 

[End of section] 

Appendix I: Briefing Provided to Staff, Subcommittee on Emerging 
Threats, Cybersecurity, and Science and Technology, House Committee on 
Homeland Security: 

Critical Infrastructure Protection: Current Cyber Sector-Specific 
Planning Approach Needs Reassessment: 

Briefing to the Staff of the Subcommittee on Emerging Threats, 
Cybersecurity, and Science and Technology: 
House Committee on Homeland Security: 

July 29, 2009: 

Outline of Briefing: 

Introduction; 
Objectives, Scope, and Methodology; 
Results in Brief; 
Background; 
Results: 
* Objective 1; 
* Objective 2; 
Conclusions; 
Recommendations for Executive Action; 
Agency Comments and Our Evaluation; 
Attachment I. 

Introduction: 

The nation's critical infrastructure relies extensively on computerized 
information technology (IT) systems and electronic data. The security 
of those systems and information is essential to the nation’s security, 
economy, and public health and safety. To help address critical 
infrastructure protection, federal policy established a framework for 
public and private sector partnerships and identified 18 critical 
infrastructure sectors (e.g., Banking and Finance; Information 
Technology; Telecommunications; Energy; Agriculture and Food; and 
Commercial Facilities). 

The Department of Homeland Security (DHS) is a key player in these 
partnerships and is responsible for issuing guidance to direct the 
sectors to develop plans addressing how key IT systems and data are to 
be secured, commonly referred to as cyber security. 

In June 2006, DHS issued the National Infrastructure Protection Plan 
(NIPP) as a road map for how DHS and other relevant stakeholders are to 
enhance the protection of critical infrastructure and how they should 
use risk management principles to prioritize protection activities 
within and across the sectors in an integrated, coordinated fashion. 
Lead federal agencies—referred to as sector-specific agencies—are 
responsible for coordinating critical infrastructure protection efforts 
with public and private stakeholders within each sector. For example, 
the Department of Treasury is responsible for the banking and finance 
sector while the Department of Energy is responsible for the energy 
sector. 

Further, the NIPP called for the lead federal agencies to develop 
sector-specific plans and sector annual reports to address how the 
sectors would implement the national plan, including how the security 
of cyber and other (physical) assets and functions was to be improved. 
More specifically, it stated that the: 

* sector plans were to, among other things, describe how the sector 
will identify and prioritize its critical cyber and other assets and 
define approaches to be taken to assess risks and develop programs to 
protect these assets; and; 

* sector annual reports were to provide status and progress on each 
sector’s efforts to carry out the sector plans. 

In response, the sector-specific agencies developed and issued plans 
for their sectors in May 2007. Subsequently, in examining these initial 
plans to determine the extent to which they addressed cyber security, 
we: 

* reported[Footnote 4] in October 2007, that none of the plans fully 
addressed all 30 cyber security-related criteria we identified in DHS 
guidance (in performing that work, we (1) analyzed DHS guidance 
provided to the critical infrastructure sectors that stated how the 
sectors should address cyber topics in their sector-specific plans, (2) 
identified 30 cyber-related criteria, and (3) shared them with 
responsible DHS officials who largely agreed that these were the 
correct criteria to use), and; 

* recommended that DHS request that by September 2008 the sector-
specific agencies’ plans address the cyber-related criteria that were 
only partially addressed or not addressed at all. 

Since then, an expert commission—led by two congressmen and industry 
officials—studied and reported[Footnote 5] in late 2008 on the public-
private partnership approach, including sector planning and other 
aspects of U.S cyber security policy. 

More recently, the President established a White House cyber security 
working group that: 

* conducted and completed a “60-day” review of U.S. cyber policy, 
including public-private partnerships and sector planning, that found 
that while sector and other groups involved in the partnership 
performed valuable work, there were alternative approaches for how the 
federal government could work with the private sector and recommended 
that these options be explored, and; 

* recommended, among other things, establishing a Cybersecurity 
Coordinator’s position within the White House to develop a new U.S. 
cyber policy and to coordinate cyber security efforts across the 
federal government. 

[End of section] 

Objectives, Scope, and Methodology: 

As agreed, our objectives were to: 

* determine the extent to which sector plans have been updated to fully 
address cyber security requirements, and; 

* assess whether these plans and related reports provide for effective 
implementation. 

For the first objective, we met with the sector-specific agencies to 
obtain updates to the May 2007 initial plans issued for the 17[Footnote 
6] critical infrastructure sectors. We then analyzed any updated plans 
using the 30 cyber criteria we identified in DHS guidance on how such 
plans were to be developed. Attachment I shows the 30 criteria 
(organized by eight major reporting sections called for in the DHS 
guidance). In particular, we focused on assessing the cyber criteria 
not fully addressed in the May 2007 plans. 

In analyzing the updated plans against the 30 criteria, we categorized 
the extent to which the plans addressed criteria using the following: 

* fully addressed: the plan specifically addressed the cyber-related 
criteria; 

* partially addressed: the plan addressed parts of the criteria or did 
not clearly address the cyber-related criteria; 

* not addressed: the plan did not specifically address the cyber-
related criteria. 

Further, we also interviewed responsible sector-specific agency 
officials to, among other things, verify our understanding of their 
updated sector plans and to validate the accuracy of our analyses of 
the extent to which additional cyber-related criteria had been 
addressed in them. 

For the second objective, we: 

* identified requirements in DHS guidance that specified how the 
sectors were to update and report on their progress in carrying out 
planned actions—referred to by the department as implementation 
actions, and; 

* compared these requirements to what the sectors had reported in their 
2008 annual reports.[Footnote 7] 

We focused on the implementation actions, because they are important 
for reporting and assessing the progress and effectiveness of the 
sector-specific plans. Where gaps existed, we collaborated with the 
sector officials to obtain any additional information that would 
fulfill the requirements and to determine the cause and impact of any 
remaining gaps. 

We conducted this performance audit from October 2008 to July 2009, in 
accordance with generally accepted government auditing standards. Those 
standards require that we plan and perform the audit to obtain 
sufficient, appropriate evidence to provide a reasonable basis for our 
findings and conclusions based on our audit objectives. We believe that 
the evidence obtained provides a reasonable basis for our findings and 
conclusions based on our audit objectives. 

[End of section] 

Results in Brief: 

Although DHS reported many efforts under way and planned to improve the 
cyber content of sector-specific plans, sector-specific agencies have 
yet to update their respective sector-specific plans to fully address 
key DHS cyber security criteria. For example, of the 17 sector-specific 
plans, only 9 have been updated. Of these 9 updates, just 3 addressed 
missing cyber criteria, and those 3 involved only a relatively small 
number (3 or fewer) of the criteria in question. Sector-specific 
agencies did not fully address missing cyber criteria in their plans in 
large part due to the following: 

* They were focused more on the physical rather than the cyber security 
aspects of the criteria in preparing their plans; 

* They were unaware of the cyber criteria shortfalls identified in 
2007, and; 

* DHS’s guidance on updating sector plans did not specifically request 
the agencies to update the cyber security aspects of their plans. 

