Loading...
Loading...
Follow CISA's proven HSEEP methodology for critical infrastructure protection and cyber resilience. Complete guide to exercise types, planning, and evaluation.
CISA's Homeland Security Exercise and Evaluation Program (HSEEP) defines a progressive series of exercises designed to build and validate capabilities over time:
Five exercise types from discussion-based to operations-based
Introduce and overview new or updated plans, policies, or procedures
WHEN TO USE:
After deploying new IR plan or procedures
PARTICIPANTS:
All stakeholders including non-technical staff
Build consensus and develop plans through working groups
WHEN TO USE:
When developing new procedures or updating existing ones
PARTICIPANTS:
Subject matter experts and planners
Evaluate plans, policies, procedures through simulated incident
WHEN TO USE:
Regular validation of IR capabilities (quarterly)
PARTICIPANTS:
Decision-makers and key personnel
Test and validate specific capabilities in isolation
WHEN TO USE:
Component testing of technical capabilities
PARTICIPANTS:
Technical staff executing the specific capability
Validate all capabilities in realistic, complex scenario
WHEN TO USE:
Annual comprehensive readiness validation
PARTICIPANTS:
All stakeholders, often multi-organizational
8-step HSEEP planning methodology
Identify planning team members, assign roles, schedule planning meetings
Key Deliverables:
Determine what capabilities will be tested and what success looks like
Key Deliverables:
Create realistic scenario that drives toward exercise objectives
Key Deliverables:
Create exercise plan, situation manual, evaluation guides
Key Deliverables:
Arrange facilities, materials, technology, participant notifications
Key Deliverables:
Execute the tabletop exercise according to plan
Key Deliverables:
Assess performance against objectives, identify strengths and gaps
Key Deliverables:
Document findings, recommendations, improvement plan
Key Deliverables:
CISA recognizes 16 critical infrastructure sectors. Tabletop exercises should consider sector-specific threats and cross-sector dependencies:
Grid disruption, SCADA/ICS attacks, NERC CIP compliance
Patient data breaches, medical device security, HIPAA compliance
Payment system disruption, fraud, PCI DSS compliance
Operational technology attacks, GPS spoofing, TSA requirements
SCADA attacks, treatment disruption, EPA compliance
Network outages, data interception, FCC requirements
Classified data, citizen data breaches, FISMA compliance
OT/IT convergence, IP theft, supply chain attacks
CISA provides standardized evaluation guides that assess performance against core capabilities:
Free tools and assistance available from CISA
Pre-built scenarios, templates, and planning guides for common threat scenarios
How to Access:
Download from cisa.gov/exercise-starter-kits
Includes:
Free facilitation support and subject matter experts for exercises
How to Access:
Request via cisa.gov/request-exercise-support
Includes:
Detailed guidance on planning and conducting cyber exercises
How to Access:
Download from cisa.gov/cyber-exercise-playbook
Includes:
Standardized formats for documenting exercise results
How to Access:
Available at hseep.dhs.gov
Includes:
Critical infrastructure organizations should consider sharing exercise findings with CISA to contribute to national resilience:
Breakpoint scenarios follow CISA HSEEP methodology and include sector-specific scenarios for all 16 critical infrastructure sectors. Generate CISA-compliant After-Action Reports automatically.
The Goldilocks Principle for scenario design, 5-layer model, and inject techniques
The IR Testing Pyramid, 5 testing methods, and annual testing calendar
4 NIST phases and key incident response metrics (MTTD, MTTA, MTTC, MTTR)