Amanda Smith
Home work help as discussed.
MARITIME CRITICAL
INFRASTRUCTURE
PROTECTION
DHS Needs to
Enhance Efforts to
Address Port
Cybersecurity
Testimony
Before the Subcommittee on Border and
Maritime Security, Committee on
Homeland Security, House of
Representatives
For Release on Delivery
Expected at 10:00 a.m. ET
Thursday,
October 8, 2015
GAO-16-116T
United States Government Accountability Office
Highlights of GAO-16-116T, a testimony
before the Subcommittee on Border and
Maritime Security, Committee on Homeland
Security, House of Representatives
October 8, 2015
MARITIME CRITICAL INFRASTRUCTURE
PROTECTION
DHS Needs to Enhance Efforts to Address Port
Cybersecurity
Why GAO Did This Study
The nation’s maritime ports handle
more than $1.3 trillion in cargo each
year: a disruption at one of these ports
could have a significant economic
impact. Increasingly, port operations
rely on computerized information and
communications technologies, which
can be vulnerable to cyber-based
attacks. Federal entities, including
DHS’s Coast Guard and FEMA, have
responsibilities for protecting ports
against cyber-related threats. GAO has
designated the protection of federal
information systems as a government-
wide high-risk area since 1997, and in
2003 expanded this to include systems
supporting the nation’s critical
infrastructure.
This statement addresses (1) cyber-
related threats facing the maritime port
environment and (2) steps DHS has
taken to address cybersecurity in that
environment. In preparing this
statement, GAO relied on work
supporting its June 2014 report on
cybersecurity at ports. (GAO-14-459)
What GAO Recommends
In its June 2014 report on port
cybersecurity, GAO recommended that
the Coast Guard include cyber-risks in
its updated risk assessment for the
maritime environment, address cyber-
risks in its guidance for port security
plans, and consider reestablishing the
sector coordinating council. GAO also
recommended that FEMA ensure
funding decisions for its port security
grant program are informed by subject
matter expertise and a comprehensive
risk assessment. DHS has partially
addressed two of these
recommendations since GAO’s report
was issued.
What GAO Found
Similar to other critical infrastructures, the nation’s ports face an evolving array of
cyber-based threats. These can come from insiders, criminals, terrorists, or other
hostile sources and may employ a variety of techniques or exploits, such as
denial-of-service attacks and malicious software. By exploiting vulnerabilities in
information and communications technologies supporting port operations, cyber-
attacks can potentially disrupt the flow of commerce, endanger public safety, and
facilitate the theft of valuable cargo.
In its June 2014 report, GAO determined that the Department of Homeland
Security (DHS) and other stakeholders had taken limited steps to address
cybersecurity in the maritime environment. Specifically:
• DHS’s Coast Guard had not included cyber-related risks in its biennial
assessment of risks to the maritime environment, as called for by federal
policy. Specifically, the inputs into the 2012 risk assessment did not include
cyber-related threats and vulnerabilities. Officials stated that they planned to
address this gap in the 2014 revision of the assessment. However, when
GAO recently reviewed the updated risk assessment, it noted that the
assessments did not identify vulnerabilities of cyber-related assets, although
it identified some cyber threats and their potential impacts.
• The Coast Guard also did not address cyber-related risks in its guidance for
developing port area and port facility security plans. As a result, port and
facility security plans that GAO reviewed generally did not include cyber
threats or vulnerabilities. While Coast Guard officials noted that they planned
to update the security plan guidance to include cyber-related elements,
without a comprehensive risk assessment for the maritime environment, the
plans may not address all relevant cyber-threats and vulnerabilities.
• The Coast Guard had helped to establish information-sharing mechanisms
called for by federal policy, including a sector coordinating council, made up
of private-sector stakeholders, and a government coordinating council, with
representation from relevant federal agencies. However, these bodies shared
cybersecurity-related information to a limited extent, and the sector
coordinating council was disbanded in 2011. Thus, maritime stakeholders
lacked a national-level forum for information sharing and coordination.
• DHS’s Federal Emergency Management Agency (FEMA) identified
enhancing cybersecurity capabilities as a priority for its port security grant
program, which is to defray the costs of implementing security measures.
However, FEMA’s grant review process was not informed by Coast Guard
cybersecurity subject matter expertise or a comprehensive assessment of
cyber-related risks for the port environment. Consequently, there was an
increased risk that grants were not allocated to projects that would most
effectively enhance security at the nation’s ports.
GAO concluded that until DHS and other stakeholders take additional steps to
address cybersecurity in the maritime environment—particularly by conducting a
comprehensive risk assessment that includes cyber threats, vulnerabilities, and
potential impacts—their efforts to help secure the maritime environment may be
hindered. This in turn could increase the risk of a cyber-based disruption with
potentially serious consequences.
View GAO-16-116T. For more information,
contact Gregory C. Wilshusen at (202) 512-
6244 or wilshuseng@gao.gov.
United States Government Accountability Office
http://www.gao.gov/products/GAO-16-116T
http://www.gao.gov/products/GAO-16-116T
mailto:wilshuseng@gao.gov
Chairman Miller, Ranking Member Vela, and Members of the
Subcommittee:
Thank you for inviting me to testify at today’s hearing on the risks of cyber
attacks facing our nation’s maritime facilities. As you know, maritime ports
are an essential part of the United States’ transportation critical
infrastructure. They are an economic engine that handles more than $1.3
trillion in cargo each year. A major disruption in the maritime
transportation system could have a significant impact on global shipping,
international trade, and the global economy, as well as posing risks to
public safety. This risk is heightened by ports’ dependence on computer-
reliant information and communication systems that may be vulnerable to
cyber threats from various actors with malicious intent. Because of the
increasing prevalence of cyber threats, since 1997 we have designated
federal information security as a government-wide high-risk area, and in
2003 we expanded this to include the protection of systems supporting
our nation’s critical infrastructure.1
In my statement today, I will summarize the results of a report we issued
in June 2014 on the extent to which the Department of Homeland
Security (DHS) and other stakeholders have addressed cybersecurity in
the maritime port environment.2 Specifically, I will discuss (1) cyber-
related threats facing the maritime port environment and (2) steps DHS
and other stakeholders have taken to address cyber risks in the maritime
environment, as well as provide updates on actions DHS has taken to
implement recommendations we made in our report. More detailed
information on our objective, scope, and methodology for that work can
be found in the issued report.
The work on which this testimony is based was conducted in accordance
with generally accepted government auditing standards. Those standards
require that we plan and perform the audit to obtain sufficient, appropriate
evidence to provide a reasonable basis for our findings and conclusions
based on our audit objectives. We believe that the evidence obtained
1GAO’s biennial high-risk list identifies government programs that have greater
vulnerability to fraud, waste, abuse, and mismanagement or need to address challenges
to economy, efficiency, or effectiveness. See most recently, GAO, High-Risk Series: An
Update, GAO-15-290 (Washington, D.C.: Feb. 11, 2015).
2GAO, Maritime Critical Infrastructure Protection: DHS Needs to Better Address Port
Cybersecurity, GAO-14-459 (Washington, D.C.: June 5, 2014).
Letter
Page 1 GAO-16-116T
http://www.gao.gov/products/GAO-15-290
http://www.gao.gov/products/GAO-14-459
provides a reasonable basis for our findings and conclusions based on
our audit objectives.
The United States has approximately 360 commercial sea and river ports
that handle more than $1.3 trillion in cargo annually. A wide variety of
goods travels through these ports each day—including automobiles,
grain, and millions of cargo containers. While no two ports are exactly
alike, many share certain characteristics such as their size, proximity to a
metropolitan area, the volume of cargo they process, and connections to
complex transportation networks. These characteristics can make them
vulnerable to physical security threats.
Moreover, entities within the maritime port environment are vulnerable to
cyber-based threats because they rely on various types of information
and communications technologies to manage the movement of cargo
throughout the ports. These technologies include
• terminal operating systems, which are information systems used to,
among other things, control container movements and storage;
• industrial control systems, which facilitate the movement of goods
using conveyor belts or pipelines to structures such as refineries,
processing plants, and storage tanks;
• business operations systems, such as e-mail and file servers,
enterprise resources planning systems, networking equipment,
phones, and fax machines, which support the business operations of
the terminal; and
• access control and monitoring systems, such as camera surveillance
systems and electronically enabled physical access control devices,
which support a port’s physical security and protect sensitive areas.
All of these systems are potentially vulnerable to cyber-based attacks and
other threats, which could disrupt operations at a port.
While port owners and operators are responsible for the cybersecurity of
their operations, federal agencies have specific roles and responsibilities
for supporting these efforts. The National Infrastructure Protection Plan
(NIPP) establishes a risk management framework to address the risks
posed by cyber, human, and physical elements of critical infrastructure. It
details the roles and responsibilities of DHS in protecting the nation’s
Background
Federal Policies and Laws
Establish Requirements
and Responsibilities for
Protecting Maritime
Critical Infrastructure
Page 2 GAO-16-116T
critical infrastructures; identifies agencies that have lead responsibility for
coordinating with federally designated critical infrastructure sectors
(maritime is a component of one of these sectors—the transportation
sector); and specifies how other federal, state, regional, local, tribal,
territorial, and private-sector stakeholders should use risk management
principles to prioritize protection activities within and across sectors.
The NIPP establishes a framework for operating and sharing information
across and between federal and nonfederal stakeholders within each
sector. These coordination activities are carried out through sector
coordinating councils and government coordinating councils. Further,
under the NIPP, each critical infrastructure sector is to develop a sector-
specific plan that details the application of the NIPP risk management
framework to the sector. As the sector-specific agency for the maritime
mode of the transportation sector, the Coast Guard is to coordinate
protective programs and resilience strategies for the maritime
environment.
Further, Executive Order 13636, issued in February 2013, calls for
various actions to improve the cybersecurity of critical infrastructure.3
These include developing a cybersecurity framework; increasing the
volume, timeliness, and quality of cyber threat information shared with the
U.S. private sector; considering prioritized actions within each sector to
promote cybersecurity; and identifying critical infrastructure for which a
cyber incident could have a catastrophic impact.
More recently, the Cybersecurity Enhancement Act of 20144 further
refined public-private collaboration on critical infrastructure cybersecurity
by authorizing the National Institute of Standards and Technology to
facilitate and support the development of a voluntary set of standards,
guidelines, methodologies, and procedures to cost-effectively reduce
cyber risks to critical infrastructure.
In addition to these cyber-related policies and law, there are laws and
regulations governing maritime security. One of the primary laws is the
Maritime Transportation Security Act of 2002 (MTSA)5 which, along with
3Exec. Order No. 13,636, 78 Fed. Reg. 11,739 (Feb. 19, 2013).
4Pub. L. No. 113-274 (Dec. 18, 2014).
5Pub. L. No. 107-295 (Nov. 25, 2002).
Page 3 GAO-16-116T
its implementing regulations developed by the Coast Guard, requires a
wide range of security improvements for the nation’s ports, waterways,
and coastal areas. DHS is the lead agency for implementing the act’s
provisions, and DHS component agencies, including the Coast Guard and
the Federal Emergency Management Agency (FEMA), have specific
responsibilities for implementing the act.
To carry out its responsibilities for the security of geographic areas
around ports, the Coast Guard has designated a captain of the port within
each of 43 geographically defined port areas. The captain of the port is
responsible for overseeing the development of the security plans within
each of these port areas. In addition, maritime security committees, made
up of key stakeholders, are to identify critical port infrastructure and risks
to the port areas, develop mitigation strategies for these risks, and
communicate appropriate security information to port stakeholders. As
part of their duties, these committees are to assist the Coast Guard in
developing port area maritime security plans. The Coast Guard is to
develop a risk-based security assessment during the development of the
port area maritime security plans that considers, among other things,
radio and telecommunications systems, including computer systems and
networks that may, if damaged, pose a risk to people, infrastructure, or
operations within the port.
In addition, under MTSA, owners and operators of individual port facilities
are required to develop facility security plans to prepare certain maritime
facilities, such as container terminals and chemical processing plants, for
deterring a transportation security incident. The implementing regulations
for these facility security plans require written security assessment reports
to be included with the plans that, among other things, contain an
analysis that considers measures to protect radio and
telecommunications equipment, including computer systems and
networks.
MTSA also codified the Port Security Grant Program, which is to help
defray the costs of implementing security measures at domestic ports.
Port areas use funding from this program to improve port-wide risk
management, enhance maritime domain awareness, and improve port
recovery and resilience efforts through developing security plans,
purchasing security equipment, and providing security training to
employees. FEMA is responsible for administering this program with input
from Coast Guard subject matter experts.
Page 4 GAO-16-116T
Like threats affecting other critical infrastructures, threats to the maritime
IT infrastructure are evolving and growing and can come from a wide
array of sources. Risks to cyber-based assets can originate from
unintentional or intentional threats. Unintentional threats can be caused
by, among other things, natural disasters, defective computer or network
equipment, software coding errors, and careless or poorly trained
employees. Intentional threats include both targeted and untargeted
attacks from a variety of sources, including criminal groups, hackers,
disgruntled insiders, foreign nations engaged in espionage and
information warfare, and terrorists.
These adversaries vary in terms of their capabilities, willingness to act,
and motives, which can include seeking monetary gain or pursuing a
political, economic, or military advantage. For example, adversaries
possessing sophisticated levels of expertise and significant resources to
pursue their objectives—sometimes referred to as “advanced persistent
threats”—pose increasing risks. They make use of various techniques—
or exploits—that may adversely affect federal information, computers,
software, networks, and operations, such as a denial of service, which
prevents or impairs the authorized use of networks, systems, or
applications.
Reported incidents highlight the impact that cyber attacks could have on
the maritime environment, and researchers have identified security
vulnerabilities in systems aboard cargo vessels, such as global
positioning systems and systems for viewing digital nautical charts, as
well as on servers running on systems at various ports.
In some cases, these vulnerabilities have reportedly allowed hackers to
target ships and terminal systems. Such attacks can send ships off
course or redirect shipping containers from their intended destinations.
For example, according to Europol’s European Cybercrime Center, a
cyber incident was reported in 2013 (and corroborated by the FBI) in
which malicious software was installed on a computer at a foreign port.
The reported goal of the attack was to track the movement of shipping
containers for smuggling purposes. A criminal group used hackers to
break into the terminal operating system to gain access to security and
location information that was leveraged to remove the containers from the
port.
The Nation and Its
Ports Face an
Evolving Array of
Cyber-Based Threats
Page 5 GAO-16-116T
In June 2014 we reported that DHS and the other stakeholders had taken
limited steps with respect to maritime cybersecurity.6 In particular, risk
assessments for the maritime mode did not address cyber-related risks;
maritime-related security plans contained limited consideration of
cybersecurity; information-sharing mechanisms shared cybersecurity
information to varying degrees; and the guidance for the Port Security
Grant Program did not take certain steps to ensure that cyber risks were
addressed.
In its 2012 National Maritime Strategic Risk assessment, which was the
most recent available at the time of our 2014 review, the Coast Guard did
not address cyber-related risks to the maritime mode. As called for by the
NIPP, the Coast Guard completes this assessment on a biennial basis,
and it is to provide a description of the types of threats the Coast Guard
expects to encounter within its areas of responsibility, such as ensuring
the security of port facilities, over the next 5 to 8 years. The assessment
is to be informed by numerous inputs, such as historical incident and
performance data, the views of subject matter experts, and risk models,
including the Maritime Security Risk Analysis Model, which is a tool that
assesses risk in terms of threat, vulnerability, and consequences.
However, we found that while the 2012 assessment contained information
regarding threats, vulnerabilities, and the mitigation of potential risks in
the maritime environment, none of the information addressed cyber-
related risks or provided a thorough assessment of cyber-related threats,
vulnerabilities, and potential consequences. Coast Guard officials
attributed this gap to limited efforts to develop inputs related to cyber
threats to inform the risk assessment. For example, the Maritime Security
Risk Analysis Model did not contain information related to cyber threats.
The officials noted that they planned to address this deficiency in the next
iteration of the assessment, which was to be completed by September
2014, but did not provide details on how cybersecurity would be
specifically addressed.
We therefore recommended that DHS direct the Coast Guard to ensure
that the next iteration of the maritime risk assessment include cyber-
related threats, vulnerabilities, and potential consequences. DHS
6GAO-14-459.
DHS and Other
Stakeholders Have
Taken Limited Actions
to Address Maritime
Port Cybersecurity
Maritime Risk Assessment
Did Not Address
Cybersecurity
Page 6 GAO-16-116T
http://www.gao.gov/products/GAO-14-459
concurred with our recommendation, and the September 2014 version of
the National Maritime Strategic Risk Assessment identifies cyber attacks
as a threat vector for the maritime environment and assigns some impact
values to these threats. However, the assessment does not identify
vulnerabilities of cyber-related assets. Without fully addressing threats,
vulnerabilities, and consequences of cyber incidents in its assessment,
the Coast Guard and its sector partners will continue to be hindered in
their ability to appropriately plan and allocate resources for protecting
maritime-related critical infrastructure.
As we reported in June 2014, maritime security plans required by MTSA
did not fully address cyber-related threats, vulnerabilities, and other
considerations. Specifically, three area maritime security plans we
reviewed from three high-risk port areas contained very limited, if any,
information about cyber-threats and mitigation activities. For example, the
three plans included information about the types of information and
communications technology systems that would be used to communicate
security information to prevent, manage, and respond to a transportation
security incident; the types of information considered to be sensitive
security information; and how to securely handle such information. They
did not, however, identify or address any other potential cyber-related
threats directed at or vulnerabilities in these systems or include
cybersecurity measures that port-area stakeholders should take to
prevent, manage, and respond to cyber-related threats and
vulnerabilities.