Recently DHS issued guidance specifically requesting that the sectors 
address cyber criteria shortfalls in their 2010 sector-specific plan 
updates. However, until the plans are issued, it is not clear whether 
they fully address cyber requirements. This notwithstanding, the 
continuing lack of plans that fully address key cyber criteria has 
reduced the effectiveness of the existing sector planning approach and 
thus increases the risk that the nation’s cyber assets have not been 
adequately identified, prioritized, and protected. 

Most sector-specific agencies developed and identified in their 2006 
sector plans those actions—referred to by DHS as implementation actions—
essential to carrying out the plans; however, since then, most agencies 
have not updated the actions and reported progress in implementing them 
as called for by DHS guidance. Specifically, in response to 2006 
guidance that called for agencies in developing implementation actions 
to address three key elements (e.g., action descriptions, completion 
milestones), most sectors initially developed implementation actions 
that fully addressed the key elements; however, while 2008 guidance 
called for implementation actions to be updated and for sector reports 
to include progress reporting against implementation action milestone 
commitments, only five sectors updated their plans and reported on 
progress against implementation actions. DHS attributed this in part to 
the department not following up and working to ensure that all sector 
plans are fully developed and implemented in accordance with department 
guidance. 

The lack of complete updates and progress reports is further evidence 
that the sector planning process has not been effective and thus leaves 
the nation in the position of not knowing precisely where it stands in 
securing its cyber and other critical infrastructure. Not following up 
to address these conditions also shows DHS is not making sector 
planning a priority. Further, the recent studies by the President’s 
working group and expert commission also identified shortfalls in the 
effectiveness of the current public-private partnership approach and 
related sector planning and offered options for improving the process. 
Given this, it is essential that DHS determine whether the current 
process should continue to be the national approach and thus worthy of 
further investment. 

Accordingly, we are making recommendations to the Secretary of Homeland 
Security, consistent with any direction from the Office of the 
Cybersecurity Coordinator, to assess whether the existing sector-
specific planning processes should continue to be the nation’s approach 
to securing cyber and other critical infrastructure. If the existing 
approach is deemed to be the national approach, we also recommend that 
the Secretary make it an agency priority and manage it accordingly, 
including collaborating closely with other sector-specific agencies to 
develop (1) sector plans that fully address cyber-related criteria and 
(2) sector annual reports that include implementation actions and 
milestones and progress reporting against plan commitments and 
timeline. 

In oral and written comments on a draft of this briefing, DHS 
officials, including the Director of Infrastructure Protection’s 
Partnership and Outreach Division, which is responsible for sector-
specific planning, commented on two areas. Specifically, they stated 
that the sector agencies had made more progress in implementing cyber-
related criteria than reported in our briefing due to other ongoing DHS 
and sector efforts outside the sector plans and sector annual reports 
(implementation actions), which were the focus of the briefing. For 
example, DHS officials said its cyber division works regularly with 
many sectors on cyber assessments, exercises, and information sharing. 
While on the surface these may appear to improve cyber security, the 
officials did not show how these activities helped the agencies address 
missing cyber-related criteria or effectively implement their plans. 
The officials also said that focusing on the agencies’ efforts the year 
after they issued their sector plans is premature as the agencies have 
until 2010 to rewrite and reissue their next sector plans. This 
notwithstanding, DHS’s guidance calls for the sector agencies to 
annually review and update as appropriate their sector plans, which is 
a means to provide an interim snapshot of where agencies stand in 
addressing their gaps and is why we used it as a basis to assess 
progress. 

[End of section] 

Background: 

Consistent with the Homeland Security Act of 2002, Homeland Security 
Presidential Directive-7 identified: 

* DHS as the principal federal agency to lead, integrate, and 
coordinate implementation of efforts to protect critical infrastructure 
and key resources; and; 

* lead federal agencies, referred to as sector-specific agencies, as 
responsible for coordinating critical infrastructure protection efforts 
with the public and private stakeholders in their respective sectors. 

It also required DHS to develop a plan that outlines national goals, 
objectives, milestones, and key initiatives necessary for fulfilling 
its responsibilities for physical and cyber critical infrastructure 
protection. 

In 2006, DHS issued the plan—commonly referred to as the NIPP—which, in 
addition to addressing the above, is to serve as a road map for how DHS 
and other relevant stakeholders are to use risk management principles 
to prioritize protection activities within and across sectors in an 
integrated, coordinated fashion. Further, the NIPP required the lead 
agencies of the 17 critical infrastructure sectors to develop a sector-
specific plan (SSP) to address how the sector’s stakeholders would 
implement the national plan and how each sector would improve the 
security of its assets systems, networks, and functions. 

In addition, as required by the NIPP, the sector-specific agencies are 
to provide updates on sector progress with their SSPs, including 
efforts to identify, prioritize, and coordinate the protection of the 
sector’s critical infrastructure, to DHS on an annual basis. DHS is 
responsible for incorporating these reports into an overall critical 
infrastructure/key resources report, called the National Critical 
Infrastructure/Key Resources Protection Annual Report, which is due to 
the Executive Office of the President by September of each year. 

Sector-specific agencies are to work in coordination with relevant 
government and private-sector representatives to develop and update the 
SSPs. Table 1 shows the designated agency for each sector. 

Table 1: Designated Sector-Specific Agencies: 

Sector-Specific Agency: Department of Agriculture. Food and Drug 
Administration; 
Sector: Agriculture and Food. 

Sector-Specific Agency: Department of Defense; 
Sector: Defense Industrial Base. 

Sector-Specific Agency: Department of Energy; 
Sector: Energy. 

Sector-Specific Agency: Department of Health and Human Services; 
Sector: Public Health and Human Healthcare. 

Sector-Specific Agency: Department of Homeland Security; 
Sector: Chemical; Commercial Facilities; Critical Manufacturing; Dams; 
Emergency Services; Government Facilities; Information Technology; 
Nuclear Reactors, Materials and Waste; Postal and Shipping; 
Telecommunication; Transportation. 

Sector-Specific Agency: Department of the Interior; 
Sector: National Monument and Icons. 

Sector-Specific Agency: Department of the Treasury; 
Sector: Banking and Finance. 

Sector-Specific Agency: Environmental Protection Agency; 
Sector: Water. 

Source: 2009 National Infrastructure Protection Plan. 

[End of table] 

The sector-specific plans are to: 

* describe how the sector will identify and prioritize its critical 
assets, including cyber assets such as networks; 

* identify the approaches the sector will take to assess risks and 
develop programs to manage and mitigate risk; 

* define the security roles and responsibilities of members of the 
sector; and; 

* establish the methods that members will use to interact and share 
information related to the protection of critical infrastructure. 

