[House Hearing, 113 Congress] [From the U.S. Government Publishing Office] OVERSIGHT OF EXECUTIVE ORDER 13636 AND DEVELOPMENT OF THE CYBERSECURITY FRAMEWORK ======================================================================= HEARING BEFORE THE SUBCOMMITTEE ON CYBERSECURITY, INFRASTRUCTURE PROTECTION, AND SECURITY TECHNOLOGIES OF THE COMMITTEE ON HOMELAND SECURITY HOUSE OF REPRESENTATIVES ONE HUNDRED THIRTEENTH CONGRESS FIRST SESSION __________ JULY 18, 2013 __________ Serial No. 113-27 __________ Printed for the use of the Committee on Homeland Security [GRAPHIC NOT AVAILABLE IN TIFF FORMAT] Available via the World Wide Web: http://www.gpo.gov/fdsys/ __________ U.S. GOVERNMENT PRINTING OFFICE 86-034 PDF WASHINGTON : 2014 _____________________________________________________________________________ For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (856) 512-1800; DC area (202) 512-1800 Fax: (202) 512-2250 Mail: Stop SSOP, Washngton, DC 20402-0001 COMMITTEE ON HOMELAND SECURITY Michael T. McCaul, Texas, Chairman Lamar Smith, Texas Bennie G. Thompson, Mississippi Peter T. King, New York Loretta Sanchez, California Mike Rogers, Alabama Sheila Jackson Lee, Texas Paul C. Broun, Georgia Yvette D. Clarke, New York Candice S. Miller, Michigan, Vice Brian Higgins, New York Chair Cedric L. Richmond, Louisiana Patrick Meehan, Pennsylvania William R. Keating, Massachusetts Jeff Duncan, South Carolina Ron Barber, Arizona Tom Marino, Pennsylvania Dondald M. Payne, Jr., New Jersey Jason Chaffetz, Utah Beto O'Rourke, Texas Steven M. Palazzo, Mississippi Tulsi Gabbard, Hawaii Lou Barletta, Pennsylvania Filemon Vela, Texas Chris Stewart, Utah Steven A. Horsford, Nevada Richard Hudson, North Carolina Eric Swalwell, California Steve Daines, Montana Susan W. Brooks, Indiana Scott Perry, Pennsylvania Mark Sanford, South Carolina Greg Hill, Chief of Staff Michael Geffroy, Deputy Chief of Staff/Chief Counsel Michael S. Twinchek, Chief Clerk I. Lanier Avant, Minority Staff Director ------ SUBCOMMITTEE ON CYBERSECURITY, INFRASTRUCTURE PROTECTION, AND SECURITY TECHNOLOGIES Patrick Meehan, Pennsylvania, Chairman Mike Rogers, Alabama Yvette D. Clarke, New York Tom Marino, Pennsylvania William R. Keating, Massachusetts Jason Chaffetz, Utah Filemon Vela, Texas Steve Daines, Montana Steven A. Horsford, Nevada Scott Perry, Pennsylvania Bennie G. Thompson, Mississippi Michael T. McCaul, Texas (ex (ex officio) officio) Alex Manning, Subcommittee Staff Director Dennis Terry, Subcommittee Clerk C O N T E N T S ---------- Page Statements The Honorable Patrick Meehan, a Representative in Congress From the State of Pennsylvania, and Chairman, Subcommittee on Emergency Preparedness, Response, and Communications: Oral Statement................................................. 1 Slides......................................................... 3 The Honorable Yvette D. Clarke, a Representative in Congress From the State of New York, and Ranking Member, Subcommittee on Emergency Preparedness, Response, and Communications: Oral Statement................................................. 8 Prepared Statement............................................. 10 The Honorable Bennie G. Thompson, a Representative in Congress From the State of Mississippi, and Ranking Member, Committee on Homeland Security.............................................. 11 Witnesses Mr. Robert Kolasky, Director, Implementation Task Force, National Protection and Programs Directorate, U.S. Department of Homeland Security: Oral Statement................................................. 13 Joint Prepared Statement....................................... 15 Mr. Charles H. Romine, PhD, Director, Information Technology Laboratory, National Institute of Standards and Technology, U.S. Department of Commerce: Oral Statement................................................. 19 Joint Prepared Statement....................................... 21 Mr. Eric A. Fischer, PhD, Senior Specialist, Science and Technology, Congressional Research Service, Library of Congress: Oral Statement................................................. 23 Joint Prepared Statement....................................... 25 OVERSIGHT OF EXECUTIVE ORDER 13636 AND DEVELOPMENT OF THE CYBERSECURITY FRAMEWORK ---------- Thursday, July 18, 2013 U.S. House of Representatives, Committee on Homeland Security, Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies, Washington, DC. The subcommittee met, pursuant to call, at 10:05 a.m., in Room 311, Cannon House Office Building, Hon. Patrick Meehan [Chairman of the subcommittee] presiding. Present: Representatives Meehan, Marino, Clarke, Keating, and Vela. Mr. Meehan. The Committee on Homeland Security, Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies will come to order. Subcommittee is meeting today to examine the implementation of Executive Order 13636 and the administration's cybersecurity framework, and I recognize myself now for an opening statement. I would like to welcome everybody to today's hearing, which continues our subcommittee's efforts to provide oversight over the President's Cybersecurity Executive Order 13636. The focus of the Executive Order is to provide protection for our Nation's critical infrastructure sectors from cyber threats. These sectors include our energy and nuclear facilities, our Nation's transportation systems, our defense industrial base, and financial services, among others. Today we will focus on the cybersecurity framework, under which the National Institute for Standards and Technology or NIST, as it is often referred to, has the responsibility of working with stakeholders to develop. The framework is expected to be completed and released by October 30. On July 1, NIST released an outline of that framework, which will be the basis of the committee's questioning today. So far NIST has held three workshops to gather input from industry, academia, other stakeholders, and a fourth is expected in September, I believe, in Dallas, Texes. I believe that the outline of NIST's framework provides an important step to increasing our Nation's awareness and ability to protect our networks from crippling cyber attacks. In fact, I believe that the three are many mature actors in both Government and the private sector working in great coordination currently--including those at the Department of Homeland Security--to shield our systems from cyber threats. It is, however, those outliers--the ones without the awareness, those with insufficient resources--who can present immense vulnerabilities to entire networks. It is this concern that our subcommittee seems to have allayed. We must find answers to the question of: How do we incentivize participation without creating counterproductive, onerous standards and regulations? Adopting the NIST framework would result in a positive exercise for owners and operators of critical infrastructure. However, I have concerns that a self-assessment may not be sufficient to incentivize action to bolster cyber defenses in all cases. Our committee has held over 200 meetings with stakeholders and one of the common themes emanating from the discussions is that they are only as strong as their weakest links. I believe an analysis of the incentives included in this framework is in order. I look forward to hearing from the panel today on ways we can assist both the public and private sector to increase their hygiene with limited resources. Providing incentives for organizations to share information and best practices is further complicated by the absence of liability protections. In the Executive Order, our goal should be to encourage that information sharing, and I have questions about the ability of regulators to reform use--require use of the framework, turning this into burdensome check-the-box rules and regulations. Ultimately, I believe it is the consensus of the committee that Congress must pass legislation in order to address many of these outstanding issues. Existing structures within DHS must be authorized by Congress to continue functioning. Liability protections, information-sharing provisions, and industry-led incentives can only be fully enacted by statute, not exclusively by Presidential Directive. I look forward to working with the committee, with our panel, and DHS to craft legislation that will address these issues. I thank the panel for their participation today, and I look forward to hearing from your testimony. [The information follows:] [GRAPHICS NOT AVAILABLE IN TIFF FORMAT] Mr. Meehan. The Chairman now recognizes the Ranking Minority Member of the subcommittee, the gentlelady from New York, Ms. Clarke, for any statement that she may have. Ms. Clarke. Thank you very much, Mr. Chairman. Welcome to our panelists this morning. Our country's reliance on cyber systems cover the waterfront; everything from power plants to pipelines and hospitals to highways, have increased cyber connections dramatically and our infrastructure is more physically and digitally interconnected than ever. Yet for all of the advantages interconnectivity offers our Nation's critical infrastructure, it is also increasingly vulnerable to attack from an array of cyber threats. It is vital that we as a country take action to strengthen our National policy on critical infrastructure security and resilience and includes measures to strengthen cybersecurity. Because the majority of our critical infrastructure is owned and operated by private companies, the public and private sectors have a shared responsibility to reduce the threats to critical infrastructure through a stronger partnership. The current Federal legislative framework for cybersecurity is complex with more than 50 statutes currently addressing various aspects of it. However, we can all agree that the current framework is not sufficient to address the growing concerns about the security of cyberspace in the United States and no major cybersecurity legislation has been enacted since 2002, although the Executive branch has taken several notable actions. The Federal role in protection of privately-held critical infrastructure has been one of the most contentious issues in the debate about cybersecurity legislation. There appears to be a broad agreement that additional actions are needed to address the security risks, NCI, but there is considerable disagreement about how much, if any, additional Federal regulation is required. So in February of this year, the President acted through an extraordinary order of directives an Executive Order on cybersecurity and a Presidential Policy Directive on critical infrastructure security and resilience that will likely become National and global references for cybersecurity policymaking. Under the EO, the Secretary of Commerce is tasked to direct the director of NIST to develop a framework of reducing cyber risks to critical infrastructure. The framework will consist of standards, methodologies, procedures, and processes that align policy, business, and technological approaches to cyber--to address cyber risks. The Department of Homeland Security in coordination with sector-specific agencies will then establish a voluntary program to support the adoption of the cybersecurity framework by owners and operators of critical infrastructure and any other interested entities. It is important that the United States set a positive example regarding the essential role that global standards play for both industry and Government. This framework presents an important opportunity to develop a product that many other countries can replicate and use in their policy environments. The United States could encourage global acceptance of this framework by seeking comments and support from our allies during its development. This adoption would be beneficial by creating consistent and cohesive approaches across these geographies as well as a commitment to the global standardization process. A long-standing concern of mine is how we go about addressing cyber workforce considerations and how they will be included in the development of the framework we will be talking about today. Our National cybersecurity workforce must be trained and be able to maintain the skills necessary to understand the changing operating environment. They must also be able to understand the threats, vulnerabilities to the environment, and most importantly, they must be skilled at practices to combat those threats and vulnerabilities. I am hoping that you, Mr. Chairman, and I can work together on this important need. We also have a need of improvement in the fundamental knowledge of cybersecurity. New solutions and approaches have been recognized for well over a decade and those discoveries were a factor in the passage of the Cyber Security Research and Development Act in 2002. However, the law focuses on cybersecurity R&D by NSF and NIST. The Homeland Security Act of 2002 in contrast does not specifically mention cybersecurity R&D, but DHS and several other Departmental agencies make significant investments in it. About 60 percent of reported funding by agencies in cybersecurity and information assurance is defense-related and we need to direct some of this R&D in the civilian arena. I understand that you, Mr. Chairman, have some language along this line, and I hope we can, together, work on this issue. What we all want for a cybersecurity framework is something that is flexible, repeatable, performance-based, includes a strong privacy and civil liberties protections, and something that is cost-effective. After all, the President is attempting to help the privately-held owners and operators of the Nation's critical infrastructure to identify, assess, and manage cybersecurity- related risks while protecting business confidentiality and individual privacy and civil liberties. In short, we need to regain sovereignty over our National and local assets that keep our small businesses running, our city and State governments providing services to citizens, our factories humming, and our essential services protected. I look forward to testimony today about the progress that is being made because of the President's leadership on cybersecurity, and I hope that Congress can learn some lessons from the process he has set in motion. I just want to add that I recently received this copy of the incentives study, Mr. Kolasky, and I understand that this is in response to the Executive Order. It was issued May 21, and it would be great if we engaged in information sharing as well if we are going to demand it from those who are tasked to give guidance to. With that, Mr. Chairman, I yield back. [The statement of Ranking Member Clarke follows:] Statement of Ranking Member Yvette D. Clarke July 18, 2013 Our country's reliance on cyber systems covers the waterfront, everything from power plants to pipelines, and hospitals to highways have increased cyber connections dramatically, and our infrastructure is more physically and digitally interconnected than ever. Yet for all the advantages interconnectivity offers, our Nation's critical infrastructure is also increasingly vulnerable to attack from an array of cyber threats. It is vital that we, as a country, take action to strengthen our National policy on critical infrastructure security and resilience, and includes measures to strengthen cybersecurity. Because the majority of our critical infrastructure is owned and operated by private companies, the public and private sectors have a shared responsibility to reduce the risks to critical infrastructure through a stronger partnership. The current Federal legislative framework for cybersecurity is complex, with more than 50 statutes currently addressing various aspects of it. However, we can all agree that the current framework is not sufficient to address the growing concerns about the security of cyber space in the United States, and no major cybersecurity legislation has been enacted since 2002, although the Executive branch has taken several notable actions. The Federal role in protection of privately-held Critical Infrastructure has been one of the most contentious issues in the debate about cybersecurity legislation. There appears to be broad agreement that additional actions are needed to address the cybersecurity risks to CI but there is considerable disagreement about how much, if any, additional Federal regulation is required. So, in February of this year, the President acted through an extraordinary pair of directives, an Executive Order on Cybersecurity and a Presidential Policy Directive on Critical Infrastructure Security and Resilience, that will likely become National and global references for cybersecurity policymaking. Under the EO, the Secretary of Commerce is tasked to direct the Director of NIST to develop a framework for reducing cyber risks to critical infrastructure. The Framework will consist of standards, methodologies, procedures, and processes that align policy, business, and technological approaches to address cyber risks. The Department of Homeland Security, in coordination with sector- specific agencies, will then establish a voluntary program to support the adoption of the Cybersecurity Framework by owners and operators of critical infrastructure and any other interested entities. It is important that the United States set a positive example regarding the essential role that global standards play for both industry and Government. This framework presents an important opportunity to develop a product that many other countries can replicate and use in their policy environments. The United States could encourage global acceptance of this framework by seeking comments and support from our allies during its development. This adoption would be beneficial by creating consistent and cohesive approaches across those geographies as well as a commitment to the global standardization process. A long-standing concern of mine is how we go about addressing Cyber Workforce considerations and how they will be they included in the development of the Framework we will be talking about today. Our National cybersecurity workforce must be trained and be able to maintain the skills necessary to understand the changing operating environment. They must also be able to understand the threats and vulnerabilities to that environment, and most importantly, they must be skilled at practices to combat those threats and vulnerabilities. I am hoping that the Chairman and I can work together on this important need. We also have a need for improvements in the fundamental knowledge of cybersecurity. New solutions and approaches have been recognized for well over a decade and these discoveries were a factor in the passage of the Cybersecurity Research and Development Act in 2002. However, that law focuses on cybersecurity R&D by NSF and NIST. The Homeland Security Act of 2002, in contrast, does not specifically mention cybersecurity R&D, but DHS and several other Departmental agencies make significant investments in it. About 60% of reported funding by agencies in cybersecurity and information assurance is defense-related, and we need to direct some of this R&D in the civilian arena. I understand the Chairman has some language along this line, and I hope we can work together on this issue too. What we all want from a Cybersecurity Framework is something that is flexible, repeatable, performance-based, includes strong privacy and civil liberties protections, and something that is cost-effective. After all, the President is attempting to help the privately-held owners and operators of the Nation's critical infrastructure to identify, assess, and manage cybersecurity-related risk while protecting business confidentiality and individual privacy and civil liberties. In short we need to regain sovereignty over our National and local assets that keep our small businesses running, our city and State governments providing services to citizens, our factories humming, and our essential services protected. I look forward to the testimony today to hear about the progress that is being made because of the