CISA Unveils 'CI Fortify' Initiative to Bolster Critical Infrastructure Defenses

CISA Launches 'CI Fortify' to Bolster Critical Infrastructure Resilience

INFORMATIONAL
May 5, 2026
4m read
Policy and ComplianceRegulatoryIndustrial Control Systems

Related Entities

Organizations

Full Report

Executive Summary

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has launched a new strategic initiative named 'CI Fortify'. This program provides actionable guidance to help U.S. critical infrastructure (CI) entities across all 16 sectors improve their resilience and ability to maintain essential services during a significant cyberattack or crisis. The core focus of 'CI Fortify' is on proactive preparation, specifically by developing robust capabilities for isolation and recovery. CISA is strongly encouraging all CI owners and operators to review and implement the guidance to fortify their defenses against sophisticated threat actors seeking to degrade or disrupt the nation's most vital services.

Regulatory Details

'CI Fortify' is not a regulation but rather a set of strong recommendations and a guiding framework. It represents CISA's strategic direction for critical infrastructure defense, emphasizing resilience and continuity of operations over prevention alone. The guidance is designed to be applicable across all 16 critical infrastructure sectors.

The two key pillars of the initiative are:

  1. Isolation: This involves having the pre-planned ability to operate key functions without relying on external or untrusted networks. This includes:

    • Proactively disconnecting from third-party dependencies.
    • Maintaining the ability to function without reliable internet or external telecommunications.
    • Ensuring systems can operate in a segmented or air-gapped state if necessary.
  2. Recovery: This focuses on the ability to rapidly and safely restore compromised systems and services, even while in an isolated state. This includes:

    • Developing and regularly testing detailed recovery plans.
    • Practicing local and manual operational modes for Industrial Control Systems (ICS).
    • Ensuring that recovery assets, such as backups and re-imaging servers, are themselves protected and accessible in an isolated environment.

Affected Organizations

The guidance is aimed at all owners and operators of critical infrastructure in the United States, spanning all 16 official sectors, including:

  • Energy
  • Financial Services
  • Healthcare and Public Health
  • Water and Wastewater Systems
  • Communications
  • Defense Industrial Base

Impact Assessment

The 'CI Fortify' initiative signals a shift in national cybersecurity strategy towards assuming that a breach will occur and focusing on operational resilience. For CI entities, implementing this guidance will require significant investment and planning.

  • Resource Requirements: Organizations will need to allocate resources to develop and test isolation and recovery playbooks. This may involve architectural changes, such as implementing stronger network segmentation, and investments in out-of-band management capabilities.
  • Operational Changes: Staff will need to be trained on how to perform their duties using manual or local control systems in the event of a cyberattack that forces isolation.
  • Increased Resilience: While costly, successful implementation will mean that an organization can continue to provide its essential service (e.g., providing power, clean water, or financial transactions) to the public, even in the face of a severe cyberattack from a nation-state adversary.

Compliance Guidance

While 'CI Fortify' is not a mandate, it aligns closely with and reinforces existing regulatory frameworks like NERC CIP for the electricity sector. Organizations that adopt the 'CI Fortify' principles will find themselves in a stronger position to meet their regulatory compliance obligations. The key is to move beyond paper-based compliance and build true, testable operational resilience.

Tactical Implementation Steps:

  1. Identify Core Services: Determine the absolute minimum set of services and functions that must be maintained during a crisis.
  2. Map Dependencies: Map all internal and external dependencies (network, software, personnel) required for those core services.
  3. Develop Isolation Playbooks: Create step-by-step procedures for disconnecting from the internet and third-party networks while keeping core services running.
  4. Test, Test, Test: Regularly conduct tabletop exercises and full-scale operational tests of both isolation and recovery plans. These tests should simulate a worst-case scenario where external connectivity is lost.

Timeline of Events

1
May 5, 2026
CISA officially launches the 'CI Fortify' initiative and releases its initial guidance.
2
May 5, 2026
This article was published

MITRE ATT&CK Mitigations

The 'Isolation' pillar of CI Fortify is an advanced form of network segmentation, preparing for full disconnection.

The 'Recovery' pillar of CI Fortify emphasizes the need for tested and resilient backup and recovery plans.

The guidance promotes building redundant, manual, or local operational modes that can be used if primary systems fail.

D3FEND Defensive Countermeasures

The 'Isolation' component of CISA's CI Fortify initiative is a direct call for critical infrastructure operators to develop and practice Network Isolation. This goes beyond standard network segmentation. Organizations must create and test playbooks for physically or logically disconnecting their operational technology (OT) networks from their corporate IT networks and the internet during a crisis. This could involve configuring firewalls to drop all external traffic with a single command, or training operators to physically unplug network connections at demarcation points. The goal is to create a 'digital island' where essential services can continue to operate using local controls, safe from an attacker who has compromised the IT network. This capability must be tested regularly to ensure it works and that staff are prepared to operate in an isolated state.

The 'Recovery' pillar of CI Fortify emphasizes the need for robust restoration capabilities. Critical infrastructure entities must maintain clean, segmented, and offline backups of all critical systems, including ICS configurations, HMI projects, and historical data. The key element CISA highlights is the ability to perform recovery while isolated. This means recovery servers and backup media must be located within the secure OT enclave or be accessible via a secure, out-of-band network. Recovery plans must be tested from end-to-end in a simulated isolated environment to prove that the organization can restore essential services without relying on the potentially compromised IT network or internet connectivity.

Timeline of Events

1
May 5, 2026

CISA officially launches the 'CI Fortify' initiative and releases its initial guidance.

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

CISACI FortifyCritical InfrastructureResiliencePolicy and ComplianceICSOT

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.