In addition, the plans are to identify risk management practices to be 
implemented, which could improve the security of the nation’s cyber-
reliant critical infrastructure. They also are to identify the 
approaches the sector will take to protect their critical cyber 
infrastructure. 

In response, the sector-specific agencies developed and issued SSPs for 
their sectors in May 2007. Subsequently, we examined these plans to 
determine the extent to which they addressed cyber security and 
reported[Footnote 8] in October 2007 on the extent to which the sectors 
addressed aspects of cyber security in their plans. Specifically, we 
reported that the results varied in that none of the plans fully 
addressed all 30 cyber security-related criteria. We also reported that 
several plans—including the information technology and 
telecommunications sectors—fully addressed many of the criteria and 
others—such as agriculture and food and commercial facilities—were less 
comprehensive. 

Further, we recommended that DHS request that by September 2008 the 
sector-specific agencies’ plans address the cyber-related criteria that 
were only partially addressed or not addressed at all. In its October 
2007 response to our report, DHS agreed with our recommendation and 
stated it had initiated actions to implement it. 

Since our 2007 report, an expert commission (led by two congressmen and 
industry officials) and a White House working group (established by the 
President) studied and reported[Footnote 9] on the public-private 
partnership approach and related issues such as sector planning as well 
as other aspects of U.S cyber security policy. Specifically, 

* In August 2007, a commission—commonly referred to as the Commission 
on Cybersecurity for the 44th Presidency—was established to examine the 
(1) adequacy of U.S. cyber strategy, including public-private 
partnerships and the sector approach and (2) identify areas for 
improvement. In December 2008, the commission reported, among other 
things, that the current public-private partnership and sector planning 
approach had serious shortcomings such as overlapping roles and 
responsibilities and duplication of effort. The commission made 25 
recommendations aimed at addressing these and other shortfalls with the 
strategy and its implementation. 

* In February 2009, the President directed the National Security 
Council and the Homeland Security Council to conduct a comprehensive 
“60-day review” of all U.S. cyber policies and structures. With regard 
to public-private partnerships, which include sector planning, the 
councils reported in May 2009 that the sector and other groups involved 
in this area performed valuable work but that there was a proliferation 
of plans and recommendations that resulted in government and private 
sector personnel and resources being spread across a multitude of 
organizations engaged in sometimes duplicative or inconsistent efforts. 
The review concluded that there are alternative approaches for how the 
federal government can work with the sectors and recommended that these 
options be explored. At this time, the President also created the 
office of Cybersecurity Coordinator—who is to be part of the White 
House’s National Security Staff and National Economic Council—to, among 
other things, assist in developing a new U.S. cyber policy. The 
Cybersecurity Coordinator position has not yet been filled. 

[End of section] 

Results: Objective 1: 

Sector-Specific Agencies Have Yet to Update Their Respective Sector-
Specific Plans to Fully Address Key Cyber Security Criteria as Called 
for by DHS Guidance: 

In response to our recommendation and as part of ongoing DHS efforts, 
the department initiated multiple efforts to improve the cyber content 
of their SSPs. Examples include the following: 

* February 2008, DHS invited all sectors (and nine accepted) to meet 
with cyber experts within DHS’s National Cyber Security Division to 
support the development of increased cyber content in SSPs. 

* April 2008, DHS issued guidance to agencies on how to report on the 
progress of annual reviews of the SSPs. 

* March 2009, DHS released guidance that specifically requested that 
agencies, as a part of their 2010 SSP rewrites, fully address all cyber-
related weaknesses, including those identified in our October 2007 
report. 

In addition to these efforts, DHS officials from the National Cyber 
Security Division reported that it is engaged in other activities aimed 
at improving, among other things, the cyber content of SSPs. They 
include: 

* working collaboratively with the sectors via a cross-sector working 
group[Footnote 10] to (1) analyze SSPs to identify cyber security-
related gaps, (2) improve information sharing, and (3) develop measures 
to assess sector progress in implementing cyber security efforts; 

* having personnel (from its Control Systems Security Program) lead an 
Industrial Control Systems Joint Working Group to foster information 
sharing and coordination of activities and programs across government 
and private sector stakeholders involved in protecting such control 
systems and assist with development and implementation of sector-
specific control system roadmaps to secure such systems within the 
chemical, dams, nuclear, and water sectors by mitigating 
vulnerabilities; 

* working with the sectors in planning and executing cyber security 
exercises; and; 

* having personnel from its Software Assurance Program work with public 
and private sector partners to develop a process for identifying 
exploitable software before security breaches occur. 

However, despite these steps, only 9 of the 17 SSPs[Footnote 11] have 
been updated while 8 have not.[Footnote 12] 

In addition, of the 9, only 3 have been revised to address missing 
cyber-related criteria, and those changes only involved addressing a 
relatively small number (3 or fewer) of missing criteria. Specifically: 

* In developing the original Chemical sector SSP, DHS had fully or 
partially addressed 29 criteria but did not address 1. The current 
version of the SSP fully addressed 1 of the criteria previously 
assessed as partial. 

* In developing the original Commercial Facilities sector SSP, DHS had 
fully or partially addressed 20 criteria and did not address 10. The 
current version of the SSP fully addressed 1 cyber-related criterion 
that was previously not addressed and partially addressed 1 cyber-
related criterion that was previously not addressed. 

* In developing the original Water sector SSP, the Environmental 
Protection Agency had fully or partially addressed 29 criteria and did 
not address 1. The current version of the SSP fully addressed 1 cyber-
related criterion that was not previously addressed and fully addressed 
2 cyber-related criteria that were previously partially addressed. 

Figure 1 summarizes the extent to which each SSP update addresses the 
30 criteria. 

Figure 1: Sector-Specific Plan Updates: 

[Refer to PDF for image: stacked vertical bar graph] 

Updated with cyber-related criteria: 

Sector: Water; 
Fully addressed: 26; 
Partially addressed: 4; 
Not addressed: 0. 

Sector: Chemical; 
Fully addressed: 24; 
Partially addressed: 5; 
Not addressed: 1. 

Sector: Commercial facilities; 
Fully addressed: 9; 
Partially addressed: 13; 
Not addressed: 8. 

Updated, but without updates to cyber-related criteria: 

Sector: Information technology; 
Fully addressed: 28; 
Partially addressed: 2; 
Not addressed: 0. 

Sector: Telecommunications; 
Fully addressed: 27; 
Partially addressed: 3; 
Not addressed: 0. 

Sector: Nuclear reactors; 
Fully addressed: 23; 
Partially addressed: 6; 
Not addressed: 1. 

Sector: Dams; 
Fully addressed: 23; 
Partially addressed: 6; 
Not addressed: 1. 

Sector: Emergency services; 
Fully addressed: 22; 
Partially addressed: 4; 
Not addressed: 4. 

Sector: Agriculture and food; 
Fully addressed: 10; 
Partially addressed: 10; 
Not addressed: 10. 

