July 25, 2024
The 2024 National Security Memorandum on Critical 
Infrastructure Security and Resilience 
The White House issued a directive, 
“National Security 
Administration after the terrorist attacks on September 11, 
Memorandum on Critical Infrastructure Security and 
2001. 
Resilience” (NSM-22), on April 30, 2024. The 
memorandum set forth a revised framework for federal 
Strategic Context and Policy Approach 
agency roles and responsibilities within the national critical 
The White House framed NSM-22 in the context of several 
infrastructure risk management enterprise. The Secretary of 
key developments: the “generational investment” in critical 
Homeland Security is designated as the responsible official 
infrastructure; the transition of the national energy and 
for coordination and implementation of NSM-22, acting 
transportation sectors away from fossil fuels; (unspecified) 
through the Director of the Cybersecurity and Infrastructure 
technological transformations; and increasingly 
Security Agency (CISA) as the National Coordinator for the 
interdependent and interconnected critical infrastructure in 
Security and Resilience of Critical Infrastructure. NSM-22 
the modern economy.  
supersed
es Presidential Policy Directive 21 (PPD-21), 
issued by President Barack Obama in 2013.  
PPD-21, by contrast, generally was more inward looking in 
its orientation, focusing on maturation of the modern 
As the first comprehensive high-level policy guidance on 
homeland security enterprise that was little more than a 
critical infrastructure security and resilience (CISR) in more 
decade old in 2013. It pivoted from the counterterrorism 
than a decade, NSM-22 presents an updated assessment of 
focus of the previous decade to broader engagement with an 
the broader strategic environment that is characterized by 
“all-hazards environment” of more diffuse and diverse 
rapidly evolving, high complexity threats. NSM-22 
challenges, including natural hazards. PPD-21 highlighted 
envisions an accelerated risk management cycle for the 
issues of interagency organization and coordination, 
CISR enterprise, requiring biennial updates of national 
information sharing, and analysis throughout the federal 
infrastructure risk management plans from designated 
government, prioritizing development of interagency 
officials and agencies, as well as enhanced intelligence 
relationships and agency capabilities. 
collection, analysis, and sharing. Additionally, it mandates 
a more assertive use of federal regulatory authorities and 
NSM-22 retains elements of the PPD-21 all-hazards 
fiscal instruments, such as procurement and grant rules to 
approach and concern with interagency relationships and 
encourage private-sector compliance with minimum 
functions. However, much of NSM-22’s content reflects 
resilience standards. As such, the directive shifts away from 
emergence of threats not mentioned in PPD-21 (i.e., effects 
th
e policy approach first established during the Clinton 
of climate change, supply chain disruptions, malign foreign 
Administration, which eschewed compulsory measures in 
investments in critical infrastructure entities, and more 
favor of voluntary public-private partnerships to promote 
aggressive threats from nation-states with advanced cyber 
infrastructure resilience.   
capabilities). NSM-22 generally refrains from re-
imaginings of core concepts, institutions, and risk 
In some aspects, NSM-22 is restrained in scope. It retains 
management methods. Instead, it directs federal agencies to 
PPD-21’s sector-specific organization of the federal CISR 
mobilize for critical infrastructure protection and make use 
enterprise, which is based on
 public-private partnerships 
of existing authorities—and, if needed—seek new ones, 
organized within
 designated sectors that encompass wide 
stating that “federal departments and agencies with 
areas of the economy and government (e.g., transportation, 
regulatory authorities shall utilize regulation, drawing on 
communications, energy). NSM-22 likewise preserves 
existing voluntary consensus standards as appropriate, to 
existing sector-specific coordination bodies and the 
establish minimum requirements and effective 
leadership role of
 Sector Risk Management Agencies 
accountability mechanisms for the security and resilience of 
(SRMAs) for each of the 16 currently designated sectors. 
critical infrastructure.”   
NSM-22 does not add any new sectors. (A Department of 
Homeland Security [
DHS] 2022 report to Congress raised 
Key Definitions and Concepts 
the possibility of adding new Space and Bioeconomy 
In NSM-22, various key definitions and concepts developed 
sectors.) Further, NSM-22 reiterates or reinstates many of 
in PPD-21 and other prior policy directives are restated, 
the core concepts established by PPD-21 and other 
modified, or omitted.   
directives, such as the definitions of 
critical infrastructure and 
risk. NSM-22 places renewed policy emphasis on 
Critical Infrastructure and Criticality 
identification, cataloguing, and prioritization of specific 
NSM-22 restates the definition of 
critical infrastructure 
assets within designated sectors, echoing the critical 
used in PPD-21 as certain “vital” infrastructure objects, 
infrastructure protection policies of the Bush 
whose “incapacity or destruction would have a debilitating 
impact on national security, national economic security, 
https://crsreports.congress.gov 
The 2024 National Security Memorandum on Critical Infrastructure Security and Resilience 
national public health or safety, or any combination of those 
not mention the NCF framework, and its requirements for 
matters.” This definition of critical infrastructure was first 
cross-sector risk assessments appear to be largely based on 
introduced in statute under the Uniting and Strengthening 
aggregation of sector-specific asset identification and 
America by Providing Appropriate Tools Required to 
prioritization inputs.  
Intercept and Obstruct Terrorism Act of 2001 (USA 
PATRIOT 
Act; P.L. 107-56) and has since been 
Key Implementation Milestones 
incorporated by reference into many subsequent laws and 
Selected NSM-22 requirements include the following 
executive branch policy directives. 
actions: 
The PATRIOT Act definition presupposes an asset-centric 
The Secretary of Homeland Security (the Secretary) 
approach to risk management based on the identification, 
produces th
e National Infrastructure Risk Management Plan 
prioritization, and protection of specific infrastructure 
(within one year, recurring biennially) as the government’s 
assets deemed to meet the statutory threshold of criticality. 
“comprehensive plan to mitigate and manage cross-sector 
A
 2003 White House directive for critical infrastructure 
risk”; acting through CISA, creates the national coordinator 
protection set forth “a national policy for Federal 
office to act as “the single coordination point for SRMAs 
departments and agencies to identify and prioritize United 
across the Federal Government”; and reviews th
e existing 
States critical infrastructure and key resources,” based on 
CISR framework for public-private partnerships and 
the Patriot Act definition of critical infrastructure. 
recommends necessary changes (within one year). 
Implementation of asset-level prioritization policies and 
legislative mandates encounter
ed practical difficulties and 
SRMAs designate a senior official (within 30 days) to 
criticism from oversight bodies over time. A decade later, 
coordinate SRMA functions and stakeholder engagements 
PPD-21 contained few provisions for asset identification 
within their respective sectors; provide a detailed 
and prioritization activities, with no specific 
justification of selection criteria, agency support, and 
implementation requirements for this activity.  
mission fulfilment plans (within 180 days); and produce a 
sector-specific risk management plan (within 270 days, 
By contrast, NSM-22 instructs federal agencies to play a 
recurring biennially).  
more direct and assertive role in public-private 
partnerships—both voluntary and regulatory—to identify, 
SRMAs and the national coordinator review “available 
prioritize, and protect critical assets. The directive then 
authorities, incentives, and other tools to encourage and 
incorporates this broad guidance into specific 
require owners and operators to implement identified 
implementation instructions. NSM-22 provides a definition 
sector-specific or cross-sector minimum security and 
of criticality as “an attribute of an asset, system, or service 
resilience requirements” and propose “any additional 
that reflects its degree of importance or necessity to stated 
authorities or capabilities that could enable 
goals, missions or functions, or continuity of operations.” It 
implementation” (within 270 days). 
does not provide standardized metrics or detailed guidance 
to federal agencies for identification of priority assets on a 
The national coordinator produces a list (no timeline) of 
national level through quantitative risk assessments or other 
Systematically Important Entities that could cause 
means.   
cascading infrastructure failures on a national scale based 
on SRMA identifications of prioritized infrastructure assets 
Risk 
and certain other inputs.   
NSM-22 defines 
risk as “the potential for an unwanted 
outcome, as determined by its likelihood and the 
The director of national intelligence (DNI) provides an 
consequences”—a definition that DHS has used for more 
intelligence estimate to the President on critical 
than a decade, sometimes presenting it as a mathematical 
infrastructure threats (within 180 days); provides reports on 
function, where risk equals the product of threat, 
intelligence collection (within one year, recurring annually) 
vulnerability, and (predicted) consequence. Som
e experts 
and information sharing with SRMAs and critical 
believe this formula has limited usefulness for quantitative 
infrastructure entities (within 18 months, recurring 
comparisons of risk that might inform asset prioritization. 
annually); and provides guidance (within one year) on 
NSM-22 seems to present the formula as a qualitative 
timely threat notification to designated federal agencies of 
assessment approach; it nonetheless instructs agencies to 
specific and credible threats to U.S. critical infrastructure. 
use it for prioritization of risk management efforts. 
Issues for Congress 
National Critical Functions 
The next Administration may rescind, modify, or fully 
In 2019, CISA introduced an analytical framework based 
implement NSM-22 without congressional action. Congress 
on a set of 55
 National Critical Functions (NCFs) intended 
may legislate changes to federal CISR policy. In the 118th 
to supplant “entity level risk management” based on asset-
Congress, some Members have introduced bills to
 create a 
specific estimates of threat, vulnerability, and consequence. 
Space infrastructure sector, to establish
 a national risk 
The NCF framework groups diverse infrastructure functions 
management process based on the NCF framework, and to 
into four areas: connect, distribute, manage, and supply. It 
requir
e certain threat and vulnerability assessments.      
seeks to provide “a richer understanding of how entities 
come together to produce critical functions” by using a 
Brian E. Humphreys, Analyst in Science and Technology 
“functional lens” to understand critical infrastructure 
Policy  
interdependencies across multiple sectors. NSM-22 does 
https://crsreports.congress.gov 
The 2024 National Security Memorandum on Critical Infrastructure Security and Resilience 
 
IF12716
 
 
Disclaimer This document was prepared by the Congressional Research Service (CRS). CRS serves as nonpartisan shared staff to 
congressional committees and Members of Congress. It operates solely at the behest of and under the direction of Congress. 
Information in a CRS Report should not be relied upon for purposes other than public understanding of information that has 
been provided by CRS to Members of Congress in connection with CRS’s institutional role. CRS Reports, as a work of the 
United States Government, are not subject to copyright protection in the United States. Any CRS Report may be 
reproduced and distributed in its entirety without permission from CRS. However, as a CRS Report may include 
copyrighted images or material from a third party, you may need to obtain the permission of the copyright holder if you 
wish to copy or otherwise use copyrighted material. 
 
https://crsreports.congress.gov | IF12716 · VERSION 1 · NEW