(IMp) CII Cybersecurity - Preparedness
(IMp) CII Cybersecurity - Preparedness
Abstract
Critical infrastructures are the foundational pillars of modern
society, encompassing essential systems and assets that support
our daily lives, economy, and national security. These infrastruc-
tures, including transportation networks, power grids, water sup-
plies, telecommunications, and financial systems, play a vital role
in ensuring the smooth functioning of governments, businesses,
and communities. Safeguarding these critical infrastructures from
both physical and cyber threats is of utmost importance in our in-
terconnected world. The global landscape presents various threats
that can impact infrastructures, such as the Covid-19 pandemic,
the activities of state and non-state hackers, and extreme weather
events. Therefore, it is crucial to prioritize the development of resil-
ient infrastructures capable of withstanding crises and maintaining
stability. This entails adopting information, communication, and
technology (ICT) platforms that leverage emerging and innovative
technologies to enhance infrastructure protection. As ICT systems
evolve and become more interconnected, collaborative, and holis-
tic strategies are necessary to protect critical infrastructure assets
from an ever-increasing number of evolving cyber threats and dis-
ruptive cyberattacks. Safeguarding high-risk critical infrastructure
assets, which are vital to safety, efficiency, and reliability, presents
serious challenges. Recognizing the importance of protecting criti-
cal infrastructure from all types of threats and implementing resil-
ient strategies is paramount. This article begins by describing the
challenges faced by the United States in protecting critical infra-
structure and assessing its Cybersecurity readiness. It then explores
strategies for resilience and the urgent need for critical infrastruc-
ture protection. Finally, the authors evaluate the resilience and
readiness strategies in place for protecting critical infrastructure in
the United States.
Keywords: Information, Communication, and Technology (ICT),
Critical Infrastructures Protection, Cybersecurity Readiness
21 doi: 10.18278/jcip.4.1.4
Journal of Critical Infrastructure Policy
Introduction
Critical infrastructures are indispensable for the continuous functioning of soci-
ety. They provide vital services that support economic growth, public safety, and
overall well-being. Transportation networks facilitate the movement of goods and
people, powering commerce and daily commutes. Power grids supply electricity,
enabling industries, hospitals, and homes to operate. Telecommunications systems
connect individuals across the globe, facilitating communication, commerce, and
emergency services. Water supply systems ensure access to clean water, a funda-
mental necessity for health and sanitation. Financial systems underpin economic
transactions, facilitating trade, investment, and prosperity. Any disruption or fail-
ure in these infrastructures can have severe consequences, affecting individuals,
businesses, and nations at large. The United States heavily relies on the reliable
and functioning critical infrastructure (CIs) for national and economic protec-
tion. However, it is crucial to recognize the increased risks associated with this de-
pendency. Today, highly digitized, and interconnected CIs, such as healthcare and
energy sectors, face numerous domestic and nation-state-sponsored threats. The
cybersecurity readiness in critical infrastructure must ensure the confidentiality,
integrity, and availability of assets. This includes protecting the creation, process-
ing, storage, and transmission of assets within the system, preventing persistent,
sophisticated, systematic, and well-funded attacks from both internal and external
threat actors.
Critical infrastructure operators (Ross, 2018), along with their operational
technologies (OT), operate complex industrial control (IC) systems, such as Su-
pervisory Control and Data Acquisition (SCADA). These IC systems and equip-
ment monitor and control devices, processes, and events in sectors like power, wa-
ter, transportation, manufacturing, and other essential services. SCADA manages
programmable systems or equipment that interacts with the physical environment
in critical infrastructures. Ensuring the safety of critical infrastructure operators
and their OT, as well as recognizing the need for cybersecurity readiness to protect
IT infrastructure assets, must be a top priority for critical infrastructure stake-
holders. IT assets in critical infrastructure are considered sensitive resources with-
in IT systems and technologies. Addressing system vulnerabilities and effectively
responding to attacks is essential for business continuity.
On the other hand, OT assets within critical infrastructure (IEC Technolo-
gy Report, 2019), specifically power systems, have different security requirements
and constraints. These OT power systems include cyber-operational and physi-
cal systems, each with specific security needs, such as availability, authentication,
authorization, integrity, and safety levels. Disruptive incidents impacting OT as-
sets can harm the safety and reliability of power systems, leading to catastroph-
ic consequences. Safety-related incidents may result in intentional or accidental
22
Cybersecurity Preparedness of Critical Infrastructure—A National Review
23
Journal of Critical Infrastructure Policy
24
Cybersecurity Preparedness of Critical Infrastructure—A National Review
Figure 3 – Ranking threats and risks associated with critical infrastructure 2023
25
Journal of Critical Infrastructure Policy
enhance the resilience and security of critical infrastructure to ensure the contin-
ued functioning and safety of societies.