Not updates: 

Sector: Public health; 
Fully addressed: 27; 
Partially addressed: 1; 
Not addressed: 2. 

Sector: Energy; 
Fully addressed: 24; 
Partially addressed: 3; 
Not addressed: 3 

Sector: Government facilities; 
Fully addressed: 24; 
Partially addressed: 3; 
Not addressed: 3. 

Sector: Transportation; 
Fully addressed: 22; 
Partially addressed: 6; 
Not addressed: 2. 

Sector: Postal and shipping; 
Fully addressed: 21; 
Partially addressed: 8; 
Not addressed: 1. 

Sector: Banking and finance; 
Fully addressed: 19; 
Partially addressed: 7; 
Not addressed: 4. 

Sector: Defense industrial base; 
Fully addressed: 18; 
Partially addressed: 5; 
Not addressed: 7. 

Sector: National monuments; 
Fully addressed: 17; 
Partially addressed: 8; 
Not addressed: 5. 

Source: GAO analysis of agency data. 

[End of figure] 

The sector-specific agencies did not fully address missing cyber-
related criteria in their SSP updates in large part due to the 
following: 

* Agency officials said that in developing their plans, they were 
focused more on specific (physical) threats to the sector than the 
cyber security aspects. 

* While DHS began efforts to improve the cyber content of SSPs, sector 
agency officials stated that DHS did not make them aware of the 
specific cyber criteria shortfalls we identified and reported on in 
2007. 

* While DHS issued SSP (formatting) guidance in 2008, this guidance did 
not specifically request updates to cyber security aspects of the plans 
or provide other substantive-type direction. 

As previously stated, DHS issued guidance in March 2009 that 
specifically requested that the sectors address cyber criteria 
shortfalls in their 2010 sector-specific plan revisions. However, until 
these plans are issued, it is not clear whether they fully address 
cyber requirements. This notwithstanding, having sector-specific 
agencies continue to have SSPs that do not fully address key cyber 
elements has reduced the effectiveness of the existing sector planning 
approach and thus increases the risk that the nation’s critical cyber 
assets have not been adequately identified, prioritized, and protected. 

[End of section] 

Results: Objective 2: 

Sector Plans and Related Reports Do Not Fully Provide for Effective 
Implementation: 

To provide for effective sector plan implementation, DHS issued 
guidance that called for the sector-specific agencies to provide for 
such activities in their SSPs and sector annual reports. 

Specifically, with regard to the SSPs, the department issued March 2006 
guidance directing the sector-specific agencies to develop and 
incorporate in their SSPs actions and activities—referred to as 
implementation actions—essential to carrying out the plans and 
achieving the goal of securing the sectors’ cyber and other assets. 
According to the guidance, implementation actions are to include (1) a 
description of the actions necessary to implement the plan, (2) 
milestones for when the actions are to be accomplished, and (3) the 
parties responsible for managing and overseeing action execution. 
Developing and updating implementation actions, including milestones, 
and responsible parties, is important for reporting and assessing the 
progress and effectiveness of the sector-specific plans. 

With regard to sector annual reports, the department issued guidance in 
March 2008 that called for sector-specific agencies (in their 2008 
annual reports to be issued later in 2008) to: 

(1) update implementation actions,[Footnote 13] and; 

(2) report on the extent of progress in achieving the actions. 

Of the 17[Footnote 14] SSPs developed in response to DHS’s guidance, 

* 14 included implementation actions that addressed all three elements: 
- Banking and Finance, 
- Chemical, 
- Commercial Facilities, 
- Dams, 
- Defense Industrial Base, 
- Emergency Services, 
- Government Facilities, 
- Information Technology, 
- National Monuments and Icons, 
- Nuclear Reactors, 
- Public Health and Healthcare,
- Telecommunications, 
- Transportation, and; 
- Water. 

* 2 included implementation actions but each only partially addressed 
the three elements: 
- Energy, and; 
- Postal and Shipping. 

Of these sectors’ plans, all identified actions and milestones critical 
to implementation of the plan but did not identify the parties 
responsible for the specified actions. 

* 1 did not include implementation actions: 
- Agriculture and Food. 

In addition, with regard to sector annual reporting, 

* 5 sectors updated and reported on the extent of progress in carrying 
out their implementation actions, while the other 12 did not.[Footnote 
15] Those that did were: 
- Dams, 
- Information Technology, 
- National Monuments and Icons,
- Nuclear Reactors,13 and; 
- Water. 

Those that did not were: 
- Agriculture and Food, 
- Banking and Finance, 
- Chemical, 
- Commercial Facilities, 
- Defense Industrial Base, 
- Emergency Services, 
- Energy, 
- Government Facilities, 
- Postal and Shipping, 
- Public Health and Healthcare, 
- Telecommunications, and, 
- Transportation. 

Figure 2 shows by sector, each sector’s progress in developing and 
updating actions for effective implementation. 

Figure 2: Sector Progress in Developing and Updating Implementation 
Actions: 

[Refer to PDF for image: table] 

Sector-Specific Plans: Elements fully addressed; 
Banking & Finance: 
Chemical: 
Commercial Facilities: 
Dams: 
Defense Industrial Base: 
Emergency Services: 
Government Facilities: 
Information Technology: 
National Monuments & Icons: 
Nuclear Reactors: 
Public Health & Healthcare: 
Telecommunications: 
Transportation: 
Water: 

Sector-Specific Plans: Elements partially addressed; 
Energy: 
Postal and Shipping: 

Sector-Specific Plans: No implementation actions; 
Agriculture & Food: 

2008 Annual Reports: Implementation actions updated; 
Dams: 
Information Technology: 
National Monuments & Icons: 
Nuclear Reactors: 
Water: 

Source: GAO analysis of agency data. 

[End of figure] 

In addition to these implementation actions, the sectors were to report 
on sector goals and priorities, sector programs, sector coordination, 
research and development progress and gaps, funding priorities, sector 
security practices, and overall progress of critical infrastructure 
protection efforts. However, these areas, including overall progress, 
did not specifically address implementation progress with the sector-
specific plan. For example, the energy sector reported on, among other 
things, progress with communicating with sector partners, protecting 
international energy assets, and collaborations with the Department of 
Homeland Security. In addition, the communications sector reported on, 
among other things, progress to narrow key gaps identified in the 
sector’s 2007 report, and progress with key programs. Despite this, the 
reporting was not sufficient for evaluating either sector-wide progress 
with sector-specific plans, or the effectiveness of these plans. 