Similarly, nine facility security plans from the nonfederal organizations we
met with during our 2014 review generally had very limited cybersecurity
information. For example, two of the plans had generic references to
potential cyber threats, but did not have any specific information on
assets that were potentially vulnerable or associated mitigation strategies.
Officials representing the Coast Guard and nonfederal entities
acknowledged that their facility security plans at the time generally did not
contain cybersecurity information.
Coast Guard officials and other stakeholders stated that the area and
facility-level security plans did not adequately address cybersecurity
because the guidance for developing the plans did not require a cyber
component. Officials further stated that guidance for the next iterations of
the plans, which were to be developed in 2014, addressed cybersecurity.
However, in the absence of a maritime risk environment that addressed
cyber risk, we questioned whether the revised plans would appropriately
Maritime Security Plans’
Consideration of
Cybersecurity Was Limited
Page 7 GAO-16-116T
address the cyber-related threats and vulnerabilities affecting the
maritime environment.
Accordingly, we recommended that DHS direct the Coast Guard to use
the results of the next maritime risk assessment to inform guidance for
incorporating cybersecurity considerations for port area and facility
security plans. While DHS concurred with this recommendation, as noted
above, the revised maritime risk assessment does not address
vulnerabilities of systems supporting maritime port operations, and thus is
limited as a tool for informing maritime cybersecurity planning. Further, it
is unclear to what extent the updated port area and facility plans include
cyber risks because the Coast Guard has not yet provided us with
updated plans.
Consistent with the private-public partnership model outlined in the NIPP,
the Coast Guard helped establish various collaborative bodies for sharing
security-related information in the maritime environment. For example,
the Maritime Modal Government Coordinating Council was established to
enable interagency coordination on maritime security issues, and
members included representatives from DHS, as well as the Departments
of Commerce, Defense, Justice, and Transportation. Meetings of this
council discussed implications for the maritime mode of the President’s
executive order on improving critical infrastructure cybersecurity, among
other topics.
In addition, the Maritime Modal Sector Coordinating Council, consisting of
owners, operators, and associations from within the sector, was
established in 2007 to enable coordination and information sharing.
However, this council disbanded in March 2011 and was no longer active,
when we conducted our 2014 review. Coast Guard officials stated that
maritime stakeholders had viewed the sector coordinating council as
duplicative of other bodies, such as area maritime security committees,
and thus there was little interest in reconstituting the council.
In our June 2014 report, we noted that in the absence of a sector
coordinating council, the maritime mode lacked a body to facilitate
national-level information sharing and coordination of security-related
information. By contrast, maritime security committees are focused on
specific geographic areas.
We therefore recommended that DHS direct the Coast Guard to work with
maritime stakeholders to determine if the sector coordinating council
should be reestablished. DHS concurred with this recommendation, but
Information-Sharing
Mechanisms Varied in
Sharing Cybersecurity
Information
Page 8 GAO-16-116T
has yet to take action on this. The absence of a national-level sector
coordinating council increases that risk that critical infrastructure owners
and operators will be unable to effectively share information concerning
cyber threats and strategies to mitigate risks arising from them.
In 2013 and 2014 FEMA identified enhancing cybersecurity capabilities
as a funding priority for its Port Security Grant Program and provided
guidance to grant applicants regarding the types of cybersecurity-related
proposals eligible for funding. However, in our June 2014 report we noted
that the agency’s national review panel had not consulted with
cybersecurity-related subject matter experts to inform its review of cyber-
related grant proposals. This was partly because FEMA had downsized
the expert panel that reviewed grants. In addition, because the Coast
Guard’s maritime risk assessment did not include cyber-related threats,
grant applicants and reviewers were not able to use the results of such an
assessment to inform grant proposals, project review, and risk-based
funding decisions.
Accordingly, we recommended that DHS direct FEMA to (1) develop
procedures for grant proposal reviewers, at both the national and field
level, to consult with cybersecurity subject matter experts from the Coast
Guard when making funding decisions and (2) use information on cyber-
related threats, vulnerabilities, and consequences identified in the revised
maritime risk assessment to inform funding guidance for grant applicants
and reviewers.
Regarding the first recommendation, FEMA officials told us that since our
2014 review, they have consulted with the Coast Guard’s Cyber
Command on high-dollar value cyber projects and that Cyber Command
officials sat on the review panel for one day to review several other cyber
projects. FEMA officials also provided examples of recent field review
guidance sent to the captains of the port, including instructions to contact
Coast Guard officials if they have any questions about the review
process. However, FEMA did not provide written procedures at either the
national level or the port area level for ensuring that grant reviews are
informed by the appropriate level of cybersecurity expertise. FEMA
officials stated the fiscal year 2016 Port Security Grant Program guidance
will include specific instructions for both the field review and national
review as part of the cyber project review.
With respect to the second recommendation, since the Coast Guard’s
2014 maritime risk assessment does not include information about cyber
Port Security Grant
Program Did Not Take Key
Steps to Effectively
Address Cyber Risks
Page 9 GAO-16-116T
vulnerabilities, as discussed above, the risk assessment would be of
limited value to FEMA in informing its guidance for grant applicants and
reviewers. As a result, we continue to be concerned that port security
grants may not be allocated to projects that will best contribute to the
cybersecurity of the maritime environment.
In summary, protecting the nation’s ports from cyber-based threats is of
increasing importance, not only because of the prevalence of such
threats, but because of the ports’ role as conduits of over a trillion dollars
in cargo each year. Ports provide a tempting target for criminals seeking
monetary gain, and successful attacks could potentially wreak havoc on
the national economy. The increasing dependence of port activities on
computerized information and communications systems makes them
vulnerable to many of the same threats facing other cyber-reliant critical
infrastructures, and federal agencies play a key role by working with port
facility owners and operators to secure the maritime environment. While
DHS, through the Coast Guard and FEMA, has taken steps to address
cyber threats in this environment, they have been limited and more
remains to be done to ensure that federal and nonfederal stakeholders
are working together effectively to mitigate cyber-based threats to the
ports. Until DHS fully implements our recommendations, the nation’s
maritime ports will remain susceptible to cyber risks.
Chairman Miller, Ranking Member Vela, and Members of the
Subcommittee, this concludes my prepared statement. I would be
pleased to answer any questions you may have at this time.
If you or your staff have any questions about this testimony, please
contact Gregory C. Wilshusen, Director, Information Security Issues at
(202) 512-6244 or wilshuseng@gao.gov. GAO staff who made key
contributions to this testimony are Michael W. Gilmore, Assistant Director;
Bradley W. Becker; Jennifer L. Bryant; Kush K. Malhotra; and Lee
McCracken.
Contact and
Acknowledgments
(311528) Page 10 GAO-16-116T
mailto:wilshuseng@gao.gov
This is a work of the U.S. government and is not subject to copyright protection in the
United States. The published product may be reproduced and distributed in its entirety
without further permission from GAO. However, because this work may contain
copyrighted images or other material, permission from the copyright holder may be
necessary if you wish to reproduce this material separately.
Page 11 GAO-16-116T
The Government Accountability Office, the audit, evaluation, and
investigative arm of Congress, exists to support Congress in meeting its
constitutional responsibilities and to help improve the performance and
accountability of the federal government for the American people. GAO
examines the use of public funds; evaluates federal programs and
policies; and provides analyses, recommendations, and other assistance
to help Congress make informed oversight, policy, and funding decisions.
GAO’s commitment to good government is reflected in its core values of
accountability, integrity, and reliability.
The fastest and easiest way to obtain copies of GAO documents at no
cost is through GAO’s website (http://www.gao.gov). Each weekday
afternoon, GAO posts on its website newly released reports, testimony,
and correspondence. To have GAO e-mail you a list of newly posted
products, go to http://www.gao.gov and select “E-mail Updates.”
The price of each GAO publication reflects GAO’s actual cost of
production and distribution and depends on the number of pages in the
publication and whether the publication is printed in color or black and
white. Pricing and ordering information is posted on GAO’s website,
http://www.gao.gov/ordering.htm.
Place orders by calling (202) 512-6000, toll free (866) 801-7077, or
TDD (202) 512-2537.
Orders may be paid for using American Express, Discover Card,
MasterCard, Visa, check, or money order. Call for additional information.
Connect with GAO on Facebook, Flickr, Twitter, and YouTube.
Subscribe to our RSS Feeds or E-mail Updates.
Listen to our Podcasts and read The Watchblog.
Visit GAO on the web at www.gao.gov.
Contact:
Website: http://www.gao.gov/fraudnet/fraudnet.htm
E-mail: fraudnet@gao.gov
Automated answering system: (800) 424-5454 or (202) 512-7470
Katherine Siggerud, Managing Director, siggerudk@gao.gov, (202) 512-
4400, U.S. Government Accountability Office, 441 G Street NW, Room
7125, Washington, DC 20548
Chuck Young, Managing Director, youngc1@gao.gov, (202) 512-4800
U.S. Government Accountability Office, 441 G Street NW, Room 7149
Washington, DC 20548
GAO’s Mission
Obtaining Copies of
GAO Reports and
Testimony
Order by Phone
Connect with GAO
To Report Fraud,
Waste, and Abuse in
Federal Programs
Congressional
Relations
Public Affairs
Please Print on Recycled Paper.
http://www.gao.gov/
http://www.gao.gov/
http://www.gao.gov/ordering.htm
http://facebook.com/usgao
http://flickr.com/usgao
http://youtube.com/usgao
http://www.gao.gov/feeds.html
http://www.gao.gov/subscribe/index.php
http://www.gao.gov/podcast/watchdog.html
http://blog.gao.gov/
http://www.gao.gov/
http://www.gao.gov/fraudnet/fraudnet.htm
mailto:fraudnet@gao.gov
mailto:siggerudk@gao.gov
mailto:youngc1@gao.gov
- MARITIME CRITICAL INFRASTRUCTURE PROTECTION
- DHS Needs to Enhance Efforts to Address Port Cybersecurity
- d16116T_high
Statement of Gregory C. Wilshusen,
Director, Information Security Issues
Background
Federal Policies and Laws Establish Requirements and Responsibilities for Protecting Maritime Critical Infrastructure
The Nation and Its Ports Face an Evolving Array of Cyber-Based Threats
DHS and Other Stakeholders Have Taken Limited Actions to Address Maritime Port Cybersecurity
Maritime Risk Assessment Did Not Address Cybersecurity
Maritime Security Plans’ Consideration of Cybersecurity Was Limited
Information-Sharing Mechanisms Varied in Sharing Cybersecurity Information
Port Security Grant Program Did Not Take Key Steps to Effectively Address Cyber Risks
Contact and Acknowledgments
MARITIME CRITICAL INFRASTRUCTURE PROTECTION
DHS Needs to Enhance Efforts to Address Port Cybersecurity
Why GAO Did This Study
What GAO Recommends
What GAO Found
<<
/ASCII85EncodePages false
/AllowTransparency false
/AutoPositionEPSFiles true
/AutoRotatePages /PageByPage
/Binding /Left
/CalGrayProfile (Dot Gain 20%)
/CalRGBProfile (sRGB IEC61966-2.1)
/CalCMYKProfile (U.S. Web Coated \050SWOP\051 v2)
/sRGBProfile (sRGB IEC61966-2.1)
/CannotEmbedFontPolicy /Error
/CompatibilityLevel 1.7
/CompressObjects /All
/CompressPages true
/ConvertImagesToIndexed true
/PassThroughJPEGImages true
/CreateJobTicket false
/DefaultRenderingIntent /Default
/DetectBlends true
/DetectCurves 0.1000
/ColorConversionStrategy /LeaveColorUnchanged
/DoThumbnails false
/EmbedAllFonts true
/EmbedOpenType false
/ParseICCProfilesInComments true
/EmbedJobOptions true
/DSCReportingLevel 0
/EmitDSCWarnings false
/EndPage -1
/ImageMemory 1048576
/LockDistillerParams true
/MaxSubsetPct 100
/Optimize true
/OPM 1
/ParseDSCComments true
/ParseDSCCommentsForDocInfo true
/PreserveCopyPage true
/PreserveDICMYKValues true
/PreserveEPSInfo true
/PreserveFlatness true
/PreserveHalftoneInfo false
/PreserveOPIComments false
/PreserveOverprintSettings true
/StartPage 1
/SubsetFonts true
/TransferFunctionInfo /Preserve
/UCRandBGInfo /Preserve
/UsePrologue false
/ColorSettingsFile ()
/AlwaysEmbed [ true
]
/NeverEmbed [ true
]
/AntiAliasColorImages false
/CropColorImages true
/ColorImageMinResolution 300
/ColorImageMinResolutionPolicy /OK
/DownsampleColorImages true
/ColorImageDownsampleType /Bicubic
/ColorImageResolution 300
/ColorImageDepth -1
/ColorImageMinDownsampleDepth 1
/ColorImageDownsampleThreshold 1.50000
/EncodeColorImages true
/ColorImageFilter /DCTEncode
/AutoFilterColorImages true
/ColorImageAutoFilterStrategy /JPEG
/ColorACSImageDict <<
/QFactor 0.15
/HSamples [1 1 1 1] /VSamples [1 1 1 1]
>>
/ColorImageDict <<
/QFactor 0.15
/HSamples [1 1 1 1] /VSamples [1 1 1 1]
>>
/JPEG2000ColorACSImageDict <<
/TileWidth 256
/TileHeight 256
/Quality 30
>>
/JPEG2000ColorImageDict <<
/TileWidth 256
/TileHeight 256
/Quality 30
>>
/AntiAliasGrayImages false
/CropGrayImages true
/GrayImageMinResolution 300
/GrayImageMinResolutionPolicy /OK
/DownsampleGrayImages true
/GrayImageDownsampleType /Bicubic
/GrayImageResolution 300
/GrayImageDepth -1
/GrayImageMinDownsampleDepth 2
/GrayImageDownsampleThreshold 1.50000
/EncodeGrayImages true
/GrayImageFilter /DCTEncode
/AutoFilterGrayImages true
/GrayImageAutoFilterStrategy /JPEG
/GrayACSImageDict <<
/QFactor 0.15
/HSamples [1 1 1 1] /VSamples [1 1 1 1]
>>
/GrayImageDict <<
/QFactor 0.15
/HSamples [1 1 1 1] /VSamples [1 1 1 1]
>>
/JPEG2000GrayACSImageDict <<
/TileWidth 256
/TileHeight 256
/Quality 30
>>
/JPEG2000GrayImageDict <<
/TileWidth 256
/TileHeight 256
/Quality 30
>>
/AntiAliasMonoImages false
/CropMonoImages true
/MonoImageMinResolution 1200
/MonoImageMinResolutionPolicy /OK
/DownsampleMonoImages true
/MonoImageDownsampleType /Bicubic
/MonoImageResolution 1200
/MonoImageDepth -1
/MonoImageDownsampleThreshold 1.50000
/EncodeMonoImages true
/MonoImageFilter /CCITTFaxEncode
/MonoImageDict <<
/K -1
>>
/AllowPSXObjects false
/CheckCompliance [
/None
]
/PDFX1aCheck false
/PDFX3Check false
/PDFXCompliantPDFOnly false
/PDFXNoTrimBoxError true
/PDFXTrimBoxToMediaBoxOffset [
0.00000
0.00000
0.00000
0.00000
]
/PDFXSetBleedBoxToMediaBox true
/PDFXBleedBoxToTrimBoxOffset [
0.00000
0.00000
0.00000
0.00000
]
/PDFXOutputIntentProfile (None)
/PDFXOutputConditionIdentifier ()
/PDFXOutputCondition ()
/PDFXRegistryName ()
/PDFXTrapped /False
/CreateJDFFile false
/Description <<
/ARA
/BGR
/CHS
/CHT
/CZE
/DAN
/DEU
/ESP
/ETI
/FRA
/GRE
/HEB
/HRV (Za stvaranje Adobe PDF dokumenata najpogodnijih za visokokvalitetni ispis prije tiskanja koristite ove postavke. Stvoreni PDF dokumenti mogu se otvoriti Acrobat i Adobe Reader 5.0 i kasnijim verzijama.)
/HUN
/ITA
/JPN
/KOR
/LTH
/LVI
/NLD (Gebruik deze instellingen om Adobe PDF-documenten te maken die zijn geoptimaliseerd voor prepress-afdrukken van hoge kwaliteit. De gemaakte PDF-documenten kunnen worden geopend met Acrobat en Adobe Reader 5.0 en hoger.)
/NOR
/POL
/PTB
/RUM
/RUS
/SKY
/SLV
/SUO
/SVE
/TUR
/UKR
/ENU (Use these settings to create Adobe PDF documents best suited for high-quality prepress printing. Created PDF documents can be opened with Acrobat and Adobe Reader 5.0 and later.)