President's leadership on cybersecurity, and I hope that Congress can learn some lessons from the process he has set into motion. Mr. Meehan. I thank the gentlelady for her comments and other Members of the committee are reminded that opening statements may be submitted for the record. [The statement of Ranking Member Thompson follows:] Statement of Ranking Member Bennie G. Thompson July 18, 2013 Several years ago, this committee passed the legislation that became the DHS' Chemical Facility Anti-Terrorism Standards (CFATS) program. CFATS was one of this committee's first attempts to proactively explore how to make this country safer by engaging the private sector. We knew that no private facility wanted to become the target of terrorists. But we also knew that the private sector does not often view the Government as a partner. We needed to create a structure that permitted Government and the private sector to work together without fear of penalty or reprisal. I believe we created such a system. Today, we are here to discuss another instance in which the private sector is being asked to cooperate with the Government to safeguard the American people. While the potential danger posed by a terrorist attack on a chemical facility is easy to understand, the threat posed by an attack on the cyber network of a facility is difficult to envision. But let's be clear--cyber attacks that cause large-scale system failures among the businesses and organization that we use every day would not only cause inconvenience, for some people, such system failures could be life-threatening. While something in our history and culture may not allow us to admit it easily, we need to acknowledge that we rely on the everyday presence of power plants, hospitals, manufacturing plants, mass transit and subway systems, airports, and the system of electronic commerce. And in our current world, none of these systems can exist without a computer network that is linked to many other computer networks. Our National and individual interests depend upon the protection of these networks and the security of the information in them. Government and the private sector must work together to assure that the owners and operators of these facilities are able to safeguard their operations and assets from the risk of cyber attack. Also, we must be sure that if attacked by a cyber terrorist, these facilities are able to quickly determine the damage, recover from the injury and move forward. The cybersecurity Executive Order attempts to achieve these goals. Needless to say, I would prefer that this Congress take up legislation to address the many cybersecurity threats facing the critical infrastructure of this Nation. However, this Congress seems to have a difficult time engaging in the legislative process. Thus, I look forward to the implementation of Executive Order 13636, which directs Federal agencies to coordinate the development and implentation of risk-based standards. Mr. Meehan. We are very pleased to have a distinguished panel before us today, and we thank each of you for the work that you are doing on behalf of our Nation and your efforts to assure that we take every possible step to protect our cyber infrastructure. We are going to be joined today first by Mr. Robert Kolasky who serves as the director of the Department of Homeland Security's Integrated Task Force that was put together to implement the Presidential Policy Directive 21 on Critical Infrastructure Security and Resilience as well as the President's Executive Order on Critical Infrastructure Cyber Security. Mr. Kolasky has served in many roles throughout DHS since joining the Federal Government in 2002, and I thank you for your service. We will be joined by Dr. Charles Romine, the director of Information Technology Laboratory, one of six research laboratories within the National Institute of Standards and Technology. Dr. Romine oversees research programs designed to promote U.S. innovation and industrial competitiveness by developing and disseminating standards, measurements, and testing for interoperability, security, usability, and reliability of information systems. Thank you, Dr. Romine. We are joined by Dr. Eric Fischer. He is the senior specialist in science and technology at the Congressional Research Service. In this role, he provides expert written and consultation support to Congress on a broad range of issues in science and technology policy including cybersecurity, environmental issues, and research and development. He has authored more than 30 CRS reports--and I thank you for that great work. They are a big help to us as we try to negotiate our way through the thicket of issues to increase our understanding--and more than 100 analytical memoranda for Congressional offices on the subjects I just mentioned. The witnesses' full written statements will appear in the record, and so I ask that you use your time as best you can to help us to hear what is important in your testimony. I will now recognize Mr. Kolasky for 5 minutes to testify. Thank you, Mr. Kolasky. STATEMENT OF ROBERT KOLASKY, DIRECTOR, IMPLEMENTATION TASK FORCE, NATIONAL PROTECTION AND PROGRAMS DIRECTORATE, U.S. DEPARTMENT OF HOMELAND SECURITY Mr. Kolasky. Good morning, Chairman Meehan, Ranking Member Clarke, and distinguished Members of the committee. I want to thank you for your support of the Department, particularly in our mission to safeguard and secure the Nation's critical infrastructure. I am pleased to be here before you to discuss the administration's role and DHS's role in implementing PPD 21 on Critical Infrastructure Security Resilience and Executive Order 13636, Critical Infrastructure Cyber Security. As you know, DHS supports critical infrastructure owners and operators in preparing for, preventing, protecting against, mitigating from, responding to, and recovering from all hazardous events including cyber incidents, natural disasters, and terrorist attacks. To achieve this, DHS works with public and private-sector partners to identify and promote effective solutions for security and resilience that address the risk facing the Nation's critical infrastructure. As you mentioned, recognizing the need for collaborative solutions to confront these risks and promote a more secure and resiliant critical infrastructure, President Obama issued Executive Order and the Presidential Policy on Critical Infrastructure Security and Resilience in February of this year. These two directives aimed to enhance the security and resilience of the Nation's critical structure to maintain a cyber environment that encourages efficiency, innovation, and economic prosperity while promoting safety, security, business confidentiality, privacy, and civil liberties. Promoting security resilience is a collaborative effort. It involves participation from the private sector, owners and operators, State, local, and Tribal territorial governments as well. To accomplish this collaborative effort, DHS stood up the integrated task force to implement the EO and PPD and the integrated task force has developed a consultative process for the whole Federal Government to work with the private sector and State and local and Tribal territorial governments as well as nonprofits and academic communities. At the integrated task force, we have developed nine separate working groups and have conducted more than 100 working sessions involving 1,100 attendees to date. Representatives from DHS have also conducted more than 100 briefings on our effort to nearly 10,000 stakeholders since February 2013. In addition, DHS has worked with our colleagues at the Department of Commerce's National Institute of Standards and Technology to utilize this consultative process in support of the development of cybersecurity framework, which NIST is leading the effort on. We have accomplished much over the past 150 days, and I would like to talk about that and I am eager to take questions related to that. Among the things that we have delivered, as Ranking Member Clarke referenced, an incentives report which analyzes potential incentives that can be used to promote to the adoption of the cybersecurity framework, a description of critical infrastructure functional relationships, instructions on producing unclassified cyber threat reports from all sources of information and making that information available to critical infrastructure partners, procedures for the expansion of the enhanced cybersecurity service program within DHS, which is intended to share cyber threat information with appropriately cleared private-sector cybersecurity providers across all critical infrastructure sectors, recommendations on the feasibility, security benefits, and merits of incorporating security standards into acquisition planning and contract administration, a process for expediting security clearances to those in the private sector with the essential need to know about cyber threat information, and a report outlining how well the current public/private partnership model that is documented in the National Infrastructure Protection Plan is working and recommendations for enhancements to that model. In addition, we have conducted an evaluation of and are identifying critical infrastructure entities where a cybersecurity incident has the potential to cause National or regionally catastrophic incidents. While we have made significant progress to date, there is much work still to be done this year. DHS will be focusing its efforts on the following steps throughout the rest of the year. Updating the National infrastructure protection plan to reflect new policies, a change in the risk environment, and lessons learned working in collaboration across the public and private sector to manage infrastructure risks. Enhancing near-real-time situational awareness for critical infrastructure, developing a draft of the National Critical Infrastructure Security and Resilience Research and Development Plan and collaborating with our colleagues at NIST on the cybersecurity framework. It is important to note that the EO and PPD work within current authorities. They do not grant new regulatory authority or establish additional incentives for participation in a voluntary program. The administration continues to believe that a comprehensive suite of legislation is necessary to implement the full ranges of steps necessary to build a strong public/ private partnership and we hope to continue to work with Congress to achieve this. Among our legislative priorities are: Facilitating cybersecurity for information sharing between the Government and the private sector while maintaining privacy and civil liberties protections and reinforcing the appropriate roles of intelligence and non-intelligence agencies. Incentivizing the adoption of best practices and standards for critical infrastructure by complementing the process set forth in the Executive Order, updating Federal agency network security laws and codifying DHS' cybersecurity responsibilities, giving law enforcement the tools to fight crime in the digital age, and creating a new National data breach reporting requirement. I will end my statements by saying that although we are doing much within the EO and PPD, this is just a start and we hope to continue to work with the owners and operators in State and local and Tribal territorial governments to make progress this year and in the future so that we all have confidence in the security and the resiliency of our critical infrastructure and key networks. Thank you for the opportunity to discuss the Department's role in improving critical infrastructure security and resilience, and I look forward to the dialogue. [The prepared statement of Mr. Kolasky follows:] Prepared Statement of Robert Kolasky July 18, 2013 introduction Good morning Chairman Meehan, Ranking Member Clarke, and distinguished Members of the committee. Let me begin by thanking you for your support of the Department of Homeland Security (DHS), particularly in its mission to safeguard and secure the Nation's critical infrastructure. I am pleased to appear before you to discuss the Department's role in implementing Executive Order (EO) 13636, Improving Critical Infrastructure Cybersecurity, and Presidential Policy Directive (PPD) 21, Critical Infrastructure Security and Resilience. DHS supports critical infrastructure owners and operators in preparing for, preventing, protecting against, mitigating from, responding to, and recovering from all-hazards events, including cyber incidents, terrorist attacks, and natural disasters. These activities promote the safety and security of the American public and ensure the provision of essential services and functions, such as energy and communications. To achieve this end, DHS works with public and private- sector partners to identify and promote effective solutions for security and resilience that address the risks facing the Nation's critical infrastructure. While this increased connectivity has led to significant transformations and advances across our country--and around the world-- it also has increased the importance and complexity of our shared risk. Our daily life, economic vitality, and National security depend on cyberspace. A vast array of interdependent IT networks, systems, services, and resources are critical to communication, travel, powering our homes, running our economy, and obtaining Government services. No country, industry, community, or individual is immune to cyber risks. Critical infrastructure is the backbone of our country's National and economic security. It includes power plants, chemical facilities, communications networks, bridges, highways, and stadiums, as well as the Federal buildings where millions of Americans work and visit each day. DHS coordinates the National protection, prevention, mitigation, and recovery from cyber incidents and works regularly with business owners and operators to take steps to strengthen their facilities and communities. The Department also conducts on-site risk assessments of critical infrastructure and shares risk and threat information with State, local, and private-sector partners. Protecting critical infrastructure against growing and evolving cyber threats requires a layered approach. DHS actively collaborates with public and private-sector partners every day to improve the security and resilience of critical infrastructure while responding to and mitigating the impacts of attempted disruptions to the Nation's critical cyber and communications networks and to reduce adverse impacts on critical network systems. Beyond evolving cybersecurity risks, the Nation's critical infrastructure is potentially affected by more frequent and severe weather events, by sustained under-investment in the integrity of aging and degrading infrastructure, and by an evolving terrorist threat. Recognizing the need for collaborative solutions to confront this changing risk paradigm and promote a more secure and resilient critical infrastructure, President Obama issued EO 13636 and PPD-21. These two directives aim to ``enhance the security and resilience of the Nation's critical infrastructure and to maintain a cyber environment that encourages efficiency, innovation, and economic prosperity while promoting safety, security, business confidentiality, privacy, and civil liberties.'' Taken together, these two policy documents are intended to achieve the following:Encourage the adoption of effective measures across all critical infrastructure sectors to improve security and resiliency and reduce risk from cyber attacks to essential functions and services by publishing a Cybersecurity Framework (the Framework) that will provide owners and operators with a prioritized, flexible, repeatable, performance-based, and cost- effective set of validated security controls based upon industry best practices. Enhance timely, relevant, and accurate information sharing on significant risks by implementing a program to develop and rapidly share unclassified information with critical infrastructure owners and operators, enabling the adoption of effective mitigations to prevent or to reduce the consequences of significant incidents. Align responsibilities of public and private partners to efficiently allocate risk reduction responsibilities by conducting an analysis of the existing critical infrastructure public-private partnership model and recommending options for improving the effectiveness of the partnership in managing both the physical and cyber risks. Promote innovation in novel risk-reduction solutions by developing a National Critical Infrastructure Security and Resilience Research and Development (R&D) Plan to identify priorities and guide R&D requirements and investments toward those solutions that will help assure the provision of essential functions and services over time. Ensure that privacy, civil rights, and civil liberties are protected as a foundational part of all risk management efforts by conducting an assessment of the privacy, civil rights, and civil liberties implications of all EO 13636 and PPD-21 programs and recommending revisions to proposed initiatives as required. Working in partnership with the Federal interagency, DHS established an Integrated Task Force to: Lead the Department's implementation of PPD-21 and EO 13636, including coordination with the Department of Commerce's National Institute of Standards and Technology, on the Cybersecurity Framework; Serve as the focal point for collaboration with industry; Involve key stakeholders from all levels of government; and Prioritize tasks, plan implementation, and coordinate principal offices of responsibility. The Integrated Task Force is further charged with ensuring the production of various deliverables as mandated under EO 13636 and PPD- 21. These deliverables, however, are not an end in themselves; rather, each deliverable is intended to contribute to future efforts that will promote the security and resilience of the Nation's critical infrastructure. consultative process Promoting security and resilience is a collaborative endeavor requiring effort and investment from both the Federal Government and private sector, as well as State, local, Tribal, and territorial partners. Thus, to implement EO 13636 and PPD-21, the Federal Government has actively sought the collaboration, input and engagement of our partners. The Integrated Task Force has developed a ``consultative process'' pursuant to EO 13636, to work within the Federal Government to collaborate with State, local, Tribal, and territorial government officials as well as private-sector owners and operators of critical infrastructure and the non-profit and academic communities. The consultative process is based on the following principles: Seek out opportunities across the whole community; Be systematic, transparent, and repeatable; Focus on appropriate and meaningful multi-directional communications and collaboration; Establish protocols to ensure that progress reports, current direction, and current messaging are broadly shared and understood; Document activities to track participation across the whole community; Identify and engage the full range of stakeholders across the critical infrastructure and cybersecurity community; Utilize established partnership organizations and regimes; Promote innovative approaches to maximize opportunities for input from stakeholders across the whole community; Ensure that privacy and civil liberties protections are incorporated into the tasks by coordinating with appropriate senior Federal agency officials; Foster development of an enduring engagement process that can be used in other cyber and critical infrastructure security and resilience efforts. Using those principles, the Integrated Task Force developed nine separate working groups and has conducted more than 100 working sessions involving 1,100 attendees, to date. Representatives from DHS have also conducted more than 100 briefings on our efforts to nearly 10,000 stakeholders since February 2013. Outside of the established Integrated Task Force