The incomplete implementation updates and progress reports are due in 
part to DHS not following up and working to ensure that all sector 
plans were fully developed and implemented in accordance with 
departmental guidance. Specifically, although DHS issued periodic 
sector-planning guidance, periodically met with sectors officials, and 
conducted other planning-related activities as discussed above, 
department officials said their follow-up and oversight of the sector 
plans did not always result in the sectors developing plans that fully 
meet DHS guidance. These officials said this occurs due to the fact 
that as part of DHS’s partnership with the private sector, the parties 
do not always agree on the extent to which DHS guidance is to be 
addressed in performing sector planning activities. Consistent with 
this, our past cyber critical infrastructure protection research and 
extensive experience[Footnote 17] at the sector agencies and their 
private sector counterparts have shown that the public-private 
partnership is indeed challenging to manage. That research and work 
also pointed out that DHS nonetheless has a leadership role and 
responsibility to make sure (1) the partnership works effectively and 
(2) the sectors plan for and implement efforts aimed at protecting the 
nation’s cyber and other critical infrastructure, including ensuring 
the current sector approach is still worth pursuing and considering, 
where appropriate, alternative approaches. 

More recently (in early 2009), DHS issued 2009 sector annual report 
guidance that called for the development of metrics and other 
implementation-related actions to, among other things, better measure 
progress, identify problems, and improve SSP implementation. According 
to responsible DHS officials, the 2009 sector reports have been drafted 
and provided to the department for review with the goal of 
incorporating a summary of these reports in DHS’s national critical 
infrastructure protection annual report to the President by September 
1, 2009. However, until DHS improves its follow-up and oversight of 
sector planning, effectively addresses the above-mentioned challenges 
of the public-private partnership, and finalizes the plans, there is 
increased risk that the 2009 plans will suffer from the same shortfalls 
as the preceding plans with the result being that sector-specific 
agencies will not fully and effectively report their progress in 
implementing their SSPs. Moreover, the incomplete implementation 
updates and progress reports are further evidence that the sector 
planning process has not been effective. 

Shortfalls with Current Public-Private Partnership Approach and Related 
Sector Planning Highlighted in Recent Studies by Expert Commission and 
Presidential Working Group: 

In addition to the above briefing results, the recent reports by the 
Commission on Cybersecurity for the 44th Presidency and President’s 60-
day review also identified shortfalls with the current public-private 
partnership approach and relating sector planning, that show such 
planning is not effective. To address the shortfalls, the commission 
and presidential review identified options to be considered as means to 
improving sector planning. Examples include: 

* The cyber security commission recommended simplifying the sector 
approach by prioritizing sectors in order to focus planning and other 
activities on the most important sectors—which it identified as Energy, 
Finance, Information Technology, and Communications—with the most 
important cyber assets. 

* The President’s review identified a number of models of effective 
public-private partnership and planning (e.g., the processes and 
structures used by the United Kingdom) and suggested that the positive 
attributes of these models be applied to the sector agencies and 
related organizations. It also recommended streamlining existing sector 
and others organizations involved in the partnerships to optimize their 
capacity to identify priorities and develop response plans. 

[End of section] 

Conclusions: 

Although DHS reported many efforts under way and planned to improve the 
cyber content of sector-specific plans, the sector-specific agencies 
have made limited progress in updating their sector plans to fully 
address key cyber elements. Further, although the agencies produce 
extensive reports on sector activities, they have not developed 
effective implementation actions and reported on whether progress is 
being made in implementing their sector plans. This means that as a 
nation, we do not know precisely where we are in implementing sector 
plans and associated protective measures designed to secure and protect 
the nation’s cyber and other critical infrastructure, despite having 
invested many years in this effort. This condition is due in part to 
DHS not making sector planning a priority and as such, not managing it 
in a way that fully meets DHS guidance. These conclusions, taken as a 
whole, further raise fundamental questions about whether the current 
approach to sector planning is worthwhile and whether there are options 
that would provide better results. Consequently, it is essential that 
federal cyber security leaders—including DHS and the to-be-appointed 
Cybersecurity Coordinator—exert their leadership role in this area by, 
among other things, determining whether it is worthwhile to continue 
with the current approach as implemented or consider if proposed 
options provide more effective results. To do less means the nation’s 
critical infrastructure sectors will continue to be at risk of not 
being able to adequately protect their cyber and other critical assets 
or be prepared to identify and respond to cyber threats and 
vulnerabilities. 

[End of section] 

Recommendations for Executive Action: 

Accordingly, we recommend that the Secretary of Homeland Security, 
consistent with any direction from the Office of the Cybersecurity 
Coordinator, assess whether the existing sector-specific planning 
processes should continue to be the nation’s approach to securing cyber 
and other critical infrastructure and, in doing so, consider whether 
proposed and other options would provide more effective results. If the 
existing approach is deemed to be the national approach, we also 
recommend that the Secretary make it, including the cyber aspects, an 
agency priority and manage it accordingly. This should include 
collaborating closely with other sector-specific agencies to develop: 

* sector-specific plans that fully address cyber-related criteria in 
the next release of the plans, and; 

* sector annual reports that (1) include updated implementation actions 
and associated milestones and (2) report progress against plan 
commitments and timelines. 

[End of section] 

Agency Comments and Our Evaluation: 

In oral and written comments on a draft of this briefing, the Director 
of Infrastructure Protection’s Partnership and Outreach Division and 
other department officials commented on the following two areas: 

* First, they stated that they believed that the sector agencies had 
made more progress in implementing cyber-related criteria than reported 
in our briefing due to other ongoing DHS and sector efforts outside the 
SSPs and sector annual reports (implementation actions), which were the 
focus of the briefing. For example, DHS officials said its National 
Cyber Security Division works regularly with many sectors on cyber 
assessments, exercises, and information sharing. In addition, DHS cites 
two cross-sector cyber working groups that play an important role in 
advancing cyber security. While these and the other examples provided 
by DHS on the surface appear to improve cyber security, DHS officials 
did not show how these activities helped the agencies address missing 
cyber-related criteria in their SSPs or effectively implement their 
plans. 

* Second, the officials stated that focusing on the agencies’ efforts 
the year after they issued their sector plans is premature as the 
agencies have until 2010 to rewrite and reissue their next sector 
plans. While the NIPP calls for the next SSPs to be issued in 2010, it 
also calls for the sector-specific agencies to annually review and 
update as appropriate their SSPs, which is a means to provide an 
interim snapshot of where agencies stand in addressing their gaps and 
is why we used it as a basis to assess agency progress. 

DHS officials also provided technical comments, which we have 
incorporated into the briefing as appropriate. 

[End of section] 

Attachment I: Scope and Methodology: 

Attachment I: DHS’s Cyber Criteria Organized by Major Reporting 
Sections: 

Section 1: Sector Profile and Goals: 
* Characterizes cyber aspects; 
* Identifies stakeholder relationships for securing cyber assets. 

Section 2: Identify Assets, Systems, Networks, and Functions: 
* Describes process to identify cyber assets, functions, or elements; 
* Describes process to identify cyber dependencies/independences. 

Section 3: Assess Risks: 
* Describes how the risk assessment process addresses cyber elements; 
* Describes a screening process for cyber aspects; 
* Describes methodology to identify potential consequences of cyber 
attacks; 
* Describes methodology for vulnerability assessments of cyber aspects; 
* Describes methodology for threat analyses of cyber aspects; 
* Describes incentives to encourage voluntary vulnerability 
assessments. 

