LAO Memo
LAO Memo
LAO Memo
This memorandum responds to your two letters, dated June 30 and August 9, requesting that
our office draft reports on various cybersecurity issues in two critical infrastructure sectors—
referred to in this memorandum as the water and wastewater systems sector and the food and
agriculture sector. (Our memorandum uses these sectors in place of “water infrastructure” and
the “farm-to-table pipeline” to reflect the focus of our research.) Based on our initial research
and outreach that identified significant data and information limitations in our ability to fully
answer each of your questions, we sent a memorandum to your Chief of Staff, Elizabeth Hess, on
August 27 that proposed a revised scope, format (a single memorandum in response to both
letters), and time line for our response. We understand that our proposed changes were
acceptable to you. Largely using qualitative data sources, we primarily focus our analysis on the
cyberattacks, cybersecurity risks, and certain cybersecurity preparedness measures that appear
similar across critical infrastructure sectors. The remainder of our analysis focuses in a more
limited way on the cybersecurity preparedness measures and any other relevant differences that
we identified in the two critical infrastructure sectors that are of particular interest to you.
EXECUTIVE SUMMARY
Research Shows Increase in Number of Cyberattacks on, and Variation in Cybersecurity
Preparedness of, Critical Infrastructure Sector Entities. The frequency of cyberattacks against
critical infrastructure entities, including in the water and wastewater systems sector and the food
and agriculture sector, are increasing. A number of entities in both sectors under consideration,
nationwide and within California, experienced disruptions in their operations and financial losses
because of cyberattacks. Cybersecurity preparedness of sector entities, however, varies widely.
In general, larger entities with experienced staff and more funding performed more extensive
cybersecurity preparedness activities and provided evidence of better documentation and
planning. By contrast, smaller entities cited a number of barriers to improved cybersecurity
preparedness, though many had recently begun at least some cybersecurity preparedness
activities.
Findings Suggest Lack of Dedicated Cybersecurity Funding and Staff Limits Preparedness
of Critical Infrastructure Sector Entities. Existing research on cybersecurity preparedness of
critical infrastructure sector entities indicates that these entities lack funding for cybersecurity
preparedness. Our interviews reflected this finding. Entities in the water and wastewater systems
To: Hon. Melissa Hurtado 2 January 10, 2022
sector and stakeholders in both sectors indicated a lack of funding available for cybersecurity
activities and staff is a primary barrier to improved cybersecurity preparedness. Moreover, we
found that some sector entities lack familiarity with available resources and best practices to
improve their cybersecurity preparedness; communicate and coordinate little, if at all, with
federal and state government entities; and operate outdated information technology (IT) and
operational technology (OT) systems that cannot be replaced due to funding and/or staff. While
many of our findings relate to both critical infrastructure sectors under consideration, some
findings are sector-specific. For example, in the water and wastewater systems sector, a number
of sector entities found that compliance with federally required cybersecurity-related activities
did not change their activities but merely reaffirmed their current practices, whereas others
benefited from the additional documentation and planning efforts that resulted due to the federal
requirements. In the food and agriculture sector, by contrast, many of the sector entities cited no
federal or state cybersecurity requirements, and had only just begun cybersecurity preparedness
activities in the last couple of years.
Options for Legislative Consideration in Order to Improve Cybersecurity Preparedness of
Critical Infrastructure Sector Entities. In order to improve the cybersecurity preparedness of
critical infrastructure sector entities, including the two sectors of interest to you, our findings
suggest that the Legislature could consider whether requiring sector entities to report significant
and verified cyberthreats or cyberattacks already underway, particularly in the food and
agriculture sector where no reporting requirements currently exist, might improve how state
government entities respond to these threats and attacks. In addition to reporting requirements,
the Legislature could direct the California Governor’s Office of Emergency Services (CalOES),
together with other state government entities in the California Cybersecurity Integration Center
(Cal-CSIC), to submit an outreach plan to inform critical infrastructure sector entities about
available state resources and provide guidance on best cybersecurity practices for legislative
consideration. Lastly, the Legislature also could direct CalOES and other Cal-CSIC partners to
evaluate options for providing critical infrastructure sector entities with grants or other funding
to improve their cybersecurity preparedness, and submit these options to the Legislature. For
sector entities with sufficient funding but insufficient buy-in from entity leadership, the
Legislature might also request that CalOES and other Cal-CSIC partners assess other options
(such as changes in state law, policy, and regulations) to incent entity leadership into allocating
more resources to cybersecurity preparedness. This analysis would need to determine issues such
as overall funding level, funding source, program design, targeted critical infrastructure sectors,
and whether both public and private entities should be eligible for the state financial assistance.