>>
/Namespace [
(Adobe)
(Common)
(1.0)
]
/OtherNamespaces [
<<
/AsReaderSpreads false
/CropImagesToFrames true
/ErrorControl /WarnAndContinue
/FlattenerIgnoreSpreadOverrides false
/IncludeGuidesGrids false
/IncludeNonPrinting false
/IncludeSlug false
/Namespace [
(Adobe)
(InDesign)
(4.0)
]
/OmitPlacedBitmaps false
/OmitPlacedEPS false
/OmitPlacedPDF false
/SimulateOverprint /Legacy
>>
<<
/AddBleedMarks false
/AddColorBars false
/AddCropMarks false
/AddPageInfo false
/AddRegMarks false
/ConvertColors /ConvertToCMYK
/DestinationProfileName ()
/DestinationProfileSelector /DocumentCMYK
/Downsample16BitImages true
/FlattenerPreset <<
/PresetSelector /MediumResolution
>>
/FormElements false
/GenerateStructure false
/IncludeBookmarks false
/IncludeHyperlinks false
/IncludeInteractive false
/IncludeLayers false
/IncludeProfiles false
/MultimediaHandling /UseObjectSettings
/Namespace [
(Adobe)
(CreativeSuite)
(2.0)
]
/PDFXOutputIntentProfileSelector /DocumentCMYK
/PreserveEditing true
/UntaggedCMYKHandling /LeaveUntagged
/UntaggedRGBHandling /UseDocumentProfile
/UseDocumentBleed false
>>
]
>> setdistillerparams
<<
/HWResolution [2400 2400]
/PageSize [612.000 792.000]
>> setpagedevice
MARITIME CRITICAL
INFRASTRUCTURE
PROTECTION
DHS Needs to Better
Address Port
Cybersecurity
Report to the Chairman, Committee on
Commerce, Science, and
Transportation, U.S. Senate
June 2014
GAO-14-459
United States Government Accountability Office
United States Government Accountability Office
Highlights of GAO-14-459, a report to the
Chairman, Committee on Commerce, Science,
and Transportation, U.S. Senate
June 2014
MARITIME CRITICAL INFRASTRUCTURE
PROTECTION
Why GAO Did This Study
U.S. maritime ports handle more than
$1.3 trillion in cargo annually. The
operations of these ports are
supported by information and
communication systems, which are
susceptible to cyber-related threats.
Failures in these systems could
degrade or interrupt operations at
ports, including the flow of commerce.
Federal agencies—in particular DHS—
and industry stakeholders have
specific roles in protecting maritime
facilities and ports from physical and
cyber threats.
GAO’s objective was to identify the
extent to which DHS and other
stakeholders have taken steps to
address cybersecurity in the maritime
port environment. GAO examined
relevant laws and regulations;
analyzed federal cybersecurity-related
policies and plans; observed
operations at three U.S. ports selected
based on being a high-risk port and a
leader in calls by vessel type, e.g.
container; and interviewed federal and
nonfederal officials.
What GAO Recommends
GAO recommends that DHS direct the
Coast Guard to (1) assess cyber-
related risks, (2) use this assessment
to inform maritime security guidance,
and (3) determine whether the sector
coordinating council should be
reestablished. DHS should also direct
FEMA to (1) develop procedures to
consult DHS cybersecurity experts for
assistance in reviewing grant
proposals and (2) use the results of the
cyber-risk assessment to inform its
grant guidance. DHS concurred with
GAO’s recommendations.
What GAO Found
Actions taken by the Department of Homeland Security (DHS) and two of its
component agencies, the U.S. Coast Guard and Federal Emergency
Management Agency (FEMA), as well as other federal agencies, to address
cybersecurity in the maritime port environment have been limited.
• While the Coast Guard initiated a number of activities and coordinating
strategies to improve physical security in specific ports, it has not conducted
a risk assessment that fully addresses cyber-related threats, vulnerabilities,
and consequences. Coast Guard officials stated that they intend to conduct
such an assessment in the future, but did not provide details to show how it
would address cybersecurity. Until the Coast Guard completes a thorough
assessment of cyber risks in the maritime environment, the ability of
stakeholders to appropriately plan and allocate resources to protect ports
and other maritime facilities will be limited.
• Maritime security plans required by law and regulation generally did not
identify or address potential cyber-related threats or vulnerabilities. This was
because the guidance issued by Coast Guard for developing these plans did
not require cyber elements to be addressed. Officials stated that guidance for
the next set of updated plans, due for update in 2014, will include
cybersecurity requirements. However, in the absence of a comprehensive
risk assessment, the revised guidance may not adequately address cyber-
related risks to the maritime environment.
• The degree to which information-sharing mechanisms (e.g., councils) were
active and shared cybersecurity-related information varied. Specifically, the
Coast Guard established a government coordinating council to share
information among government entities, but it is unclear to what extent this
body has shared information related to cybersecurity. In addition, a sector
coordinating council for sharing information among nonfederal stakeholders
is no longer active, and the Coast Guard has not convinced stakeholders to
reestablish it. Until the Coast Guard improves these mechanisms, maritime
stakeholders in different locations are at greater risk of not being aware of,
and thus not mitigating, cyber-based threats.
• Under a program to provide security-related grants to ports, FEMA identified
enhancing cybersecurity capabilities as a funding priority for the first time in
fiscal year 2013 and has provided guidance for cybersecurity-related
proposals. However, the agency has not consulted cybersecurity-related
subject matter experts to inform the multi-level review of cyber-related
proposals—partly because FEMA has downsized the expert panel that
reviews grants. Also, because the Coast Guard has not assessed cyber-
related risks in the maritime risk assessment, grant applicants and FEMA
have not been able to use this information to inform funding proposals and
decisions. As a result, FEMA is limited in its ability to ensure that the program
is effectively addressing cyber-related risks in the maritime environment.
View GAO-14-459. For more information,
contact Gregory C. Wilshusen at (202) 512-
6244 or wilshuseng@gao.gov or Stephen L.
Caldwell at (202) 512-9610 or
caldwells@gao.gov.
http://www.gao.gov/products/GAO-14-459�
http://www.gao.gov/products/GAO-14-459�
mailto:wilshuseng@gao.gov�
mailto:caldwells@gao.gov�
Page i GAO-14-459 Maritime Port Cybersecurity
Letter 1
Background
4
Federal Stakeholders Have Taken Limited Actions to Address
Cybersecurity in the Maritime Port Environment 16
Conclusions 28
Recommendations for Executive Action 28
Agency Comments and Our Evaluation 29
Appendix I Objective, Scope, and Methodology 32
Appendix II Additional Federal Maritime Cybersecurity Actions 36
Appendix III Full Text for Figure 1 on Examples of Technologies Used in Maritime
Port Environments 43
Appendix IV Comments from the Department of Homeland Security 44
Appendix V GAO Contacts and Staff Acknowledgments 47
Related GAO Products
48
Tables
Table 1: Sources of Cyber-based Threats 7
Table 2: Types of Exploits 8
Figures
Figure 1: Examples of Technologies Used in Maritime Port
Environments 6
Contents
Page ii GAO-14-459 Maritime Port Cybersecurity
Figure 2: Examples of Technologies Used in Maritime Port
Environments (Printable Version) 43
Abbreviations
CBP U.S. Customs and Border Protection
Coast Guard U.S. Coast Guard
DHS Department of Homeland Security
FEMA Federal Emergency Management Agency
HSPD-7 Homeland Security Presidential Directive 7
ISAC information sharing and analysis center
IT information technology
MTSA Maritime Transportation Security Act of 2002
NIPP National Infrastructure Protection Plan
NIST National Institute of Standards and Technology
PPD-21 Presidential Policy Directive 21
SAFE Port Act Security and Accountability for Every Port Act of 2006
TSA Transportation Security Administration
This is a work of the U.S. government and is not subject to copyright protection in the
United States. The published product may be reproduced and distributed in its entirety
without further permission from GAO. However, because this work may contain
copyrighted images or other material, permission from the copyright holder may be
necessary if you wish to reproduce this material separately.
Page 1 GAO-14-459 Maritime Port Cybersecurity
441 G St. N.W.
Washington, DC 20548
June 5, 2014
The Honorable John D. Rockefeller IV
Chairman
Committee on Commerce, Science,
and Transportation
United States Senate
Dear Mr. Chairman:
An essential element of the nation’s transportation critical infrastructure,1
Information and communication systems support the operation of these
ports, and failures in these systems as a result of unintended or malicious
incidents could degrade or interrupt port operations and the flow of cargo
or, as a recently reported incident showed, allow criminal activity to occur
unimpeded. Since 2003, we have identified the protection of systems
supporting our nation’s critical infrastructure as a government-wide high-
U.S. maritime ports are part of an economic engine handling more than
$1.3 trillion in cargo annually. A major disruption in the maritime
transportation system could have a widespread impact on global
shipping, international trade, and the global economy. The potential
economic impact caused by a disruption in port operations underscores
the importance of ensuring that ports remain operational to the maximum
extent possible.
1The term “critical infrastructure” as defined in the Uniting and Strengthening America by
Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001
(USA PATRIOT Act) refers to systems and assets so vital to the United States that their
incapacity or destruction would have a debilitating impact on security, national economic
security, national public health or safety, or any combination of these. 42 U.S.C. §
5195c(e). The transportation systems sector (which includes the maritime mode as a
subsector) is 1 of 16 critical infrastructure sectors established by federal policy. The other
sectors are chemical; commercial facilities; communications; critical manufacturing; dams;
defense industrial base; emergency services; energy; financial services; food and
agriculture; government facilities; healthcare and public health; information technology;
nuclear reactors, materials, and waste; and water and wastewater systems.
Page 2 GAO-14-459 Maritime Port Cybersecurity
risk area, and we continued to do so in the most recent update to our
high-risk list.2
In addition, we recently testified that the federal government needs to
address pressing challenges to its cybersecurity and accelerate progress
in bolstering the cybersecurity posture of the nation.
3 As computer
technology has advanced, our nation’s critical infrastructures, such as
power distribution, water supply, telecommunications, and emergency
services, have become increasingly dependent on computerized
information systems and electronic data to carry out operations and to
process, maintain, and report essential information. The security of these
systems and data is essential to protecting national security, economic
prosperity, and public health and safety. As we have reported, (1) cyber
threats to critical infrastructure are evolving and growing, (2) cyber
incidents affecting computer systems and networks continue to rise, and
(3) the federal government continues to face challenges in a number of
key aspects of its approach to protecting the nation’s critical
infrastructure.4
A combination of federal, state, and local governments; port authorities;
and private companies own and operate U.S. ports and maritime facilities
and are ultimately responsible for protecting their assets from physical
and cyber-related threats. Federal law and policy establish a role for
federal agencies, in particular, the Department of Homeland Security
(DHS), in protecting maritime facilities and ports from physical and cyber-
related threats.
2GAO’s biennial High-Risk List identifies government programs that have greater
vulnerability to fraud, waste, abuse, and mismanagement or need to address challenges
to economy, efficiency, or effectiveness. We have designated federal information security
as a high-risk area since 1997; in 2003, we expanded this high risk area to include
protecting systems supporting our nation’s critical infrastructure. See GAO, High-Risk
Series: An Update, GAO-13-283 (Washington, D.C.: February 2013).
3GAO, Government Efficiency and Effectiveness: Views on the Progress and Plans for
Addressing Government–wide Management Challenges, GAO-14-436T (Washington,
D.C.: Mar. 12, 2014).
4GAO, Cybersecurity: National Strategy, Roles, and Responsibilities Need to Be Better
Defined and More Effectively Implemented, GAO-13-187 (Washington, D.C.: Feb. 14,
2013).
http://www.gao.gov/products/GAO-13-283�
http://www.gao.gov/products/GAO-14-436T�
http://www.gao.gov/products/GAO-13-187�
Page 3 GAO-14-459 Maritime Port Cybersecurity
At your request, we reviewed cybersecurity-related threats and actions
taken by stakeholders in the maritime environment. Our specific objective
was to identify the extent to which DHS and other stakeholders have
taken steps to address cybersecurity5
To conduct our evaluation, we analyzed relevant maritime laws and
regulations for cybersecurity-related authorities, and analyzed
cybersecurity-related federal policies and plans. Based on these
analyses, we identified relevant federal entities, including the
Departments of Homeland Security (including the U.S. Coast Guard
(Coast Guard) and Federal Emergency Management Agency (FEMA)),
Commerce, Defense, Justice, and Transportation. We also identified
activities that federal and nonfederal maritime stakeholders should be
performing to mitigate cyber threats to their operations. We focused on
the information and communications technology used to operate port
facilities. We did not include aspects of the maritime environment such as
vessels, off-shore platforms, inland waterways, intermodal connections,
in the maritime port environment.
6
We conducted this performance audit from April 2013 to June 2014 in
accordance with generally accepted government auditing standards.
Those standards require that we plan and perform the audit to obtain
and federally managed information and communication technology. We
visited a non-projectable sample of three domestic ports to identify the
types of technologies used during port operations and to examine port
area and facility security plans. These ports were selected based on their
identification as both high-risk ports and as national leaders in calls by
specific types of vessels—oil and natural gas, containers, and dry bulk.
We also gathered and analyzed evidence of stakeholder actions taken to
address cybersecurity issues as reflected in security plans, and
interviewed federal and nonfederal officials who have roles in protecting
maritime facilities and ports from physical or cyber-related threats.
5“Cybersecurity” means the ability to protect or defend the use of cyberspace from cyber
attacks. “Cyberspace” is defined as a global domain within the information environment
consisting of the interdependent network of information systems infrastructures including
the Internet, telecommunications networks, computer systems, and embedded processors
and controllers. A “cyber attack” is further defined as an attack, via cyberspace, targeting
an enterprise’s use of cyberspace for the purpose of disrupting, disabling, destroying, or
maliciously controlling a computing environment/infrastructure, or destroying the integrity
of the data or stealing controlled information.
6Intermodal connections link the various transportation modes, e.g., maritime ports and
related facilities, highways, rail, and air.
Page 4 GAO-14-459 Maritime Port Cybersecurity
sufficient, appropriate evidence to provide a reasonable basis for our
findings and conclusions based on our audit objective. We believe that
the evidence obtained provides a reasonable basis for our findings and
conclusions based on our audit objective. Appendix I discusses our
objective, scope, and methodology in greater detail.
The United States has approximately 360 commercial sea and river ports
that handle more than $1.3 trillion in cargo annually. A wide variety of
goods, including automobiles, grain, and millions of cargo containers,
travel through these ports each day. While no two ports are exactly alike,
many share certain characteristics, like their size, general proximity to a
metropolitan area, the volume of cargo being processed, and connections
to complex transportation networks designed to move cargo and
commerce as quickly as possible, that make them vulnerable to physical
security threats.
Entities within the maritime port environment are also vulnerable to cyber-
based threats because maritime stakeholders rely on numerous types of
information and communications technologies to manage the movement
of cargo throughout ports. Examples of these technologies include the
following:
• Terminal operating systems: These are information systems used
by terminal operators to, among other things, control container
movements and storage. For example, the terminal operating system
is to support the logistical management of containers while in the
terminal operator’s possession, including container movement and
storage. To enhance the terminal operator’s operations, the system
can also be integrated with other systems and technologies, such as
financial systems, mobile computing, optical character recognition,
and radio frequency identification systems.
• Industrial control systems: In maritime terminals, industrial control
systems7
7Industrial control systems are automated systems used to control industrial processes
such as manufacturing, product handling, production, and distribution. According to
maritime sector documentation, control systems are used to operate motors, pumps,
valves, signals, lighting, and access controls.
facilitate the movement of goods throughout the terminal
using conveyor belts or pipelines to various structures (e.g., refineries,
processing plants, and storage tanks).
Background
Page 5 GAO-14-459 Maritime Port Cybersecurity
• Business operations systems: These are information and
communications technologies used to help support the business
operations of the terminal, such as communicating with customers
and preparing invoices and billing documentation. These systems can
include e-mail and file servers, enterprise resource planning systems,8
• Access control and monitoring systems: Information and
communication technology can also be used to support physical
security operations at a port. For example, camera surveillance
systems can be connected to information system networks to facilitate
remote monitoring of port facilities, and electronically enabled physical
access control devices can be used to protect sensitive areas of a
port.
networking equipment, phones, and fax machines.
See figure 1, an interactive graphic, for an overview of the technologies
used in the maritime port environment. See appendix III for a printable
version.
8An enterprise resource planning system is an automated system using commercial off-
the-shelf software consisting of multiple, integrated functional modules that perform a
variety of business-related tasks such as general ledger accounting, payroll, and supply
chain management.
Page 6 GAO-14-459 Maritime Port Cybersecurity
Source: GAO analysis of maritime sector information; Art Explosion (clip art).
Container
Bulk liquid
Dry bulk
Terminal
operating
system
Business
operations
systems
Industrial
control
system
Storage tanks
Refinery
Supply pipes
InstrumentsBusiness
operations
systems
Processing
building
Silos
Conveyor belts
Industrial
control
system
Business
operations
systems
Interactive graphic Figure 1: Examples of Technologies Used in Maritime Port Environments
Move mouse over blue system names to get descriptions of the systems. See appendix III for noninteractive version of this graphic.
Page 7 GAO-14-459 Maritime Port Cybersecurity
The location of the entity that manages these systems can also vary. Port
facility officials we interviewed stated that some information technology
systems used by their facilities are managed locally at the ports, while
others are managed remotely from locations within and outside the United
States.
In addition, other types of automated infrastructure are used in the global
maritime trade industry. For example, some ports in Europe use
automated ground vehicles and stacking cranes to facilitate the
movement of cargo throughout the ports.
Like threats affecting other critical infrastructures, threats to the maritime
information technology (IT) infrastructure can come from a wide array of
sources. For example, advanced persistent threats—where adversaries
possess sophisticated levels of expertise and significant resources to
pursue their objectives—pose increasing risk. Threat sources include
corrupt employees, criminal groups, hackers, and terrorists. These threat
sources vary in terms of the capabilities of the actors, their willingness to
act, and their motives, which can include monetary or political gain or
mischief, among other things. Table 1 describes the sources of cyber-
based threats in more detail.