working groups, the cyber and critical infrastructure communities are being engaged through working sessions, conferences, meetings, and virtual collaboration methods such as the Homeland Security Information Network, IdeaScale, and webinars. The format and style of engagement varies according to the needs of the community engaged and the purpose for engagement. The venue and mechanism for engagement is also determined by the outcomes sought and the nature of the constituency involved. In addition, DHS has worked with the Department of Commerce's National Institute of Standards and Technology (NIST) to utilize the consultative process in support of the development of the Framework. status of current efforts We have accomplished much over the past 150 days using the Consultative Process to engage whole community stakeholders. The Secretary has already submitted several EO 13636 and PPD-21 deliverables to the White House, to include: An Incentives Report, which analyzes potential Government incentives that could be used to promote the adoption of the Framework; A description of critical infrastructure functional relationships, which illustrates the Federal Government's current organizational structure to deliver risk management support to stakeholders and make it easier for them to collaborate with the Government; Instructions on producing unclassified cyber threat reports from all sources of information, including intelligence, to improve the ability of critical infrastructure partners to prevent and respond to significant threats; Procedures for expansion of the Enhanced Cybersecurity Services (ECS) program to all critical infrastructure sectors. The ECS program promotes cyber threat information sharing between Government and the private sector, which helps critical infrastructure entities protect themselves against cyber threats to the systems upon which so many Americans rely. DHS will share with appropriately cleared private sector cybersecurity providers the same threat indicators that we rely on to protect the .gov domain. Those providers will then be free to contract with critical infrastructure entities and provide cybersecurity services comparable to those provided to the U.S. Government; Recommendations on feasibility, security benefits, and merits of incorporating security standards into acquisition planning and contract administration, addressing what steps can be taken to make existing procurement requirements related to cybersecurity consistent; A process for expediting security clearances to those in the private sector with an essential ``need to know'' regarding Classified cybersecurity risk information. This processing is intended only for those who need access to Classified information. While it is important to ensure that our private- sector partners who have a valid need for access to Classified information receive appropriate security clearances, we believe that most information sharing can be conducted at the Unclassified level; and A report outlining how well the current critical infrastructure public-private partnership model as articulated in the National Infrastructure Protection Plan (NIPP) is working toward promoting the security and resilience of the Nation's critical infrastructure, and recommendations to strengthen those partnerships. In addition, we have conducted an initial evaluation of and are identifying critical infrastructure entities which would reasonably result in catastrophic consequences from a cybersecurity incident. While we are incorporating lessons from this analysis in developing a repeatable system of critical infrastructure assessments, the results from this preliminary evaluation identified a relatively small list of U.S. critical infrastructure that if impacted by a cybersecurity incident could cause catastrophic consequence to our National security, economic security, public health, and safety. moving forward While we have made significant progress to date, there is much work still to be done this year to fulfill the vision set forth in EO 13636 and PPD-21. To that end, DHS will be focusing its efforts on the following steps via the Integrated Task Force: Updating the NIPP to reflect new policies, a change in the risk environment, and lessons learned working in collaboration across the public and private sectors to manage infrastructure risk; Enhancing near-real-time situational awareness for critical infrastructure, with a particular focus on multi-directional information sharing and understanding of interdependencies between physical and cyber systems and critical infrastructure sectors; Developing a draft of the National Critical Infrastructure Security and Resilience Research and Development Plan; and Collaborating with NIST on the Cybersecurity Framework. DHS is developing the Performance Goals described in EO 13636 for the Framework collaboratively with critical infrastructure owners and operators using the Consultative Process. By framing the importance of cyber risk in a business context, the Performance Goals will encourage adoption of the Framework. The goals complement the Framework which will outline what businesses should do to manage cyber risk. In turn, the specific standards and controls suggested under the Framework will explain how businesses should manage cyber risk. Through the Performance Goals, critical infrastructure owners and operators will be able to adopt a common approach to evaluating the effectiveness of risk management investments based upon business outcomes. While DHS will not require nor evaluate the adoption of the Performance Goals among critical infrastructure owners and operators, the Goals will encourage businesses to frame cybersecurity risk in the context of economic sustainability, and thereby facilitate strategic planning and investment to identify changing risks and implement measurably effective solutions. The Framework will also serve as a basis for a DHS Voluntary Program, which will result in on-going collaboration with industry to promote market-based solutions to higher levels of cybersecurity. cyber legislative priorities It is important to note that EO 13636 directs Federal agencies to work within current authorities and increase voluntary cooperation with the private sector to provide better protection for computer systems critical to our National and economic security. We continue to believe that a comprehensive suite of legislation is necessary to implement the full range of steps needed to build a strong public-private partnership, and we will continue to work with Congress to achieve this. Consistent with the proposal that the administration transmitted last Congress, legislation should: Facilitate cybersecurity information sharing between the Government and the private sector as well as among private- sector companies. We believe that such sharing can occur in ways that uphold privacy and civil liberties protections, expand upon existing best practices from industry leaders in this area, reinforce the appropriate roles of intelligence and non-intelligence agencies, and include targeted liability protections; Incentivize the adoption of best practices and standards for critical infrastructure by complementing the process set forth under the Executive Order; Give law enforcement the tools to fight crime in the digital age; Update Federal agency network security laws, and codify DHS' cybersecurity responsibilities; and Create a National Data Breach Reporting requirement. In each of these legislative areas, we want to incorporate robust privacy and civil liberties safeguards. The administration stands ready to work with Congress to pass important cybersecurity legislation. conclusion Critical infrastructure security and resilience to cyber incidents and other risks is an on-going capability development effort rather than an end-state to be achieved on a given date, or via a defined deliverable. All partners in this National effort will need to continue to contribute to its progress over time. The implementation of EO 13636 and PPD-21 is a key step in achieving these desired outcomes; progress will require sustained effort by both public and private partners, and a recognition of the rapidly evolving risk environment. The desired end-state of the critical infrastructure partnership model is an environment in which public and private partners work in a networked manner to effectively and efficiently share information and allocate risk-reduction responsibilities. If achieved, this result will maximize the comparative advantage of each and reduce duplication or under- investment, resulting in collaborative solutions to reduce the likelihood of the highest-consequence incidents. Thank you for the opportunity to discuss the Department's role in improving critical infrastructure security and resilience. I look forward to any questions you may have. Mr. Meehan. Thank you, Mr. Kolasky. That is a--you got a lot on your agenda. That is a big report, and I know we will be looking forward to talking with you about some of that. Dr. Romine. The Chairman now recognizes you for your 5 minutes of testimony. Thank you. STATEMENT OF CHARLES H. ROMINE, PH D, DIRECTOR, INFORMATION TECHNOLOGY LABORATORY, NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY, U.S. DEPARTMENT OF COMMERCE Mr. Romine. Thank you, Chairman Meehan, Ranking Member Clarke, and Members of the subcommittee. Thank you very much for the opportunity to testify today. As directed in the Executive Order, NIST is working with industry to develop the cybersecurity framework to improve the cybersecurity of critical infrastructures and working with the Department of Homeland Security to establish performance goals. Our partnership with industry and with DHS is driving much of our effort. Earlier this year, we signed a memorandum agreement with DHS to ensure that our work on the framework and also with cybersecurity standards best practices and metrics is fully integrated with information sharing, threat analysis, response, and operational work of DHS. We believe this will enable a more holistic approach to addressing the complex challenges that we face. The framework is an important element in addressing the challenges of improving the cybersecurity of our critical infrastructure. A NIST-coordinated and industry-led framework will draw on standards and best practices that industry already develops and uses. NIST is ensuring that the process is open and transparent to all stakeholders and will ensure a robust technical underpinning to the framework. This approach will significantly bolster the relevance of the resulting framework to industry making it more appealing for industry to adopt. This multi-stakeholder approach leverages the respective strengths of the public and private sectors and helps to develop solutions in which both sides will be invested. The approach does not dictate solutions to industry but rather facilitates industry coming together to develop and offer solutions that the private sector is best positioned to embrace. I would also like to note that this is not a new or novel approach for NIST. We have used very similar approaches in the recent past to address other pressing National priorities. For example, NIST's work in the area of cloud computing technologies enabled us to develop important definitions and architectures and is now enabling broad Federal Government deployment of secure cloud computing technologies. The lessons learned from this experience and others are informing how we are planning for and structuring our current effort. NIST's initial steps toward implementing the Executive Order included issuing a request for information or RFI this past February to gather relevant input from industry and other stakeholders and asking stakeholders to participate in the cybersecurity framework process. The responses to the RFI, a total of 244, were posted on NIST's website. Those responding ranged from individuals to large corporations and trade associations and they provided comments as brief as a few sentences on specific topics as well as so comprehensive that they ran over 100 pages. We published an analysis of these comments in May. NIST is also engaging with stakeholders through a series of workshops and events to ensure that we can cover the breadth of considerations that will be needed to make this National priority a success. Our first such session held in April initiated the process of identifying existing resources and gaps and prioritized the issues to be addressed as part of the framework. At the end of May, a second workshop at Carnegie Mellon University brought together a broad cross-section of participants representing critical infrastructure owners and operators, industry associations, standards developing organizations, individual companies, and Government agencies. This 3-day working session using the analysis of the RFI comments as input was designed to identify and achieve consensus on the standards, guidelines, and practices that will be used in the framework. Last week, NIST held its third workshop to present initial considerations for the framework. This workshop had a particular emphasis on issues that have been identified from the initial work including the specific needs of different sectors. During the workshop, NIST gained consensus on several elements that the framework will include. At 8 months, we will have a preliminary framework that builds on these elements. After a year-long effort, once we have developed an initial framework, there will still be much to do. For example, we will work with specific sectors and DHS to build strong voluntary programs for specific critical infrastructure areas. Their work will then inform the needs of critical infrastructure and the next versions of the framework. The goal at the end of this process will be for industry itself to take ownership and update the cyber secure framework ensuring that the framework will continue to evolve as needed. We have made significant progress, but we have a lot of work still ahead of us, and I look forward to working with this committee and others to help us address these pressing challenges. I will be pleased to answer any questions you may have for me. Thank you. [The prepared statement of Mr. Romine follows:] Prepared Statement of Charles H. Romine July 18, 2013 introduction Chairman Meehan, Ranking Member Clarke, Members of the subcommittee, I am Chuck Romine, director of the Information Technology Laboratory of the National Institute of Standards and Technology (NIST), a non-regulatory bureau within the U.S. Department of Commerce. Thank you for this opportunity to testify today on NIST's role under Executive Order 13636, ``Improving Critical Infrastructure Cybersecurity'' and our responsibility to develop a framework for reducing cyber risks to critical infrastructure. the role of nist in cybersecurity NIST's mission is to promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life. Our work in addressing technical challenges related to National priorities has ranged from projects related to the Smart Grid and electronic health records to atomic clocks, advanced nanomaterials, and computer chips. In the area of cybersecurity, we have worked with Federal agencies, industry, and academia since 1972 starting with the development of the Data Encryption Standard. Our role to research, develop, and deploy information security standards and technology to protect information systems against threats to the confidentiality, integrity, and availability of information and services, was strengthened through the Computer Security Act of 1987 and reaffirmed through the Federal Information Security Management Act of 2002. Consistent with this mission, NIST actively engages with industry, academia, and other parts of the Federal Government including the intelligence community, and elements of the law enforcement and National security communities, coordinating and prioritizing cybersecurity research, standards development, standards conformance demonstration, and cybersecurity education and outreach. Our broader work in the areas of information security, trusted networks, and software quality is applicable to a wide variety of users, from small and medium enterprises to large private and public organizations including agencies of the Federal Government and companies involved with critical infrastructure. executive order 13636, ``improving critical infrastructure cybersecurity'' On February 13, 2013, the President signed Executive Order 13636, ``Improving Critical Infrastructure Cybersecurity,'' which gave NIST the responsibility to develop a framework to reduce cyber risks to critical infrastructure (the Cybersecurity Framework). As directed in the Executive Order, NIST, working with industry, will develop the Cybersecurity Framework and the Department of Homeland Security (DHS) will establish performance goals. DHS, in coordination with sector- specific agencies, will then support the adoption of the Cybersecurity Framework by owners and operators of critical infrastructure and other interested entities, through a voluntary program. Our partnership with DHS will drive much of our effort. Earlier this year, we signed a Memorandum of Agreement with DHS to ensure that our work on the Cybersecurity Framework, and also with cybersecurity standards, best practices, and metrics, is fully integrated with the information sharing, threat analysis, response, and operational work of DHS. We believe this will enable a more holistic approach to addressing the complex challenges we face. A Cybersecurity Framework is an important element in addressing the challenges of improving the cybersecurity of our critical infrastructure. A NIST-coordinated and industry-led Framework will draw on standards and best practices that industry already develops and uses. NIST is ensuring that the process is open and transparent to all stakeholders, and will ensure a robust technical underpinning to the Framework. This approach will significantly bolster the relevance of the resulting Framework to industry, making it more appealing for industry to adopt. This multi-stakeholder approach leverages the respective strengths of the public and private sectors, and helps develop solutions in which both sides will be invested. The approach does not dictate solutions to industry, but rather facilitates industry coming together to offer and develop solutions that the private sector is best positioned to embrace. I would also like to note that this is not a new or novel approach for NIST. We have utilized very similar approaches in the recent past to address other pressing National priorities. For example, NIST's work in the area of cloud computing technologies enabled us to develop important definitions and architectures, and is now enabling broad Federal Government deployment of secure cloud computing technologies. The lessons learned from this experience and others are informing how we are planning for and structuring our current effort. developing the cybersecurity framework The Cybersecurity Framework will consist of standards, methodologies, procedures, and processes that align policy, business, and technological approaches to address cyber risks for critical infrastructure. Once the final Framework is established, the Department of Homeland Security (DHS), in coordination with sector-specific agencies, will then support the adoption of the Cybersecurity Framework by owners and operators of critical infrastructure and other interested entities through a voluntary program. Regulatory agencies will also review the Cybersecurity Framework to determine if current cybersecurity requirements are sufficient, and propose new actions to ensure consistency. This approach reflects both the need for enhancing the security of our critical infrastructure and the reality that the bulk of critical infrastructure is owned and operated by the private sector. Any efforts to better protect critical infrastructure need to be supported and implemented by the owners and operators