The administration also could consider whether funds should be made conditional on the
adoption of cybersecurity policies and standards that reflect best practices and/or target smaller
entities that face additional barriers to cybersecurity preparedness.
ORGANIZATION OF MEMORANDUM
First, we provide background information on technology concepts and definitions relevant to
a discussion of cybersecurity, federal and state government entities in cybersecurity governance,
critical infrastructure sectors, and the America’s Water Infrastructure Act (AWIA) of 2018.
To: Hon. Melissa Hurtado 3 January 10, 2022
Second, we provide a summary of our research methodology, including mention of the data
limitations we faced in our analytical work. Third, we provide the findings from our research,
organized into four subsections: (1) an overview of the cyberthreat landscape and cybersecurity
preparedness across critical infrastructure sectors, (2) findings that are relevant to entities in both
the water and wastewater systems sector and in the food and agriculture sector, (3) findings that
are specific to entities in the water and wastewater systems sector, and (4) findings that are
specific to entities in the food and agriculture sector. Finally, we provide options for legislative
consideration to improve the cybersecurity preparedness of critical infrastructure entities,
including both sectors covered in this memorandum.
BACKGROUND
In this section, we provide background information necessary to understand our findings and
options for legislative consideration, including information on relevant technology concepts and
definitions, federal and state government entities involved in cybersecurity governance, federally
defined critical infrastructure sectors, and AWIA.
Cybersecurity Governance
Federal Government Entities. Federal government entities involved in cybersecurity
activities that are mentioned in this memorandum include:
• United States Department of Homeland Security (DHS). Relevant to this
memorandum is DHS’s involvement in cybersecurity, primarily through its
Cybersecurity and Infrastructure Security Agency (CISA). CISA is one of the
federal leads on national cybersecurity issues and coordinates resilience and
security efforts across critical infrastructure sectors. As one of the leads, CISA
provides national directives and guidance, shares information on potential
To: Hon. Melissa Hurtado 4 January 10, 2022
Water and Wastewater Systems Sector. CISA defines the national water and wastewater
systems sector as the 153,000 public drinking water systems and more than 16,000 publicly
owned wastewater treatment systems in the United States. (Of those, California has over 7,000
public drinking water systems and about 900 publicly owned wastewater treatment systems.)
U.S. EPA is the sector risk management agency for the water and wastewater systems sector.
(This sector does not include private water companies, which are not covered by our
memorandum, nor does it include the dams sector which is briefly mentioned in this
memorandum.)
Food and Agriculture Sector. CISA defines the food and agriculture sector as the estimated
2.1 million farms; 935,000 restaurants; and 20,000 registered food manufacturing, processing,
and storage facilities under almost entirely private ownership in the United States. (Of those,
California has nearly 70,000 farms and over 90,000 restaurants.) USDA and HHS (delegated to
FDA) are the co-sector risk management agencies for the food and agriculture sector. (This
sector does not include other critical infrastructure sectors with inputs into the food and
To: Hon. Melissa Hurtado 6 January 10, 2022
agriculture sector, such as the chemical and transportation systems sectors, that are not covered
by our memorandum.)
AWIA
On October 23, 2018, AWIA was signed into law. AWIA requires community (drinking)
water systems across the United States that serve more than 3,300 people to certify their
completion of risk and readiness assessments and emergency response plans to U.S. EPA. Risk
and readiness assessments evaluate the risks to, and resilience of, community water systems
across several categories, including the security of IT and OT systems used to convey water.
Emergency response plans incorporate findings from the risk and readiness assessments and
identify resources and strategies to improve the security of the community water systems,
including their cybersecurity. These plans also identify mitigation measures in the event of, as
relevant to this memorandum, a cyberattack that affects the safety and/or supply of drinking
water, such as the identification of alternative drinking water options and operation of physical
infrastructure without the use of IT or OT systems.
In your request, you asked us to estimate how many water and wastewater systems sector
entities in California serve 3,300 or fewer people, meaning that they would not be required by
the federal government to complete these risk assessments and emergency response plans. We
estimate that, while a clear majority of sector entities in California serve 3,300 or fewer people,
only 2 percent of the total state population is served by these smaller entities.
standardized set of interview questions was used to better survey the cyberthreat landscape,
cybersecurity preparedness activities undertaken, and barriers to cybersecurity preparedness
identified across interviewed sector entities. These interviews were kept confidential to protect
individual sector entities, and no findings or information from the interviews will be attributed
by name to one or more sector entities. (Although we met with a number of food and agriculture
sector entities and stakeholders, we did not employ the use of standardized interviews for the
food and agriculture sector primarily due to time constraints.)