Section 4: Prioritizing Infrastructure: 
* Identifies entity responsible for prioritization of cyber aspects; 
* Describes criteria and basis for prioritization of cyber aspects. 

Section 5: Develop and Implement Protective Programs: 
* Describes process to develop long-term protective plans for cyber 
aspects; 
* Describes process to identify specific cyber-related program needs; 
* Identifies programs to deter, respond, and recover from cyber attack; 
* Addresses implementation and maintenance of protective programs. 

Section 6: Measure Progress: 
* Ensures that integration of cyber metrics is part of measurement 
process; 
* Describes how cyber metrics will be reported to DHS
* Includes developing and using cyber metrics to measure progress; 
* Describes how to use metrics to guide future cyber projects. 

Section 7: Critical Infrastructure Protection Research and Development 
(R&D): 
* Describes how technology developments are related to the sector’s 
cyber goals; 
* Describes process to identify cyber security technology requirements; 
* Describes process to solicit information on ongoing cyber R&D 
initiatives; 
* Identifies existing cyber-related projects that support goals and 
identifies gaps; 
* Identifies R&D governance structure. 

Section 8: Managing Sector-Specific Agency Responsibilities: 
* Describes sector-specific agency’s management of NIPP 
responsibilities; 
* Describes process for updating, reporting, budgeting, and training; 
* Describes sector’s coordination structure; 
* Describes process for investment priorities; 
* Describes process for cyber-related information sharing. 

Source: GAO analysis of DHS’s SSP guidance. 

[End of attachment] 

Appendix II: Comments from the Department of Homeland Security: 

U.S. Department of Homeland Security: 
Washington, DC 20528: 

September 11, 2009: 
	
Mr. David A. Powner: 
Director, Information Technology Management Issues: 
U.S. Government Accountability Office: 
441 G Street, NW: 
Washington, D.C. 20548: 

Dear Mr. Powner: 

RE: Draft Report GAO 09-969 (Reference # 310891) Critical 
Infrastructure Protection: Current Cyber Sector-Specific Planning 
Approach Needs Reassessment: 

Thank you for the opportunity to review the draft report concerning 
critical infrastructure protection. In addition to responding to the 
recommendations in the Government Accountability Office's (GAO's) draft 
report, we are providing general comments that address what we believe 
are errors, misinterpretations, and incorrect conclusions contained in 
the text of the report and the appendix. 

Recommendation: "GAO recommends the Secretary of DHS, consistent with 
any direction from the Office of Cybersecurity Coordinator, assess 
whether existing sector-specific planning processes should continue to 
be the nation's approach to securing cyber and other critical 
infrastructure and, in doing so, consider whether proposed or other 
options would provide more effective results. 

If the existing approach is deemed to be the national approach, we also 
recommend that the Secretary make it, including the cyber aspects, an 
agency priority and manage it accordingly. This should include 
collaborating closely with other sector-specific agencies to develop: 

* sector-specific plans that fully address cyber-related criteria in 
the next release of the plans, and, 

* sector annual reports that (1) include updated implementation actions 
and associated milestones and (2) report progress against plan 
commitments and timelines." 

Response: The Department of Homeland Security (DHS) supports the 
ongoing assessment and improvement of the sector planning approach. DHS 
continually assesses the effectiveness of this approach and identifies 
and implements improvements. However, DHS does not concur with some of 
the conclusions stated in the draft report, which form the basis
for GAO's recommendations (see below) and which relate to updates to 
Sector-Specific Plans (SSPs) and implementation actions in the Sector 
Annual Reports. The draft report does not give due consideration to 
many of the ongoing sector and cross-sector cybersecurity activities 
identified in the annual reports and briefed to GAO. 

If the recommendation is intended to suggest that there is a binary 
choice between continuing the existing sector-specific planning 
approach and other options, DHS disagrees; actions such as 
prioritization of efforts with or among sectors and use of supplemental 
approaches (for example, certain planning requirements relevant to 
cybersecurity are mandatory for parts of the chemical sector) can move 
forward in parallel with ongoing sector-planning activity. And as 
stated above, DHS believes we must continue to refine our work with the 
private sector regarding cybersecurity to enhance the effectiveness of 
our partnerships. As stated in the Cyberspace Policy Review: 

Partnerships must evolve to clearly define the nature of the 
relationship, the roles and responsibilities of various groups and 
their participants, the expectations of each party's contribution, and 
accountability mechanisms. The Federal government should streamline, 
align, and provide resources to existing organizations to optimize 
their capacity to identify priorities, enable more efficient execution, 
and develop response and recovery plans. 

The efforts of DHS, and of the Federal government, to implement this 
recommendation are ongoing. 

Finally, as discussed in General Item 5 of our comments, the report 
confuses elements of the planning and reporting processes under the 
National Infrastructure Protection Plan (NIPP), leading to inaccurate 
conclusions. 

General Comments: 

General Item: 1; Page: 3: 

Issue: "Sector-Specific Agencies have yet to update their respective 
Sector-Specific Plans to fully address key cybersecurity criteria as 
called for by DHS guidance." 

DHS Statement: The risk management framework outlined in the 2006 NIPP 
established the process for combining consequence, vulnerability, and 
threat information to produce a comprehensive and systematic assessment 
of national and sector-specific risk that drives Critical 
Infrastructure and Key Resources (CIKR) protection activities. At each 
step of the risk management framework, the physical, cyber, and human 
elements of CIKR are considered. The 2006 guidance for developing the 
SSPs was based on this NIPP risk management framework and its 
consideration of all three elements of CIKR. The 2006 SSP guidance did 
not call for the cyber element to be addressed separately in each 
section of the SSP; GAO had not identified the 30 cybersecurity 
criteria at that time. The GAO's 30 cybersecurity criteria were 
therefore not fully addressed in the 2007 SSPs; however, the physical, 
cyber, and human elements of CIKR were considered and addressed by each 
of the individual sectors, in accordance with DHS guidance. 

In accordance with the NIPP, the NIPP and the SSPs are reviewed on an 
annual basis for currency and continued relevance to all CIKR partners. 
The sectors issue SSP Updates as deemed necessary based on the annual 
review of their SSPs. Nine Sector-Specific Agencies (SSAs) issued 2008 
Updates to their SSPs. In 2008, DHS also conducted a comprehensive 
triennial review and update of the NIPP. Released in early 2009, the 
revised NIPP captures the evolution and maturation of the processes and 
programs first outlined in 2006, including more robust coverage of 
cybersecurity, based on the 30 cyber criteria identified by GAO. 

The SSAs are currently conducting a comprehensive triennial review and 
rewrite of their SSPs for reissue in 2010. DHS' guidance for the 2010 
SSP rewrites is based on the updated 2009 NIPP and incorporates GAO's 
cyber criteria. The 2010 SSPs will address cybersecurity more 
completely based on DHS guidance and a prioritization of risk within 
each sector. 