of this infrastructure. It also reflects the reality that many in the private sector are already doing the right things to protect their systems and should not be diverted from those efforts through new requirements. current status of the cybersecurity framework Underlying all of this work, NIST sees its role in developing the Cybersecurity Framework as partnering with industry and other stakeholders to help them develop the Framework. NIST's unique technical expertise in various aspects of cybersecurity-related research and technology development, and our established track record of working with a broad cross-section of industry and Government agencies in the development of standards and best practices, positions us very well to address this significant National challenge in a timely and effective manner. NIST's initial steps towards implementing the Executive Order included issuing a Request for Information (RFI) this past February to gather relevant input from industry and other stakeholders, and asking stakeholders to participate in the Cybersecurity Framework process. Given the diversity of sectors in critical infrastructure, the initial efforts are designed help identify existing cross-sector security standards and guidelines that are immediately applicable or likely to be applicable to critical infrastructure. The responses to the RFI--a total of 244--were posted on NIST's website. Those responding ranged from individuals to large corporations and trade associations and they provided comments as brief as a few sentences on specific topics, as well as so comprehensive that they ran over a hundred pages. We published an analysis of these comments in May. NIST is also engaging with stakeholders through a series of workshops and events to ensure that we can cover the breadth of considerations that will be needed to make this National priority a success. Our first such session--held in April--initiated the process of identifying existing resources and gaps, and prioritized the issues to be addressed as part of the Framework. At the end of May, a second workshop at Carnegie Mellon University brought together a broad cross-section of participants representing critical infrastructure owners and operators, industry associations, standards-developing organizations, individual companies, and Government agencies. This 3-day working session, using the analysis of the RFI comments as input, was designed to identify and achieve consensus on the standards, guidelines, and practices that will be used in the Framework. Based on the responses to the RFI, conclusions from the workshops, and NIST analyses, the preliminary Framework is designed and intended: To be an adaptable, flexible, and scalable tool for voluntary use; To assist in assessing, measuring, evaluating, and improving an organization's readiness to deal with cybersecurity risks; To be actionable across an organization; To be prioritized, flexible, repeatable, performance-based, and cost-effective; To rely on standards, guidelines, and practices that align with policy, business, and technological approaches to cybersecurity; To complement rather than to conflict with current regulatory authorities; To promote, rather than to constrain, technological innovation in this dynamic arena; To focus on outcomes; To raise awareness and appreciation for the challenges of cybersecurity but also the means for understanding and managing the related risks; To be built upon international standards and other standards, best practices and guidelines that are used globally. Last week, NIST held its third workshop to present initial considerations for the Framework. This workshop had a particular emphasis on issues that have been identified from the initial work-- including the specific needs of different sectors. During the workshop, NIST gained consensus on the elements of the Framework that include: A section for senior executives and others on using this Framework to evaluate an organization's preparation for potential cybersecurity-related impacts on their assets and on the organizations ability to deliver products and services. By using this Framework, senior executives can manage cybersecurity risks within their enterprise's broader risks and business plans and operations. A User's Guide to help organizations understand how to apply the Framework. Core Sections to address: Five major cybersecurity functions and their categories, subcategories, and informative references; Three Framework Implementation Levels associated with an organization's cybersecurity functions and how well that organization implements the Framework. A compendium of informative references, existing standards, guidelines, and practices to assist with specific implementation. At 8 months, we will have a preliminary Framework that builds on these elements. In a year's time, once we have developed an initial Framework, there will still be much to do. For example, we will work with specific sectors to build strong voluntary programs for specific critical infrastructure areas. Their work will then inform the needs of critical infrastructure and the next versions of the Framework. The goal at the end of this process will be for industry itself to take ``ownership'' and update the Cybersecurity Framework--ensuring that the Framework will continue to evolve as needed. conclusion The cybersecurity challenge facing critical infrastructure is greater than it ever has been. The President's Executive Order reflects this reality, and lays out an ambitious agenda founded on active collaboration between the public and private sectors. NIST is mindful of the weighty responsibilities with which we have been charged by President Obama, and we are committed to listening to, and working actively with, critical infrastructure owners and operators to develop a Cybersecurity Framework. The approach to the Cybersecurity Framework set out in the Executive Order will allow industry to protect our Nation from the growing cybersecurity threat while enhancing America's ability to innovate and compete in a global market. It also helps grow the market for secure, interoperable, innovative products to be used by consumers anywhere. Thank you for the opportunity to present NIST's views regarding critical infrastructure cybersecurity security challenges. I appreciate the committee holding this hearing. We have a lot of work ahead of us, and I look forward to working with this committee and others to help us address these pressing challenges. I will be pleased to answer any questions you may have. Mr. Meehan. Thank you, Dr. Romine. The Chairman now recognizes Dr. Fischer for 5 minutes of testimony. Dr. Fischer. STATEMENT OF ERIC A. FISCHER, PH D, SENIOR SPECIALIST, SCIENCE AND TECHNOLOGY, CONGRESSIONAL RESEARCH SERVICE, LIBRARY OF CONGRESS Mr. Fischer. Good morning, Chairman Meehan, Ranking Member Clarke, and distinguished Members of the subcommittee. On behalf of the Congressional Research Service, thank you for the opportunity to testify today. Over the past several years, evidence has grown that U.S. critical infrastructure is vulnerable to potentially damaging cyber attacks. Calls for action have come from many corridors. The 111th and 112th Congresses considered but did not enact legislation to address those vulnerabilities. Last year, the Obama administration announced that it was in developing Executive Order, which as you heard was--as, you know, was released in February of this year. Five goals in the order have received the most public attention. They are No. 1, expanded information sharing including Classified information between the Government and the private sector. No. 2, identification of critical infrastructure for which successful cyber attacks could have catastrophic impacts. No. 3, a voluntary framework of cybersecurity standards and best practices for critical infrastructure developed with the private sector. No. 4, incentives for voluntary adoption of that framework. No. 5, review of regulatory requirements on cybersecurity and recommendations on how to improve them. The order called for fulfillment of its information-sharing requirements and certain others by mid-June of this year and for the high-risk critical infrastructure to be designated by mid-July. The framework is to be finalized by next February along with the report addressing privacy and civil liberties protections. The review of regulatory requirements is to be completed in two stages with gaps to be identified by next March and the problematic requirements by February 2016. The administration issued Presidential Policy Directive 21 along with the Executive Order. The Directive makes cybersecurity an integral component of critical infrastructure security and resilience. Generally, reaction to the Executive Order and Directive from stakeholders has been positive. Criticisms have tended to fall into five categories: Whether the Order does anything new, the implementation time table, adoption of the framework, the critical infrastructure designation process, and the Order's influence on Congressional action. For all five categories, arguments have been made on both sides. One criticism of the Order was also raised against some of the legislative proposals in the 112th Congress that it would result in increased industry regulation that would be both ineffective and burdensome. Such critics say that even a voluntary framework can become mandatory in practice. An alternative view is that voluntary approaches have not been particularly effective in this area and regulation appears to be working in sectors such as electric power. Others believe that voluntary approaches can be effective without causing undue burdens. Some argue that it will be better for this Congress to wait until the Order is fully implemented before considering legislation. Others believe, however, that the Order merely clarifies what changes are needed to current law. It may be too early to determine how at least some of those concerns above will be addressed, let alone whether the responses will satisfy critics. Overall, however, response from the private sector appears to be cautiously optimistic. With respect to current legislation, the Cybersecurity Enhancement Act, H.R. 756, would require a triennial strategic plan for cybersecurity R&D. It would be prepared using an interagency process similar to that established under the High Performance Computing Act of 1991 and related laws. PPD 21 also requires a periodic R&D plan, but it would focus specifically on critical infrastructure and cover physical as well as a cybersecurity. It would also be quadrennial rather than triennial, and it would be led by the Secretary of Homeland Security rather than the Office of Science and Technology Policy. CISPA, H.R. 624, would permit sharing of classified information with private-sector critical infrastructure entities. Under the bill, procedures would be established by the Director of National Intelligence. The Executive Order in contrast puts the Secretary of Homeland Security in the lead. CISPA also requires that the establishment of new procedures relating to privacy and civil liberties; whereas the Order requires agencies to apply protections consistent with established principles. Finally, I should mention that CISPA would address one of the perceived gaps in current law. It would explicitly permit information sharing between private entities and would provide liability protections. Significant debate has centered on the scope of those changes and the potential impacts on privacy and civil liberties. That concludes my testimony. Once again, thank you for asking me to appear before you today. [The prepared statement of Mr. Fischer follows:] Prepared Statement of Eric A. Fischer July 18, 2013 Chairman Meehan, Ranking Member Clarke, and distinguished Members of the subcommittee: Thank you for the opportunity to discuss Executive Order 13636, Improving Critical Infrastructure Cybersecurity, with you today. In my testimony, I will provide some background on the development of the Order and describe its major provisions, including the roles it proposes for the private sector and reaction to it by those stakeholders, as well as its relationship to Congressional legislation and the new Obama administration policy directive on critical infrastructure. development of the executive order Both the George W. Bush administration and the Obama administration have made improvements to the cybersecurity of critical infrastructure a priority. The Bush administration created the Comprehensive National Cybersecurity Initiative (the CNCI) in 2008 via a Classified Presidential Directive.\1\ The Obama administration performed an interagency review of Federal cybersecurity initiatives in 2009, culminating in the release of its Cyberspace Policy Review\2\ and the creation of the White House position of Cybersecurity Coordinator. --------------------------------------------------------------------------- \1\ National Security Presidential Directive 54/Homeland Security Presidential Directive 23 (NSPD-54/HSPD-23). \2\ The White House, Cyberspace Policy Review, May 29, 2009, http:/ /www.whitehouse.gov/assets/documents/ Cyberspace_Policy_Review_final.pdf; The White House, ``Cyberspace Policy Review [Supporting Documents],'' May 2009, http:// www.whitehouse.gov/cyberreview/documents/. --------------------------------------------------------------------------- Both those efforts and a number of reports from agencies, think tanks, and other groups identified gaps in Federal efforts. Both the 111th and 112th Congresses considered legislative proposals to close those gaps, but none were enacted. In the absence of enacted legislation, the Obama administration began drafting a cybersecurity Executive Order in 2012. The development involved a lengthy interagency process, with both agencies and stakeholders in the private sector providing input. The White House released Executive Order 13636 on February 12, 2013, along with a new policy directive on critical infrastructure. Relevant legislation is also being developed by the 113th Congress. Four bills with cybersecurity provisions (H.R. 624, H.R. 756, H.R. 967, and H.R. 1163) that were introduced in the month after the release of the Executive Order passed the House in April, and additional bills in the House and the Senate are reportedly being drafted. requirements in the executive order The Order uses existing statutory and Constitutional authority to: Expand information sharing and collaboration between the Government and the private sector, including sharing Classified information by broadening a program developed for the defense industrial base to other critical-infrastructure sectors; Develop a voluntary framework of cybersecurity standards and best practices for protecting critical infrastructure, through a public/private effort; Establish a consultative process for improving critical- infrastructure cybersecurity; Identify critical infrastructure with especially high priority for protection, using the consultative process; Establish a program with incentives for voluntary adoption of the framework by critical-infrastructure owners and operators; Review cybersecurity regulatory requirements to determine if they are sufficient and appropriate; and Incorporate privacy and civil liberties protections in activities under the Order. The information-sharing and framework provisions in particular have received significant public attention. Information Sharing The Order formalizes a previously existing program, now called Enhanced Cybersecurity Services, in the Department of Homeland Security (DHS), for providing classified threat information to eligible critical infrastructure companies and to their eligible internet, network, communications, and cybersecurity service providers (known jointly as commercial service providers or CSPs). The program developed out of a pilot involving the Department of Defense and companies in the defense industrial base, which is one of the 16 recognized critical- infrastructure sectors. The Order also requires the Secretary of Homeland Security, the Attorney General, and the Director of National Intelligence to expedite dissemination to targeted entities of unclassified and, where authorized, classified threat indicators. Additionally, the Secretary of Homeland Security is to expedite processing of security clearances to appropriate critical-infrastructure personnel and expand programs to place relevant private-sector experts in Federal agencies on a temporary basis. Cybersecurity Framework Executive Order 13636 requires the National Institute of Standards and Technology (NIST) to lead the development of a Cybersecurity Framework that uses an open, consultative process to identify cross- sector, voluntary consensus standards and business best practices that can reduce cybersecurity risks to critical infrastructure. The framework is to be technology-neutral. It must identify areas for improvement and be reviewed and updated as necessary. The Secretary of Homeland Security is required to set performance goals for the framework, establish a voluntary program to support its adoption, and coordinate establishment of incentives for adoption. The sector-specific agencies must coordinate review of the framework and development of sector-specific guidance, and report annually to the President on participation by critical-infrastructure sectors. Agencies with regulatory responsibilities for critical infrastructure are required to engage in consultative review of the framework, determine whether existing cybersecurity requirements are adequate, report to the President whether the agencies have authority to establish requirements that sufficiently address the risks, propose additional authority where required, and identify and recommend remedies for ineffective, conflicting, or excessively burdensome cybersecurity requirements. The development of the framework is arguably the most innovative and labor-intensive requirement in the Executive Order. It builds on the involvement of NIST in the development of cybersecurity technical standards \3\ and its statutory responsibilities to work with both Government and private entities on various aspects of standards and technology.\4\ --------------------------------------------------------------------------- \3\ See, e.g., National Institute of Standards and Technology, ``Computer Security Resource Center,'' February 20, 2013, http:// csrc.nist.gov/. \4\ 15 U.S.C. 272. --------------------------------------------------------------------------- None of the major legislative proposals in the 111th and 112th Congresses had proposed using NIST to coordinate an effort led by the private sector to develop a framework for cybersecurity, such as is envisioned by the Executive Order. Hundreds of entities have been involved in NIST's efforts to date, beginning with a Request for Information in February and including public workshops in April, May, and July of 2013.