SlideShare a Scribd company logo
1 of 24
Download to read offline
CISA 5G STRATEGY
Ensuring the Security and Resilience
of 5G Infrastructure In Our Nation
2020
U.S. Department of Homeland Security
Cybersecurity and Infrastructure Security Agency
CISA 5G
STRATEGY
Ensuring the Security and Resilience
of 5G Infrastructure In Our Nation
2020
U.S. Department of Homeland Security
Cybersecurity and Infrastructure Security Agency
“From my perspective, 5G is the single
biggest critical infrastructure build that
the globe has seen in the last 25 years
and, coupled with the growth of cloud
computing, automation, and future of
artificial intelligence, demands focused
attention today to secure tomorrow.
”
Christopher Krebs
Director, CISA
CISA 5G
STRATEGY
CONTENTS
Message from the Director .......................................... 01
What is 5G? ................................................................ 02
5G Strategic Context .................................................. 03
Mission, Vision, and Core Competencies .................... 04
Who We Partner With .................................................. 05
5G Strategic Initiatives .............................................. 06
Conclusion ................................................................. 17
MESSAGE FROM
THE DIRECTOR
As we look to implement 5G into our nation’s networks and critical infrastructure, it is
important we work to address potential risks that come with 5G deployment. That is
where my agency, the Cybersecurity and Infrastructure Security Agency (CISA) within the
U.S. Department of Homeland Security (DHS) comes in. CISA leads the national effort to
enhance the security, resilience, and reliability of our cyber and physical infrastructure.
As the lead federal civilian agency for cybersecurity, I see our role as being out front as the Nation’s risk advisor. And, I
use the term “advisor” very deliberately, because it is well known that the private sector owns and operates the majority of
critical infrastructure in the United States. Our work with these network defenders takes place on a voluntary basis. Through
these partnerships, CISA helps facilitate a collective defense against risks, enabling enhanced capabilities, improved
decision making, and increased information sharing that allow the private sector to be more effective in their jobs.
The deployment of 5G technologies will enable new innovation, new markets, and economic growth around the world.
Tens of billions of new devices will be connected to the Internet in the next few years. Given 5G’s scope, the stakes for
safeguarding our networks could not be higher. The vulnerabilities that will come with 5G deployment are broad and range
from insider threats to cyber espionage and attacks from sophisticated nation-states.
Now more than ever, trust in our services and the underpinning equipment is paramount. We must realize the importance of
managing risk associated with 5G deployment because there are certain areas of critical infrastructure – automated health
care, telecommunications backbone, sensitive military and government facilities, and mass transit – where the scale of 5G
changes the nature of risk to critical functions.
At CISA, we are committed to working with our partners and stakeholders to ensure the security and integrity of 5G
technology in our nation. As we all know, adversaries are not going to stop looking for ways to attack targets of opportunity,
especially those that are criticality paramount to the long-term success of our nation. Working together we will ensure a
safer, more secure, and resilient tomorrow.
Christopher Krebs,
Director, Cybersecurity and Infrastructure Security Agency
MESSAGE FROM THE DIRECTOR
01 CISA 5G STRATEGY
CISA 5G STRATEGY
WHAT
IS 5G?
Roughly every 10 years, the next generation of mobile communication networks is released, bringing faster speeds
and increased capabilities. The first-generation (1G) of wireless networks brought the very first cell phones, 2G brought
improved coverage and texting, 3G introduced voice with data/internet, and 4G/4G long-term evolution (LTE) delivered
increased speeds to keep up with mobile data demand. The fifth-generation (5G) of wireless technology represents
a complete transformation of telecommunication networks, introducing a wealth of benefits such as higher data rates
(extremely fast download speeds), ultra-low latency (near real-time interactivity), and increased network capacity (allowing
for the connectivity of many more devices at once). These benefits will pave the way for new capabilities and support
connectivity for applications like smart cities, autonomous vehicles, remote healthcare, and much more.
100x
Faster Download Speeds
While a 3-gigabyte movie would
take 40 minutes to download on
4G, it would take only 35 seconds
on a 5G network.
10x
Decrease in Latency
Data response times will be as low
as 1 millisecond, providing endless
possibilities from remote surgery to
self driving cars.
100x
Network Capacity
5G promises greater traffic
capacity, allowing for millions of
devices to be connected on the
same network within a small area.
Initial 5G deployment will operate on a non-standalone (NSA) network, relying on existing telecommunications infrastructure
(e.g., 4G-LTE) to provide improved bandwidth, capacity, and reliability of wireless broadband services. The evolution from
NSA to standalone (SA) 5G networks, which do not rely on existing infrastructure, will take years. However, the transition to
a SA network will allow end-users to realize the full potential of 5G, enabling applications that require connectivity for tens
of billions of devices over large areas, ultra-low latency for critical near-real time communications, and faster, more reliable
connections in crowded areas. Here’s how it will work:
USE CASES RADIO ACCESS NETWORK (RAN) CORE NETWORK
Core Network
Infrastructure
The core network is
the backbone of the
U.S. communications
infrastructure that routes data
and connects the different
parts of the access network.