Table 1: Sources of Cyber-based Threats
Threat source Description
Bot-network operators Bot-net operators use a network of compromised, remotely controlled systems, referred to as a
bot-net, to coordinate attacks and to distribute phishing schemes, spam, and malware attacks. The
services of these networks are sometimes made available on underground markets (e.g.,
purchasing a denial-of-service attack or services to relay spam or phishing attacks).
Business competitors Companies that compete against or do business with a target company may seek to obtain
sensitive information to improve their competitive advantage in various areas, such as pricing,
manufacturing, product development, and contracting.
Criminal groups Organized criminal groups use spam, phishing, and spyware/malware to commit identity theft,
online fraud, and computer extortion.
Hackers Hackers break into networks for the thrill of the challenge, bragging rights in the hacker community,
revenge, stalking, monetary gain, and political activism, among other reasons. While gaining
unauthorized access once required a fair amount of skill or computer knowledge, hackers can now
download attack scripts and protocols from the Internet and launch them against victim sites. Thus,
while attack tools have become more sophisticated, they have also become easier to use.
The Nation and Its Ports
Face an Evolving Array of
Cyber-Based Threats
Page 8 GAO-14-459 Maritime Port Cybersecurity
Threat source Description
Insiders A disgruntled or corrupt organization insider is a source of computer crime. The insider may not
need a great deal of knowledge about computer intrusions because his or her knowledge of a
target system is sufficient to allow unrestricted access to cause damage to the system or to steal
system data. The insider threat includes malicious current and former employees and contractors
hired by the organization, as well as careless or poorly trained employees who may inadvertently
introduce malware into systems.
Nations Nations use cyber tools as part of their information-gathering and espionage activities. In addition,
several nations are aggressively working to develop information warfare doctrine, programs, and
capabilities. Such capabilities enable a single entity to have a significant and serious impact by
disrupting the supply, communications, and economic infrastructures that support military power—
impacts that could affect the daily lives of citizens across the country. In his January 2012
testimony, the Director of National Intelligence stated that, among state actors, China and Russia
are of particular concern.
Phishers Individuals or small groups execute phishing schemes in an attempt to steal identities or
information for monetary gain. A phisher may also use spam and spyware or malware to
accomplish their objectives.
Spammers An individual or organization that distributes unsolicited e-mail with hidden or false information in
order to sell products, conduct phishing schemes, distribute spyware or malware, or attack
organizations (e.g., a denial of service).
Spyware or malware authors Individuals or organizations with malicious intent carry out attacks against users by producing and
distributing spyware and malware.
Terrorists A terrorist seeks to destroy, incapacitate, or exploit critical infrastructures in order to threaten
national security, cause mass casualties, weaken the economy, and damage public morale and
confidence. The terrorist may use phishing schemes or spyware/malware in order to generate
funds or gather sensitive information.
Source: GAO analysis based on data from the Director of National Intelligence, Department of Justice, Central Intelligence Agency, National Institute of Standards and Technology, and Software
Engineering Institute’s CERT® Coordination Center.
These sources of cyber threats may make use of various cyber
techniques, or exploits, to adversely affect information and
communications networks. Types of exploits include denial-of-service
attacks, phishing, Trojan horses, viruses, worms, and attacks on the IT
supply chains that support the communications networks. Table 2
describes the types of exploits in more detail.
Table 2: Types of Exploits
Type of exploit Description
Denial of service An attack that prevents or impairs the authorized use of networks, systems, or applications by
exhausting resources.
Distributed denial of service A variant of the denial-of-service attack that uses numerous hosts to perform the attack.
Phishing A digital form of social engineering that uses authentic-looking, but fake, e-mails to request
information from users or direct them to a fake website that requests information.
Trojan Horse A computer program that appears to have a useful function, but also has a hidden and potentially
malicious function that evades security mechanisms by, for example, masquerading as a useful
program that a user would likely execute.
Page 9 GAO-14-459 Maritime Port Cybersecurity
Type of exploit Description
Virus A computer program that can copy itself and infect a computer without the permission or
knowledge of the user. A virus might corrupt or delete data on a computer, use an e-mail program
to spread itself to other computers, or even erase everything on a hard disk. Unlike a computer
worm, a virus requires human involvement (usually unwitting) to propagate.
Worm A self-replicating, self-propagating, self-contained program that uses network mechanisms to
spread. Unlike a computer virus, a worm does not require human involvement to propagate.
Exploits affecting the information
technology supply chain
The installation of hardware or software that contains malicious logic (like a logic bomb, Trojan
horse, or a virus) or an unintentional vulnerability (the result of an existing defect, such as a
coding error) or that may be counterfeited. A supply chain threat can also come from a failure or
disruption in the production of a critical product, or a reliance on a malicious or unqualified service
provider for the performance of technical services.
Source: GAO analysis of unclassified government and nongovernment data.
Similar to those in the United States, ports elsewhere in the world also
rely on information and communications technology to facilitate their
operations, and concerns about the potential impact of cybersecurity
threats and vulnerabilities on these operations have been raised. For
example, according to a 2011 report issued by the European Network and
Information Security Agency,9 the maritime environment, like other
sectors, increasingly relies on information and communications systems
to optimize its operations, and the increased dependency on these
systems, combined with the operational complexity and multiple
stakeholders involved, make the environment vulnerable to cyber attacks.
In addition, Australia’s Office of the Inspector of Transport Security
reported in June 2012 that a cyber attack is probably the most serious
threat to the integrity of offshore oil and gas facilities and land-based
production.10
In addition, a recently reported incident highlights the risk that
cybersecurity threats pose to the maritime port environment. Specifically,
according to Europol’s European Cybercrime Center, a cyber incident
was reported in 2013 (and corroborated by the Federal Bureau of
Investigation) in which malware was installed on a computer at a foreign
port.
11
9European Network and Information Security Agency, Analysis of Cyber Security Aspects
in the Maritime Sector (Heraklion, Greece: November 2011).
The reported goal of the attack was to track the movement of
10Offshore Oil and Gas Resources Sector Security Inquiry © Commonwealth of Australia
(2012).
11Europol European Cybercrime Center, Cyber Bits: Hackers deployed to facilitate drugs
smuggling (The Hague, Netherlands: June 2013).
Page 10 GAO-14-459 Maritime Port Cybersecurity
shipping containers for smuggling purposes. A criminal group used
hackers to break into the terminal operating system to gain access to
security and location information that was leveraged to remove the
containers from the port.
Port owners and operators are responsible for the cybersecurity of their
operations, and federal plans and policies specify roles and
responsibilities for federal agencies to support those efforts. In particular,
the National Infrastructure Protection Plan (NIPP), a planning document
originally developed pursuant to the Homeland Security Act of 2002 and
Homeland Security Presidential Directive 7 (HSPD-7),12 sets forth a risk
management framework to address the risks posed by cyber, human, and
physical elements of critical infrastructure. It details the roles and
responsibilities of DHS in protecting the nation’s critical infrastructures;
identifies agencies that have lead responsibility for coordinating with the
sectors (referred to as sector-specific agencies); and specifies how other
federal, state, regional, local, tribal, territorial, and private-sector
stakeholders should use risk management principles to prioritize
protection activities within and across sectors.13
In addition, NIPP sets up a framework for operating and sharing
information across and between federal and nonfederal stakeholders
within each sector that includes the establishment of two types of
councils: sector coordinating councils and government coordinating
12See 6 U.S.C. § 121(d)(5); the White House, Homeland Security Presidential Directive 7
(Washington, D.C.: December 2003). Presidential Policy Directive 21 (PPD-21) revoked
HSPD-7, but plans developed pursuant to HSPD-7 remain in effect until specifically
revoked or superseded. PPD-21 also required DHS to provide to the President a
successor to the National Infrastructure Protection Plan, which DHS released in
December 2013. See DHS, National Infrastructure Protection Plan, Partnering for Critical
Infrastructure Security and Resilience (Washington, D.C.: December 2013).
13NIPP was first issued in June 2006. It was updated in 2009 and again in December
2013, in part, to reflect changes in federal cybersecurity policy since 2009. It identifies the
roles and responsibilities of DHS, sector-specific agencies, and private sector partners.
Federal Plans and Policies
Establish Responsibilities
for Securing Cyber-Reliant
Critical Infrastructure
Page 11 GAO-14-459 Maritime Port Cybersecurity
councils.14 The 2006 and 2009 NIPPs identified the U.S. Coast Guard as
the sector-specific agency for the maritime mode of the transportation
sector.15
Under NIPP, each critical infrastructure sector is also to develop a sector-
specific plan to detail the application of its risk management framework
for the sector. The 2010 Transportation Systems Sector-Specific Plan
includes an annex for the maritime mode of transportation.
In this role, the Coast Guard is to coordinate protective programs
and resilience strategies for the maritime environment.
16
In February 2013, the White House issued Presidential Policy Directive
21,
The maritime
annex is considered an implementation plan that details the individual
characteristics of the maritime mode and how it will apply risk
management, including a formal assessment of risk, to protect its
systems, assets, people, and goods.
17
14Sector coordinating councils are self-organized, self-run, and self-governed
organizations that are representative of a spectrum of key stakeholders within a sector;
and serve as a principal entry point for the government to collaborate with each sector for
developing and coordinating a wide range of critical infrastructure security and resilience
activities and issues. Government coordinating councils are established to enable
interagency and intergovernmental coordination, and include representatives across
various levels of government (federal and state/local/tribal/territorial) as appropriate to the
risk and operational landscape of each sector. Representatives from the Departments of
Commerce, Defense, Homeland Security, Justice, and Transportation make up the
Maritime Mode Government Coordinating Council.
which shifted the nation’s focus from protecting critical infrastructure
against terrorism toward protecting and securing critical infrastructure and
increasing its resilience against all hazards, including natural disasters,
terrorism, and cyber incidents. The directive identified sector-specific
15The 2013 NIPP designates DHS and the Department of Transportation as co-sector-
specific agencies with responsibility for the maritime mode. Within DHS, Coast Guard has
primary responsibility for the maritime mode.
16DHS, Transportation Systems Sector-Specific Plan: An Annex to the National
Infrastructure Protection Plan (Washington, D.C.: 2010).
17PPD-21, issued on February 12, 2013, revoked HSPD-7. However, plans developed
pursuant to HSPD-7 are to remain in effect until specifically revoked or superseded. PPD-
21 re-aligned the HSPD-7 critical infrastructure sectors and reduced the number from 18
to 16. The 16 critical infrastructure sectors are chemical; commercial facilities;
communications; critical manufacturing; dams; defense industrial base; emergency
services; energy; financial services; food and agriculture; government facilities; healthcare
and public health; information technology; nuclear reactors, materials, and waste;
transportation systems; and water and wastewater systems.
Page 12 GAO-14-459 Maritime Port Cybersecurity
agency roles and responsibilities to include, among other things, serving
as a day-to-day federal interface for the prioritization and coordination of
sector-specific activities.
In December 2013, DHS released an updated version of NIPP. The 2013
NIPP reaffirms the role of various coordinating structures (such as sector
coordinating councils and government coordinating councils) and
integrates cyber and physical security and resilience efforts into an
enterprise approach for risk management, among other things. The 2013
NIPP also reiterates the sector-specific agency roles and responsibilities
as defined in Presidential Policy Directive 21.
In addition, in February 2013 the President signed Executive Order 13636
for improving critical infrastructure cybersecurity.18
• the National Institute of Standards and Technology shall lead the
development of a cybersecurity framework that will provide
technology-neutral guidance;
The executive order
states that, among other things
• the policy of the federal government is to increase the volume,
timeliness, and quality of cyber threat information sharing with the
U.S. private sector;
• agencies with responsibility to regulate the security of critical
infrastructure shall consider prioritized actions to promote cyber
security; and
• DHS shall identify critical infrastructure where a cybersecurity incident
could have a catastrophic effect on public health or safety, economic
security, or national security.
The primary laws and regulations that establish DHS’s maritime security
requirements include the Maritime Transportation Security Act of 2002
(MTSA),19 the Security and Accountability for Every Port Act of 2006
(SAFE Port Act),20
18Exec. Order No. 13,636, 78 Fed. Reg. 11,739 (Feb. 19, 2013).
and Coast Guard’s implementing regulations for these
laws.
19Pub. L. No. 107-295, 116 Stat. 2064.
20Pub. L. No. 109-347, 120 Stat. 1884.
Federal Laws and
Implementing Regulations
Establish Security
Requirements for the
Maritime Sector
Page 13 GAO-14-459 Maritime Port Cybersecurity
Enacted in November 2002, MTSA requires a wide range of security
improvements for protecting our nation’s ports, waterways, and coastal
areas. DHS is the lead agency for implementing the act’s provisions and
relies on its component agencies, including the Coast Guard and FEMA,
to help implement the act.21 The Coast Guard is responsible for security
of U.S. maritime interests, including completion of security plans related
to geographic areas around ports with input from port stakeholders.
These plans are to assist the Coast Guard in the protection against
transportation security incidents across the maritime port environment.22
The Coast Guard has designated a captain of the port within each of 43
geographically defined port areas23
The MTSA implementing regulations, developed by the Coast Guard,
require the establishment of area maritime security committees across all
port areas.
across the nation who is responsible
for overseeing the development of the security plans within his or her
respective geographic region.
24
21GAO, Maritime Security: Progress and Challenges 10 Years after the Maritime
Transportation Security Act,
The committees for each of the 43 identified port areas,
which are organized by the Coast Guard, consist of key stakeholders who
(1) may be affected by security policies and (2) share information and
develop port security plans. Members of the committees can include a
diverse array of port stakeholders, including federal, state, local, tribal,
and territorial law enforcement agencies, as well as private sector entities
such as terminal operators, yacht clubs, shipyards, marine exchanges,
commercial fishermen, trucking and railroad companies, organized labor,
and trade associations. These committees are to identify critical port
infrastructure and risks to the port, develop mitigation strategies for these
risks, and communicate appropriate security information to port
stakeholders.
GAO-12-1009T (Washington, D.C.: Sept. 11, 2012).
22A transportation security incident is defined as a security incident resulting in a
significant loss of life, environment damage, transportation system disruption, or economic
disruption in a particular area. 46 U.S.C. § 70101(6).
23DHS determines the level of risk faced by U.S. port areas and then assigns those port
areas to one of three groups based on that risk. There are seven Group I port areas that
are considered critical.
2433 C.F.R. § 103.300.
http://www.gao.gov/products/GAO-12-1009T�
Page 14 GAO-14-459 Maritime Port Cybersecurity
The area maritime security committees, in consultation with applicable
stakeholders within their geographic region, are to assist the Coast Guard
in developing the port area maritime security plans. Each area maritime
security plan is to describe the area and infrastructure covered by the
plan, establish area response and recovery protocols for a transportation
security incident, and include any other information DHS requires.25 In
addition, during the development of each plan, the Coast Guard is to
develop a risk-based security assessment that includes the identification
of the critical infrastructure and operations in the port, a threat
assessment, and a vulnerability and consequence assessment, among
other things.26 The assessment is also to consider, among other things,
physical security of infrastructure and operations of the port, existing
security systems available to protect maritime personnel, and radio and
telecommunication systems, including computer systems and networks
as well as other areas that may, if damaged, pose a risk to people,
infrastructure, or operations within the port. Upon completion of the
assessment, a written report must be prepared that documents the
assessment methodology that was employed, describes each
vulnerability27 identified and the resulting consequences,28
MTSA and its associated regulations also require port facility owners and
operators to develop facility security plans for the purpose of preparing
certain maritime facilities, such as container terminals and chemical
processing plants, to deter a transportation security incident.
and provides
risk reduction strategies that could be used for continued operations in
the port.
29
2546 U.S.C. § 70103(b); see also 33 C.F.R. §§ 103.500-103.520.
The plans
are to be updated at least every 5 years and are expected to be
consistent with the port’s area maritime security plan. The MTSA
implementing regulations require that the facility security plans document
26See 33 C.F.R. §§ 103.400-103.410. A security system is defined as a device or multiple
devices designed, installed, and operated to monitor, detect, observe, or communicate
about activity that may pose a security threat in a location or locations on a vessel or
facility. 33 C.F.R. § 101.105.
27Vulnerability is defined as a physical feature or operational attribute that renders an
entity open to exploitation or susceptible to a given hazard.
28A consequence is defined as an effect of an event, incident, or occurrence.
2946 U.S.C. § 70103(c); see also 33 C.F.R. §§ 105.400-105.415.
Page 15 GAO-14-459 Maritime Port Cybersecurity
information on security systems and communications, as well as facility
vulnerability and security measures, among other things. The
implementing regulations also require port facility owners and operators,
as well as their designated facility security officers, to ensure that a facility
security assessment is conducted and that, upon completion, a written
report is included with the corresponding facility security plan submission
for review and approval by the captain of the port.30
Enacted in October 2006, the SAFE Port Act created and codified new
programs and initiatives related to the security of the U.S. ports, and
amended some of the original provisions of MTSA. For example, the
SAFE Port Act required the Coast Guard to establish a port security
exercise program.
The facility security
assessment report must include an analysis that considers measures to
protect radio and telecommunications equipment, including computer
systems and networks, among other things.
31
MTSA also codified the Port Security Grant Program, which is to help
defray the costs of implementing security measures at domestic ports.
32
30See 33 C.F.R. §§ 105.300-105.310.
According to MTSA, funding is to be directed towards the implementation
of area maritime security plans and facility security plans among port
authorities, facility operators, and state and local government agencies
that are required to provide port security services. Port areas use funding
from the grant program to improve port-wide risk management, enhance
maritime domain awareness, and improve port recovery and resiliency
efforts through developing security plans, purchasing security equipment,
and providing security training to employees. FEMA is responsible for
designing and operating the administrative mechanisms needed to
implement and manage the grant program. Coast Guard officials provide
subject matter expertise regarding the maritime industry to FEMA to
inform grant award decisions.