\5\ An additional workshop is planned for September. --------------------------------------------------------------------------- \5\ National Institute of Standards and Technology, ``Cybersecurity Framework,'' July 2, 2013, http://www.nist.gov/itl/cyberframework.cfm. --------------------------------------------------------------------------- Other Requirements Acquisition and Contracting. The Secretary of Defense and the Administrator of General Services must make recommendations to the President on incorporating security standards in acquisition and contracting processes, including harmonization of cybersecurity requirements. Consultative Process. The Secretary of Homeland Security is required to establish a broad consultative process to coordinate improvements in the cybersecurity of critical infrastructure. Cybersecurity Workforce. The Secretary of Homeland Security is required to coordinate technical assistance to critical-infrastructure regulatory agencies on development of their cybersecurity workforce and programs. High-Risk Critical Infrastructure. The Order requires the Secretary of Homeland Security to use consistent and objective criteria, the consultative process established under the Order, and information from relevant stakeholders to identify and update annually a list of critical infrastructure for which a cyber attack could have catastrophic regional or National impact, but not including commercial information technology products or consumer information technology services. The Secretary must confidentially notify owners and operators of critical infrastructure that is so identified of its designation and provide a process to request reconsideration. Privacy and Civil Liberties. The Order requires agencies to ensure incorporation of privacy and civil liberties protections in agency activities under the Order, including protection from disclosure of information submitted by private entities, as permitted by law. The DHS Chief Privacy Officer and Officer for Civil Rights and Civil Liberties must assess risks to privacy and civil liberties of DHS activities under the Order and recommend methods of mitigation to the Secretary in a public report. Agency privacy and civil liberties officials must provide assessments of agency activities to DHS. Implementation Deliverables and Deadlines The Order contains several requirements with deadlines, and other requirements with no associated dates. In March 2013, DHS announced that it had formed a task force with eight working groups focused on the various deliverables for which it is responsible.\6\ There are 12 deliverables with specific associated dates: --------------------------------------------------------------------------- \6\ Department of Homeland Security, ``Integrated Task Force,'' March 18, 2013, http://www.dhs.gov/sites/default/files/publications/EO- PPD%20Fact%20Sheet%2018March13.pdf. --------------------------------------------------------------------------- June 12, 2013 Instructions for producing unclassified threat reports (Secretary of Homeland Security, Attorney General, Director of National Intelligence) (Sec. 4(a)). Procedures for expansion of the Enhanced Cybersecurity Services Program (Secretary of Homeland Security) (Sec. 4(c)). Recommendations to the President on incentives to participate in the framework (Secretaries of Homeland Security, Commerce, and the Treasury) (Sec. 8(d)). Recommendations to the President on acquisitions and contracts (Secretary of Defense, Administrator of General Services) (Sec 8(e)). July 12, 2013 Designation of critical infrastructure at greatest risk (Secretary of Homeland Security) (Sec. 9(a)). October 10, 2013 Publication of preliminary Cybersecurity Framework (Director of the National Institute of Standards and Technology) (Sec. 7(e)). February 12, 2014 Report on privacy and civil liberties, preceded by consultations (Chief Privacy Officer and Officer for Civil Rights and Civil Liberties of DHS) (Sec. 5(b)). Publication of final Cybersecurity Framework (Director of the National Institute of Standards and Technology) (Sec. 7(e)). May 13, 2014 Reports to the President on review of regulatory requirements (agencies with regulatory responsibilities for critical infrastructure) (Sec. 10(a)). Proposed additional risk mitigation actions (agencies with regulatory responsibilities for critical infrastructure) (Sec. 10(b)). February 12, 2016 Reports to the Office of Management and Budget on ineffective, conflicting, or burdensome requirements (agencies with regulatory responsibilities for critical infrastructure) (Sec. 10(c)). The Order also includes more than 20 actions for which no specific date is provided. While many of the activities under the Order are in the process of development, some provisions may already have had some effect. For example, the provision on expedited security clearances was apparently used in responses to a cyber attack this past spring on several banks, to facilitate communication by the FBI with the banks.\7\ --------------------------------------------------------------------------- \7\ Joseph Menn, ``FBI Says More Cooperation with Banks Key to Probe of Cyber Attacks,'' Reuters, May 13, 2013, http:// www.reuters.com/article/2013/05/13/us-cyber-summit-fbi-banks- idUSBRE94C0XH20130513. --------------------------------------------------------------------------- relationship of the executive order to the presidential policy directive Presidential Policy Directive 21 (PPD 21),\8\ Critical Infrastructure Security and Resilience, on protection of critical infrastructure, was released in tandem with Executive Order 13636. PPD 21 supersedes Homeland Security Presidential Directive 7 (HSPD 7), Critical Infrastructure Identification, Prioritization, and Protection, released December 17, 2003. PPD 21 includes cybersecurity broadly as a need to be addressed along with physical security. It seeks to strengthen both the cyber- and physical security and resilience of critical infrastructure by: --------------------------------------------------------------------------- \8\ The White House, ``Critical Infrastructure Security and Resilience,'' Presidential Policy Directive 21, February 12, 2013, http://www.whitehouse.gov/the-press-office/2013/02/12/presidential- policy-directive-critical-infrastructure-security-and-resil. --------------------------------------------------------------------------- clarifying functional relationships among Federal agencies, including the establishment of separate DHS operational centers for physical and cyber-infrastructure; identifying baseline requirements for information sharing, to facilitate timely and efficient information exchange between Government and critical-infrastructure entities while respecting privacy and civil liberties; applying integration and analysis capabilities in DHS to prioritize and manage risks and impacts, recommend preventive and responsive actions, and support incident management and restoration efforts for critical infrastructure; and organizing research and development (R&D) to enable secure and resilient critical infrastructure, enhance impact-modeling capabilities, and support strategic DHS guidance. Implementation Deliverables and Deadlines June 12, 2013 Description of functional relationships within DHS and across other Federal agencies relating to critical infrastructure security and resilience (Secretary of Homeland Security). July 12, 2013 Analysis of public-private partnership models with recommended improvements (Secretary of Homeland Security). August 11, 2013 Convening of experts to identify baseline information and intelligence exchange requirements (Secretary of Homeland Security). October 10, 2013 Demonstration of ``near-real-time'' situational-awareness capability for critical infrastructure (Secretary of Homeland Security). Updated National Infrastructure Protection Plan that addresses implementation of the directive (Secretary of Homeland Security). February 12, 2015 First quadrennial National Critical Infrastructure Security and Resilience R&D Plan (Secretary of Homeland Security).\9\ --------------------------------------------------------------------------- \9\ PPD 7 gave primary responsibility for coordinating R&D to the Office of Science and Technology Policy. In addition to DHS, the Directive describes specific responsibilities for the Departments of Commerce, Interior, Justice, and State, the intelligence community, the General Services Administration, the Federal Communications Commission, the sector- specific agencies, and all Federal departments and agencies.\10\ --------------------------------------------------------------------------- \10\ PPD 7 did not describe specific responsibilities of the intelligence community, the General Services Administration, or the Federal Communications Commission. --------------------------------------------------------------------------- relationship of the executive order to the cyber intelligence sharing and protection act (cispa, h.r. 624) and other legislation A number of observers, both in the Federal Government and the private sector, have stated that Executive Order 13636 is not sufficient to protect U.S. critical infrastructure from cyber threats, and that legislation is needed. In 2011, the White House proposed legislation with provisions on personnel authorities, criminal penalties, data breach notification, authorities of the Department of Homeland Security (DHS), a regulatory framework for cybersecurity of critical infrastructure, and reform of the Federal Information Security Management Act (FISMA). Related provisions also appeared in bills introduced in recent Congresses. Both the White House proposal and several bills have contained incentives for information sharing by the private sector with the Federal Government and other private entities, including protection from legal liability and exemption from provisions in the Freedom of Information Act. At a hearing before the Senate Committee on Homeland Security and Governmental Affairs in September 2012, Secretary of Homeland Security Janet Napolitano stated that in addition to the Executive Order, there were at least three things for which legislation would be necessary: Personnel authorities, liability protections, and criminal penalties (S. Hrg. 112-639, p. 23). A number of private-sector entities have also stated that liability and disclosure protections are needed to encourage private-sector information sharing. Among the cybersecurity bills that have been introduced in the 113th Congress, H.R. 624, the Cyber Intelligence Sharing and Protection Act (CISPA), which passed the House in April, addresses information sharing. Some provisions in CISPA, as in the Executive Order, would provide for expedited security clearances and sharing of classified information by the Federal Government with the private sector. The bill would additionally permit entities providing cybersecurity services to themselves or others (which the bill calls cybersecurity providers) to obtain and share threat information for purposes of protection, notwithstanding any other provision of law. CISPA would also make such entities and those they protect exempt from liability for good-faith use of cybersecurity systems to obtain or share threat information and decisions based on such information. In the Senate, the Committee on Commerce, Science, and Transportation is reportedly drafting a bill that would provide a legislative basis for NIST's role in developing and updating the framework in the Executive Order.\11\ The draft bill would also reportedly require a Federal cybersecurity research and development plan, as would H.R. 756, the Cybersecurity Enhancement Act of 2013, which passed the House in April. PPD-21 requires an R&D plan that addresses security and resiliency for critical infrastructure, including cybersecurity. --------------------------------------------------------------------------- \11\ John Eggerton, ``Rockefeller, Thune Circulate Cybersecurity Draft,'' Broadcasting & Cable, July 12, 2013, http:// www.broadcastingcable.com/article/494447-Rockefeller_Thune_- Circulate_Cybersecurity_Draft.php. --------------------------------------------------------------------------- private-sector reactions to the executive order Given the absence of enacted comprehensive cybersecurity legislation, some security observers contend that the Executive Order is a necessary step in securing vital assets against cyber threats. Some observers, however, have raised concerns.\12\ Common themes by such critics include the following claims: --------------------------------------------------------------------------- \12\ See, for example, Paul Rosenzweig and David Inserra, Obama's Cybersecurity Executive Order Falls Short, Issue Brief No. 3852, February 14, 2013, http://www.heritage.org/research/reports/2013/02/ obama-s-cybersecurity-executive-order-falls-short; Dave Frymier, ``The Cyber Security Executive Order Is Not Enough,'' Innovation Insights: Wired.com, March 1, 2013, http://www.wired.com/insights/2013/03/the- cyber-security-executive-order-is-not-enough/. The Order offers little more than do existing processes. Such critics point out that, for example, the Enhanced Cybersecurity Services program was in place before the release of the Order, and that a variety of efforts have been underway to develop and adopt voluntary standards and best practices in cybersecurity for many years. Proponents of the Order argue that it lays out and clarifies Obama administration goals, requires specific deliverables and time lines, and that the framework and other provisions are in fact new with the Executive Order. The Order could make enactment of legislation less likely. These critics express concern that Congress might decide to wait until the major provisions of the Order have been fully implemented before considering legislation. Proponents state that immediate action was necessary in the absence of legislation, and that changes in current law are necessary no matter how successful the Executive Order might be, to provide liability protections for information sharing and to meet other needs. The process for developing the framework is either too slow or too rushed. Some observers believe that some actions to protect critical infrastructure are well-established and should be taken immediately, given the nature and extent of the current threat. They state that the year-long process to develop the framework may delay implementation of needed security measures\13\ and creates unnecessary and unacceptable risks. Others counter that widespread adoption of the framework requires consensus, which takes time to achieve, and that the 1-year time frame may be insufficient, given that the process for developing and updating consensus standards often takes several years. Some also state that the framework process does not preclude entities from adopting established security measures immediately. --------------------------------------------------------------------------- \13\ For example, some suppliers to the Federal Government have reportedly called for suspension of procurement rulemaking relating to cybersecurity until the framework has been published (Aliya Sternstein, ``Contractors Ask GSA to Freeze Cyber-Related Regulations,'' Nextgov, May 17, 2013, http://www.nextgov.com/cybersecurity/2013/05/contractors- ask-gsa-freeze-cyber-related-regulations/63244/ ?oref=nextgov_cybersecurity). --------------------------------------------------------------------------- The framework risks becoming a form of de facto regulation, or alternatively, its voluntary nature makes it insufficiently enforceable. Another concern of some is that it could lead to Government intrusiveness into private-sector activities, for example through increased regulation under existing statutory authority,\14\ while others contend that voluntary measures have a poor history of success. Some others, however, have argued that changes in the business environment--such as the advent of continuous monitoring, more powerful analytical tools, and a better prepared workforce--improve the likelihood that a voluntary approach can be successful.\15\ --------------------------------------------------------------------------- \14\ For example, some believe that the framework, while voluntary, ``could develop in such a way that companies will be forced to adopt prescriptive standards due to the fact that information on program adoption for `high-risk' industries may be made public. More concerning, this could be done without a review process and could be used to leverage [sic] in ways that may not be beneficial to lowering overall risk'' (Testimony of David E. Kepler, Senate Committee on Homeland Security and Governmental Affairs and Senate Committee on Commerce, Science, and Transportation, ``The Cybersecurity Partnership Between the Private Sector and Our Government: Protecting Our National and Economic Security,'' hearing, March 7, 2013, http:// www.hsgac.senate.gov/hearings/the-cybersecurity-partnership-between- the-private-sector-and-our-government-protecting-our-national-and- economic-security). \15\ CRS Report R42984, The 2013 Cybersecurity Executive Order: Overview and Considerations for Congress, by Eric A. Fischer et al.; Mike McConnell et al., The Cybersecurity Executive Order (Booz Allen Hamilton, April 26, 2013), http://www.boozallen.com/media/file/BA13- 051CybersecurityEOVP.pdf. --------------------------------------------------------------------------- The Order could lead to overclassification or underclassification of high-risk critical infrastructure by DHS. Some observers have expressed concern that the requirement in the Order for DHS to designate high-risk critical infrastructure may be insufficiently clear and could lead to either harmfully expansive designations or inappropriate exclusions of entities.\16\ This might be particularly a problem if the criteria are not sufficiently validated.\17\ --------------------------------------------------------------------------- \16\ Testimony of Roger Mayer, House Committee on Energy and Commerce, ``Cyber Threats and Security Solutions,'' hearing, May 21, 2013, http://energycommerce.house.gov/hearing/cyber-threats-and- security-solutions. \17\ The Government Accountability Office (GAO) expressed similar concerns about DHS's National Critical Infrastructure Prioritization Program (NCIPP) list of highest-priority U.S. infrastructure (Government Accountability Office, Critical Infrastructure Protection: DHS List of Priority Assets Needs to Be Validated and Reported to Congress, GAO-13-296, March 2013, http://www.gao.gov/assets/660/ 653300.pdf). The relationship between the NCIPP list and that under the Executive Order has raised some concerns. There appear to be some differences between the lists that have resulted in some disagreements with the private sector (see, for example, Testimony of Dave McCurdy, House Committee on Energy and Commerce, Cyber Threats and Security Solutions, hearing, May 21, 2013, http://energycommerce.house.gov/ hearing/cyber-threats-and-security-solutions). It appears to be too early in the development of the components of the Executive Order to determine how the concerns described above will be addressed and whether the responses will satisfy critics and skeptics. Overall, however, response to the Order from the private sector--including critical-infrastructure entities, trade associations, --------------------------------------------------------------------------- and cybersecurity practitioners--appears to be cautiously optimistic. Mr. Meehan. Well, thank you Dr. Fischer. I thank each of the panelists for your opening statements. Now I recognize myself for 5 minutes of questions. Dr. Romine, let me just start with you because the focus of our hearing today is NIST and the work that has been done, and I know you gave a little bit of an opening with regard to some of the progress, but give me a sense as to where you are by virtue of the three separate meetings that have been done and what you expect will be the next most critical steps moving into the meetings in Dallas next month. Mr. Romine. Thank you for the question. I am actually quite excited by the progress that we have made and the response that we have gotten from the private sector. One of the concerns that you always have when you begin an issue like this is ensuring that you get a good participation and a vigorous discussion with the private sector if you are going to establish a voluntary program with the framework as the backbone. I am really gratified in two ways. We have gotten vigorous discussions and vigorous debate and we have achieved over the course of a relatively short time a lot of consensus on the overall structure of the framework. We are going to take that, the consensus that we have received in San Diego just last week on elements of it and establish a pretty solid draft framework in preparation for the meeting in Dallas. As you know, the deliverable will be immediately after or just a short time after the Dallas---- Mr. Meehan. What do you think the essence of that deliverable is going to be? What was going to come out at the conclusion of this process? Mr. Romine. So I think there are a few key elements to the framework that have to be there. One is an executive summary that is digestible by the very senior leadership of corporations, companies, the owners and operators of the critical infrastructure. This is something that they are going to have to integrate into their business decision process, and so we have to convey enough information in a way that is digestible to them so that they---- Mr. Meehan. I guess--who and how? That is part of what a lot of this is--you know, the questions become--we often talk about the weakest link, but there is also the--when you talk about business and other kinds of, you know, public and private-sector entities that it is an endless process of who may or may not be included. Who do we think this is targeted to, you know, to be received by, and what kind of activity are we expecting them to undertake as a result of the creation of the standards? Mr. Romine. Well, I think the goal is for all of the critical infrastructure sectors that have been identified through the DHS process and are going to be responsive to the adoption of this voluntary framework and that includes companies at various levels of both sophistication and various levels of import in terms of the critical infrastructure. So there are going to be some very major corporations who already have a lot of mature business processes in place and cybersecurity risk assessment in place to adopt the framework because they may be the most critical of the critical infrastructures and I am sure Mr. Kolasky---- Mr. Meehan. Mr. Kolasky, let me jump onto that with you in terms of the identification of this most critical infrastructure because this is one of the pieces as well, and while I know you can't talk with specificity about that at this point in time because my understanding is that it will be something that will be more or less protected information, but where do you come off of the work that is being done in here and how will the identification of specific sectors uniquely vulnerable relate to what is being done and how about those that are not identified as the most vulnerable but will still be out there in commerce? Mr. Kolasky. Sure. Thank you, Chairman Meehan. First and foremost, to do the work to identify the critical infrastructure where cybersecurity incident could cause catastrophe, we had to work with all of the 16 critical infrastructure sectors and we set up a process to do so. In doing so, we identified the critical functions that each of those infrastructure produce. That and analytic work done in collaboration with industry is very helpful for understanding the overall scope of critical infrastructure in a relationship with cybersecurity which will help the framework adoption. In terms of the actual critical infrastructure that we have identified or are in the process of identifying, it is a relatively small list. It is a list where we think a cybersecurity incident can cause public safety or significant economic damage or National security implications, we plan to work with those industries, those entities, those businesses-- -- Mr. Meehan. Are many or most of those industries already pretty far along in terms of their commitment to cybersecurity or are you concerned about some real outliers? Mr. Kolasky. I think it is fair to say that we are confident that they are very well along with cybersecurity. Most of those entities we have on-going relationships with and we plan to continue those on-going relationships. We will work with them to identify risk management approaches and provide Federal resources to support them, but we are confident that they have taken a cybersecurity problem very seriously and that they have gone a long way in mitigating their vulnerabilities. Mr. Meehan. Okay. Well, thank you. My time is expired, but I know we are going to have an opportunity to ask a series of questions, so I look forward to exploring it further. The Chairman now recognizes the gentlelady from New York, Ms. Clarke. Ms. Clarke. Thank you--thank you very much, Mr. Chairman. The privacy and the civil liberties protections established in the Executive Order process are to be consistent with the fair information practice principles including the principle of data minimization. What steps are being taken to ensure that once a final framework is in place personally identifiable information that is irrelevant and unnecessary to accomplish a specified cybersecurity purpose will not be collected? I want to extend that question to all of the panelists. Mr. Romine. Well, I can certainly start on the development on the framework through the workshops. I will give a specific example in San Diego. We had a separate breakout section specifically devoted to privacy and civil liberties issues where we got the chance to engage with a broad cross-section of stakeholders and received their input on the importance and some of the techniques that are already being used by these industries to ensure protection of privacy and civil liberties. That was led by my laboratory's senior advisor for privacy, a position that I am committed to. I think that is an important position for an information technology laboratory to have. So I am very proud of that. We also at NIST have the information security and privacy advisory board or ISPAB, a Federal advisory committee that we keep apprised of our activities that are relevant in that space and so we engage with them and we are hoping to engage with the privacy and civil liberties board that has been recently reconstituted as well. It is baked into many of the discussions that we have during the framework development. Ms. Clarke. Do either of you have---- Mr. Kolasky. Sure. I would just add that across the EO, the PPD as part of the integrated task force, we have stood up an assessments working group particularly thinking of privacy and civil liberties assessments for all of the work that is going on with the EO PPD. We did this at the front end of the work and these members have been sitting on our working groups and working in collaboration across the interagency because we very much want to bake privacy and civil liberties into all the work we are doing rather than review and assess at the end of it. Ms. Clarke. Very well. Let me move on to my second question then. Section 5(a) of the Executive Order requires agencies to coordinate their activities with their senior privacy and civil liberties officials. Are senior privacy and civil liberties officials at each agency, being NIST and DHS--excuse me--are these civil liberty officials at each agency given the opportunity to provide substantive policy recommendations during the development of the phase of the framework? Can you expand on their role in the process? Mr. Kolasky. As I was just talking about with the assessments working group, very much so. This is a collaboration across the senior civil liberties and privacy officials. It has been a great opportunity in some of the departments and agencies. Traditionally these folks haven't worked on critical infrastructure issues. It has created a community practice and they been given an opportunity in addition, you know, with all our work we are briefing the advocacy community and other interested parties regularly on what is going on. Ms. Clarke. Very well. Mr. Romine. I would say within the Department of Commerce, the privacy and civil liberties officer at NIST is our chief information officer. He is down the hall from me. I get the opportunity to talk with him on a regular basis about everything that our laboratory is doing including this effort. At the Department of Commerce, as you know, it is the Secretary of Commerce who was directed by the President to direct the director of NIST under the Executive Order to undertake this framework development and they are certainly aware of all of the actions that we are taking. They are at the Secretary's level--they have the Privacy and Civil Liberties Office and they are certainly aware as well. Ms. Clarke. Very well. Let me ask Mr. Kolasky, Presidential Policy Directive 21 which accompanied the Executive Order requires an evaluation of existing public-private partnership model and recommendations for improving public/private collaboration. Can you characterize for the committee the current status of the public/private partnership model and what steps are being considered to improve the model? Mr. Kolasky. Sure, yes, ma'am. First of all, we delivered this report last week and I think the good news is we really do believe that the model has been established over the last 15 years to work on critical infrastructure security and resilience is working and has the potential to work to solve tough critical infrastructure security and resilience issues. I think the process that we have been undergoing over the last 6 months is a great demonstration of that. There were improvements that can be made but the key is to understand that we have been able to collaborate with the private sector through these processes and work with State and local and Tribal territorial governments. The reason I think we can do that is there is a shared sense of purpose. We have improved communications. We are working toward joint priorities and things like that. That all leads to trust. Nothing is more important to trust that industry and Government and at different levels of government can come together to work on these issues. In terms of recommendations going forward, we--as I said, although it is working we think there are some enhancements that can be made. We would like to move from more of a process- focused and outcome-focused partnership. We would like to use the partnership to set joint National priorities, and I think that is an important step. We would like to explore how to promote regional networks and bring some of the good work down to the regional level, and finally we would like to look at new methods to unleash innovation through public and private programs. Ms. Clarke. Thank you all very much. I yield back, Mr. Chairman. Mr. Meehan. I thank the gentlelady. The Chairman now recognizes the distinguished gentleman from Pennsylvania, the former United States attorney, from the middle District of Pennsylvania, Congressman Marino. Mr. Marino. Mr. Marino. Thank you, Chairman. Good morning, gentlemen, and I apologize for being late and not hearing all of the opening statements. I am trying to juggle three and four things as my colleagues know that we do. I have a concern following up on my colleague across the aisle as far as security but from a different perspective. We have certainly seen where this administration has a series of bungles concerning IRS, Benghazi, Fast and Furious, but the President happens to come up with, ``I didn't know about it,'' ``I don't know anything about it,'' and usually there is a low- level person that gets blamed for it--who is still on the payroll as a matter of fact. So what can you do, what can be done if the President is going to take the responsibility for this to make sure that we don't have Snowdens running around gathering critical information about what we are doing and those involved and then sharing it with our enemies? Mr. Kolasky, perhaps you could start with this. Mr. Kolasky. Sure. Thank you, Congressman, and thank you for the question. As you know, this is an important issue that whatever we do we need to protect the security of the information that we are providing and that we are collecting. The security approaches within the Executive Order relate to information sharing and we are thinking of it in two different ways; one of which is we are working to separate Classified information from Unclassified information and focus on getting Unclassified information on how to mitigate cyber vulnerabilities based on cyber threats out as efficiently and quickly as possible in an actual manner to help industry take action to mitigate those threats. That is a very important step. This doesn't have to be done at a Classified level in a lot of places and if we can improve those processes, that will help very much. The second side to promote the protection of Classified information, we have made improvements in our enhanced cybersecurity service program and made that available to a limited number of commercial service providers to promote the airing of information we have about cyber threat indicators and these are particular cyber threat indicators. They are things like malware and email language and we want to make sure that is available but we want to make sure that security is protected in doing so and finally we want to make sure that anyone that gets a security clearance in Government has undergone proper vetting. Mr. Marino. Thank you. Doctor, please. Mr. Romine. Congressman, from the standpoint of the framework, I think your question really relates principally to the idea of risk mitigation strategies for the insider threat. So that has been a source of on-going discussion, but as a part of a more general discussion among owners and operators of critical infrastructure to ensure the, sort of, full risk management approach for cybersecurity and that includes both the insider threat as well as Congresswoman Clarke's concerns about protection of privacy and civil liberties. Mr. Marino. Doctor. Mr. Fischer. Thank you, Mr. Marino. I would just like to add that I would say that a lot of experts believe that it would--it is basically impossible to prevent any, you know, insider threat from being successful---- Mr. Marino. As a prosecutor, I am aware it is basically--it is impossible to prevent anything, but it does happen, but it just seems that it is happening ad nauseam with this administration. Mr. Fischer. Right. So the question then becomes, what are the levels at which that kind of problem can be tolerated, and how does it relate to the potential benefits of what is being done. So for example, with respect to the information sharing, you know, one of the things that DHS has been doing with the enhanced cybersecurity services program is to focus--if I understand correctly--on what they call cybersecurity service or commercial service providers which have to do with the internet service providers and that sort of thing rather than opening up the dissemination of this threat information to all sorts of critical infrastructure entities, and so the critical infrastructure entities work through these CSPs. So to the extent that that sort of thing is successful, the idea of narrowing the vulnerabilities to specific areas may be useful. Mr. Marino. Thank you. I have another question, but perhaps we will have another round, and so I yield back. Mr. Meehan. I thank the gentleman. The Chairman now recognizes the distinguished gentleman from Texas, Mr. Vela. Mr. Vela. Thank you for your testimony today. Dr. Romine, Executive Order 13636 specifically provides that the cybersecurity framework and protection against cyber threats should include physical threats; not just computer viruses and hacking. The White House Strategic National Risk Assessment includes natural electromagnetic pulse from a geomagnetic super-storm as an example of a physical threats to critical infrastructures. Does the cybersecurity framework as you envision it include threats not only from computer viruses and hacking but physical threats especially from EMP? Mr. Romine. I would say yes in general although EMP is not spotlighted as much as just the overall risk assessment that each of these owners and operators is going to be involved in. When we talk about a cybersecurity and protection of critical infrastructure, we are keenly aware of the cyber physical systems nature of many of these infrastructures that the information systems are not in fact independent but rather often interact with physical or other kinds of systems. So the risk assessment approach that we are taking or the risk management approach that we are taking in the framework is intended to encompass the impact or the risks holistically rather than just with regard to viruses and other kinds of cyber threats, traditional cyber threats. Mr. Vela. Dr. Fischer, what additional challenges are imposed globally in terms of privacy protection and the sharing of personally identifiable information across borders? Mr. Fischer. Sir, Mr. Vela, could I clarify? You say what challenges to with respect to the Executive Order and---- Mr. Vela. Yes, no it is: What additional challenges are imposed globally in terms of privacy protection and the sharing of personal identifiable information across borders? Mr. Fischer. I see, okay. Yes, well, two quick things I can say to that. First of all, there obviously--the work is being done within the United States is done in the context, international context and there is quite a network of international agreements. There is no, currently, no global cybersecurity treaty. Some people have tried to--tried to draft such a thing, but it hasn't been adopted, and there are a lot of bilateral agreements which often would be the vehicles in which these sorts of concerns would, I think, be addressed. With respect to specific--or specific questions or with respect to privacy and civil liberties, I would say that is outside of my expertise, but we do have experts on our cybersecurity team within CRS who deal specifically with those issues and we would be happy to talk with you about that or answer questions for the record. Mr. Vela. Okay. I guess we will wait for another day on those. For the whole panel, what are examples of effective risk- based approach in the framework? Mr. Romine. So one of the exciting things that we have had in the workshops is seeing the representatives of various industries talking with each other about the approaches that they take and the effectiveness of those approaches. One of those approaches involves something that in the energy sector is called the C2M2 which essentially regardless of that, the expansion of that, the idea is to have a, sort of, set of maturity levels associated with specific functions. If you take a look at the framework outline that we provided in San Diego and some of the consensus that we received, that model seems to be very attractive to the vast majority of the participants and the critical infrastructures. So that kind of risk assessment--NIST has a very strong history in risk-based management of cybersecurity through the Federal Information Security Management Act or FISMA, activities. We have had special publications that are quite influential in this space with regard to the private sector and have been adopted widely by the public sector and have been adopted widely by the private sector as well because of their effectiveness. Mr. Kolasky. I would just add one of the things I have observed through the process is an example of what works is if corporate leadership gets involved in the process and we have heard that repeatedly that you have to produce a framework that resonates at the board level and resonates as the CEO level and in doing so, that will help organizations make risk management decisions. Mr. Fischer. I don't believe I would have anything to add it to those comments at this point. Thank you, sir. Mr. Vela. I yield back. Mr. Meehan. I thank the gentleman from Texas. I recognize myself now for 5 minutes of follow-up questions. One of the issues that we have been dealing with throughout the concept of not only the creation of the NIST standards but as the underlying concept of voluntary adoption of those standards and it permeates the language in the report, I mean in the Executive Order that these are voluntary. But at the same time we are creating a framework, and I would like to explore the extent to which people begin to see this framework as a basis for further activity, not the least of which could become further activity in which that framework is used as the basis for other regulatory agencies to say that they are now