 
 
 
 
Statement of 
Chris Jaikaran 
Analyst in Cybersecurity Policy 
Before 
Committee on Homeland Security 
Subcommittee on Cybersecurity and Infrastructure Protection 
U.S. House of Representatives 
Hearing on 
“The Current State of DHS’s Efforts to Secure 
Federal Networks” 
March 28, 2017 
Congressional Research Service 
https://crsreports.congress.gov 
TE10015 
 
  
 
Congressional Research Service 
1 
Introduction 
Chairman Ratcliffe, Ranking Member Richmond, and Members of the committee, thank you for the 
opportunity to testify on the current state of efforts by the Department of Homeland Security (DHS) to 
secure federal networks. My name is Chris Jaikaran and I am an Analyst in Cybersecurity Policy at the 
Congressional Research Service. In this role, I research and analyze cybersecurity issues and their policy 
implications.  
My testimony today will address legislation recently passed by Congress, the roles and responsibilities 
assigned by those pieces of legislation, and the potential impact of that legislation on federal network 
security.  
Legislation 
During the 113th and the 114th Congresses, three pieces of legislation were enacted that changed how 
federal network security is managed. The testimony below briefly summarizes the effect of the legislation 
on federal network security without addressing other cybersecurity concerns, such as effects on the 
private sector. 
Federal Information Security Modernization Act of 2014 
The Federal Information Security Modernization Act of 2014 (FISMA) was enacted during the 113th 
Congress and codified the existing role the Department of Homeland Security (DHS) was already 
performing securing federal networks.1 FISMA authorized DHS to assist OMB in developing and 
implementing agency information security programs, coordinating with agencies on cybersecurity, and 
providing assistance to agencies in achieving cybersecurity. The law also authorized DHS to issue binding 
operational directives, which are discussed later in this statement.  
OMB is required to submit an annual report to Congress on the performance of agencies in implementing 
FISMA. The report for fiscal year 2016 was released on March 10, 2017, and like previous reports, is 
available to the public online. Agencies are also required report to their appropriate committees on their 
FISMA performance, but those reports are not made publically available. 
National Cybersecurity Protection Act 
The National Cybersecurity Protection Act of 2014 (NCPA), statutorily authorized the National 
Cybersecurity and Communications Integration Center (NCCIC) within DHS.2 Enacted during the 113th 
Congress, this law established the NCCIC as the interface between the civilian federal government and 
non-federal entities for information sharing, risk analysis, and mitigation strategies related to 
cybersecurity. The law also permits DHS to provide technical assistance to both federal and non-federal 
entities to support risk management and incident response, conditional upon the request of that entity.  
                                                 
1 P.L. 113-283.  
2 P.L. 113-282.  
CRS TESTIMONY 
Prepared for Congress ————————————————————————————————— 
Congressional Research Service 
2 
Cyber Security Act of 2015 
The Consolidated Appropriations Act of 2015 was the vehicle for the Cybersecurity Act of 2015. Enacted 
by the 114th Congress, this law contains four separate titles, the first of which is the Cybersecurity 
Information Sharing Act (or CISA).3 
CISA authorized an information sharing program whereby cybersecurity threat information can be 
quickly, readily, and voluntarily shared among the private sector, between the private sector and the 
federal government, and among federal government agencies. CISA included provisions for the 
minimization of personally identifiable information, prohibitions on the government use of that data, 
protections for the private sector from antitrust concerns, and liability protections for sharing information. 
The law also authorized the application of defensive measures to mitigate known threats or security 
vulnerabilities on any network for which they own or have consent to take those measures from the 
network owner.  
The second title is on National Cybersecurity Advancement. This part of the law provided authority for 
the NCCIC to manage the information sharing program authorized by Title I. Title II also provided 
authority to DHS to provide, with or without reimbursement, the ability to detect and block threats 
coming from the public Internet to agency networks. This capability is known in the cybersecurity 
community as intrusion detection systems and intrusion prevention systems, and as the National 
Cybersecurity Protection System (NCPS) or EINSTEIN (the name of the program DHS runs to deliver 
this capability). Title II also authorized DHS to develop and deploy tools to agencies which would 
continuously monitor the network activity of agencies’ internal networks in order to detect risks and 
recommend mitigation activities. This is known as the Continuous Diagnostics and Mitigation program at 
DHS. 
Title III, or the Federal Cybersecurity Workforce Assessment Act of 2015, requires federal agencies to 
identify the cybersecurity workforce roles of greatest need to the department and report to Congress on 
the progress of implementation. 
Title IV contains miscellaneous cybersecurity requirements, including a study from DHS on the risks 
facing first responder networks.  
Roles and Responsibilities 
To take an organizational view, these laws established certain roles and responsibilities among federal 
entities for the security of the .gov domain. It may be helpful to think of OMB as the “strategic,” DHS as 
the “operational,” and individual agencies as the “tactical,” with roles for NIST and agency Inspectors 
General, as well. 
OMB, exercising its oversight of agency budgets, is responsible for overseeing agency adoption of 
cybersecurity practices and guiding agencies have a cybersecurity posture commensurate to their risk. 
Through their budgetary authority, OMB enforces the adoption of cybersecurity practices by directing the 
expenditure of funds for this purpose. OMB may also install new senior officials to oversee mismanaged 
cybersecurity programs, but CRS was unable to find an instance of OMB exercising that authority.4 
DHS oversees agency adoption of cybersecurity programs, provides tools to protect agency networks, and 
coordinates government-wide efforts on federal cybersecurity.  
                                                 
3 P.L. 114-113.  
4 40 U.S.C. §11303. 
CRS TESTIMONY 
Prepared for Congress ————————————————————————————————— 
Congressional Research Service 
3 
Ultimately, however, agency heads are responsible for ensuring that risks are effectively managed in their 
own agencies, with cybersecurity being one such risk (financial and operational risk are among the 
others). In accordance with FISMA (P.L. 113-283) agency heads shall ensure the responsibility for 
cybersecurity is delegated to senior official, frequently a chief information security officer.5 
NIST develops standards (i.e., the Federal Information Processing Standards) and guidance (i.e., Special 
Publications) to inform agencies of security practices to adopt.6  
Inspectors General annually evaluate their agency’s cybersecurity programs and provide 
recommendations on improving their agency’s cybersecurity posture. 
Policy Outcomes 
Prior to the 113th Congress, cybersecurity risks were one of many risks that an agency head was 
responsible for managing, along with fiscal risk and operational risk. In managing cybersecurity risk, 
agencies had a responsibility to manage risk effectively, and through their collective risk management the 
security of the .gov domain was obtained. DHS, OMB, and NIST provided programs, information, tools, 
and guidance to assist agencies in managing that risk, to include EINSTEIN and FISMA guidance.7 
However, it was incumbent upon the agency to accept those tools and implement that guidance. 
With the passage of the aforementioned laws enacted in the 113th and 114th Congress, including the 
Cybersecurity Act of 2014, Congress updated law to reflect that risk exists not just at the agency level, but 
across the entire federal government. Federal agencies face cybersecurity risks not just for the information 
that individual agencies possess. Agencies also face inherent cybersecurity risks because they exist as part 
of the federal government, regardless of the work of that particular agency.  
The Congress statutorily affirmed the role of DHS in mitigating risk to all federal civilian agencies, 
reflecting the interdependent and inherent shared cyber risks agencies face. Rather than distribute risk 
mitigation across agency heads as their responsibility, DHS was granted authority to monitor 
cybersecurity risk for the .gov domain, provide tools to mitigate that risk, and assist agencies in doing so. 
With these authorities, DHS provides defense of agency networks at the transition point from the public 
Internet to the agency’s networks with EINSTEIN, which improves network security.8 DHS also provides 
advanced vulnerability management with CDM.9 These tools are designed not only to strengthen security 
of agencies where they are deployed, but also to the federal enterprise by allowing DHS visibility to 
network activity across all federal agencies. This is intended to allow DHS to notice malicious activity at 
one agency and the opportunity to mitigate that activity at another agency before it becomes disruptive, a 
form of herd protection for civilian agencies. Additionally, by consolidating these responsibilities at DHS, 
DHS is arguably able to monitor risk to the .gov domain and take action to mitigate that risk, freeing up 
agency resources to focus their risk at the agency level (i.e., the agency network, agency computers and 
data). 
                                                 
544 U.S.C. §3554, (a) (3) (A). 
6 NIST, “FIPS Publications,” website, October 16, 2015, at http://csrc.nist.gov/publications/PubsFIPS.html. And NIST, “Special 
Publications,” website, April 8, 2016, at http://csrc.nist.gov/publications/PubsSPs.html. 
7 The e-Government Act of 2002 (P.L. 107-347) requires OMB to develop and issue guidance on implementing information 
technology security, and the Comprehensive National Cybersecurity Initiative (https://obamawhitehouse.archives.gov/issues/
foreign-policy/cybersecurity/national-initiative) directed DHS to develop and deploy EINSTEIN to agencies.  
8 https://www.dhs.gov/einstein. 
9 https://www.dhs.gov/cdm. 
CRS TESTIMONY 
Prepared for Congress ————————————————————————————————— 
Congressional Research Service 
4 
 
The distinction between the federal enterprise and the agency’s enterprise appears to be continuing under 
the new Administration. The President’s “Budget in Brief” requests $1.5 billion for DHS cybersecurity 
mission (to be split between their .gov and private sector security operations, but explicitly support a 
“more assertive defense of Government networks.”).10 Early indications from the Administration officials 
signal that the position of the Administration is to manage risks to the federal enterprise as a single 
entity.11 Through this strategy, the Administration seeks to alleviate agency heads from having to further 
divide limited agency resources between mission operations and mission support, with the potential 
detriment to spending on the agency’s cybersecurity. By shifting some additional cybersecurity actions 
from individual agencies to a single entity responsible for the security of all agencies the intent is to allow 
agencies to focus their resources on executing against the agency’s mission.  
Binding operational directives (BODs) are an example of the policy shift enacted with this group of 
legislation. These directives are compulsory direction to an agency from DHS to take specific action in 
order to protect the agency’s information technology.12 This is a unique relationship wherein one cabinet 
agency can direct another to take action—in this case, expend that agency’s resources—for the purposes 
of managing risk to that agency, not risk to DHS. DHS is under no obligation to notify the public or 
Congress on the issuance of a BOD or its contents. 
 
 
Disclaimer 
This document was prepared by the Congressional Research Service (CRS). CRS serves as nonpartisan shared staff 
to congressional committees and Members of Congress. It operates solely at the behest of and under the direction of 
Congress. Information in a CRS Report should not be relied upon for purposes other than public understanding of 
information that has been provided by CRS to Members of Congress in connection with CRS’s institutional role. 
CRS Reports, as a work of the United States Government, are not subject to copyright protection in the United 
States. Any CRS Report may be reproduced and distributed in its entirety without permission from CRS. However, 
as a CRS Report may include copyrighted images or material from a third party, you may need to obtain the 
permission of the copyright holder if you wish to copy or otherwise use copyrighted material. 
 
                                                 
10 OMB, “America First: A Budget Blueprint to Make America Great Again,” budget report, 2017, at 
https://www.whitehouse.gov/sites/whitehouse.gov/files/omb/budget/fy2018/2018_blueprint.pdf.  
11 Tom Bossert, “Cyber Disrupt 2017,” remarks via video, March 15, 2017, at https://www.csis.org/events/cyber-disrupt-2017. 
12 44 U.S.C. §3553. 
CRS TESTIMONY 
Prepared for Congress ————————————————————————————————— 
TE10015