316 U.S.C. § 912.
32The Port Security Grant Program was established in January 2002 when the
Transportation Security Administration was appropriated $93.3 million to award grants to
critical national seaports. Pub. L. No. 107-117, 115 Stat. 2230, 2327 (2002). In November
2002, MTSA codified the program. 46 U.S.C. § 70107. Since fiscal year 2002, the
appropriations acts have provided annual appropriations for the program.
Port Security Grant Funding
Page 16 GAO-14-459 Maritime Port Cybersecurity
DHS and the other stakeholders have taken limited steps with respect to
maritime cybersecurity. In particular, the Coast Guard did not address
cybersecurity threats in a 2012 national-level risk assessment. In addition,
area maritime security plans and facility security plans provide limited
coverage of cybersecurity considerations. While the Coast Guard helped
to establish mechanisms for sharing security-related information, the
degree to which these mechanisms were active and facilitated the sharing
of cybersecurity-related information varied. Also, FEMA had taken steps
to address cybersecurity through the Port Security Grant Program, but it
has not taken additional steps to help ensure cyber-related risks are
effectively addressed. Other federal stakeholders have also taken some
actions to address cybersecurity in the maritime environment. According
to DHS officials, a primary reason for limited efforts in addressing cyber-
related threats in the maritime environment is that the severity of cyber-
related threats has only recently been recognized. Until the Coast Guard
and FEMA take additional steps to more fully implement their efforts, the
maritime port environment remains at risk of not adequately considering
cyber-based threats in its mitigation efforts.
While the Coast Guard has assessed risks associated with physical
threats to port environments, these assessments have not considered
risks related to cyber threats. NIPP recommends sector-specific agencies
and critical infrastructure partners manage risks from significant threats
and hazards to physical and cyber critical infrastructure for their
respective sectors through, among other things, the
• identification and detection of threats and hazards to the nation’s
critical infrastructure;
• reduction of vulnerabilities of critical assets, systems, and networks;
and
• mitigation of potential consequences to critical infrastructure if
incidents occur.
The Coast Guard completes, on a biennial basis, the National Maritime
Strategic Risk Assessment, which is to be an assessment of risk within
the maritime environment and risk reduction based on the agency’s
efforts. Its results are to provide a picture of the risk environment,
including a description of the types of threats the Coast Guard is
expected to encounter within its areas of responsibility, such as ensuring
the security of port facilities, over the next 5 to 8 years. The risk
assessment is also to be informed by numerous inputs, such as historical
Federal Stakeholders
Have Taken Limited
Actions to Address
Cybersecurity in the
Maritime Port
Environment
The Coast Guard Did Not
Address Cyber-Related
Risks in a National-Level
Risk Assessment for the
Maritime Mode
Page 17 GAO-14-459 Maritime Port Cybersecurity
incident and performance data, the views of subject matter experts, and
risk models, including the Maritime Security Risk Analysis Model.33
However, the Coast Guard did not address cybersecurity in the fourth and
latest iteration of the National Maritime Strategic Risk Assessment, which
was issued in 2012. While the assessment contained information
regarding threats, vulnerabilities, and the mitigation of potential risks in
the maritime environment, none of the information addressed cyber-
related risks. The Coast Guard attributed this gap to its limited efforts to
develop inputs related to cyber threats, vulnerabilities, and consequences
to inform the assessment. Additionally, Coast Guard officials stated that
the Maritime Security Risk Analysis Model, a key input to the risk
assessment, did not contain information regarding cyber-related threats,
vulnerabilities, and potential impacts of cyber incidents. The Coast Guard
plans to address this deficiency in the next iteration of the assessment,
which is expected to be completed by September 2014, but officials could
provide no details on how cybersecurity would be specifically addressed.
Without a thorough assessment of cyber-related threats, vulnerabilities,
and potential consequences to the maritime subsector, the Coast Guard
has limited assurance that the maritime mode is adequately protected
against cyber-based threats. Assessments of cyber risk would help the
Coast Guard and other maritime stakeholders understand the most likely
and severe types of cyber-related incidents that could affect their
operations and use this information to support planning and resource
allocation to mitigate the risk in a coordinated manner. Until the Coast
Guard completes a thorough assessment of cyber risks in the maritime
environment, maritime stakeholders will be less able to appropriately plan
and allocate resources to protect the maritime transportation mode.
33The Maritime Security Risk Analysis Model is the primary tool employed by the Coast
Guard to assess and manage security risks in the maritime domain. Using a combination
of target and attack mode scenarios, this tool assesses risk in terms of threat,
vulnerability, and consequences. The tool enables area maritime security committees to
perform detailed scenario risk assessments on the entire maritime critical infrastructure.
The maritime mode uses the program to inform strategic and tactical risk decision making.
In November 2011, we reported on the approach, use, and efforts to measure this model
in GAO, Coast Guard: Security Risk Model Meets DHS Criteria, but More Training Could
Enhance Its Use for Managing Programs and Operations, GAO-12-14 (Washington D.C.:
Nov. 17, 2011).
http://www.gao.gov/products/GAO-12-14�
Page 18 GAO-14-459 Maritime Port Cybersecurity
MTSA and the SAFE Port Act provide the statutory framework for
preventing, protecting against, responding to, and recovering from a
transportation security incident in the maritime environment. MTSA
requires maritime stakeholders to develop security documentation,
including area maritime security plans and facility security plans. These
plans, however, do not fully address the cybersecurity of their respective
ports and facilities.
Area maritime security plans do not fully address cyber-related threats,
vulnerabilities, and other considerations. The three area maritime security
plans we reviewed from the three high-risk port areas we visited generally
contained very limited, if any, information about cyber-related threats and
mitigation activities. For example, the three plans reviewed included
information about the types of information and communications
technology systems that would be used to communicate security
information to prevent, manage, and respond to a transportation security
incident; the types of information that are considered to be Sensitive
Security Information; and how to securely handle and transmit this
information to those with a need to know.
However, the MTSA-required plans did not identify or address any other
potential cyber-related threats directed at or vulnerabilities in the
information and communications systems or include cybersecurity
measures that port area stakeholders should take to prevent, manage,
and respond to cyber-related threats and vulnerabilities. Coast Guard
officials we met with agreed that the current set of area maritime security
plans, developed in 2009, do not include cybersecurity information. This
occurred in part because, as Coast Guard officials stated, the guidance
for developing area maritime security plans did not require the inclusion of
a cyber component. As a result, port area stakeholders may not be
adequately prepared to successfully manage the risk of cyber-related
transportation security incidents.
Coast Guard officials responsible for developing area maritime security
plan guidance stated that the implementing policy and guidance for
developing the next set of area maritime security plans includes basic
considerations that maritime stakeholders should take into account to
address cybersecurity. Currently, the area maritime security plans are
formally reviewed and approved on a 5-year cycle, so the next updates
will occur in 2014 and will be based on recently issued policy and
guidance. Coast Guard officials stated that the policy and guidance for
developing the area security plans was updated and promulgated in July
2013 and addressed inclusion of basic cyber components. Examples
Maritime-Related Security
Plans Provide Limited
Coverage of Cybersecurity
Considerations
Page 19 GAO-14-459 Maritime Port Cybersecurity
include guidance to identify how the Coast Guard will communicate with
port stakeholders in a cyber-degraded environment, the process for
reporting a cyber-related breach of security, and direction to take cyber
into account when developing a port’s “all hazard”-compatible Marine
Transportation System Recovery Plan. Our review of the guidance
confirmed that it instructs preparers to generally consider cybersecurity
issues related to information and communication technology systems
when developing the plans. However, the guidance does not include any
information related to the mitigation of cyber threats.
Officials representing both the Coast Guard and nonfederal entities that
we met with stated that the current facility security plans also do not
contain cybersecurity information. Our review of nine facility security
plans from the organizations we met with during site visits confirmed that
those plans generally have very limited cybersecurity information. For
example, two of the plans had generic references to potential cyber
threats, but did not have any specific information on assets that were
potentially vulnerable or associated mitigation strategies. According to
federal and nonfederal entities, this is because, similar to the guidance for
the area security plans, the current guidelines for facility security plans do
not explicitly require entities to include cybersecurity information in the
plans. Coast Guard officials stated that the next round of facility security
plans, to be developed in 2014, will include cybersecurity provisions.
Since the plans are currently in development, we were unable to
determine the degree to which cybersecurity information will be included.
Without the benefit of a national-level cyber-related risk assessment of
the maritime infrastructure to inform the development of the plans, the
Coast Guard has limited assurance that maritime-related security plans
will appropriately address cyber-related threats and vulnerabilities
associated with transportation security incidents.
Although the Coast Guard helped to establish mechanisms for sharing
security-related information, the degree to which these mechanisms were
active and shared cybersecurity-related information varied. As the DHS
agency responsible for maritime critical infrastructure protection-related
efforts, the Coast Guard is responsible for establishing public-private
partnerships and sharing information with federal and nonfederal entities
in the maritime community. This information sharing is to occur through
formalized mechanisms called for in federal plans and policy. Specifically,
federal policy establishes a framework that includes government
coordinating councils—composed of federal, state, local, or tribal
Information-Sharing
Mechanisms Were Active
and Shared Cybersecurity
Information to Varying
Degrees
Page 20 GAO-14-459 Maritime Port Cybersecurity
agencies—and encourages the voluntary formation of sector coordinating
councils, typically organized, governed by, and made up of nonfederal
stakeholders. Further, federal policy also encourages sector-specific
agencies to promote the formulation of information sharing and analysis
centers (ISAC), which are to serve as voluntary mechanisms formed by
owners and operators for gathering, analyzing, and disseminating
information on infrastructure threats and vulnerabilities among owners
and operators of the sectors and the federal government.
The Maritime Modal Government Coordinating Council was established in
2006 to enable interagency coordination on maritime security issues.
Coast Guard officials stated that the primary membership consisted of
representatives from the Departments of Homeland Security,
Transportation, Commerce, Defense, and Justice. Coast Guard officials
stated that the council has met since 2006, but had only recently begun to
discuss cybersecurity issues. For example, at its January 2013 annual
meeting, the council discussed the implications of Executive Order 13636
for improving critical infrastructure cybersecurity for the maritime mode. In
addition, during the January 2014 meeting, Coast Guard officials
discussed efforts related to the development of a risk management
framework that integrates cyber and physical security resilience efforts.
In 2007, the Maritime Modal Sector Coordinating Council, consisting of
owners, operators, and associations from within the sector, was
established to enable coordination and information sharing within the
sector and with government stakeholders. However, the council
disbanded in March 2011 and is no longer active. Coast Guard officials
attributed the demise of the council to a 2010 presidential memorandum
that precluded the participation of registered lobbyists in advisory
committees and other boards and commissions, which includes all Critical
Infrastructure Partnership Advisory Council bodies, including the Critical
Infrastructure Cross-Sector Council, and all sector coordinating councils,
according to DHS.34
34See Presidential Memorandum on Lobbyists on Agency Boards and Commissions, Daily
Comp. Pres. Docs., 2010 DCPD No. 00513 (June 18, 2010).
The former chair of the council stated that a majority
of the members were registered lobbyists, and, as small trade
associations, did not have non-lobbyist staff who could serve in this role.
Page 21 GAO-14-459 Maritime Port Cybersecurity
The Coast Guard has attempted to reestablish the sector coordinating
council, but has faced challenges in doing so. According to Coast Guard
officials, maritime stakeholders that would likely participate in such a
council had viewed it as duplicative of statutorily authorized mechanisms,
such as the National Maritime Security Advisory Committee35 and area
maritime security committees.36
While Coast Guard officials stated that these committees, in essence,
meet the information-sharing requirements of NIPP and, to some extent,
may expand the NIPP construct into real world “all hazards” response and
recovery activities, these officials also stated that the committees do not
fulfill all the functions of a sector coordinating council. For example, a key
function of the council is to provide national-level information sharing and
coordination of security-related activities within the sector. In contrast, the
activities of the area maritime security committees are generally focused
on individual port areas. In addition, while the National Maritime Security
Advisory Committee is made up of maritime-related private-sector
stakeholders, its primary purpose is to advise and make
recommendations to the Secretary of Homeland Security so that the
government can take actions related to securing the maritime port
environment. Similarly, another primary function of the sector coordinating
council may include identifying, developing, and sharing information
concerning effective cybersecurity practices, such as cybersecurity
working groups, risk assessments, strategies, and plans. Although Coast
As a result, Coast Guard officials stated
that there has been little stakeholder interest in reconstituting the council.
35See 46 U.S.C. § 70112. The National Maritime Security Advisory Committee operates in
accordance with the Federal Advisory Committee Act, to advise, consult with, and make
recommendations to the Secretary of Homeland Security, via the Commandant of the
Coast Guard, on matters relating to maritime security. In September 2013, we observed a
meeting of the committee at which the Coast Guard provided an update on recent
cybersecurity efforts. For example, the Coast Guard discussed recent outreach efforts to
educate and encourage industry and maritime partners to obtain training on cybersecurity.
In addition, the Coast Guard provided an overview of cybersecurity-related efforts in
working groups mandated by Executive Order 13636, which focused on a variety of
activities, including identifying cyber-dependent elements of the maritime subsector. (See
app. II for more information on efforts related to the executive order.)
36See 33 C.F.R. § 103.300. The area maritime security committees have been established
for each of 43 port areas to serve as maritime security-related information-sharing forums.
Public and private industry partners from each port area make up the committees’
membership. Coast Guard officials stated that the working relationships developed
through these committees typically foster daily interaction between committee members
and the Coast Guard’s captain of the port.
Page 22 GAO-14-459 Maritime Port Cybersecurity
Guard officials stated that several of the area maritime security
committees had addressed cybersecurity in some manner,37
In addition, the Maritime Information Sharing and Analysis Center was to
serve as the focal point for gathering and disseminating information
regarding maritime threats to interested stakeholders; however, Coast
Guard officials could not provide evidence that the body was active or
identify the types of cybersecurity information that was shared through it.
They stated that they fulfill the role of the ISAC through the use of
Homeport—a publicly accessible and secure Internet portal that supports
port security functionality for operational use. According to the officials,
Homeport serves as the Coast Guard’s primary communications tool to
support the sharing, collection, and dissemination of information of
various classification levels to maritime stakeholders. However, the Coast
Guard could not show the extent to which cyber-related information was
shared through the portal.
the
committees do not provide a national-level perspective on cybersecurity
in the maritime mode. Coast Guard officials could not demonstrate that
these committees had a national-level focus to improve the maritime port
environment’s cybersecurity posture.
Though the Coast Guard has established various mechanisms to
coordinate and share information among government entities at a national
level and between government and private stakeholders at the local level,
it has not facilitated the establishment of a national-level council, as
recommended by NIPP. The absence of a national-level sector
coordinating council increases the risk that critical infrastructure owners
and operators would not have a mechanism through which they can
identify, develop, and share information concerning effective
cybersecurity practices, such as cybersecurity working groups, risk
assessments, strategies, and plans. As a result, the Coast Guard would
not be aware of and thus not be able to mitigate cyber-based threats.
37Although officials stated that several of the 43 committees have established
cybersecurity subcommittees and several others have held in-depth cybersecurity-related
discussions, officials were unable to demonstrate the extent to which information on
cyber-based threats, vulnerabilities, and implications to ports were addressed by and
shared among the committees.
Page 23 GAO-14-459 Maritime Port Cybersecurity
Under the Port Security Grant Program, FEMA has taken steps to
address cybersecurity in port areas by identifying enhancing
cybersecurity capabilities as a funding priority in fiscal years 2013 and
2014 and by providing general guidance regarding the types of
cybersecurity-related proposals eligible for funding. DHS annually
produces guidance that provides the funding amounts available under the
program for port areas and information about eligible applicants, the
application process, and funding priorities for that fiscal year, among
other things. Fiscal year 2013 and 2014 guidance stated that DHS
identified enhancing cybersecurity capabilities as one of the six priorities
for selection criteria for all grant proposals in these funding cycles.38
FEMA program managers stated that FEMA added projects that aim to
enhance cybersecurity capabilities as a funding priority in response to the
issuance of Presidential Policy Directive 21 in February 2013.39
Specifically, the 2013 guidance stated that grant funds may be used to
invest in functions that support and enhance port-critical infrastructure
and key resources in both physical space and cyberspace under
Presidential Policy Directive 21. The 2014 guidance expanded on this
guidance to encourage applicants to propose projects to aid in the
implementation of the National Institute of Standards and Technology’s
cybersecurity framework, established pursuant to Executive Order 13636,
and provides a hyperlink to additional information about the framework. In
addition, the guidance refers applicants to the just-established DHS
Critical Infrastructure Cyber Community Voluntary Program for resources
38In fiscal years 2013 and 2014, the guidance identified the following funding priorities for
proposals: (1) enhancing maritime domain awareness; (2) enhancing improvised
explosive device and chemical, biological, radiological, and nuclear explosives prevention,
protection, response and supporting recovery capabilities; (3) enhancing cybersecurity
capabilities; (4) port resilience and supporting recovery capabilities; (5) training and
exercises; and (6) equipment associated with Transportation Worker Identification
Credential implementation. Allowable costs under the fiscal years 2013 and 2014 Port
Security Grant Program include efforts to build and sustain core capabilities across the
Prevention, Protection, Mitigation, Response and Recovery mission areas essential to
achieving the National Preparedness Goal. Cybersecurity is one of the core capabilities.