General Item: 2; Page: 4: 

Issue Summary: Sector-specific agencies did not fully address missing 
cyber criteria in their plans in part because "they were unaware of the 
cyber criteria shortfalls identified in 2007." 

DHS Statement: DHS approached SSAs through multiple avenues to bring 
the 2007 GAO report to their attention. The National Cyber Security 
Division (NCSD) invited the SSAs to meet with subject-matter experts 
regarding their SSPs and Sector Annual Reports. The agenda for the 
initial meetings included discussion of the 2007 GAO findings, hi 
addition, NCSD worked collaboratively with public and private partners 
from the sectors through the Cross-Sector Cyber Security Working Group 
(CSCSWG) to assist them in analyzing and identifying gaps in their 
respective SSPs and Sector Annual Reports. 

General Item: 3; Page: 4: 

Issue: "The lack of complete updates and progress reports are further 
evidence that the sector planning process has not been effective and 
thus leaves the Nation in a position of not knowing precisely where we 
stand in securing cyber critical infrastructures." 

DHS Statement: The fact that all the SSPs have not been fully updated 
yet to include ongoing and planned cybersecurity activities does not 
correlate to a lack of cybersecurity planning and activities in the 
sectors or to the lack of effectiveness of planning, nor has GAO 
demonstrated this correlation in the draft report. The report also does 
not take into account the many ongoing activities in the sectors 
related to cybersecurity. These activities are described below. 
Additionally, all the sectors reported on their CIKR protection 
progress in the 2008 Sector Annual Reports. 

General Item: 4; Page: 5: 

Issue: "Although DHS reported many efforts underway and planned to 
improve the cyber content of sector-specific plans, sector-specific 
agencies have yet to update their plans to fully address key DHS 
cybersecurity criteria. The continuing lack of plans that fully address 
key cyber criteria has reduced the effectiveness of the existing sector 
planning approach." 

DHS Statement: GAO expanded the scope of this engagement beyond the 
initial focus on coverage of cybersecurity in the SSPs to encompass the 
entire sector planning approach. DHS was not asked to provide a broader 
update on the NIPP public-private partnership, and the draft report 
does not include information previously provided by DHS on the numerous 
ongoing partnership activities specifically related to cybersecurity, 
such as: 

* The CSCSWG, co-chaired by NCSD and private-sector representatives, 
meets on a monthly basis to address a broad range of cyber-related 
issues in addition to the SSPs and Sector Annual Reports. The CSCSWG 
includes public- and private-sector partners with cybersecurity 
expertise from the CIKR sectors and their SSAs. NCSD's Critical 
Infrastructure Protection Cybersecurity Program is providing 
cybersecurity expertise in support of an initiative within the CSCSWG 
to develop cybersecurity measures for all 18 CIKR sectors. 

* NCSD provides assistance to the Transportation, Critical 
Manufacturing, Commercial Facilities, Chemical, Banking & Finance, and 
Defense Industrial Base (DIB) Sectors and their SSAs in support of the 
sectors' broader cybersecurity activities, including risk management 
(e.g., the DIB Sector's Cybersecurity Task Force). 

* NCSD's Control Systems Security Program leads the Industrial Control 
Systems Joint Working Group (ICSJWG) to foster information sharing and 
coordination of activities and programs across government and private-
sector stakeholders involved in protecting CIKR. The ICSJWG is a 
collaborative coordinating body that provides a vehicle for 
communicating and partnering between Federal agencies and private asset 
owner/operators of industrial control systems. 

* NCSD manages the United States Computer Emergency Readiness Team (US-
CERT), which has monthly situational awareness conference calls with 
the Information Technology Information Sharing and Analysis Center 
(ISAC), Financial Services ISAC, Multi-State ISAC, and members of the 
Chemical Sector, through the NIPP partnership framework. 

* During significant events, US-CERT holds conference calls with the 
private sector regarding recent threats and vulnerabilities and 
associated mitigation activities through the CSCSWG and ISAC Council 
distribution. 

Additionally, during the week of August 24, 2009, a public-private risk 
assessment of the Information Technology Sector was issued jointly by 
the IT Sector Coordinating Council and Government Coordinating Council. 
The Energy Sector recently completed work on a joint public-private 
Control Systems Roadmap Update, which it plans to issue in the next few 
months. The framework of trusted relationships built through the NIPP 
sector partnership is essential to the development of these joint 
products. The partnership framework continues to evolve and improve, 
using shared lessons learned across and between all sectors. 

General Item: 5; Appendix I, slide 14: 

Issue: "DHS guidance calls for the sector agencies to annually review 
and update as appropriate their sector plans, which is a means to 
provide an interim snapshot of where agencies stand in addressing their 
gaps and is why we used it as a basis to assess progress."
DHS Statement: The SSP is a strategic, three-year plan and is not meant 
to provide a snapshot of where agencies stand in addressing their gaps, 
nor should it be used as a basis to assess progress in CIKR protection. 
The Sector Annual Report serves these purposes. The NIPP calls for the 
sector-specific agencies to review their SSPs on an annual basis and 
issue updates, as needed, to capture changes in sector programs and 
processes and maintain currency for all sector partners. 

General Item: 6; Page: 4: 

Issue: "Most sector-specific agencies developed and identified in their 
2007 sector plans those actions—referred to by DHS as implementation 
actions—essential to carrying out the plans; however, since then, most 
agencies have not updated the actions and reported progress in 
implementing them as called for by DHS guidance." 

DHS Statement: Implementation actions were identified in DHS' 2006 SSP 
guidance for the development of the 2007 SSPs; many of the 
implementation actions were one-time actions that were completed in 
2007 or 2008. Others are of an ongoing, continuous nature. In 2008, 
sectors were asked to review these items and incorporate new and 
ongoing activities for which progress could be measured. All the 
sectors reported on their CIKR protection progress in the 2008 Sector 
Annual Reports; however only some included actual implementation action 
matrices. Since the vast majority of these items were completed, DHS 
made adjustments in 2009 to the reporting process to better reflect the 
maturation of the sectors and more accurately capture the progress of 
CIKR protection efforts. DHS is now working with the sectors toward the 
development of outcome metrics designed to measure the beneficial value 
of activities in mitigating risks to CIKR. 

General Item: 7; Page: 5: 

Issue: "Not following up to address these conditions also shows DHS is 
not making sector planning a priority." 

DHS Statement: DHS is actively engaged with the SSAs and sectors 
regarding the implementation of the NIPP. DHS assists the sectors with 
planning and reporting on an ongoing basis and continually evaluates 
and improves these processes, with input from the sectors. 

General Item: 8; Pages: 2, 3; Appendix I, slide 39: 

Issue Summary: An expert commission and the President's cybersecurity 
working group conducted studies on cybersecurity and the public-private 
partnership; both studies identified issues with the current sector 
planning approach. 

