The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has launched a new strategic initiative named 'CI Fortify'. This program provides actionable guidance to help U.S. critical infrastructure (CI) entities across all 16 sectors improve their resilience and ability to maintain essential services during a significant cyberattack or crisis. The core focus of 'CI Fortify' is on proactive preparation, specifically by developing robust capabilities for isolation and recovery. CISA is strongly encouraging all CI owners and operators to review and implement the guidance to fortify their defenses against sophisticated threat actors seeking to degrade or disrupt the nation's most vital services.
'CI Fortify' is not a regulation but rather a set of strong recommendations and a guiding framework. It represents CISA's strategic direction for critical infrastructure defense, emphasizing resilience and continuity of operations over prevention alone. The guidance is designed to be applicable across all 16 critical infrastructure sectors.
The two key pillars of the initiative are:
Isolation: This involves having the pre-planned ability to operate key functions without relying on external or untrusted networks. This includes:
Recovery: This focuses on the ability to rapidly and safely restore compromised systems and services, even while in an isolated state. This includes:
The guidance is aimed at all owners and operators of critical infrastructure in the United States, spanning all 16 official sectors, including:
The 'CI Fortify' initiative signals a shift in national cybersecurity strategy towards assuming that a breach will occur and focusing on operational resilience. For CI entities, implementing this guidance will require significant investment and planning.
While 'CI Fortify' is not a mandate, it aligns closely with and reinforces existing regulatory frameworks like NERC CIP for the electricity sector. Organizations that adopt the 'CI Fortify' principles will find themselves in a stronger position to meet their regulatory compliance obligations. The key is to move beyond paper-based compliance and build true, testable operational resilience.
The 'Isolation' pillar of CI Fortify is an advanced form of network segmentation, preparing for full disconnection.
The 'Recovery' pillar of CI Fortify emphasizes the need for tested and resilient backup and recovery plans.
The guidance promotes building redundant, manual, or local operational modes that can be used if primary systems fail.
The 'Isolation' component of CISA's CI Fortify initiative is a direct call for critical infrastructure operators to develop and practice Network Isolation. This goes beyond standard network segmentation. Organizations must create and test playbooks for physically or logically disconnecting their operational technology (OT) networks from their corporate IT networks and the internet during a crisis. This could involve configuring firewalls to drop all external traffic with a single command, or training operators to physically unplug network connections at demarcation points. The goal is to create a 'digital island' where essential services can continue to operate using local controls, safe from an attacker who has compromised the IT network. This capability must be tested regularly to ensure it works and that staff are prepared to operate in an isolated state.
The 'Recovery' pillar of CI Fortify emphasizes the need for robust restoration capabilities. Critical infrastructure entities must maintain clean, segmented, and offline backups of all critical systems, including ICS configurations, HMI projects, and historical data. The key element CISA highlights is the ability to perform recovery while isolated. This means recovery servers and backup media must be located within the secure OT enclave or be accessible via a secure, out-of-band network. Recovery plans must be tested from end-to-end in a simulated isolated environment to prove that the organization can restore essential services without relying on the potentially compromised IT network or internet connectivity.
CISA officially launches the 'CI Fortify' initiative and releases its initial guidance.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.