Skip to main content

Critical Infrastructure Protection: CISA Should Improve Priority Setting, Stakeholder Involvement, and Threat Information Sharing

GAO-22-104279 Published: Mar 01, 2022. Publicly Released: Mar 01, 2022.

Fast Facts

The National Critical Infrastructure Prioritization Program is intended to identify the critical infrastructure assets in most need of protection.

Nearly all federal and state officials we spoke with questioned the program's relevance and usefulness. For example, they said it doesn't consider the most prevalent infrastructure threats, such as cyberattacks.

CISA (the agency running the program) has started shifting its focus from simply protecting a set of critical assets to improving the resilience of critical functions—e.g., supplying water. But, it could do more to communicate this shift.

Our recommendations address this and other issues.

Chemical Facility Storage Tanks

storage tanks

Skip to Highlights

Highlights

What GAO Found

Through the National Critical Infrastructure Prioritization Program, the Cybersecurity and Infrastructure Security Agency (CISA) is to identify a list of systems and assets that, if destroyed or disrupted, would cause national or regional catastrophic effects. Consistent with the Implementing Recommendations of the 9/11 Commission Act of 2007, the program works to annually update and prioritize the list. The program's list is used to inform the awarding of preparedness grants to states. However, nine of 12 CISA officials and all 10 of the infrastructure stakeholders GAO interviewed questioned the relevance and usefulness of the program. For example, stakeholders identified cyberattacks as among the most prevalent threats they faced but said that the program's list was not reflective of this threat. Further, according to CISA data, since fiscal year 2017, no more than 14 states (of 56 states and territories) provided updates to the program in any given fiscal year. Ensuring that its process for determining priorities reflects current threats, such as cyberattacks, and incorporates input from additional states would give CISA greater assurance that it and stakeholders are focused on the highest priorities.

In 2019, CISA published a set of 55 critical functions of government and the private sector considered vital to the security, economy, and public health and safety of the nation. According to CISA officials, this new National Critical Functions framework is intended to better assess how failures in key systems, assets, components, and technologies may cascade across the 16 critical infrastructure sectors. Examples of critical functions are shown below in CISA's four broad categories of “connect” (nine of the 55 functions), “distribute” (nine), “manage” (24), and “supply” (13).

Examples of Cybersecurity and Infrastructure Security Agency (CISA) National Critical Functions

Examples of Cybersecurity and Infrastructure Security Agency (CISA) National Critical Functions

CISA is currently carrying out a process to break down each of the 55 national critical functions (such as “supply water”) into systems (such as “public water systems”) and assets (including infrastructure such as “water treatment plants”), as illustrated below.

Examples of Critical Infrastructure Systems and Assets That Support the National Critical Function “Supply Water”

Examples of Cybersecurity and Infrastructure Security Agency (CISA) National Critical Functions

CISA plans to integrate the National Critical Functions framework into broader prioritization and risk management efforts, and has already used it to inform key agency actions. For example, CISA used the framework to analyze the impact of COVID-19 on critical infrastructure. Although CISA initiated the functions framework in 2019, most of the federal and nonfederal critical infrastructure stakeholders that GAO interviewed reported being generally uninvolved with, unaware of, or not understanding the goals of the framework. Specifically, stakeholders did not understand how the framework related to prioritizing infrastructure, how it affected planning and operations, or where their particular organizations fell within it. In response, CISA officials stated that stakeholders with local operational responsibilities were the least likely to be familiar with the National Critical Functions, which were intended to improve the analysis and management of cross-sector and national risks. Still, CISA officials acknowledged the need to improve connection between the National Critical Functions framework and local and operational risk management activities and communications. In addition, CISA lacks an available documented framework plan with goals and strategies that describe what it intends to achieve and how. Without such a documented plan, stakeholders' questions regarding the framework will likely persist.

CISA offers physical and cybersecurity assessments to critical infrastructure partners, but the agency's 2020 reorganization resulted in challenges in communicating and coordinating the delivery of some cybersecurity services. According to regional staff, their ability to effectively coordinate the cybersecurity services that CISA headquarters delivered was impaired because of staff placement following the reorganization. Specifically, staff conducting outreach and offering a suite of cybersecurity assessments to critical infrastructure stakeholders are located in regional offices, while CISA offers additional cyber assessment services using staff from a different division—the Cybersecurity Division—which operates out of headquarters. Addressing these communication and coordination challenges can improve CISA's cybersecurity support.

CISA analyzes and shares threat information related to critical infrastructure; however, stakeholders reported needing more regionally specific information to address those threats. For instance, selected stakeholders that GAO spoke to said that CISA's threat information helped them to understand the broader threat landscape, such as threats to election security and COVID-19 response efforts. Almost half (12 of 25) of the stakeholders reported needing additional information related to the threats specific to their regions and local infrastructure. Specifically, stakeholders told us that organizations in their regions were primarily concerned with active shooters, chemical spills, or biological attacks and, thus, needed information that was applicable to those threats.

Why GAO Did This Study

The risk environment for critical infrastructure ranges from extreme weather events to physical and cybersecurity attacks. The majority of critical infrastructure is owned and operated by the private sector, making it vital that the federal government work with the private sector, along with state, local, tribal, and territorial partners. CISA is the lead federal agency responsible for overseeing domestic critical infrastructure protection efforts.

GAO was asked to review CISA's critical infrastructure prioritization activities. This report examines (1) the extent to which the National Critical Infrastructure Prioritization Program currently identifies and prioritizes nationally significant critical infrastructure, (2) CISA's development of the National Critical Functions framework, and (3) key services and information that CISA provides to mitigate critical infrastructure risks.

