The Federal Energy Management Program (FEMP) provides agencies with guidance and direction on how to enhance the cyber security posture of federal facilities.
Use the following tools and resources to facilitate the implementation of Executive Order (E.O.) 13800: Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure.
The tools and resources on this page will enable facility stakeholders to:
- Describe their current cybersecurity posture
- Describe their target state for cybersecurity
- Evaluate their current state for physical security
- Identify and prioritize opportunities for improvement within the context of a continuous and repeatable process
- Assess progress toward the target state
- Communicate among internal and external stakeholders about cybersecurity risk.
Pathways for Cybersecurity Engagement
Assess Facility Cyber Risk
Distributed Energy Resource Cybersecurity Framework
The Distributed Energy Resource Cybersecurity Framework (DERCF) fills a critical gap that expands upon existing cybersecurity frameworks for evaluating the cybersecurity posture of federal sites with distributed energy systems.
Available as both a written guide and web-based application, the DERCF helps users pinpoint cybersecurity vulnerabilities for renewable energy systems—based on unique facilities, personnel, and operational procedures—and develops customized action plans to improve an organization's security controls and practices.
Facility Cybersecurity Framework
The FCF helps federal facilities address E.O. 13800 to strengthen the cybersecurity posture of federal agencies. This self-assessment tool is tailored specifically to secure facility related control systems from cyber threats.
The FCF distills cybersecurity best practices to help users identify, protect, detect, respond, and recover to cyber threats and vulnerabilities. Use the related Best Practices tool to mitigate gaps discovered through an assessment and understand how those gaps could be explored from known operational technology cyber attack tactics and techniques.
- Enhance cybersecurity management skills and resources using real-world, cyber-attack-based hands-on and adaptive trainings.
- Review fact sheets about securing facility related control systems and lighting systems.
- Leveraging draft cybersecurity procurement and implementation language may provide an opportunity to expand and solidify cybersecurity procurement language with vendors. Review questions to better understand when to engage cybersecurity experts during this process. This would help mitigate systems level and supply chain cyber threats and expedite secure and sustainable deployment and integration of critical SCADA, smart systems, and automation technology. Review guidance for energy delivery systems from DOE and control systems from the U.S. Department of Homeland Security.