Baseband Unit
(BBU) Pool
The centralized BBU Pool
implements software-defined
networking (SDN) and multi-
access edge computing to
allocate the network based on
need and connects to remote
radio units located on macro
towers through mobile fronthaul
(optical fiber).
Mobile End
User Devices
Autonomous
Vehicles
Telemedicine
Industry
Automation
Smart
Homes/Cities
Virtual/Augmented
Reality
5G networks will enable the
connection for billions of new
devices, sensors, and systems
that will intelligently connect to
the network based on their time
sensitivity and computational needs.
5G
Small Cell & Macro Towers
5G networks will leverage low-, mid-,
and high-band spectrum, requiring
the deployment of small cells in
addition to macro towers. These small
cells will serve as signal repeaters,
providing improved speed, greater
network capacity, and stronger
reliability in high-density areas.
Mobile Fronthaul Mobile Backhaul/
Transport Network
Connects the
RAN to the Core
02
WHAT IS 5G?
CISA 5G STRATEGY
5G STRATEGIC
CONTEXT
5G networks and future communications technologies (e.g., SDN, network slicing, edge computing) will transform the way
we communicate, introducing a vast array of new connections, capabilities, and services. However, these developments
introduce significant risks that threaten national security, economic security, and impact other national and global interests.
Given these concerns, the United States and other like-minded countries have placed an increased emphasis on ensuring
the security and integrity of 5G technology. For example, security officials from over 30 countries, including the United
States, met in Prague in May 2019 to discuss guidelines for secure 5G network deployment. The result of the engagement
was the development of The Prague Proposals, which identified recommendations in four distinct categories in preparation
of 5G roll-out: (1) Policy, (2) Technology, (3) Economy, and (4) Security, Privacy, and Resilience.
Building upon the recommendations established by the Prague Proposals, the United States developed the National
Strategy to Secure 5G, a strategic document that supports the goals of the National Cyber Strategy and expands on how
the U.S. Government will secure 5G infrastructure domestically and abroad. The National Strategy to Secure 5G also
identifies four major lines of effort to maximize the security of 5G infrastructure.1
NATIONAL STRATEGY
TO SECURE 5G
Lines of Effort:
1 Facilitate Domestic 5G Rollout
2 Assess Risks to and Identify Core Security
Principles of 5G Infrastructure
3 Address Risks to United States Economic and
National Security During Development and
Deployment of 5G Infrastructure Worldwide
4 Promote Responsible Global Development
and Deployment of 5G
03
The Department of Homeland Security (DHS)
Cybersecurity and Infrastructure Security Agency
(CISA) leads 5G risk management efforts so the United
States can fully benefit from all the advantages 5G
connectivity promises to bring. In support of CISA’s
operational priority to secure 5G, as outlined
in the CISA Strategic Intent, the CISA 5G Strategy
establishes five strategic initiatives that stem from the
four lines of effort defined in the National Strategy to
Secure 5G. Guided by three core competencies: Risk
Management, Stakeholder Engagement, and Technical
Assistance, these initiatives include associated
objectives to ensure there are policy, legal, security,
and safety frameworks in place to fully leverage 5G
technology while managing its significant risks. With the
support of CISA and its partners, the CISA 5G Strategy
seeks to advance the development and deployment of a
secure and resilient 5G infrastructure, one that enables
enhanced national security, technological innovation,
and economic opportunity for the United States and its
allied partners.
1. https://www.whitehouse.gov/wp-content/uploads/2020/03/
Nation-al-Strategy-5G-Final.pdf
5G STRATEGIC CONTEXT
CISA 5G STRATEGY
OUR VISION
5G connectivity that enhances national security, technological
innovation, and economic opportunity.
OUR MISSION
Lead 5G risk management efforts to promote the development
and deployment of secure and resilient 5G infrastructure.
CORE COMPETENCIES
Stakeholder Engagement
Risk Management
Technical Assistance
Promote secure and resilient 5G deployment by leading efforts to identify, analyze,
prioritize, and manage risks
Actively engage federal, state, local, tribal and territorial, industry, association, academia,
non-profit, and international partners to address 5G challenges
Update and develop instructional tools and services to support stakeholders with the
planning, governance, operational, and technical aspects of secure 5G deployment
04
VISION, MISSION, AND CORE COMPETENCIES
CISA 5G STRATEGY
WHO WE
PARTNER WITH
CISA is committed to working with its partners to ensure secure and resilient 5G technology for the nation and its allies. As
the Nation’s risk advisor, CISA serves the unique role as a trusted information broker across the public and private sector. In
this role, CISA fosters increased information sharing and helps stakeholders make more informed decisions when identifying
and addressing future 5G technology priorities. Participation in this effort is based on a clear and shared interest in ensuring
the security and resilience of the Nation’s critical infrastructure and a secure and resilient deployment of 5G infrastructure.