GAO analyzed agency documentation and conducted interviews with critical infrastructure stakeholders representing the energy, water and wastewater systems, critical manufacturing, and information technology sectors; six of 10 CISA regions; and six states to understand the need for any improvements to CISA's efforts, among other things. GAO selected these six states based on population size and the amounts of grant awards received from DHS's State Homeland Security Program.

Recommendations

GAO recommends that CISA take the following six actions and DHS concurred:

  • improve its process for identifying critical infrastructure priorities to better reflect current threats;
  • seek input from states that have not provided recent updates on identifying critical infrastructure;
  • involve stakeholders in the development of the National Critical Functions framework;
  • document goals and strategies for the National Critical Functions framework;
  • improve efforts to coordinate cybersecurity services; and
  • share regionally specific threat information.

Recommendations for Executive Action

Agency Affected Recommendation Status
Cybersecurity and Infrastructure Security Agency The Director of CISA should ensure that CISA's process for developing a prioritized list of critical infrastructure that would cause national or regional catastrophic effects if destroyed or disrupted reflects current threats. (Recommendation 1)
Closed – Implemented
As of March 2024, CISA took steps to ensure its process for developing a prioritized list of critical infrastructure reflects current threats and reported that its annual review process will help ensure that any future threat environment changes are appropriately reflected in the program's nomination process and thresholds. A National Critical Infrastructure Prioritization Program (NCIPP) nomination consists of three elements : (1) infrastructure of interest; (2) a scenario of interest, such as a terrorist act or natural disaster; and 3) disruption consequences, such as economic loss and fatalities. In August 2022, CISA reported developing a plan to review the NCIPP thresholds and...
Cybersecurity and Infrastructure Security Agency The Director of CISA should ensure that CISA's process for developing a prioritized list of critical infrastructure that would cause national or regional catastrophic effects if destroyed or disrupted includes input from additional states that have not provided recent nominations or updates. (Recommendation 2)
Closed – Implemented
In February 2022, CISA's National Risk Management Center (NRMC) reported that it will work with CISA Regional staff to make affirmative outreach to states who did not submit nominations to the National Critical Infrastructure Prioritization Program (NCIPP) in Fiscal Years 2019, 2020, or 2021 to ensure these states were aware of the program and the process to submit nominations. During the next nomination data call, CISA NRMC said it would also provide an option for states to affirm that no new assets currently on the NCIPP list have been taken offline. As part of the FY 2023 NCIPP data call, CISA NRMC reported emailing the data call kickoff memo and nomination materials to all states and...
Cybersecurity and Infrastructure Security Agency The Director of CISA should ensure that stakeholders are fully engaged in the implementation of the National Critical Functions framework. (Recommendation 3)
Closed – Implemented
CISA's National Risk Management Center has engaged with private sector and government partners to develop and apply the National Critical Functions (NCF) framework, and CISA reported in February 2022 that it is committed to continuing, improving, and expanding its engagement with stakeholders. For example, to engage with stakeholders, CISA has used webinars, meetings with sector councils and cross-sector councils, workshops, and meetings with individual public and private entities. In March 2021, CISA established the Federal Risk Management Working Group through the Federal Senior Leadership Council, which ensures federal partners, including Sector Risk Management Agencies, have a formal...
Cybersecurity and Infrastructure Security Agency The Director of CISA should document, as appropriate, goals and strategies for the National Critical Functions framework. (Recommendation 4)
Open
According to CISA officials, CISA planned to begin documenting goals and strategies for the National Critical Functions framework that are informed by critical infrastructure plans required in National Security Memorandum 22. However, as of April 2025, CISA officials reported that National Security Memorandum 22 implementation was delayed to allow for further review in response to Executive Order 14239, Achieving Efficiency Through State and Local Preparedness. As a result, CISA officials do not anticipate fully implementing this recommendation until March 2027. We will monitor CISA's progress and update this recommendation accordingly.
Cybersecurity and Infrastructure Security Agency The Director of CISA should implement processes to improve communication and coordination between critical infrastructure organizations and CISA headquarters and regional staff. (Recommendation 5)
Closed – Implemented
In June 2023, CISA's Integrated Operations Division (IOD) implemented its Service Delivery Change Request tool. CISA officials stated that this tool provides a more effective mechanism for CISA Regional personnel and critical infrastructure stakeholders to request changes to existing CISA products and services, as well as to request a new product or service. CISA's guidance for implementing the tool acknowledges that CISA's service delivery model to stakeholders results in many services designed by headquarters officials but implemented by CISA's field personnel. The tool is intended to facilitate a continuous feedback loop between these entities to improve communication and...
Cybersecurity and Infrastructure Security Agency The Director of CISA should coordinate with relevant regionally based, federal, and nonfederal partners to regularly develop and distribute regionally specific threat information to each of CISA's 10 regions. (Recommendation 6)
Closed – Implemented
CISA officials reported in August 2022 that in response to our recommendation CISA's Intelligence sub-division established a Regional Engagement Lead whose primary purpose was to build and maintain threat information sharing relationships across CISA's 10 regions. As of October 2023, CISA's outreach and engagements with the regions had increased in frequency, according to CISA officials, and CISA determined a single employee serving as the regional engagement lead would not satisfy the engagement requirements being sought or provided to the regions. CISA then designated multiple members of CISA's Intelligence sub-division with a role in regional engagement activities. These staff members...

Full Report

GAO Contacts

Media Inquiries

Sarah Kaczmarek
Managing Director
Office of Public Affairs

Public Inquiries

Topics

Critical infrastructureCritical infrastructure protectionCritical infrastructure vulnerabilitiesCybersecurityHomeland securityInformation sharingRisk managementSetting prioritiesWater systemsPublic and private partnerships