26
Cybersecurity Preparedness of Critical Infrastructure—A National Review
Figure 5 shows the substantial global cyber incidents on critical infrastructure be-
tween 2006 to March 2023. The incidents highlight the growing sophistication and
impact of cyber-attacks on critical infrastructure globally. They underscore the
need for robust cybersecurity measures, continuous monitoring, and internation-
al collaboration to defend against such threats and protect critical systems. The
(Washburn and Sin, 2019) dataset collected significant incidents worldwide, uti-
lizing publicly available information, targeting various domains of critical infra-
structures from January 1, 2009, to November 15, 2019. It comprises a total of 130
incidents specifically directed at critical infrastructure sectors. Figure 6 illustrates
the notable incidents within different critical infrastructure sectors documented
during the period spanning from 2009 to 2019.
Based on the graph provided, notable observations can be made regarding the dis-
ruption of critical infrastructure sectors, particularly in the Energy and Transpor-
tation sectors. These sectors experienced a significant spike in incidents, followed
by the critical manufacturing and nuclear sectors, respectively. This spike can be
attributed to ransomware attacks like WannaCry and destructive malware such
as NotPetya, which occurred in 2017. The dataset encompasses two key factors:
disruptive cyber-physical incidents and disruptive cyber-operational incidents.
In the case of cyber-physical incidents, malicious activities executed by state or
nonstate threat actors have had disruptive effects on operational technology (OT)
systems, devices, and processes, thereby compromising Industrial Control (IC)
systems. On the other hand, cyber-operational incidents involve threat actors con-
ducting malicious activities that disrupt IT systems connected to ICS or Internet
of Things (IoT) systems and devices. These incidents can be aimed at managing
inspections, intelligence preparation of the battlefield (IPB), or stealing intellectu-
27
Journal of Critical Infrastructure Policy
al property (IP) for economic purposes. Figure 7 displays the cases of disruptive
incidents categorized as cyber-physical incidents, cyber-operational incidents, or
cases with unknown factors. The data covers the period from January 1, 2009, to
November 15, 2019.
28
Cybersecurity Preparedness of Critical Infrastructure—A National Review
29
Journal of Critical Infrastructure Policy
30
Cybersecurity Preparedness of Critical Infrastructure—A National Review
law enforcement, fire services, and emergency medical services. The Energy Sector
covers the production, transmission, and distribution of energy resources, such as
electricity, oil, natural gas, and renewable energy sources. The Financial Services
Sector involves institutions engaged in banking, investment, insurance, and other
financial activities. The Food and Agriculture Sector plays a critical role in the
production, processing, and distribution of food and agricultural products, ensur-
ing food security and supply. The Government Facilities Sector includes facilities
and infrastructure that support government operations, such as administrative
buildings and public transportation systems. The Healthcare and Public Health
Sector comprises healthcare facilities, hospitals, medical supply manufacturers,
and public health organizations. The Information Technology Sector involves in-
dustries responsible for designing, developing, and maintaining information tech-
nology systems and networks, facilitating communication, and data management.
The Nuclear Reactors, Materials, and Waste Sector includes nuclear power plants,
facilities for handling nuclear materials, and sites for the disposal of radioactive
waste. The Transportation Systems Sector encompasses various modes of trans-
portation, including aviation, maritime, rail, and road transportation systems.
Lastly, the Water and Wastewater Systems Sector covers facilities involved in water
supply, treatment, distribution, and wastewater management, ensuring clean and
accessible water resources for communities. These sectors collectively form the
critical infrastructure that underpins the functioning and security of a nation, re-
quiring careful attention and protection.
These sectors are interconnected and rely on each other to ensure the re-
liable operation of critical infrastructure. They represent various industries and
infrastructure components that are vital for the functioning of the nation. Each
sector has its own unique characteristics, risks, and vulnerabilities. CISA, along
with sector-specific agencies and stakeholders, works to enhance the security, re-
silience, and preparedness of these critical infrastructure sectors. By addressing
risks and implementing appropriate protective measures, the aim is to ensure the
continued operation and protection of these essential sectors in the face of various
threats and hazards. Table 1 presents the sixteen critical infrastructure sectors and
their corresponding Sector-Specific Agencies, as outlined in Presidential Policy
Directive-21 and the 2013 National Infrastructure Protection Plan (National In-
frastructure Protection Plan 2013).
31
Journal of Critical Infrastructure Policy
32
Cybersecurity Preparedness of Critical Infrastructure—A National Review
and other sensitive information from state, local, tribal, territorial governments,
and international partners.