39Prior to the release of Executive Order 13636 (February 19, 2013), DHS guidance for
the grant program did not identify projects that enhance cybersecurity capabilities as one
of its funding priorities.
Port Security Grant
Program Provides Some
Guidance for
Cybersecurity Grants but
Has Not Taken Additional
Steps to Help Ensure
Risks are Addressed
Page 24 GAO-14-459 Maritime Port Cybersecurity
to assist critical infrastructure owners and operators in the adoption of the
framework and managing cyber risks.40
While these actions are positive steps towards addressing cybersecurity
in the port environment, FEMA has not consulted individuals with
cybersecurity-related subject matter expertise to assist with the review of
cybersecurity-related proposals. Program guidance states that grant
applications are to undergo a multi-level review for final selection,
41
including a review by a National Review Panel, comprised of subject
matter experts drawn from the Departments of Homeland Security and
Transportation.42
40According to program documentation, DHS launched the Critical Infrastructure Cyber
Community Voluntary Program in February 2014 to coincide with the release of the
cybersecurity framework.
However, according to FEMA program managers, the
fiscal year 2013 National Review Panel did not include subject matter
experts from DHS cybersecurity and critical infrastructure agencies—such
as the DHS Office of Cybersecurity and Communications, the DHS Office
of Infrastructure Protection, or the Coast Guard’s Cyber Command. As a
result, the National Review Panel had limited subject matter expertise to
evaluate and prioritize cybersecurity-related grant proposals for funding.
41Specifically, according to FEMA guidance, the proposal review and selection process
consists of three levels: an initial review, a field review, and a national-level review. During
the initial review, FEMA officials review grant proposals for completion. During the field
review, Coast Guard captains of the port, in coordination with officials of the Department
of Transportation’s Maritime Administration, review and score proposals according to (1)
the degree to which a proposal addresses program goals, including enhancing
cybersecurity capabilities, and (2) the degree to which a proposal addresses one of the
area maritime security plan priorities (e.g., transportation security incident scenarios),
among other factors. The captains of the port provide a prioritized list of eligible projects
for funding within each port area to FEMA, which coordinates the national review process.
42Specifically, according to FEMA guidance, the national review consists of the following
steps: (1) The National Review Panel conducts an initial review of the prioritized project
lists for each port area to determine whether the proposed projects would accomplish
intended risk mitigation goals. (2) The National Review Panel validates and normalizes the
prioritized list of projects from the captains of the port and provides a master list of
prioritized projects by port area. (3) A risk-based analysis is then applied to the National
Review Panel’s validated and prioritized lists for each port area. The risk-based analysis
considers factors such as the captain of the port ranking, the relationship of the projects to
one or more of the national port security priorities, and the risk level of the port area in
which the project would be located, among other factors. (4) The National Review Panel
evaluates and validates the consolidated and ranked project list resulting from application
of the risk-based analysis and submits its determinations to FEMA. The Secretary of
Homeland Security has the final approval authority for all projects.
Page 25 GAO-14-459 Maritime Port Cybersecurity
In March 2014, FEMA program managers stated that cybersecurity
experts were not involved in the National Review Panel in part because
the panel has been downsized in recent years. For the future, the officials
stated that FEMA is considering revising the review process to identify
cybersecurity proposals early on in the review process in order to obtain
relevant experience and expertise from the Coast Guard and other
subject matter experts to inform proposal reviews. However, FEMA has
not documented this new process or its procedures for the Coast Guard
and FEMA officials at the field and national review levels to follow for the
fiscal year 2014 and future cycles.
In addition, because the Coast Guard has not conducted a
comprehensive risk assessment for the maritime environment that
includes cyber-related threats, grant applicants and DHS officials have
not been able to use the results of such an assessment to inform their
grant proposals, project scoring, and risk-based funding decisions. MTSA
states that, in administering the program, national economic and strategic
defense concerns based on the most current risk assessments available
shall be taken into account.43 Further, according to MTSA, Port Security
Grant Program funding is to be used to address Coast Guard-identified
vulnerabilities, among other purposes. FEMA officials stated that the
agency considers port risk during the allocation and proposal review
stages of the program funding cycle.44
Additionally, during the field-level review, captains of the port score grant
proposals according to (1) the degree to which a proposal addresses
program goals, including enhancing cybersecurity capabilities, and (2) the
degree to which a proposal addresses one of the area maritime security
However, FEMA program
managers stated that the risk formula and risk-based analysis that FEMA
uses in the allocation and proposal review stages do not assess cyber
threats and vulnerabilities.
43See 46 U.S.C. § 70107(a).
44Specifically, DHS is required by law to allocate program funding according to risk. 46
U.S.C. § 70107(a). In the allocation stage of the program, FEMA uses a risk formula to
place port areas into port groupings according to risk of terrorist attacks. During the
proposal review stage, the guidance states that FEMA applies a risk-based analysis to the
National Review Panel’s validated and prioritized lists for each port area in all groups. The
risk-based analysis considers factors such as the captain of the port ranking, the
relationship of the projects to one or more of the national port security priorities, and the
risk level of the port area in which the project would be located, among other factors.
Page 26 GAO-14-459 Maritime Port Cybersecurity
plan priorities (e.g., transportation security incident scenarios), among
other factors. However, as Coast Guard officials stated, and our review of
area maritime security plans indicated, current area maritime security
plans generally contain very limited, if any, information about cyber-
related threats. Further, a FEMA Port Security Grant Program section
chief stated that he was not aware of a risk assessment for the maritime
mode that discusses cyber-related threats, vulnerabilities, and potential
impact. Using the results of such a maritime risk assessment that fully
addresses cyber-related threats, vulnerabilities, and consequences,
which—as discussed previously—has not been conducted, to inform
program guidance could help grant applicants and reviewers more
effectively identify and select projects for funding that could enhance the
cybersecurity of the nation’s maritime cyber infrastructure.
Furthermore, FEMA has not developed or implemented outcome
measures to evaluate the effectiveness of the Port Security Grant
Program in achieving program goals, including enhancing cybersecurity
capabilities. As we reported in November 2011, FEMA had not evaluated
the effectiveness of the Port Security Grant Program in strengthening
critical maritime infrastructure because it had not implemented measures
to track progress toward achieving program goals.45 Therefore, we
recommended that FEMA—in collaboration with the Coast Guard—
develop time frames and related milestones for implementing
performance measures to monitor the effectiveness of the program. In
response, in February 2014 FEMA program managers stated that the
agency developed and implemented four management and administrative
measures in 2012 and two performance measures to track the amount of
funds invested in building and sustaining capabilities in 2013.46
45GAO, Port Security Grant Program: Risk Model, Grant Management, and Effectiveness
Measures Could Be Strengthened,
According
to a FEMA program manager, FEMA did not design the two performance
measures to evaluate the effectiveness of the program in addressing
GAO-12-47 (Washington, D.C.: Nov. 17, 2011).
46The four management and administrative measures are (1) the percentage of
preparedness grant awards processed within 120 days, (2) the percentage of
preparedness grant awards monitored programmatically, (3) the percentage of grant funds
released to grantees within 270 days, and (4) the percentage of preparedness grant
awards closed within 90 days. The two performance measures are the percentage of
program funding invested in building new capabilities and the percentage of funding
invested in sustaining existing capabilities. According to FEMA officials, in fiscal year
2013, 53 percent of program funding was used to build new capabilities and 47 percent
was used to sustain existing capabilities.
http://www.gao.gov/products/GAO-12-47�
Page 27 GAO-14-459 Maritime Port Cybersecurity
individual program goals, such as enhancing cybersecurity capabilities,
but to gauge the program’s effectiveness in reducing overall maritime risk
in a port area based on program funding. While these measures can help
improve FEMA’s management of the program by tracking how funds are
invested, they do not measure program outcomes.
In addition, in February 2012, we found that FEMA had efforts under way
to develop outcome measures for the four national preparedness grant
programs, including the Port Security Grant Program, but that it had not
completed these efforts.47 Therefore, we recommended that FEMA revise
its plan in order to guide the timely completion of ongoing efforts to
develop and implement outcome-based performance measures for all
four grant programs. In January 2014, FEMA officials stated that they
believe that the implementation of project-based grant application tracking
and reporting functions within the Non-Disaster Grant Management
System will address our February 2012 recommendation that the agency
develop outcome measures to determine the effectiveness of the Port
Security Grant Program.48
While the development of the Non-Disaster Grant Management System is
a positive step toward improving the management and administration of
preparedness grants, FEMA officials stated that the deployment of these
system functions has been delayed due to budget reductions, and the
time frame for building the project-based applications and reporting
functions is fiscal year 2016. Therefore, it is too early to determine how
FEMA will use the system to evaluate the effectiveness of the Port
Security Grant Program. Until FEMA develops outcome measures to
evaluate the effectiveness of the program in meeting program goals, it
cannot provide reasonable assurance that funds invested in port security
grants, including those intended to enhance cybersecurity capabilities,
are strengthening critical maritime infrastructure—including cyber-based
infrastructure—against risks associated with potential terrorist attacks and
other incidents.
However, the officials did not provide details
about how these functions will address the recommendation.
47GAO, Homeland Security: DHS Needs Better Project Information and Coordination
among Four Overlapping Grant Programs, GAO-12-303 (Washington, D.C.: Feb. 28,
2012).
48The Non-Disaster Grant Management System is a web-based system under
development that is intended to provide FEMA and its stakeholders with a system that
supports the grants management life cycle and consolidates grants information.
http://www.gao.gov/products/GAO-12-303�
Page 28 GAO-14-459 Maritime Port Cybersecurity
In addition to DHS, the 2010 Transportation Systems Sector-Specific Plan
identified the Departments of Commerce, Defense, Justice, and
Transportation as members of the Maritime Modal Government
Coordinating Council. Many agencies, including others within DHS, had
taken some actions with respect to the cybersecurity of the maritime
subsector. For more details on these actions, see appendix II.
Disruptions in the operations of our nation’s ports, which facilitate the
import and export of over $1.3 trillion worth of goods annually, could be
devastating to the national economy. While the impact of a physical event
(natural or manmade) appears to have been better understood and
addressed by maritime stakeholders than cyber-based events, the
growing reliance on information and communications technology
suggests the need for greater attention to potential cyber-based threats.
Within the roles prescribed for them by federal law, plans, and policy, the
Coast Guard and FEMA have begun to take action. In particular, the
Coast Guard has taken action to address cyber-based threats in its
guidance for required area and facility plans and has started to leverage
existing information-sharing mechanisms. However, until a
comprehensive risk assessment that includes cyber-based threats,
vulnerabilities, and consequences of an incident is completed and used to
inform the development of guidance and plans, the maritime port sector
remains at risk of not adequately considering cyber-based risks in its
mitigation efforts. In addition, the maritime sector coordinating council is
currently defunct, which may limit efforts to share important information
on threats affecting ports and facilities on a national level. Further, FEMA
has taken actions to enhance cybersecurity through the Port Security
Grant Program by making projects aimed at enhancing cybersecurity one
of its funding priorities. However, until it develops procedures to instruct
grant reviewers to consult cybersecurity-related subject matter experts
and uses the results of a risk assessment that identifies any cyber-related
threats and vulnerabilities to inform its funding guidance, FEMA will be
limited in its ability to ensure that the program is effectively addressing
cyber-related risks in the maritime environment.
To enhance the cybersecurity of critical infrastructure in the maritime
sector, we recommend that the Secretary of Homeland Security direct the
Commandant of the Coast Guard to take the following actions:
Other Federal Agencies
Have Taken Actions to
Address Cybersecurity in
the Maritime Port
Environment
Conclusions
Recommendations for
Executive Action
Page 29 GAO-14-459 Maritime Port Cybersecurity
• work with federal and nonfederal partners to ensure that the maritime
risk assessment includes cyber-related threats, vulnerabilities, and
potential consequences;
• use the results of the risk assessment to inform how guidance for area
maritime security plans, facility security plans, and other security-
related planning should address cyber-related risk for the maritime
sector; and
• work with federal and nonfederal stakeholders to determine if the
Maritime Modal Sector Coordinating Council should be reestablished
to better facilitate stakeholder coordination and information sharing
across the maritime environment at the national level.
To help ensure the effective use of Port Security Grant Program funds to
support the program’s stated mission of addressing vulnerabilities in the
maritime port environment, we recommend that the Secretary of
Homeland Security direct the FEMA Administrator to take the following
actions:
• in coordination with the Coast Guard, develop procedures for officials
at the field review level (i.e., captains of the port) and national review
level (i.e., the National Review Panel and FEMA) to consult
cybersecurity subject matter experts from the Coast Guard and other
relevant DHS components, if applicable, during the review of
cybersecurity grant proposals for funding and
• in coordination with the Coast Guard, use any information on cyber-
related threats, vulnerabilities, and consequences identified in the
maritime risk assessment to inform future versions of funding
guidance for grant applicants and reviews at the field and national
levels.
We provided a draft of this report to the Departments of Homeland
Security, Commerce, Defense, Justice, and Transportation for their
review and comment. DHS provided written comments on our report
(reprinted in app. IV). In its comments, DHS concurred with our
recommendations. In addition, the department stated that the Coast
Guard is working with a variety of partners to determine how cyber-
related threats, vulnerabilities, and potential consequences are to be
addressed in the maritime risk assessment, which the Coast Guard will
use to inform security planning efforts (including area maritime security
plans and facility security plans). DHS also stated that the Coast Guard
will continue to promote the re-establishment of a sector coordinating
council, and will also continue to use existing information-sharing
Agency Comments
and Our Evaluation
Page 30 GAO-14-459 Maritime Port Cybersecurity
mechanisms. However, DHS did not provide an estimated completion
date for these efforts.
In addition, DHS stated that FEMA will work with the Coast Guard to
develop the recommended cyber consultation procedures for the Port
Security Grant Program by the end of October 2014, and will use any
information on cyber-related threats, vulnerabilities, and consequences
from the maritime risk assessment in future program guidance, which is
scheduled for publication in the first half of fiscal year 2015.
Officials from DHS and the Department of Commerce also provided
technical comments via e-mail. We incorporated these comments where
appropriate. Officials from the Departments of Defense, Justice, and
Transportation stated that they had no comments.
We are sending copies of this report to interested congressional
committees; the Secretaries of Commerce, Defense, Homeland Security,
and Transportation; the Attorney General of the United States; the
Director of Office of Management and Budget; and other interested
parties. In addition, the report is available at no charge on the GAO
website at http://www.gao.gov.
If you or your staff have any questions about this report, please contact
Gregory C. Wilshusen at (202) 512-6244 or wilshuseng@gao.gov or
Stephen L. Caldwell at (202) 512-9610 or caldwells@gao.gov. Contact
points for our Offices of Congressional Relations and Public Affairs may
http://www.gao.gov/�
mailto:wilshuseng@gao.gov�
mailto:caldwells@gao.gov�
Page 31 GAO-14-459 Maritime Port Cybersecurity
be found on the last page of this report. GAO staff who made key
contributions to this report are listed in appendix V.
Sincerely yours,
Gregory C. Wilshusen
Director, Information Security Issues
Stephen L. Caldwell
Director, Homeland Security and Justice Issues
Appendix I: Objective, Scope, and
Methodology
Page 32 GAO-14-459 Maritime Port Cybersecurity
Our objective was to identify the extent to which the Department of
Homeland Security (DHS) and other stakeholders have taken steps to
address cybersecurity in the maritime port environment.
The scope of our audit focused on federal agencies that have a role or
responsibilities in the security of the maritime port environment, to include
port facilities. We focused on the information and communications
technology used to operate port facilities. We did not include other
aspects of the maritime environment such as vessels, off-shore platforms,
inland waterways, intermodal connections, systems used to manage
water-based portions of the port, and federally managed information and
communication technology.
To identify federal agency roles and select the organizations responsible
for addressing cybersecurity in the maritime port environment, we
reviewed relevant federal law, regulations, policy, and critical
infrastructure protection-related strategies, including the following:
• Homeland Security Act of 2002;
• Maritime Transportation Security Act of 2002;
• Homeland Security Presidential Directive 7—Critical Infrastructure
Identification, Prioritization, and Protection, December 2003;
• Security and Accountability for Every Port Act of 2006;
• 2006 National Infrastructure Protection Plan;
• 2009 National Infrastructure Protection Plan;
• 2013 National Infrastructure Protection Plan;
• 2010 Transportation Systems Sector-Specific Plan;
• Presidential Policy Directive 21—Critical Infrastructure Security and
Resilience, February 12, 2013;
• Executive Order 13636—Improving Critical Infrastructure
Cybersecurity; and
• Title 33, Code of Federal Regulations, Chapter 1, Subchapter H.
We analyzed these documents to identify federal agencies responsible for
taking steps to address cybersecurity in the maritime environment, such
as developing a risk assessment and information-sharing mechanisms,
guiding the development of security plans in response to legal
requirements, and providing financial assistance to support maritime port
security activities. Based on our analysis, we determined that the U.S.
Coast Guard (Coast Guard) and Federal Emergency Management
Agency (FEMA), within DHS, were relevant to our objective. We also
included the Departments of Transportation, Defense, Commerce, and
Justice as they were identified as members of the Maritime Modal
Government Coordinating Council in the 2010 Transportation Systems
Appendix I: Objective, Scope, and
Methodology
Appendix I: Objective, Scope, and
Methodology
Page 33 GAO-14-459 Maritime Port Cybersecurity
Sector-Specific Plan. We also included other DHS components, such as
U.S. Customs and Border Protection, National Protection and Programs
Directorate, Transportation Security Administration, and United States
Secret Service, based on our prior cybersecurity and port security work
and information learned from interviews during our engagement.