Data Limitations on our Analytical Work. Due to the sensitivity of cybersecurity-related
research, our office was limited in its ability to obtain quantitative data sources (including state-
specific sources). Therefore, in responding to your request, we relied mostly on qualitative data
(often descriptive and/or high-level) from interviews, literature, and meetings to inform the
findings in our memorandum.
Overview
Increase in Frequency of Cyberattacks on Critical Infrastructure Sector Entities. Recent
federal data, provided by state government entities, suggests cyberattacks are increasing in
California. In 2020, an estimated 47,000 cyberattacks with payouts totaling $1.2 billion were
reported in California across all entities and sectors. In the first six months of 2021, 38,000
cyberattacks had already been reported in the state (with total payouts unknown), representing an
annual increase of 62 percent (were trends to continue). We are unable to determine from these
data how many cyberattacks were on critical infrastructure sector entities, but qualitative data we
reviewed from academic and government sources suggest a similar pattern for these entities.
According to officials in state government, for example, at least a couple dozen entities in the
state’s food and agriculture sector reported cyberattacks in the first two months of 2021, the
majority of which were ransomware attacks. Water and wastewater systems sector entities in the
state also experienced several cyberattacks, some of which led to a loss of sensitive data and of
entity control of one or more OT systems. Several water and wastewater systems sector entities
we interviewed cited significant increases in attempted cyberattacks, some of which were
successful but remediated thereafter.
Cybersecurity Preparedness Varies Widely Across Critical Infrastructure Sectors.
Cybersecurity preparedness across different critical infrastructure sectors varies based on the
current legal, policy, and regulatory frameworks for addressing cybersecurity risks in a particular
sector. In the nuclear reactors, materials, and waste sector, for example, federal regulators
To: Hon. Melissa Hurtado 8 January 10, 2022
developed comprehensive cybersecurity regulations for nuclear power plants and routinely
inspect their cybersecurity plans and protocols. In the water and wastewater systems sector,
federal documentation and planning does identify cybersecurity risks, but compliance measures
such as the emergency response plans and risk and readiness assessments under AWIA are fairly
new. Cybersecurity practices are identified in federal documentation and planning for the food
and agriculture sector, but risks in the sector itself are identified as an area of interest to be better
understood.
Findings Relevant to Both Entities in the Water and Wastewater Systems Sector
and in the Food and Agriculture Sector
Three Primary Areas of Cybersecurity Vulnerability Common to Both Sectors. Our
research found three primary areas of vulnerability that are common to entities in both sectors of
interest:
• Phishing Cyberattacks on Sector Entity Personnel. More sophisticated phishing
attacks are increasingly targeting sector entity personnel. According to FBI IC3
data from 2020, phishing was the top cybercrime reported to federal authorities by
the public. A majority of California water and wastewater systems sector entities
interviewed cited these attacks as a primary vulnerability, and almost all
successful cyberattacks on these entities started with phishing. Phishing can be a
vector for ransomware. Academic and state government entity sources cited
numerous ransomware attacks last year on food and agriculture sector entities
nationwide and in California, leading to temporary disruptions in operations and
millions paid to attackers.
• Outdated IT and OT Systems. Entities in both sectors cited outdated IT and OT
systems as a primary vulnerability for additional cyberattacks. In your request,
you asked if we could determine the age of IT and OT systems in water and
wastewater systems sector entities and evaluate the need for physical and/or
technological upgrades. While information was not available to allow us to
determine the age of these systems statewide, water and wastewater systems
sector entities we interviewed estimated the age of some of their systems at
upwards of 25 years old. Interviews with sector entities and other sources
confirmed that OT systems in general were more likely to be outdated than IT
systems. Entities in both sectors cited deficiencies in their cybersecurity
preparedness from unpatched software, unsupported hardware, and other systems-
related risks that, without more funding and staff, could not be addressed.