authorized to begin to create required adherence to certain of these standards. I would like the panel to individually address your perception of what voluntariness means and where you believe and to the extent certainly, Mr. Kolasky and Dr. Romine, to the extent that you are dealing with NIST, where you believe this goes to and what you believe the intention is with regard to whether these will ultimately be utilized in some way to become requirements. Because I am aware of a number of shalls in the Executive Order and, you know, the shall-proposed, prioritized, risk- based, coordinated actions, you know, if the current regulatory requirements are deemed to be insufficient. So please, Dr. Romine, first. Mr. Romine. I can start with that. NIST has a long history of developing in coordination with industry guidelines and best practices and ultimately industry-led standards that do govern the industry in a purely voluntary way, and that has been very effective in the past, and we expect it to be effective in the future with the Executive Order and the framework. The only way that works is vigorous participation on the part of the private sector so that they have buy-in and a stake in the outcome of the framework itself. So I think with that understanding and the fact that we believe that we have that vigorous participation, I am not as concerned about this being a, sort of, a hidden way of getting regulatory authority. I really think the voluntary nature of it is quite explicit and quite transparent and we expect it to continue to be that way. Mr. Meehan. Mr. Kolasky, what is your impression of this from DHS? Mr. Kolasky. Sure. First principle of ours as we participated in this is for the framework to be successful and in the attached assessments--incentives it has to make sense for businesses to make business decisions. Businesses make rational decisions and they have to see that this is in their business interest and because of that, as Dr. Romine just referred to, it is very important to listen to businesses and we have taken that obligation---- Mr. Meehan. I mean, you don't question--and I often talk to businesses. Businesses will say we are way ahead of the Government in many ways because we appreciate that the exposure that we have to our business--so we are asking you, what are you doing to help us, and then I get that part. What I am concerned about is when we begin to get to a point where some businesses say hey, we think we are doing something and we start to get Washington coming in and creating a requirement. Mr. Kolasky. Right. That is why the voluntary nature of this is so important. If we can create confidence in the marketplace that businesses are doing something, if we can offer information to continue to incentivize them to do something, then I don't think Government needs to get involved in that kind of manner that you are talking about. So it is really important for us to set up a framework that gives the market confidence so businesses can do business with each other and with the Government is that they are taking---- Mr. Meehan. So to the extent said that you speak for Department of Homeland Security and you are allowed to discuss it as a matter of policies, it is your perception that the Department is looking at this as a voluntary program? Mr. Kolasky. I can speak with certainty that the Department is looking at this---- Mr. Meehan. Dr. Fischer, you have had the ability to see these kinds of things not just in this particular area with cyber, but in the broader spectrum with other agencies in which there have been standards that have been utilized, Department of Defense, EPA, other kinds of things and in your own testimony you discussed the different pieces of this issue. Would you articulate more fully your sense as to whether or not these kinds of the voluntary standards may or have been utilized in other situations to become regulations and requirements? Mr. Fischer. So there are a few points I think might be useful to make here. No. 1 is that we have been asked particularly in the last Congress by a number of Congressional offices about the question of what the current regulatory capabilities or powers are of the Federal Government with respect to cybersecurity. Our answer had to be that there--except for cases in which they are explicitly laid out and clear--where there are such regulations such as a width of the electric power sector--it is difficult to say because until the agency actually tries to create a regulations, one doesn't know what is really going to happen because the regulatory process is a separate process. It involves industry and other stakeholders in---- Mr. Meehan. But do you believe as it stands right now and I am sorry to cut you off and please go forward if you can, but I do want to ask this question. Do you believe that the way the Executive Order is written right now as it moves in it opens the door to the ability of agencies to say, in our interpretation and it may be a particular agency that may look in just say, in our interpretation, there is an opportunity here for us to use this as a basis to ask for, you know, more cyber protection in a particular area? Mr. Fischer. Certainly the Executive Order explicitly requires that agencies make recommendations with respect to where the gaps are. So to the extent that those gaps would be I guess fillable under current law, then it is clear that agencies could in fact attempt to create regulations in those areas. To the extent that they are not as capable under current law, then that is the interpretation, then they would have to come to Congress for additional authority. Mr. Meehan. Well, this is where they have to come to Congress for additional authority to do what? To do rulemaking of regulations because as I see this they are talking about---- Mr. Fischer. Well, to be able to--right--so if for example the current--if the current regulation--if the current authority of an agency to create regulations is limited or the agency determines that it doesn't have the authority currently---- Mr. Meehan. Well, I have never--we don't have a problem here in Washington with agencies who believe that they have limited authority to enter into issues and that is why I am trying to explore this provision in the Order which says, you know, if the current regulatory requirements are deemed to be insufficient--now I don't know who deems them to be insufficient but it may be the agency itself that says hey, we believe that this is, you know, the current regulatory requirements are insufficient, you know, within 90 days we will publish a final of the--published final framework, we are going to propose, you know, further coordinated actions and that appears to me to be regulation or rulemaking. Mr. Fischer. Right. So to me, the question becomes whether or not the agency currently has the authority to make those rules and regulations. If they do have that authority, then they may do it anyways. So for example, with respect to the pipeline sector and certainly we have people who can talk to very specifically about that, but with respect to pipelines, the TSA has the capability of or says that it has the capability of creating cybersecurity regulations, but they have decided that those regulations are not needed and might in fact be counterproductive to date. That is my understanding of what they have said. So, you know, so there are examples in which they clearly-- agencies apparently have not---- Mr. Meehan. That is left to the discretion of the agency or are they constrained by law? Mr. Fischer. Well, TSA appears to have that authority under current law. Now whether that is true for others is hard to say. So for example, I would say that, generally speaking, you know, we certainly haven't found anything with respect to the IT sector that would permit such things, which isn't to say that some agency might not claim that they have it, that authority, though. Mr. Meehan. All right. Well, thank you Dr. Fischer. I now turn it to the distinguished lady from New York. Ms. Clarke. Thank you, Mr. Chairman. Just following up on the line of inquiry that our Chairman posed to you. Mr. Romine, what does flexibility mean in the context of the framework? Mr. Romine. I would say the primary reason for the need for flexibility is the different sectors have very different characteristics in the way that they operate and you have to have a framework that is capable of recognizing that. In addition, the owner-operators might range from multibillion-dollar international corporations to relatively small regional concerns who still own and operate some portion of what is deemed to be critical infrastructure. The capabilities represented by those two things also mandates that we have a flexible approach. Ms. Clarke. So in effect, it is addressing the nuances of the specificity of industry and company size, what have you? Mr. Romine. That is right, and I think an additional point I would make is that many of these critical infrastructures have in place a series of protections that they have invested in and believe are quite effective. We want to be sure that the framework is flexible enough to recognize that those measures that are already being taken if they are effective should not be replaced by something else as a result of the framework. So we are trying to be mindful of that as well. One final point I would make is that in many cases, these particular critical infrastructures are regulated already to one degree or another and in some cases, very heavily regulated, and I think the intent of this notion of regulation review is to ensure that we harmonize the framework in a way that recognizes the regulations that are already in place so that we are not committing sectors to an onerous change in the way that they do their business. Ms. Clarke. Very well. Mr. Kolasky, Dr. Fischer, how can implementation of the framework be used to demonstrate compliance with existing regulatory requirements? That is, sort of, I think, where Dr. Romine was going. Is that something that you have also recognized? Mr. Kolasky. Yes, it is. Let me talk about it in a couple of terms. One of which you mentioned earlier, the incentives work that we have done in analysis and over and over again we heard from our private-sector partners as well as some of our advisory councils that one potential incentive would be to allow the cybersecurity framework to meet the information security requirements for already-regulated industry ergo reducing compliance costs and we think that that is something that needs to be pursued and thought about because if you can demonstrate you have got good cybersecurity in place you shouldn't have to demonstrate it twice to the Government. Second, just to echo Dr. Romine, I think it is really important to think about the idea of regulatory relief and are there regulations in place that are going to impede the adoption of the cybersecurity framework and the Executive Order asks the regulatory agencies to think about that because we don't want regulations that are in place that will cause people from not adopting good positive flexible cybersecurity solutions. Mr. Fischer. I guess the only question I might have about that would be--obviously--if to the extent you have let's say many private-sector entities are--feel more comfortable with-- those that are regulated--feel have developed good relations within their current regulatory environment and feel comfortable with the like, for example the electric sector, but others as well. So they are somewhat concerned if in fact they feel that that environment will be changed to the extent that other agencies would end up being involved say in the regulation. So to the extent that the current environment could be kept stable for them, I think they would be more receptive to the possibility of--to compliance. I think I will stop there. Ms. Clarke. Dr. Fischer, that is a very intriguing statement you have made for me because I understand how industry could want to remain in a stable environment but the environment around them is changing and so to the extent, I guess it is an evolutionary process in terms of adaptation, but the status quo wouldn't necessarily work. Mr. Fischer. Well, we are--yes. So with respect to cyberspace, the situation is somewhat different than it may be with--in other areas. So, you know, I often say cyberspace is the most rapidly evolving technology space in human history, and the technology is evolving, the threat environment is evolving, things are changing constantly. I think it is widely recognized within experts in this area, and the private-sector people have paid attention to this, that in fact that kind of rapid evolution means that static, particularly design-based standards, for example, have a very limited usefulness. Now performance standards are usually considered to be better but the problem with performance standards is of course that you have to come up with what the performance criteria are and that can be sometimes more difficult and they can sometimes be more difficult to enforce. But I think that most people who have looked at this question seriously have in fact said that well, there is basically kind of a baseline of standards that are going to be true no matter what, performance standards, but there has to be the flexibility to be able to change things on a much more rapid basis in reaction to what happens with respect to, you know, with respect to the environment. Now I just want to say one more thing about that. There is this--it has been some time ago that, right, there is this design problem in cybersecurity that is that the cyberspace was not designed with security in mind is often said. One of the reactions to that is well, what you have to do is build security in. Now right now, I mean, everybody kind of seems I think to agree with that, but there are two things. No. 1 is there is always going to be a need to add things on because there is always going to be problems that you couldn't possibly anticipate when you design something. The second point I think is that there are always or there appear to be in the current--with the current incentive structure with respect to cybersecurity--there appear to be, sort of, counter incentives to building security in from the get-go. Now whether those are essentially fundamental or not is something that I don't think anybody really understands, but that is always, you know, an issue. So to the extent that you are going to have to add this stuff on later is a question. Ms. Clarke. I yield back, Mr. Chairman. Thank you, gentlemen. Mr. Meehan. I thank the gentlelady. Just using the prerogative of the Chairman for one second, Dr. Fischer, you are articulating something which is at the heart of where we, I think, appreciate and need to be sensitive to, which is the dynamic nature of the cyber threat. Such that what you build today as a defense will not only be analyzed but it will be--there are those who will spend their time purposely trying to get around it; therefore we have got--it is a constant state of cat and mouse, so to speak, for lack of a better word. The framework itself that we are talking about is very admirable in the sense that it creates a place for people to begin to have a sense about what they can and should be doing, but do we create a problem if they see the framework as a check-the-box kind of thing that says, okay, now I am cyber safe. Mr. Fischer. Right. I appreciate the question, Mr. Chairman. One of the criticisms that has been leveled by some people, and I can't say to the degree to which they are accurate about this, but one of the things that has been leveled is that for example, by analogy with FISMA, one of the criticisms of the Federal Information Security Management Act has been that it has become something of a check-box exercise where, you know, it is very process-oriented and it doesn't really focus on the question of how you keep systems actually safe and secure. Now there are obviously attempts to revise FISMA, to amend FISMA, and also I would say the administration has been doing-- the current administration and the Bush administration as well--have been doing things to try to actually make systems secure and focus more on that aspect of what the law intends, the goals of the law. But to the extent that the framework of, would it become a kind of bureaucratic, you know, check list, that would be a problem. I certainly wouldn't want to speak to how NIST and DHS are trying to avoid having that happen, but I am sure that they are aware of that problem as well. Mr. Meehan. Thank you. Thank you for the indulgence. The Chairman now recognizes the gentleman from Pennsylvania. Mr. Marino. Thank you, Chairman. My colleague, the Chairman and of course my colleague is a former U.S. attorney as well-spawned a thought based on his questioning and the question I am asking and that I am going to follow up with a little statement is who or whom, what person as far as general, what people, or what entities are we focusing on because several weeks ago, Mayor Giuliani came in and testified before the full committee, and I agreed with him 100 percent on his observations. He said we cannot take our eye off of the ball but we have several balls in the air that we must be watching simultaneously. We cannot take our eye off of al-Qaeda and there are those that think that al-Qaeda is defeated and we really don't have to worry about them anymore. I think that couldn't be any more from the truth than anything at all. But then there are individuals that think we need to focus on individual terrorists, who the leaders of the terrorist organizations persuade some fanatic, young terrorist to do something whether that is through propaganda or initial contact--and by the way, you never see the terrorists who are running the organizations strap bombs to themselves or their families, it is always that they convince somebody else to do it. But Giuliani was very specific saying we have to keep our eye on the rogue such as the Boston terrorists and organizations such as al-Qaeda and without tipping the cards, what say each of you about where we are as far as watching the whole scheme? Do you understand my question? Mr. Kolasky. Mr. Kolasky. Sure. Thank you, Congressman Marino. It is a hard challenge, and that is what is so important about the intelligence component of this and we have made a lot of investments in trying to understand both the adversaries' tactics and the nature of the adversary and, you know, their incentives and what they are trying to do and we will continue to make those investments and as we learn from that, as I talked about earlier, one of our jobs is to get the information out to those who are protecting the networks so they know what to be looking for. This threat, unfortunately, is coming from a lot of different places. It is coming from international, it is coming from domestically, it is coming from the mid-level hackers in the organized coalitions, and in criminals. And so because of that, we have to learn and we had to get that information out to folks at an Unclassified level so that they can protect their networks. Mr. Marino. Sure, and as you mentioned, we do have the individual hackers, we do have the genius kid and we have, I think, still al-Qaeda and other organizations, and we have the Chinese. So I am just hoping that we are keeping--I am pretty sure we are keeping our eye on each one of these entities. Doctor, would you please respond? Mr. Romine. I would say from the framework's standpoint and though work that NIST is doing, the threat space is very broad and evolving as you have correctly noted and part of Congresswoman Clarke's question, if I could amend my answer, I would also include the evolution of the threat space as an important component of being flexible in our response. I think the goal of the framework is to assist the private- sector owners and operators to raise the bar as much as we can in the cybersecurity space so that all of these threat vectors are--it is much, much more difficult to cause harm to the United States regardless of whether you are in a basement or in a foreign country. Mr. Marino. Thank you, Doctor. Mr. Fischer. Yes. Well, I tend to--we tend to think about different classes of potential actors with respect to threats. So clearly as you mentioned, I mean, you have on the one hand there is the criminal element and often they are interested in, you know, financial gain through illegal means; basically ordinary crime through cyber means is what it amounts to. But increasingly, there appears to be an organized crime element of--with respect to cyber attacks as well. Then there is what you might call the cyber hacktivists-- the--or--you know, sometimes there is just, sort of, you know, the script kiddie types, you know, people who are trying to just, you know, created an exploit of some sort. But also, those are making some political statement. Then the third is would be the terrorists, the al-Qaeda types, and the like that are more organized and have a specific political goal and then finally the, kind of, state actors, you know, which sometimes called the advanced, persistent threats if you don't want to give a name to a particular country. But all those are going to have--those actors are going to have different goals. They are going to have different levels of sophistication. I think that to the extent that the--you know, that the framework and the other aspects of the EO and PPD can in fact take those into account, obviously they will be more effective. Mr. Marino. Gentlemen, your task is monumental and I appreciate what you are doing for this country. I yield back. Mr. Meehan. Thank the gentleman from Pennsylvania. The Chairman now recognizes the distinguished former prosecutor from Massachusetts. Mr. Keating. Thank you, Mr. Chairman. Thank you, Ranking Member Clarke, for having this important meeting. Just quickly, I just want to hone in on one thing is that as you go about the task, both with, you know, establishing the framework around the Executive Order of the President and as you are dealing with the National Institute responsibility of developing a framework to secure the information, in this whole process, is it going to be role carved out more specifically, or at least the flexibility for universities to get more involved and other involved Northeastern, in my own home State, has worked very closely with some of you folks. But I want to just see what your view is and is there because I think it is critically important. I think it is an area where you have maybe information gathering and research done that may not be biased by existing economic impacts to an individual business although there are some. Also it is another important area for us not just with Homeland Security but in terms of other Government agencies and private agencies as well to really develop trained people which I see as one of the major problems that we will continue to have as people move in and out of the private-sector jobs. That we really need the intellectual and educational brainpower to keep up as well. So I see the benefits of universities being great. Could you just comment on what you are going to do; how they have a place in this? Mr. Romine. Certainly, and thank you very much for the question. You are absolutely right. It is no accident that the three working sessions or workshops that we--two that we have already held and one that we are going to be holding are at university venues--we had our second overall workshop was at Carnegie Mellon University. The third one which we had last week was at the University of California at San Diego and the next is going to be at the University of Texas, Dallas. That is an attempt, an explicit attempt on our part to engage a cross-section of the academic community as well. We have strong relationships with many academic institutions and I couldn't agree more. One of the risks that has been identified consistently in many of our cybersecurity efforts but certainly during the framework development with industry is industry telling us as well that workforce--a cyber-educated workforce is a key risk that they see--the lack of the ability to attract cybersecurity talent. So, I agree with you. I think the other thing, the other role that the universities can play is at the point where we have identified a substantial gap whether it is in the standards space or whether it is in the technology space, universities are well-poised to help us in that area as well. Mr. Keating. Great. Well, thank you, and I would particularly appreciate anything that you might offer to me and the committee as a whole to tell us what we can do to try and encourage that because I see those gaps and I see them as becoming more and more of a problem going forward. So with that, I will yield back my time and I think my colleague also for letting me go. Thank you. Mr. Meehan. The Chairman now recognizes the gentleman from Texas, Mr. Vela. Mr. Vela. Yes, I have a couple more questions for the panel. Section 9(b) of the Executive Order allows other Federal agencies to share information with the Department of Homeland Security to identify at-risk infrastructure. Since the Executive Order was issued in February, what has been the nature of this inter-agency information sharing? Mr. Kolasky. Sure, thank you, Congressman. So that specific task has been met by us working with the sectors of the critical infrastructure sectors to identify critical infrastructure. So this has necessitated close collaboration with the sector-specific agencies particularly agencies like the Department of Energy, the EPA, the Department of Transportation, and others, Health and Human Services and others. So the nature of that engagement is really to understand how these sectors come to work and to bring in private-sector partners to have a conversation. We have focused largely in doing that work in understanding the most critical infrastructure in the infrastructure that can cause high consequences so it is critical that we have the folks who understand how those industries work, bringing them to the table, and then we work with our industry partners to understand if there is any nexus to cyber technologies. Mr. Vela. Have the Department of Defense, law enforcement, or intelligence communities shared information with DHS under this provision? Mr. Kolasky. Sure. The Department of Defense is also a sector-specific agency. It is the sector-specific agency for the defense industrial base and so we work closely with them in that regard. The law enforcement community and intelligence community were involved in the discussions on the methodology and the approach we took, but given that the approach largely focused on understanding how systems work and consequences related to systems failing, those are questions that are largely outside of the sphere of the intelligence community and the law enforcement community. So although they participated in the discussions, they have not really been the focus of the information sharing. Mr. Vela. Mr. Kolasky, Section 9(a) requires that the Secretary of Homeland Security in consultation with private- sector partners and other relevant agencies identify critical infrastructure at the greatest risk. What criteria is being used for this purpose? Mr. Kolasky. Sure, sure. The Executive Order talks about the criteria in terms of public safety and health consequences, economic consequences, and the impact to National security. So as we defined that, when we are talking--and it uses the phrase catastrophic--and we take that phrase to be a fairly high threshold--so catastrophe is something that is very significant to this country either at a National or regional level. So as we have developed a criteria, we have looked to pass critical infrastructure efforts and we thought about economic security and economic loss in terms of tens of billions of dollars, significant loss of life, and negative ability for us to project power, our military to protect power through National security needs. Mr. Vela. Last week, the administration held its first strategic economic dialogue with Chinese officials. Administration officials cited progress in the talks while stating that continued intellectual property theft originating from China was unacceptable. How does the Executive Order help stem the loss of intellectual property? I don't know who is best to answer that question. Mr. Kolasky. I think very much intellectual property theft is one of the cybersecurity incidents that we are very cognizant of, so our information-sharing efforts certainly take that into account; so do our protective efforts in the work that is being done via the framework. Mr. Romine. I would just add that intellectual property loss is one of the risks that the owners and operators do face in the critical infrastructure domain and so to that extent, it fits into the overall risk management and risk mitigation strategy that the framework promotes. Mr. Fischer. You know, I would just like to add that the economics of cybersecurity both even with respect to the question of what real losses are and what it means is an area that is currently undergoing a lot of examination. A lot of things about it aren't clear. It depends on the scale at which one is looking at it, whether you are looking at it on the scale of an individual company or the scale of a country or global scale, and from some of the efforts I have seen, I think there is a pretty good chance that there will be a lot of clear understanding of that over the next year or so. Mr. Vela. Thank you. I yield back my time. Mr. Meehan. I thank the gentleman. I just have some closing questions. If I may, and they really go into two areas. Let me start with one. You know, we have mentioned the issue of liability a number of times as we move into this and it is sort of the back-end of incentives in some ways because we are trying to incent our partners to step up to the plate. But I also, in my experience, and of course we have work to jointly here on this committee with ourselves and with staff from both sides of the aisle reaching out to a cross-section of participants in the various sectors, and the input has been good because it really gives you a sense as to the way they see the world why they are trying to evaluate the threat. But one of the concerns is a lot of folks are already struggling with where they make commitments of resources when it is hard to define what the impact of, you know, protective stances is so that you could do an endless amount of investment and not be certain how much you are increasing your security. Therefore, there is a concern about, you know, steps that are being taken. What happens if we create this framework that then is utilized as a basis for somebody to say rightly or wrongly in litigation you should have taken some steps? Where does it start to become a standard that becomes something that is used? Dr. Fischer, do you have a thought on that? Mr. Fischer. Well, I just--sort of following up on a previous question with respect to this--one of the things that can happen with voluntary standards is that if they become a business norm, then of course businesses that don't follow those standards can be subject to certainly criticism and potentially lawsuits. So that would certainly be something that would have to be paid attention to. I think that is what you are referring to and what some critics of the framework have said with respect to a voluntary framework becoming effectively de facto mandatory. Now I should mention that, you know, with respect to the particular legal issues, that is outside of my area of expertise, but we do have experts on our team who can talk with you about it. Mr. Meehan. All right. Thank you. Let me just step into one last thing so long as we are here. The gentlelady from New York in her opening statement identified a document that I am also in possession of and it is called as the ``DHS Incentive Study Preliminary Analysis and Findings'', Mr. Kolasky, and of course it is as I am sure with anything, when it is called preliminary, this represents some of the current thinking. But I would like to explore if I can some of this which is before us because it looks at the very concept of incentives and maybe you can explain to me what the document is first and then there are a few specific questions---- Mr. Kolasky. That is a work product that we shared on May 21 in advance of us delivering a document to the White House on June 12. That work product was shared broadly with our working group in the integrated task force, which includes representatives from industry. What we were trying to do there is present a look at the research that is out there and get feedback from the owner- operator community to help us shape our final recommendations. So I think it is fine that you have the document because we made it regularly--we made it widely available so we could collect feedback so we could hone in on our recommendations and then I am happy to talk about---- Mr. Meehan. Well, if you can, can we walk down a couple of things here because I know that you know, we are discussing first the idea of a legislative proposal. Can you indicate to me what is meant by a legislative proposal and what is the intention of DHS or the administration or others to introduce new or additional legislation in the area of cybersecurity? Mr. Kolasky. Sure. Again, we are still, at the administration level, we are still having conversations. DHS issued a report. So did the Department of Treasury. So did to the Department of Commerce as well as GSA and DOD on Federal procurement incentives and so my understanding and in talking with administration, is those four reports that are up there and we are now talking at the administration level, the policy process and steps forward as you refer to in the document. Some of the incentives that have been recommended by various folks along the way and incentives reports would take legislative action and so there is a possibility that the administration would come and talk to you all about particularly---- Mr. Meehan. So as you are looking into the future, but, you know, we have been working on a bipartisan basis to try to consider whether there are legislative steps that ought to be taken in addition to and some argue that legislation is necessary--legislation, we believe necessary to help you in your job in terms of codifying the ability of DHS and then further to give DHS the ability to be a point of importance as we move forward. So in light of the fact that legislation generally begins in the Congress, it would be very good if conversations about legislation include us. Mr. Kolasky. I think we are happy to do that and happy to have conversations particularly on the incentives and I will echo my opening statements that as we pointed out, we appreciate the fact that one of the things that we hope is in the new legislation is to codify some of DHS's roles in general and cybersecurity and also that some of these incentives if we think they make sense, we have to work together to put them in place because they are outside of the authority of the Executive branch. Mr. Meehan. Okay. Can I ask, there is a couple of things in here--you talk about insurance, removed as an independent category of incentives and we are going to put it into the cybersecurity act. What steps are being considered with respected to insurance? Mr. Kolasky. So what we said in our incentives report is we are very much in favor of the evolution of the cyber insurance market. We think that a lot of progress has been made independent of Government action to create a cyber insurance market and we hope that that will continue. The best incentives are market-based incentives. In terms of if you are thinking about--and what that refers to--if you are thinking about any liability protections of that need to be put in place, we have to think carefully as you have talked about, Congressman Meehan, we have to think carefully about not creating liability protections that incent bad behavior and that any liability protections may have to be tied with insurance requirements. Mr. Meehan. Well, since insurance is generally a market- based thing, what is the legislative aspect that relates to insurance? Mr. Kolasky. We do not recommend any legislative aspects related to insurance. We think that the Government has convenient power to promote the insurance market, but---- Mr. Meehan. I am only saying final incentive category--I am reading the document--remove as independent category, include in cybersecurity act, which I am presuming is the legislation. Mr. Kolasky. That was an acronym that was created. We do not recommend that specifically in our---- Mr. Meehan. Would that be the same thing for liability considerations and legal benefits? I mean, those are two and so is there I guess I would ask liability considerations--is there some discussion of legislation that would deal with liability? Mr. Kolasky. Not that I am aware of at DHS. Mr. Meehan. And legal benefits. I am just, again, coming from the document. Do you understand what that might refer to in any specific sense? Mr. Kolasky. Sure. Other legal benefits could be things like antitrust protections, which obviously is something that-- -- Mr. Meehan. Right. FOIA? Mr. Kolasky. It could be another legal benefit, and again, the document that you are looking at is a review of incentives that are available, not a review of our recommended incentives. Mr. Meehan. Well, do you have recommended incentives? Are you going to make recommendations in these particular areas? Mr. Kolasky. We have made general recommendation pending the creation of the cybersecurity framework. As I said, our recommendations were done in coordination with Treasury and Commerce but are independent of each other and the administration is considering all of those and all of us will work together to chart a path forward. Mr. Meehan. Okay. Let me just ask one then. I am sorry for overrunning my time, but I want to work with this document. If I could ask just one last question. Just the--tell me where you are on the expedited security clearance process because this seems to suggest that you are going to remove that incentive, that there is a sense that this is moving along at an appropriate enough pace. Mr. Kolasky. Yes. We do not believe that that is an incentive. We believe that should be done on a need-to-know basis and that we should work with owners and operators. We should not attach that to the cybersecurity framework but instead, work with owners and operators to identify critical infrastructure and individuals within critical infrastructure owner and operators companies who have the need to get Classified cyber threat information; at the 150-day mark we deliver to the administration, update on DHS's program to get private-sector individuals clearances, and improvements and enhancements---- Mr. Meehan. You know, because that is the thing that I hear again and again and again and you are a little bit better than another agency we hear frequently about but it--you know, we get asked for all kinds of information to be dumped into the Government and then we never hear anything again. Mr. Kolasky. We have made a lot of progress since February, but in doing so, we wanted it to be measured progress related to Congressman Marino's question to make sure we aren't giving clearances to people who don't need clearances. Mr. Meehan. Okay. I thank you for your testimony. Does the gentlelady have any follow-up questions? Ms. Clarke. No, I am fine. Mr. Meehan. Okay. Well, I want to express my deep appreciation for your testimony today. The witnesses' testimony has been very valuable to us. There may be possible questions from some of the other Members of the committee and if in fact there are and they are forwarded to you, I ask that you would do your best to respond in writing. So without objection, the subcommittee stands adjourned. [Whereupon, at 11:41 a.m., the subcommittee was adjourned.]