DHS Statement: GAO did not discuss or reference these studies with DHS' 
Office of Infrastructure Protection. 

General Item: 9; Page: 6: 

Issue: "This should include collaborating closely with other sector-
specific agencies to develop sector-specific plans that fully address 
cyber-related criteria in the next release of the plans." 

DRS Statement: This effort is well underway as part of the ongoing 
rewrite of the SSPs for reissuance in 2010. 

Again, thank you for the opportunity to comment on this Draft Report 
and we look forward to working with you on future homeland security 
issues. 

Sincerely, 

Signed by: 

Jacqueline L. Lacasse, for: 

Jerald E. Levine: 
Director: 
Departmental GAO/OIG Liaison Office: 

[End of section] 

Appendix III: GAO Contact and Staff Acknowledgments: 

GAO Contact: 

David A. Powner at (202) 512-9286 or pownerd@gao.gov: 

Staff Acknowledgments: 

In addition to the contact named above, the following staff also made 
key contributions to this report: Gary Mountjoy, Assistant Director; 
Scott Borre; Rebecca Eyler; Lori Martinez; and Teresa Smith. 

[End of section] 

Footnotes: 

[1] GAO, Critical Infrastructure Protection: Sector-Specific Plans/ 
Coverage of Key Cyber Security Elements Varies. [hyperlink, 
http://www.gao.gov/products/GAO-08-113] (Washington, D.C.: Oct. 31, 
2007). 

[2] Currently, there are 18 sectors; however, one sector (critical 
manufacturing) was established in 2008 and has not yet completed a 
sector-specific plan. 

[3] [hyperlink, http://www.gao.gov/products/GAO-08-113]. 

[4] GAO, Critical Infrastructure Protection: Sector-Specific Plans/ 
Coverage of Key Cyber Security Elements Varies, [hyperlink, 
http://www.gao.gov/products/GAO-08-113] (Washington, D.C.: Oct. 31, 
2007). 

[5] Center for Strategic and International Studies, Securing Cyberspace 
for the 44th Presidency, A Report of the CSIS Commission on 
Cybersecurity for the 44th Presidency (Washington, D.C., December 
2008); and The White House, Cyberspace Policy Review: Assuring a 
Trusted and Resilient Information and Communications Infrastructure 
(Washington, D.C., May 29, 2009). 

[6] Currently, there are 18 sectors; however, the critical 
manufacturing sector was established in 2008 and has not yet completed 
a sector-specific plan. 

[7] The critical manufacturing sector did not have any annual reports. 

[8] GAO, Critical Infrastructure Protection: Sector-Specific Plans/ 
Coverage of Key Cyber Security Elements Varies, [hyperlink, 
http://www.gao.gov/products/GAO-08-113] (Washington, D.C.: Oct. 31, 
2007). 

[9] Center for Strategic and International Studies, Securing Cyberspace 
for the 44th Presidency, A Report of the CSIS Commission on 
Cybersecurity for the 44th Presidency (Washington, D.C., December 
2008); and The White House, Cyberspace Policy Review: Assuring a 
Trusted and Resilient Information and Communications Infrastructure 
(Washington, D.C., May 29, 2009). 

[10] The group is called the Cross-Sector Cyber Security Working Group. 
It is co-chaired by DHS (National Cyber Security Division) and private 
sector partners. The group meets monthly and includes public and 
private sector security partners with cyber security expertise from 
each of the sectors. 

[11] Our analysis includes 17 of the 18 sectors, as the Critical 
Manufacturing sector was established in 2008 and has not yet finished 
its sector-specific plan. 

[12] While the NIPP requires SSPs to be revised and reissued every 
three years, it also calls for the sector-specific agencies to annually 
review and update as appropriate their SSPs to reflect progress on 
actions planned and under way. The guidance allows agencies the option 
to report progress via an updated plan, a list of updates, or in the 
case there is no progress to report, a memorandum of no action. These 8 
were memorandum of no action. 

[13] In the 2008 guidance, DHS refers to these actions as an 
implementation matrix. 

[14] Currently, there are 18 sectors; however, the critical 
manufacturing sector was established in 2008 and has not yet completed 
a sector-specific plan. 

[15] The Critical Manufacturing sector was not requested to develop an 
annual report, as the sector was established in early 2008. 

[16] Implementation actions were updated in one area covered under the 
Nuclear Reactors sector. 

[17] See, for example, GAO, Critical Infrastructure Protection: 
Department of Homeland Security Faces Challenges in Fulfilling 
Cybersecurity Responsibilities, [hyperlink, 
http://www.gao.gov/products/GAO-05-434], (Washington, DC.: May 26, 
2005); and Critical Infrastructure Protection: Progress Coordinating 
Government and Private Sector Efforts Varies by Sectors' 
Characteristics, [hyperlink, http://www.gao.gov/products/GAO-07-39], 
(Washington, DC.: Oct. 16, 2006). 

[End of section] 

GAO's Mission: 

The Government Accountability Office, the audit, evaluation and 
investigative arm of Congress, exists to support Congress in meeting 
its constitutional responsibilities and to help improve the performance 
and accountability of the federal government for the American people. 
GAO examines the use of public funds; evaluates federal programs and 
policies; and provides analyses, recommendations, and other assistance 
to help Congress make informed oversight, policy, and funding 
decisions. GAO's commitment to good government is reflected in its core 
values of accountability, integrity, and reliability. 

Obtaining Copies of GAO Reports and Testimony: 

The fastest and easiest way to obtain copies of GAO documents at no 
cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each 
weekday, GAO posts newly released reports, testimony, and 
correspondence on its Web site. To have GAO e-mail you a list of newly 
posted products every afternoon, go to [hyperlink, http://www.gao.gov] 
and select "E-mail Updates." 

Order by Phone: 

The price of each GAO publication reflects GAO’s actual cost of
production and distribution and depends on the number of pages in the
publication and whether the publication is printed in color or black and
white. Pricing and ordering information is posted on GAO’s Web site, 
[hyperlink, http://www.gao.gov/ordering.htm]. 

Place orders by calling (202) 512-6000, toll free (866) 801-7077, or
TDD (202) 512-2537. 

Orders may be paid for using American Express, Discover Card,
MasterCard, Visa, check, or money order. Call for additional 
information. 

To Report Fraud, Waste, and Abuse in Federal Programs: 

Contact: 

Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]: 
E-mail: fraudnet@gao.gov: 
Automated answering system: (800) 424-5454 or (202) 512-7470: 

Congressional Relations: 

Ralph Dawn, Managing Director, dawnr@gao.gov: 
(202) 512-4400: 
U.S. Government Accountability Office: 
441 G Street NW, Room 7125: 
Washington, D.C. 20548: 

Public Affairs: 

Chuck Young, Managing Director, youngc1@gao.gov: 
(202) 512-4800: 
U.S. Government Accountability Office: 
441 G Street NW, Room 7149: 
Washington, D.C. 20548: