The Department’s Protective Security Coordination Division conducts specialized field assessments to identify vulnerabilities, interdependencies, capabilities, and cascading effects of impacts on the nation’s critical infrastructure.
These voluntary, non-regulatory vulnerability assessments are the foundation of the National Infrastructure Protection Plan's risk-based implementation of protective programs designed to prevent, deter, and mitigate the risk of a terrorist attack while enabling timely, efficient response and restoration in an all-hazards, post-event situation.
Because the majority of all U.S. critical infrastructure is privately owned, the effectiveness of vulnerability assessments depends upon the voluntary collaboration of private sector owners and operators. To further enhance the security and resilience of the nation's critical infrastructure, Protective Security Advisors (PSAs) conduct Enhanced Critical Infrastructure Protection (ECIP) visits. During an ECIP visit, PSAs focus on coordination, outreach, training, education, and building existing relationships with federal, state, local, tribal, territorial, and private sector partners.
ECIP visits are often followed by Infrastructure Survey Tool (IST) security surveys to collect, process, and analyze facility assessment data and develop a detailed assessment of the security and resilience of a facility.
Special Reports on Vulnerabilities & Indicators of Terrorist Activity
The Department facilitates information sharing between the government and individual sites and industry sectors, as well as between facilities and sectors, by offering comparative assessment data that supports national-level, cross-sector risk analysis of nationally significant critical infrastructure.
For the Department's federal, state, and local partners only, special reports, known as Infrastructure Protection Report Series, are available. These reports cover all 16 critical infrastructure sectors and identify common critical infrastructure vulnerabilities, sector-specific background information, and the types of terrorist activities that might be successful in exploiting these vulnerabilities.
Types of Vulnerability Assessments Offered
The Department offers the following CIKR vulnerability assessment programs:
- Infrastructure Survey Tool security surveys
- Computer-Based Assessment Tool imagery captures
- Regional Resiliency Assessment Program
For more information on any of these voluntary vulnerability assessments or the Infrastructure Protection Report Series, please email email@example.com.