To determine the extent to which the Coast Guard and FEMA have taken
steps to address cybersecurity in the maritime port environment, we
collected and analyzed relevant guidance and reports. For example, we
analyzed the Coast Guard’s 2012 National Maritime Strategic Risk
Assessment, Coast Guard guidance for developing area maritime security
plans, the 2012 Annual Progress Report—National Strategy for
Transportation Security, the Transportation Sector Security Risk
Assessment, and FEMA guidance for applying for and reviewing
proposals under the Port Security Grant Program.1 We also examined our
November 2011 and February 2012 reports related to the Port Security
Grant Program and our past work related to FEMA grants management
for previously identified issues and context.2
To gain an understanding of how information and communication
technology is used in the maritime port environment and to better
understand federal interactions with nonfederal entities on cybersecurity
In addition, we gathered and
analyzed documents and interviewed officials from DHS’s Coast Guard,
FEMA, U.S. Customs and Border Protection, Office of Cybersecurity and
Communications, Office of Infrastructure Protection, Transportation
Security Administration, and United States Secret Service; the
Department of Commerce’s National Oceanic and Atmospheric
Administration; the Department of Defense’s Transportation Command;
the Department of Justice’s Federal Bureau of Investigation; and the
Department of Transportation’s Maritime Administration, Office of
Intelligence, Security and Emergency Response, and the Volpe Center.
1DHS, Federal Emergency Management Agency, FY 2013 and FY 2014 Port Security
Grant Program (PSGP) Funding Opportunity Announcements.
2See GAO, Port Security Grant Program: Risk Model, Grant Management, and
Effectiveness Measures Could Be Strengthened, GAO-12-47 (Washington, D.C.: Nov.17,
2011); Homeland Security: DHS Needs Better Project Information and Coordination
among Four Overlapping Grant Programs, GAO-12-303 (Washington, D.C.: Feb. 28,
2012); and Maritime Security: Progress and Challenges 10 Years after the Maritime
Transportation Security Act, GAO-12-1009T (Washington, D.C.: Sept. 11, 2012), among
others listed in “Related GAO Products” at the end of this report.
http://www.gao.gov/products/GAO-12-47�
http://www.gao.gov/products/GAO-12-303�
http://www.gao.gov/products/GAO-12-1009T�
Appendix I: Objective, Scope, and
Methodology
Page 34 GAO-14-459 Maritime Port Cybersecurity
issues, we conducted site visits to three port areas—Houston, Texas; Los
Angeles/Long Beach, California; and New Orleans, Louisiana. These
ports were selected in a non-generalizable manner based on their
identification as both high risk (Group I) ports by the Port Security Grant
Program,3
We also randomly selected facility owners from Coast Guard data on
those facilities required to prepare facility security plans under the
Maritime Transportation Security Act’s implementing regulations. For
those facilities whose officials agreed to participate in our review, we
interviewed staff familiar with Coast Guard facility security requirements
or information technology security, and analyzed their facility security
plans for any cybersecurity-related items. We also included additional
nonfederal entities such as port authorities and facilities as part of our
review. The results of our analysis of area maritime security plans and
facility security plans at the selected ports cannot be projected to other
facilities at the port areas we visited or other port areas in the country. We
also met with other port stakeholders, such as port authorities and an oil
storage and transportation facility. We met with the following
organizations:
and as national leaders in calls by specific types of vessels—
oil and natural gas, containers, and dry bulk—in the Department of
Transportation Maritime Administration’s March 2013 report, Vessel Calls
Snapshot, 2011. For those port areas, we analyzed the appropriate area
maritime security plans for any cybersecurity-related information.
• APM Terminals
• Axiall
• Cargill
• Domino Sugar Company
• Harris County, Texas, Information Technology Center
• Louisiana Offshore Oil Port
• Magellan Terminals Holdings, L.P.
• Metropolitan Stevedoring
• Port of Houston Authority
• Port of Long Beach
• Port of Los Angeles
• Port of New Orleans
3The program uses a risk model to group port areas into risk of terrorist attack. Group I
port areas have been determined to be the highest risk. For more information, see
GAO-12-47.
http://www.gao.gov/products/GAO-12-47�
Appendix I: Objective, Scope, and
Methodology
Page 35 GAO-14-459 Maritime Port Cybersecurity
• SSA Marine
• St. Bernard Port
• Trans Pacific Container Service
We determined that information provided by the federal and nonfederal
entities, such as the type of information contained within the area
maritime security plans and facility security plans, was sufficiently reliable
for the purposes of our review. To arrive at this assessment, we
corroborated the information by comparing the plans with statements from
relevant agency officials.
We conducted this performance audit from April 2013 to June 2014 in
accordance with generally accepted government auditing standards.
Those standards require that we plan and perform the audit to obtain
sufficient, appropriate evidence to provide a reasonable basis for our
findings and conclusions based on our audit objective. We believe the
evidence obtained provides a reasonable basis for our findings and
conclusions based on our audit objective.
Appendix II: Additional Federal Maritime
Cybersecurity Actions
Page 36 GAO-14-459 Maritime Port Cybersecurity
This appendix summarizes cybersecurity-related actions, if any, taken by
other agencies of the departments identified as members of the
Government Coordinating Council of the Maritime Mode related to the
nonfederally owned and operated maritime port environment.
Under Executive Order 13636, the Secretary of Homeland Security is to
use a risk-based approach to identify critical infrastructure where a
cybersecurity incident could reasonably result in catastrophic regional or
national effects on public health or safety, economic security, or national
security. The Secretary is also to apply consistent, objective criteria in
identifying such critical infrastructure. Sector-specific agencies were to
provide the Secretary with information necessary to identify such critical
infrastructure.
To implement Executive Order 13636, DHS established an Integrated
Task Force to, among other things, lead DHS implementation and
coordinate interagency and public- and private-sector efforts. One of the
eight working groups that made up the task force was assigned the
responsibility for identifying cyber-dependent infrastructure. Officials from
DHS’s Office of Infrastructure Protection who were responsible for the
working group stated that, using the defined methodology, the task force
examined the maritime mode as part of its efforts.
Office of Cybersecurity and Communications
The Office of Cybersecurity and Communications, among other things, is
responsible for collaborating with public, private, and international
partners to ensure the security and continuity of the nation’s cyber and
communications infrastructures in the event of terrorist attacks, natural
disasters, and catastrophic incidents.
One division of the Office of Cybersecurity and Communications
(Stakeholder Engagement and Cyber Infrastructure Resilience) offers to
partner with critical infrastructure partners—including those in the
maritime port environment—to conduct cyber resilience reviews. These
reviews are voluntary and are based on the CERT® Resilience
Management Model, a process improvement model for managing
operational resilience. They are facilitated by field-based Cyber Security
Appendix II: Additional Federal Maritime
Cybersecurity Actions
The Department of
Homeland Security
Integrated Task Force
National Protection and
Programs Directorate
Appendix II: Additional Federal Maritime
Cybersecurity Actions
Page 37 GAO-14-459 Maritime Port Cybersecurity
Advisors. The primary goal of this program is to evaluate how critical
infrastructure and key resource providers manage the cybersecurity of
significant information.
In addition, the Industrial Control Systems Cyber Emergency Response
Team——a branch of the National Cybersecurity and Communications
Integration Center division within the Office of Cybersecurity and
Communications—directed the development of the Cyber Security
Evaluation Tool, which is a self-assessment tool that evaluates the
cybersecurity of an automated industrial control or business system using
a hybrid risk- and standards-based approach, and provides relevant
recommendations for improvement.
We observed one maritime port entity engage with Office of Cybersecurity
and Communications staff members to conduct a cyber resilience review.
According to data provided by Office of Cybersecurity and
Communications officials, additional reviews have been conducted with
maritime port entities. In addition, three maritime port entities informed us
they conducted a self-assessment using the Cyber Security Evaluation
Tool.
Office of Infrastructure Protection
The Office of Infrastructure Protection is responsible for working with
public- and private-sector critical infrastructure partners and leads the
coordinated national effort to mitigate risk to the nation’s critical
infrastructure. Among other things, the Office of Infrastructure Protection
has the overall responsibility for coordinating implementation of NIPP
across 16 critical infrastructure sectors and overseeing the development
of 16 sector-specific plans.
Through its Protective Security Coordination Division, the Office of
Infrastructure Protection also has a network of field-based protective
security advisors, who are security experts that serve as a direct link
between the department and critical infrastructure partners in the field.
Two nonfederal port stakeholders identified protective security advisors
as a resource for assistance in cybersecurity issues.
Officials from Infrastructure Protection’s Strategy and Policy Office
supported the Coast Guard in developing the sector-specific plan and
annual report for the maritime mode.
Appendix II: Additional Federal Maritime
Cybersecurity Actions
Page 38 GAO-14-459 Maritime Port Cybersecurity
U.S. Customs and Border Protection (CBP) is responsible for securing
America’s borders. This includes ensuring that all cargo enters the United
States legally, safely, and efficiently through official sea ports of entry;
preventing the illegal entry of contraband into the country at and between
ports of entry; and enforcing trade, tariff, and intellectual property laws
and regulations.
In addition, CBP developed and administered the Customs-Trade
Partnership Against Terrorism program, a voluntary program where
officials work in partnership with private companies to review the security
of their international supply chains and improve the security of their
shipments to the United States. Under this program, CBP issued
minimum security criteria for U.S.-based marine port authority and
terminal operators that include information technology security practices
(specifically, password protection, establishment of information
technology security policies, employee training on information technology
security, and developing a system to identify information technology
abuse that includes improper access).
Among other things, the Secret Service protects the President, Vice
President, visiting heads of state and government, and National Special
Security Events; safeguards U.S. payment and financial systems; and
investigates cyber/electronic crimes. In support of these missions, the
Secret Service has several programs that have touched on maritime port
cybersecurity.
The Electronic Crimes Task Force initiative is a network of task forces
established in the USA PATRIOT Act for the purpose of preventing,
detecting, and investigating various forms of electronic crimes, including
potential terrorist attacks against critical infrastructure and financial
payments systems.
The Secret Service also conducts Critical Systems Protection advances
for protective visits. This program identifies, assesses, and mitigates any
risks posed by information systems to persons and facilities protected by
the Secret Service. It also conducts protective advances to identify,
assess, and mitigate any issues identified with networks or systems that
could adversely affect the physical security plan or cause physical harm
to a protectee. The advances support all of the Secret Service’s
protective detail offices by implementing network monitoring, and applying
cyber intelligence analysis. Additionally, the program supports full
spectrum protective visits, events, or venues domestically, in foreign
countries, special events, and national special security events.
U.S. Customs and Border
Protection
United States Secret Service
Appendix II: Additional Federal Maritime
Cybersecurity Actions
Page 39 GAO-14-459 Maritime Port Cybersecurity
In addition, Secret Service personnel in Los Angeles have engaged with
maritime port stakeholders in Los Angeles and Long Beach in several
ways. For example, Secret Service staff gave a general cybersecurity
threat presentation to port stakeholders, though no specific cyber threats
to the maritime port environment were discussed. In addition, Secret
Service was requested by a local governmental entity to assist in
assessing the cyber aspects of critical infrastructure. Secret Service
officials stated that they are still very early on in this process and are
currently working with the entity to identify the critical assets/components
of the cyber infrastructure. The process is still in the information-gathering
phase, and officials do not expect to release any sort of summary product
until mid-2014 at the earliest. Officials stated that the end product would
detail any potential vulnerabilities identified during the assessment and
make recommendations for mitigation that the stakeholder could
implement if it chooses.
Secret Service officials also stated that an evaluation was conducted
under the Critical Systems Protection Program with a maritime port
stakeholder in the Houston area, but did not provide details regarding this
evaluation.
The Transportation Security Administration (TSA) is the former lead
sector-specific agency for the transportation systems sector. TSA
currently co-leads the sector with the Department of Transportation and
Coast Guard, and it supports, as needed, the Coast Guard’s lead for
maritime security. TSA also uses the Transportation Sector Security Risk
Assessment to determine relative risks for the transportation modes.
However, according to TSA officials, Coast Guard and TSA agreed in
2009 that the maritime modal risk assessment would be addressed in a
separate report.
TSA also established the Transportation Systems Sector Cybersecurity
Working Group, whose meetings (under the Critical Infrastructure
Partnership Advisory Council framework) have discussed maritime
cybersecurity issues.
Although components of the Department of Commerce do have maritime-
related efforts under way, none are directly related to the cybersecurity of
the port environment. Further, the National Institute of Standards and
Technology (NIST) has not developed any specific standards related to
the cybersecurity of maritime facilities within our scope.
Transportation Security
Administration
The Department of
Commerce
Appendix II: Additional Federal Maritime
Cybersecurity Actions
Page 40 GAO-14-459 Maritime Port Cybersecurity
NIST has started to work with private sector stakeholders from different
critical infrastructure sectors to develop a voluntary framework for
reducing cyber risks to critical infrastructure, as directed by Executive
Order 13636. It is developing this voluntary framework in accordance with
its mission to promote U.S. innovation and industrial competitiveness.
The framework has been shaped through ongoing public engagement.
According to officials, more than 3,000 people representing diverse
stakeholders in industry, academia, and government have participated in
the framework’s development through attendance at a series of public
workshops and by providing comments on drafts. On February 12, 2014,
NIST released the cybersecurity framework. Though representatives from
numerous critical infrastructure sectors provided comments on the draft
framework, only one maritime entity provided feedback, in October 2013.
The entity stated that the framework provided a minimum level of
cybersecurity information, but may not provide sufficient guidance to all
relevant parties who choose to implement its provisions and suggestions.
Additionally, the entity stated that it found the framework to be technical in
nature and that it does not communicate at a level helpful for business
executives. Department of Commerce officials stated that NIST worked to
address these comments in the final version of the framework.
The mission of the Department of Transportation is to serve the United
States by ensuring a fast, safe, efficient, accessible, and convenient
transportation system that meets our vital national interest and enhances
the quality of life of the American people. The department is organized
into several administrations, including the Research and Innovative
Technology Administration, which coordinates the department’s research
programs and is charged with advancing the deployment of cross-cutting
technologies to improve the nation’s transportation networks. The
administration includes the Volpe Center, which partners with public and
private organizations to assess the needs of the transportation
community, evaluate research and development endeavors, assist in the
deployment of state-of-the-art transportation technologies, and inform
decision- and policy-making through analyses. Volpe is funded by
sponsoring organizations.
In 2011, Volpe entered into a 2-year agreement with DHS’s Control
Systems Security Program to evaluate the use of control systems in the
transportation sector, including the maritime mode. Under this agreement,
Volpe and DHS developed a road map to secure control systems in the
transportation sector in August 2012. The document discussed the use of
industrial control systems in the maritime mode, and described high-level
The Department of
Transportation
Appendix II: Additional Federal Maritime
Cybersecurity Actions
Page 41 GAO-14-459 Maritime Port Cybersecurity
threats. It also established several goals for the entire transportation
sector with near- (0-2 years), mid- (2-5 years), and long-term (5-10 years)
objectives, metrics, and milestones. Volpe and DHS also developed a
cybersecurity standards strategy for transportation industrial control
systems, which identified tasks for developing standards for port industrial
control systems starting in 2015. Volpe also conducted outreach to
various maritime entities. According to Volpe officials, this study was
conducted mostly at international port facilities and vessels (though U.S.
ports were visited under a different program). The officials stated that the
agreement was canceled due to funding reductions resulting from the
recent budget sequestration.
DHS officials gave two reasons why funding for Volpe outreach was
terminated after sequestration. First, as part of a reorganization of the
Office of Cybersecurity and Communications, there is a heightened focus
on “operational” activities, and DHS characterized Volpe’s assistance
under the agreement as outreach and awareness. Second, the officials
stated that because the demand for incident management and response
continues to grow, a decision was made to stop funding Volpe to meet
spending cuts resulting from sequestration and increase funding for cyber
incident response for critical infrastructure asset owners and operators
who use industrial control systems.
Although components of the Department of Justice have some efforts
under way, most of those efforts occur at the port level. Specifically, the
department’s Federal Bureau of Investigation is involved in several
initiatives at the local level, focused on interfacing with key port
stakeholders as well as relevant entities with state and local
governments. These initiatives are largely focused on passing threat
information to partners. Additionally, the Bureau’s Infragard program
provides a forum to share threat information with representatives from all
critical infrastructure sectors, including maritime.
While the Department of Defense has recognized the significance of
cyber-related threats to maritime facilities, the department has no explicit
role in the protection of critical infrastructure within the maritime sub-
sector. Officials also said that the department had not supported maritime
mode stakeholders regarding cybersecurity. In addition, though the
Department of Defense was identified as a member of the Maritime Modal
Government Coordinating Council in the 2010 Transportation Systems
Sector-Specific Plan, the department was not listed as a participant in the
The Department of Justice
The Department of
Defense
Appendix II: Additional Federal Maritime
Cybersecurity Actions
Page 42 GAO-14-459 Maritime Port Cybersecurity
2013 or 2014 council meetings. Further, DHS, including the U.S. Coast
Guard, had not requested support from Defense on cybersecurity of
commercial maritime port operations and facilities.
Appendix III: Full Text for Figure 1
on Examples of Technologies Used
in Maritime Port Environments
Page 43 GAO-14-459 Maritime Port Cybersecurity
Figure 2 provides an overview of the technologies used in the maritime
port environment (see interactive fig. 1) and includes the figure’s rollover
information.
Figure 2: Examples of Technologies Used in Maritime Port Environments (Printable Version)
Appendix III: Full Text for Figure 1
on Examples of Technologies Used
in Maritime Port Environments
Appendix IV: Comments from the Department
of Homeland Security
Page 44 GAO-14-459 Maritime Port Cybersecurity
Appendix IV: Comments from the
Department of Homeland Security
Appendix IV: Comments from the Department
of Homeland Security
Page 45 GAO-14-459 Maritime Port Cybersecurity
Appendix IV: Comments from the Department
of Homeland Security
Page 46 GAO-14-459 Maritime Port Cybersecurity
Appendix V: GAO Contacts and
Staff
Acknowledgments
Page 47 GAO-14-459 Maritime Port Cybersecurity
Gregory C. Wilshusen, (202) 512-6244 or wilshuseng@gao.gov
Stephen L. Caldwell, (202) 512-9610 or caldwells@gao.gov
In addition to the contacts named above, key contributions to this report
were made by Michael W. Gilmore (Assistant Director), Christopher
Conrad (Assistant Director), Bradley W. Becker, Jennifer L. Bryant,
Franklin D. Jackson, Tracey L. King, Kush K. Malhotra, Lee McCracken,
Umesh Thakkar, and Adam Vodraska.
Appendix V: GAO Contacts and Staff
Acknowledgments
GAO Contacts
Staff
Acknowledgments
Related GAO Products
Page 48 GAO-14-459 Maritime Port Cybersecurity
National Preparedness: FEMA Has Made Progress, but Additional Steps
Are Needed to Improve Grant Management and Assess Capabilities.
GAO-13-637T. Washington, D.C.: June 25, 2013.
Communications Networks: Outcome-Based Measures Would Assist
DHS in Assessing Effectiveness of Cybersecurity Efforts. GAO-13-275.
Washington, D.C.: April 3, 2013.
High Risk Series: An Update. GAO-13-283. Washington, D.C.: February
14, 2013.
Cybersecurity: National Strategy, Roles, and Responsibilities Need to Be
Better Defined and More Effectively Implemented. GAO-13-187.
Washington, D.C.: February 14, 2013.
Information Security: Better Implementation of Controls for Mobile
Devices Should Be Encouraged. GAO-12-757. Washington, D.C.:
September 18, 2012.
Maritime Security: Progress and Challenges 10 Years after the Maritime
Transportation Security Act. GAO-12-1009T. Washington, D.C.:
September 11, 2012.
Information Security: Cyber Threats Facilitate Ability to Commit Economic
Espionage. GAO-12-876T. Washington, D.C.: June 28, 2012.
IT Supply Chain: National Security-Related Agencies Need to Better
Address Risks. GAO-12-361. Washington, D.C.: March 23, 2012.
Homeland Security: DHS Needs Better Project Information and
Coordination among Four Overlapping Grant Programs. GAO-12-303.
Washington, D.C.: February 28, 2012.
Critical Infrastructure Protection: Cybersecurity Guidance Is Available, but
More Can Be Done to Promote Its Use. GAO-12-92. Washington, D.C.:
December 9, 2011.
Port Security Grant Program: Risk Model, Grant Management, and
Effectiveness Measures Could Be Strengthened. GAO-12-47.
Washington, D.C.: November 17, 2011.
Related GAO Products
http://www.gao.gov/products/GAO-13-637T�
http://www.gao.gov/products/GAO-13-275�
http://www.gao.gov/products/GAO-13-283�
http://www.gao.gov/products/GAO-13-187�
http://www.gao.gov/products/GAO-12-757�
http://www.gao.gov/products/GAO-12-1009T�
http://www.gao.gov/products/GAO-12-876T�
http://www.gao.gov/products/GAO-12-361�
http://www.gao.gov/products/GAO-12-303�
http://www.gao.gov/products/GAO-12-92�
http://www.gao.gov/products/GAO-12-47�
Related GAO Products
Page 49 GAO-14-459 Maritime Port Cybersecurity
Coast Guard: Security Risk Model Meets DHS Criteria, but More Training
Could Enhance Its Use for Managing Programs and Operations.
GAO-12-14. Washington, D.C.: November 17, 2011.
Information Security: Additional Guidance Needed to Address Cloud
Computing Concerns. GAO-12-130T. Washington, D.C.: October 6, 2011.
Cybersecurity: Continued Attention Needed to Protect Our Nation’s
Critical Infrastructure. GAO-11-865T. Washington, D.C.: July 26, 2011.
Critical Infrastructure Protection: Key Private and Public Cyber
Expectations Need to Be Consistently Addressed. GAO-10-628.
Washington, D.C.: July 15, 2010.
Cyberspace: United States Faces Challenges in Addressing Global
Cybersecurity and Governance. GAO-10-606. Washington, D.C.: July 2,
2010.
Critical Infrastructure Protection: Current Cyber Sector-Specific Planning
Approach Needs Reassessment. GAO-09-969. Washington, D.C.:
September 24, 2009.
Cyber Analysis and Warning: DHS Faces Challenges in Establishing a
Comprehensive National Capability. GAO-08-588. Washington, D.C.: July
31, 2008.
Homeland Security: DHS Improved its Risk-Based Grant Programs’
Allocation and Management Methods, But Measuring Programs’ Impact
on National Capabilities Remains a Challenge. GAO-08-488T.
Washington, D.C.: March 11, 2008.
Maritime Security: Coast Guard Inspections Identify and Correct Facility
Deficiencies, but More Analysis Needed of Program’s Staffing, Practices,
and Data. GAO-08-12. Washington, D.C.: February 14, 2008.
Cybercrime: Public and Private Entities Face Challenges in Addressing
Cyber Threats. GAO-07-705. Washington, D.C.: June 22, 2007.
Risk Management: Further Refinements Needed to Assess Risks and
Prioritize Protective Measures at Ports and Other Critical Infrastructure.
GAO-06-91. Washington, D.C.: December 15, 2005.
(311307)
http://www.gao.gov/products/GAO-12-14�
http://www.gao.gov/products/GAO-12-130T�
http://www.gao.gov/products/GAO-11-865T�
http://www.gao.gov/products/GAO-10-628�
http://www.gao.gov/products/GAO-10-606�
http://www.gao.gov/products/GAO-09-969�
http://www.gao.gov/products/GAO-08-588�
http://www.gao.gov/products/GAO-08-488T�
http://www.gao.gov/products/GAO-08-12�
http://www.gao.gov/products/GAO-07-705�
http://www.gao.gov/products/GAO-06-91�
The Government Accountability Office, the audit, evaluation, and
investigative arm of Congress, exists to support Congress in meeting its
constitutional responsibilities and to help improve the performance and
accountability of the federal government for the American people. GAO
examines the use of public funds; evaluates federal programs and
policies; and provides analyses, recommendations, and other assistance
to help Congress make informed oversight, policy, and funding decisions.
GAO’s commitment to good government is reflected in its core values of
accountability, integrity, and reliability.
The fastest and easiest way to obtain copies of GAO documents at no
cost is through GAO’s website (http://www.gao.gov). Each weekday
afternoon, GAO posts on its website newly released reports, testimony,
and correspondence. To have GAO e-mail you a list of newly posted
products, go to http://www.gao.gov and select “E-mail Updates.”
The price of each GAO publication reflects GAO’s actual cost of
production and distribution and depends on the number of pages in the
publication and whether the publication is printed in color or black and
white. Pricing and ordering information is posted on GAO’s website,
http://www.gao.gov/ordering.htm.
Place orders by calling (202) 512-6000, toll free (866) 801-7077, or
TDD (202) 512-2537.
Orders may be paid for using American Express, Discover Card,
MasterCard, Visa, check, or money order. Call for additional information.
Connect with GAO on Facebook, Flickr, Twitter, and YouTube.
Subscribe to our RSS Feeds or E-mail Updates. Listen to our Podcasts.
Visit GAO on the web at www.gao.gov.
Contact:
Website: http://www.gao.gov/fraudnet/fraudnet.htm
E-mail: fraudnet@gao.gov
Automated answering system: (800) 424-5454 or (202) 512-7470
Katherine Siggerud, Managing Director, siggerudk@gao.gov, (202) 512-
4400, U.S. Government Accountability Office, 441 G Street NW, Room
7125, Washington, DC 20548
Chuck Young, Managing Director, youngc1@gao.gov, (202) 512-4800
U.S. Government Accountability Office, 441 G Street NW, Room 7149
Washington, DC 20548
GAO’s Mission
Obtaining Copies of
GAO Reports and
Testimony
Order by Phone
Connect with GAO
To Report Fraud,
Waste, and Abuse in
Federal Programs
Congressional
Relations
Public Affairs
Please Print on Recycled Paper.
http://www.gao.gov/�
http://www.gao.gov/�
http://www.gao.gov/ordering.htm�
http://facebook.com/usgao�
http://flickr.com/usgao�
http://twitter.com/usgao�
http://youtube.com/usgao�
http://www.gao.gov/feeds.html�
http://www.gao.gov/subscribe/index.php�
http://www.gao.gov/podcast/watchdog.html�
http://www.gao.gov/�
http://www.gao.gov/fraudnet/fraudnet.htm�
mailto:fraudnet@gao.gov�
mailto:siggerudk@gao.gov�
mailto:youngc1@gao.gov�
- MARITIME CRITICAL INFRASTRUCTURE PROTECTION
- d14459high
DHS Needs to Better Address Port Cybersecurity
Contents
Letter
Background
The Nation and Its Ports Face an Evolving Array of Cyber-Based Threats
Federal Plans and Policies Establish Responsibilities for Securing Cyber-Reliant Critical Infrastructure
Federal Laws and Implementing Regulations Establish Security Requirements for the Maritime Sector
Port Security Grant Funding
Federal Stakeholders Have Taken Limited Actions to Address Cybersecurity in the Maritime Port Environment
The Coast Guard Did Not Address Cyber-Related Risks in a National-Level Risk Assessment for the Maritime Mode
Maritime-Related Security Plans Provide Limited Coverage of Cybersecurity Considerations
Information-Sharing Mechanisms Were Active and Shared Cybersecurity Information to Varying Degrees
Port Security Grant Program Provides Some Guidance for Cybersecurity Grants but Has Not Taken Additional Steps to Help Ensure Risks are Addressed
Other Federal Agencies Have Taken Actions to Address Cybersecurity in the Maritime Port Environment
Conclusions
Recommendations for Executive Action
Agency Comments and Our Evaluation
Appendix I: Objective, Scope, and Methodology
Appendix II: Additional Federal Maritime Cybersecurity Actions
The Department of Homeland Security
Integrated Task Force
National Protection and Programs Directorate
Office of Cybersecurity and Communications
Office of Infrastructure Protection
U.S. Customs and Border Protection
United States Secret Service
Transportation Security Administration
The Department of Commerce
The Department of Transportation
The Department of Justice
The Department of Defense
Appendix III: Full Text for Figure 1 on Examples of Technologies Used in Maritime Port Environments
Appendix IV: Comments from the Department of Homeland Security
Appendix V: GAO Contacts and Staff Acknowledgments
GAO Contacts
Staff Acknowledgments
Related GAO Products
MARITIME CRITICAL INFRASTRUCTURE PROTECTION
DHS Needs to Better Address Port Cybersecurity
Why GAO Did This Study
What GAO Recommends
<<
/ASCII85EncodePages false
/AllowTransparency false
/AutoPositionEPSFiles true
/AutoRotatePages /PageByPage
/Binding /Left
/CalGrayProfile (Dot Gain 20%)
/CalRGBProfile (sRGB IEC61966-2.1)
/CalCMYKProfile (U.S. Sheetfed Uncoated v2)
/sRGBProfile (sRGB IEC61966-2.1)
/CannotEmbedFontPolicy /Warning
/CompatibilityLevel 1.7
/CompressObjects /All
/CompressPages true
/ConvertImagesToIndexed true
/PassThroughJPEGImages true
/CreateJobTicket false
/DefaultRenderingIntent /Default
/DetectBlends true
/DetectCurves 0.1000
/ColorConversionStrategy /LeaveColorUnchanged
/DoThumbnails false
/EmbedAllFonts true
/EmbedOpenType false
/ParseICCProfilesInComments true
/EmbedJobOptions true
/DSCReportingLevel 0
/EmitDSCWarnings false
/EndPage -1
/ImageMemory 1048576
/LockDistillerParams true
/MaxSubsetPct 100
/Optimize true
/OPM 1
/ParseDSCComments true
/ParseDSCCommentsForDocInfo true
/PreserveCopyPage true
/PreserveDICMYKValues true
/PreserveEPSInfo true
/PreserveFlatness true
/PreserveHalftoneInfo false
/PreserveOPIComments false
/PreserveOverprintSettings true
/StartPage 1
/SubsetFonts true
/TransferFunctionInfo /Preserve
/UCRandBGInfo /Preserve
/UsePrologue false
/ColorSettingsFile ()
/AlwaysEmbed [ true
]
/NeverEmbed [ true
]
/AntiAliasColorImages false
/CropColorImages true
/ColorImageMinResolution 220
/ColorImageMinResolutionPolicy /Warning
/DownsampleColorImages true
/ColorImageDownsampleType /Bicubic
/ColorImageResolution 300
/ColorImageDepth -1
/ColorImageMinDownsampleDepth 1
/ColorImageDownsampleThreshold 1.50000
/EncodeColorImages true
/ColorImageFilter /DCTEncode
/AutoFilterColorImages true
/ColorImageAutoFilterStrategy /JPEG
/ColorACSImageDict <<
/QFactor 0.15
/HSamples [1 1 1 1] /VSamples [1 1 1 1]
>>
/ColorImageDict <<
/QFactor 0.76
/HSamples [2 1 1 2] /VSamples [2 1 1 2]
>>
/JPEG2000ColorACSImageDict <<
/TileWidth 256
/TileHeight 256
/Quality 15
>>
/JPEG2000ColorImageDict <<
/TileWidth 256
/TileHeight 256
/Quality 15
>>
/AntiAliasGrayImages false
/CropGrayImages true
/GrayImageMinResolution 220
/GrayImageMinResolutionPolicy /Warning
/DownsampleGrayImages true
/GrayImageDownsampleType /Bicubic
/GrayImageResolution 300
/GrayImageDepth -1
/GrayImageMinDownsampleDepth 2
/GrayImageDownsampleThreshold 1.50000
/EncodeGrayImages true
/GrayImageFilter /DCTEncode
/AutoFilterGrayImages true
/GrayImageAutoFilterStrategy /JPEG
/GrayACSImageDict <<
/QFactor 0.15
/HSamples [1 1 1 1] /VSamples [1 1 1 1]
>>
/GrayImageDict <<
/QFactor 0.76
/HSamples [2 1 1 2] /VSamples [2 1 1 2]
>>
/JPEG2000GrayACSImageDict <<
/TileWidth 256
/TileHeight 256
/Quality 15
>>
/JPEG2000GrayImageDict <<
/TileWidth 256
/TileHeight 256
/Quality 15
>>
/AntiAliasMonoImages false
/CropMonoImages true
/MonoImageMinResolution 900
/MonoImageMinResolutionPolicy /Warning
/DownsampleMonoImages true
/MonoImageDownsampleType /Bicubic
/MonoImageResolution 1200
/MonoImageDepth -1
/MonoImageDownsampleThreshold 1.50000
/EncodeMonoImages true
/MonoImageFilter /CCITTFaxEncode
/MonoImageDict <<
/K -1
>>
/AllowPSXObjects false
/CheckCompliance [
/None
]
/PDFX1aCheck false
/PDFX3Check false
/PDFXCompliantPDFOnly false
/PDFXNoTrimBoxError true
/PDFXTrimBoxToMediaBoxOffset [
0.00000
0.00000
0.00000
0.00000
]
/PDFXSetBleedBoxToMediaBox true
/PDFXBleedBoxToTrimBoxOffset [
0.00000
0.00000
0.00000
0.00000
]
/PDFXOutputIntentProfile (None)
/PDFXOutputConditionIdentifier ()
/PDFXOutputCondition ()
/PDFXRegistryName ()
/PDFXTrapped /False
/CreateJDFFile false
/Description <<
/ARA
/BGR
/CHS
/CHT
/CZE
/DAN
/DEU
/ESP
/ETI
/FRA
/GRE
/HEB
/HRV
/HUN
/ITA (Utilizzare queste impostazioni per creare documenti Adobe PDF adatti per visualizzare e stampare documenti aziendali in modo affidabile. I documenti PDF creati possono essere aperti con Acrobat e Adobe Reader 6.0 e versioni successive.)
/JPN
/KOR
/LTH
/LVI
/NLD (Gebruik deze instellingen om Adobe PDF-documenten te maken waarmee zakelijke documenten betrouwbaar kunnen worden weergegeven en afgedrukt. De gemaakte PDF-documenten kunnen worden geopend met Acrobat en Adobe Reader 6.0 en hoger.)
/NOR
/POL
/PTB
/RUM
/RUS
/SKY
/SLV
/SUO
/SVE
/TUR
/UKR
/ENU (Use these settings to create Adobe PDF documents suitable for reliable viewing and printing of business documents. Created PDF documents can be opened with Acrobat and Adobe Reader 5.0 and later.)
>>
>> setdistillerparams
<<
/HWResolution [2400 2400]
/PageSize [612.000 792.000]
>> setpagedevice
BITS bottom info:
ICS bottom info:
TOS info:
ICS middle info:
BITS middle info:
BITS top info:
TOS:
BITS top:
ICS middle:
BITS middle:
ICS bottom:
BITS bottom: