$2 billion in grants are available for state, local, tribal, and territorial cybersecurity plans.
High Contrast
$2 billion in grants are available for state, local, tribal, and territorial cybersecurity plans.
The funding and required compliance measures can create a more effective cybersecurity approach.
To take advantage of funding, states must understand eligibility requirements and processes.
Within the $1.2 trillion Infrastructure Investment and Jobs Act (IIJA), the State and Local Cybersecurity Grant Program will appropriate nearly $2 billion in federal grants in fiscal years 2022 through 2025 to directly support and enhance cybersecurity programs owned or operated by state, local, tribal and territorial governments.
However, becoming eligible for a grant has its challenges. Approval requires collaboration at all levels of government (including the establishment of a planning committee) and a documented cybersecurity plan. Two states have chosen to decline the funding based on effort and allocation considerations. But the funding, and the compliance measures required to receive it, can serve as a catalyst for developing a more effective cybersecurity foundation, with potential benefits that include:
The available funds come at an optimal time, as chief information security officers for state governments look to embrace their entire state and extend their leadership reach to all levels of government, including the local level. A whole-of-state approach with centralized investments can drive economies of scale and consistency in cybersecurity architecture across state as well as local government agencies.
Cybersecurity planning committee
The committee is tasked with identifying and prioritizing statewide efforts, as well as identifying opportunities to consolidate projects to increase efficiencies. Guidelines for committee formation include the following:
Cybersecurity plan
The cybersecurity plan is the statewide planning document that must be approved by the cybersecurity planning committee and the state’s chief information officer, CISO, or equivalent. The plan must align with the stated purposes of IIJA funding, as summarized below.
Funds can be used for:
Funds cannot be used for:
Additionally, the plan and individual projects must consider common security best practices that move states toward a zero trust architecturemodel, in alignment with President Joe Biden’s 2021executive orderon improving the nation’s cybersecurity. These practices include but are not limited to, the following:
With 80% of the funding required to be allocated to local governments (including a minimum of 25% for rural areas), the impact across the state could be realized through either individual entity allocations or a centralized approach. This whole-of-state strategy focuses on establishing, expanding, and improving major programs as a shared state investment utilized by state and local government agencies, and starts with building collaborative relationships between the state and local agencies.
The main areas of opportunity include the sharing of the:
Funds will be distributed incrementally to support projects throughout the performance period of up to four years. FEMA will be responsible for the oversight of appropriated funds. States will use their state administrative agencies to receive funds from the federal government and then distribute the funding to local governments in accordance with state law.
Governments should pursue two critical action items prior to applying for funding:
In conjunction with FEMA, to ensure ongoing monitoring and the effective use of funds, an entity can use several methods to track performance and ongoing progress, demonstrating whether funds have provided benefits.
These benefits include:
The funding is available for allocation until 2025 but will eventually be exhausted. Funding for the long term includes careful planning with vendors, partners, and the legislators or districts benefiting from the established programs. Establishing these cybersecurity programs will allow for the clear benefit to be seen when considering protecting and defending key citizen services. However, the baseline of all “whole of state” programs should begin with cross-agency collaboration to allow organizations to continue to share knowledge and best practices beyond the grant’s cybersecurity plan.
Receiving the available IIJA funds will open the door for state and local governments to collaborate on cybersecurity, establish cross-functional programs, and create or enhance existing programs. Program execution will require coordinated project management, planning, and ongoing management.