33
Journal of Critical Infrastructure Policy
34
Cybersecurity Preparedness of Critical Infrastructure—A National Review
35
Journal of Critical Infrastructure Policy
36
Cybersecurity Preparedness of Critical Infrastructure—A National Review
37
Journal of Critical Infrastructure Policy
38
Cybersecurity Preparedness of Critical Infrastructure—A National Review
39
Journal of Critical Infrastructure Policy
policies and procedures, builds trust, standardizes data formats, and uti-
lizes dedicated platforms and tools to enable effective information shar-
ing. The framework includes mechanisms for timely reporting and coor-
dinated response, automation of sharing through technologies like AIS,
sector-specific information sharing groups, and continuous improvement
and evaluation. By implementing this framework, organizations can en-
hance their ability to detect, prevent, and respond to threats, ensuring the
security and resilience of critical infrastructure. The Sharing Environment
is a collaborative effort that enhances the sharing of critical infrastructure
information among government agencies, private sector organizations,
and stakeholders. It provides a platform for exchanging threat intelligence,
best practices, and situational awareness specific to critical infrastructure
sectors. It facilitates sector-specific information sharing, develops trusted
communities, supports incident reporting and collaboration, offers analyt-
ical capabilities, and fosters government-private sector partnerships. It en-
sures a secure environment for sharing information, maintains confidenti-
ality, and adapts to evolving threats and sector requirements. Participating
in this environment enables organizations to access valuable insights, en-
hance their security posture, and collectively address critical infrastructure
challenges for national security and public safety.
Conclusion
Critical infrastructure is a vital requirement for the survival of any society. This
article highlights the importance of recognizing security and resilience as criti-
cal requirements for effective protection strategies in the United State. It explores
various cybersecurity assessment frameworks and strategies with a shared goal of
enhancing cybersecurity capacity and effectiveness. These assessments primarily
focus on evaluating the level of cybersecurity capabilities by promoting best prac-
tices, safeguarding information, guiding cybersecurity activities, and managing
risks within organizations. They also contribute to maintaining the desired securi-
ty posture, assessing the current state of cyber preparedness, and fostering opera-
tional resilience. To further enhance the frameworks for protecting critical infra-
structure, it is recommended to develop a measurement system that evaluates the
capabilities of assessment methods. This system should measure the effectiveness
of activities and action plans using meaningful indicators on a shared platform.
Moreover, transitioning from voluntary and self-assessment methods to a more
consistent and comprehensive approach would be beneficial.
40
Cybersecurity Preparedness of Critical Infrastructure—A National Review
References
Automated Indicator Sharing (AIS). 2016. HDS. Retrieved from https://www.dhs.
gov/sites/default/files/publications/privacy_pia_nppd_ais_update_03162016.pdf.
Center for Strategic & International Studies (CSIS). 2023. Significant Cyber In-
cidents Since 2006.Retrieved from https://www.csis.org/programs/strategic-tech
nologies-program/significant-cyber-incidents
CISA Year in Review 2022. CISA. 2022. CISA Year in Review 2022. Retrieved from
https://www.cisa.gov/2022-year-review
Critical Infrastructure and Key Resources Cyber Information Sharing and Collab-
oration Program. 2023. HDS. Retrieved from https://www.cisa.gov/sites/default/
files/c3vp/CISCP_20140523.pdf.
41
Journal of Critical Infrastructure Policy
Critical Infrastructure Cross Sector Council Charter. 2018. CISA. Retrieved from
https://www.cisa.gov/sites/default/files/publications/chartercscapp-508.pdf.
Federal Senior Leadership Council Charter. 2021. CISA. Retrieved from https://
www.cisa.gov/sites/default/files/publications/fslc-charter-2021-508.pdf.
Global Forum on Cyber Expertise Report. 2017. GFCE Global Good Practices
Critical Information Infrastructure
IEC Technology Report. 2019. Cyber Security and Resilience Guidelines for the
Smart Energy Operational Environment. Retrieved from www.iec.ch/basecamp/
42
Cybersecurity Preparedness of Critical Infrastructure—A National Review
cyber-security-and-resilience-guidelines-smart-energy-operational-environ
ment.
National Infrastructure Protection Plan (NIPP) 2013: Partnering for Critical In-
frastructure Security and Resilience. Cybersecurity and Infrastructure Security
Agency (CISA). Retrieved from https://www.cisa.gov/resources-tools/resources/
nipp-2013-partnering-critical-infrastructure-security-and-resilience.
43
Journal of Critical Infrastructure Policy
Ross, Ron. 2018. Risk Management Framework for Information Systems and Or-
ganizations: A System Life Cycle Approach for Security and Privacy (Special Pub-
lication (NIST SP) No. 800-37r2). National Institute of Standards and Technology.
Retrieved from https://doi.org/10.6028/NIST.SP.800-37r2.
Traffic Light Protocol 2.0 User Guide. 2022. CISA. Retrieved from https://www.
cisa.gov/sites/default/files/2023-02/tlp-2-0-user-guide_508c.pdf.