• Inadequate Access Management. Interviews with sector entities and meetings
with stakeholders highlighted access management as a primary vulnerability. A
number of cyberattacks cited by stakeholders involved former or current
employees who were able to gain unauthorized access to sector entity systems
because basic cybersecurity protocols (such as multifactor authentication or
revoking credentials) were not employed by sector entities. Other vulnerabilities
cited by stakeholders and water and wastewater systems sector entities were
To: Hon. Melissa Hurtado 9 January 10, 2022
Some entities we interviewed that were not as familiar with cybersecurity preparedness benefited
from the increased communication between IT departments, leadership, and operations teams
that resulted from these assessment and planning activities. These entities also cited better
documentation and planning, and more awareness of cybersecurity vulnerabilities. Other entities
we interviewed, however, said they benefited little from the assessments and plans. These
entities said the process merely reaffirmed their current practices, rather than changing how they
communicate or prepare for cyberattacks. A small number of entities found the process revealed
a lack of interest and participation from leadership and a siloed internal approach to
cybersecurity preparedness.
Federal Plans Did Not Appear to Lead to Improvements in Majority of Systems. In your
request, you asked our office to determine how many entities in the water and wastewater
systems sector implemented improvements based on the federal risk and readiness assessments
and emergency response plans required under AWIA. Based on the interviews we conducted, a
majority of water and wastewater systems sector entities did not identify and/or implement
improvements through this process. Rather, many of these entities cited existing technology
modernization plans already in place before federal compliance efforts were underway as the
primary driver of their cybersecurity improvements.
Large Food and Agriculture Companies and Cooperatives Combine Many IT and OT
Systems, Increasing Cybersecurity Risks. One academic stakeholder in the food and agriculture
sector noted how large agricultural companies and cooperatives, often formed through mergers
and acquisitions, result in a patchwork of legacy and modern IT and OT systems supporting their
operations. Whereas some other critical infrastructure sectors have federal guidance on IT and
OT systems accumulated through, for example, mergers and acquisitions, the food and
agriculture sector does not. This patchwork of systems exposes food and agriculture sector
entities to increased cybersecurity risks and can limit their preparedness.
International Supply Chain in Food and Agriculture Limits Reach of State Authorities.
The supply chain of California’s food and agriculture sector is international and widely varied,
with numerous entities of all sizes and at multiple places in the supply chain operating outside of
California in other countries and states. This variation makes new state authorities on
cybersecurity preparedness in the food and agriculture sector, as compared to the water and
wastewater systems sector, more limited in their effect and reach. Some stakeholders we spoke to
also cited this variation as one reason emergency preparedness planning was more difficult.
preparedness. Another potential option for legislative consideration to increase sector entities’
awareness and interest in cybersecurity is by providing additional funding for state government
entities to reach out to sector entities about available cybersecurity resources and best practices.
The Legislature could direct CalOES (as the administrative entity for Cal-CSIC) to prepare a
multiyear outreach plan, including an estimate of requisite funding to provide additional
outreach. Key considerations for the Legislature include delegation of responsibility for specific
outreach efforts (for example, CDT for cybersecurity policy guidance), funding sources for any
funding needed by state government entities for additional outreach, and quantifiable measures
of success to evaluate the multiyear outreach plan after its implementation.
Evaluate Options to Provide Critical Infrastructure Sector Entities With Funding to
Improve Their Cybersecurity Preparedness. One of the primary barriers to improvements in the
cybersecurity preparedness of critical infrastructure sector entities identified by our research was
a lack of adequate funding for cybersecurity activities and staff, typically reflecting
circumstances where there was a lack of buy-in from entity leadership to dedicate available
funding for this purpose. To address this issue, the Legislature could direct CalOES and other
Cal-CSIC partners to evaluate options for providing critical infrastructure sector entities with
grants or other funding to improve their cybersecurity preparedness, and submit these options to
the Legislature. For sector entities with sufficient funding but insufficient buy-in from entity
leadership, the Legislature might also request that CalOES and other Cal-CSIC partners assess
other options (such as changes in state law, policy, and regulations) to incent entity leadership
into allocating more resources to cybersecurity preparedness. This analysis would need to
determine issues such as overall funding level, funding source, program design, and targeted
critical infrastructure sectors. Another policy issue for the administration’s analysis to consider is
whether the state financial assistance should be granted to both public and private entities. The
administration also could consider whether funds should be made conditional on the adoption of
cybersecurity policies and standards that reflect best practices and/or target smaller entities that
face additional barriers to cybersecurity preparedness. This set of baseline policies and standards
could be defined by the state government entity that administers the funds, in consultation with
the Legislature and other stakeholders.
If you would like a briefing and/or have any questions on this memorandum, please feel free
contact the memorandum’s author, Brian Metzker, at Brian.Metzker@lao.ca.gov.