FACT SHEET

CISA Cybersecurity Resources for State, Local, Tribal, and Territorial

CISA cybersecurity services support SLTT security and resilience
Top Three Resources for SLTT
  • Connect with your Regional Cybersecurity Advisor.
  • Sign up for Cyber Hygiene Services.
  • Perform a Cyber Performance Goals Assessment.

CISA offers the following cybersecurity services to support the security and resilience of state, local, tribal, and territorial (SLTT) partners:

Regional Cybersecurity Advisors
https://www.cisa.gov/about/regions

  • Provide cybersecurity preparedness assessments and technical assistance.
  • Gateway to CISA cybersecurity services, products, and programs.
  • Support preparation, response, and recovery efforts for hazards impacting critical infrastructure.
  • Conduct and integrate infrastructure assessments and analysis—including dependencies and cascading effects—on critical infrastructure to influence decision-making at all phases of emergency management.
  • Facilitate information sharing between public and private sector critical infrastructure partners.
  • Improve situational awareness of cybersecurity risks and incidents.
  • Connect SLTT partners to the SLTT Security Operations Center (SOC) Call, a bimonthly call that shares timely cyber defense information tailored for SLTTs. 

Cyber Hygiene Services
https://www.cisa.gov/cyber-hygiene-services

  • Cyber Hygiene services can assist SLTT partners in:
    • Reducing risk to internet-facing configurations and known vulnerabilities.
    • Avoiding surprises.
    • Sharpening their responses.
    • Broadening their security horizon.
  • CISA also consistently reviews Cyber Hygiene data to message entities on emerging vulnerabilities.

Cybersecurity Performance Goals Assessment
https://www.cisa.gov/cpg

  • CISA’s Cybersecurity Performance Goals (CPGs)
    • Are a set of practices organizations should implement to kickstart their cybersecurity efforts.
    • Can help SLTT partners determine the areas they need to invest additional time in and develop to improve cyber defense.
  • SLTT partners can work with their regional Cybersecurity Advisor to perform a CPG Assessment.

Additional Services:

Secure Cloud Business Applications (SCuBA)
https://www.cisa.gov/scuba 

SCuBA provides tailored cloud solutions guidance and secure configuration baselines (SCBs) for Microsoft 365 (M365) and Google Workspace (GWS) applications. 

ScubaGear and ScubaGoggles tools:

  • Compare tenant configurations to CISA’s security recommendations.
  • Lower the amount of effort required for organizations to assess themselves, providing a detailed report.
  • Have code updates released on a regular basis to address Google’s and Microsoft’s configuration updates.
  • Do not collect data or share with CISA, they only create output reports.

Logging Made Easy (LME)
https://www.cisa.gov/lme 

CISA’s LME provides a free, easy-to-deploy log management solution. It includes real-time threat alerts, customizable dashboards, and community collaboration on GitHub, helping small to medium-sized organizations improve their cybersecurity.

LME offers:

  • Centralized logging.
  • Proactive threat detection.
  • Enhanced security by allowing organizations to monitor their networks, identify users, and actively analyze Sysmon data.

Protective Domain Name System Resolver
https://www.cisa.gov/pdns 

Protective DNS Resolver is a device-centric service that blocks and secures organizations’ web traffic from reaching malicious destinations by using state-of-the-art DNS technologies.

Through advanced analysis of DNS logs data, the Protective DNS service provides customers:

  • An increased visibility into DNS traffic across their networks through flexible analysis tools, dynamic dashboards, and customizable alerts.
  • It also filters DNS queries to prevent resolution for known malicious domains and/or IP addresses.
  • This service is only available to limited number of entities at this time. 

Malcolm
https://www.cisa.gov/malcolm 

Malcolm is a network traffic analysis tool suite which enables the user to capture full network packet artifacts (PCAP files) and logs in OT/ICS environments, allowing customers to collect and index IT & OT logs, enrich log data with threat intelligence and network context, and support customer cyber hygiene goals (asset inventory, continuous monitoring, etc.).

Use Malcolm for:

  • Network Visibility.
  • Threat Detection & Hunting.
  • User-Friendly Visualization.
  • Scalability & Flexibility.
  • Compliance & Forensics.

Cybersecurity Publications and Products
https://www.cisa.gov/news-events/cybersecurity-advisories 

Professional Services

CISA provides a limited number of vulnerability assessments and vulnerability services to critical infrastructure entities. Engage with your Regional Cybersecurity Advisor to learn more.