Vijayan, Jaikumar. 2022. “What is an ISAC or ISAO? How this cyber threat in-
formation sharing organizations improve security.” CSO. Retrieved from https://
www.csoonline.com/article/3406505/what-is-an-isac-or-isao-how-these-cyber-
threat-information-sharing-organizations-improve-security.html.
Washburn, Ryan, and Sarah Sin. 2019. Research Brief: Significant Multi-Domain In-
cidents against Critical Infrastructure (SMICI) Dataset. College Park, MD: START.
Retrieved from https://www.start.umd.edu/publication/research-brief-significant
-multi-domain-incidents-against-critical-infrastructure-smici.
White House Fact sheet. 2021. The American Jobs Plan. Retrieved from https://
www.whitehouse.gov/briefing-room/statements-releases/2021/03/31/fact-sheet-
the-american-jobs-plan/.
World Economic Forum Report. 2023. The Global Risks Report 2023. Retrieved
from https://www.weforum.org/reports/global-risks-report-2023/.
44
Journal of Critical Infrastructure Policy • Volume 4, Number 1 • Fall 2023
45 doi: 10.18278/jcip.4.1.5
Journal of Critical Infrastructure Policy
tion—mostly coal, gas and oil generators representing 21% of our installed capac-
ity—is at risk of retiring by 2030. Some industry forecasts predict that renewable
energy will provide nearly half the power to the country by 2032, but currently
those renewable resources are not being built at the rate we need to replace those
traditional generators.
As the generation fleet moves to a lower-carbon footprint, reliant on in-
termittent energy resources (like sun and wind), the planners and operators of
the bulk electric system have to plan for a much different kind of system with
different physical characteristics—and get it right. Peoples’ livelihoods and lives
depend on it.
This means PJM and its stakeholders have been hard at work crafting a reli-
able path forward through our core functions of planning, markets and operations.
We have synthesized these efforts into our Ensuring a Reliable Energy Tran-
sition initiative, dedicated to finding answers to reliability challenges through in-
tensive, data-driven research and analysis and collaboration across government
and industry.
• At the same time, fossil fuel generators that balance the grid today are retiring
at a significant rate.
46
PJM: Charting the Path to the Grid of the Future
• Renewable resources that have passed through PJM’s vetting process are not
being built at the pace required to replace these resources, through factors
beyond PJM’s control, like supply chain issues, cost of capital and permitting.
The related analysis is detailed in our most recent paper in the Energy Tran-
sition in PJM series.
Reliability-First Policies
These reliability concerns are not unique to the PJM grid. As this year’s North
American Electric Reliability Corporation’s (NERC) summer assessment showed,
roughly two-thirds of the U.S. (but not the PJM region) already faced increased
resource adequacy risk this past summer.
However, we believe this risk is avoidable. How? Through policies that ac-
celerate the rate of entry of new generation (such as through permitting reform)
47
Journal of Critical Infrastructure Policy
and slow the exit of the traditional thermal generation we use to balance the grid
today. This will give time for replacement generation to be installed and operating
at the required scale.
In addition, PJM advocates an approach to policymaking that expressly
considers reliability impacts in the development phase of the policy—not after the
fact.
We continue to work with both state and federal policymakers to ensure
that reliability considerations are built into all environmental and renewable gen-
eration policies.
• Filed with FERC a set of proposals to better recognize the relative contribution
of all generation resources in meeting reliability needs
• Performed groundbreaking work with the state of New Jersey to advance the
buildout of its ambitious offshore wind program—a model that is being con-
sidered by other states
Our Ensuring a Reliable Energy Transition initiative proposes an initial set
of actions to support reliability that PJM can take with its stakeholders, govern-
ment and industry over the immediate, near-term and upcoming time frames to
keep pace with these trends:
48
Journal of Critical Infrastructure Policy
• Upcoming: Attracting and maintaining (as needed) resources that have essen-
tial reliability services
Essential reliability services are defined by NERC as the ability of a genera-
tion resource to provide services such as voltage control, frequency support, and
ramping capability to balance the electrical grid and maintain the reliable delivery
of electricity.
PJM has documented in its research that the more we depend on intermit-
tent resources, the more we will need to share electricity with our neighboring
systems to account for fluctuations in supply. PJM is already a leader in this area
and regularly exports and imports electricity to adjoining systems; we are cur-
rently working both internally and externally to determine just how much of that
interregional transfer capability we will need to build.
49
PJM: Charting the Path to the Grid of the Future
the energy transition. For the first time in recent history, PJM could be at risk of
facing resource adequacy challenges.
Decarbonizing the grid will be a challenge, for all of us, but it will happen.
We’re all going to have to work together to find solutions, including state and fed-
eral policymakers.
The solutions are there; this country has proven that time and time again, it
simply requires dedicated resources and brainpower. PJM will find those solutions
but will need all stakeholders at the table to do so.
50