FEDERAL DEPARTMENTS AND AGENCIES
Through information sharing and coordination with federal departments and agencies, CISA helps
establish collective risk management strategies that support the development of national policy and
strategy frameworks for future 5G deployment.
SLTT GOVERNMENT AGENCIES
CISA partners with state, local, tribal, and territorial government agencies to understand common
vulnerabilities and share assessments of potential risks posed by 5G technology. In addition, CISA
works with SLTT stakeholders to discuss the specific policy, technological, and legal implications
inhibiting secure 5G deployment.
INDUSTRY
CISA relies on its partnership with the private sector to understand and manage risks posed to 5G
technology. With the promise of connectivity between billions of Internet of Things (IoT) devices, it is
critical that CISA and industry collaborate to identify vulnerabilities and ensure that cybersecurity is
prioritized within the design and development of 5G technology.
NON-GOVERNMENTAL ORGANIZATIONS
The research and development (R&D) initiatives carried out by associations, academia, and non-
profits is invaluable to the security and resilience of 5G networks. From the analysis, design, testing,
and development of new 5G capabilities, partnerships with these entities provide both subject matter
insight and expertise that promote secure 5G deployment.
INTERNATIONAL ALLIES
As 5G connectivity becomes a reality, there is the potential for an increase in untrusted vendors,
equipment, and devices. Whether vulnerabilities are malicious or inadvertent, there will remain a
need to maintain strong relationships with international partners to communicate risks and safeguard
the flow of information.
05
WHO WE PARTNER WITH
CISA 5G STRATEGY
5G STRATEGIC
INITIATIVES
The CISA 5G Strategy aligns to the National Strategy to Secure 5G and establishes five strategic initiatives that seek
to advance the deployment of a secure and resilient 5G infrastructure. Each of the strategic initiatives address critical
risks to secure 5G deployment, such as physical security concerns, attempts by threat actors to influence the design and
architecture of the network, vulnerabilities within the 5G supply chain, and an increased attack surface for malicious actors
to exploit weaknesses. Within each strategic initiative are objectives that define specific actions and responsibilities to
ensure the security and resilience of 5G technology in our Nation.
NATIONAL STRATEGY TO SECURE 5G
Strategic Initiative 1
Support 5G policy
and standards
development by
emphasizing security
and resilience
Strategic Initiative 2
Expand situational
awareness of 5G
supply chain risks
and promote security
measures
Strategic Initiative 3
Partner with
stakeholders to
strengthen and secure
existing infrastructure
to support future 5G
deployments
Strategic Initiative 4
Encourage innovation
in the 5G marketplace
to foster trusted 5G
vendors
Strategic Initiative 5
Analyze potential
5G use cases and
share information
on risk management
strategies
06
5G STRATEGIC INITIATIVES
STRATEGIC INITIATIVE 1
Strategic Initiative 1: Support 5G policy and standards development by
emphasizing security and resilience
The development of 5G policies and standards serve as the foundation for securing 5G’s future communications
infrastructure. Those entities that shape the future of these policies and standards position themselves as global leaders
and help facilitate secure deployment and commercialization of 5G technologies. To prevent attempts by threat actors
to influence the design and architecture of 5G networks, it is critical that these foundational elements be designed and
implemented with security and resilience from the start.
DESIRED OUTCOME: Threat actors are unable to maliciously influence the design and architecture of 5G networks.
OBJECTIVES
1.1 Expand and coordinate participation in government and
industry 5G working groups and standards body meetings
CISA actively participates across numerous 5G standards bodies and working
groups to bolster security and resilience, including groups like the Communications
Security Reliability and Interoperability Council (CSRIC). To further their
participation, CISA will continue to identify additional opportunities to provide
subject matter expertise and risk management support. To ensure the distribution
of streamlined and consistent messaging across all support areas, CISA will also
develop an internal working group to consolidate and coordinate all efforts.
CISA 5G STRATEGY
07
STRATEGIC INITIATIVE 1
CISA 5G STRATEGY
1.2 Partner with trusted market leaders to increase 5G standards
contributions
The development of technical standards contributions from adversarial nations
has the potential to allow untrusted technologies and equipment to capitalize
on standards that are unique to their systems. The development of standards
from adversarial nations is also indicative of strong influence among standards
bodies, such as the 3rd Generation Partnership Project (3GPP), the leading global
telecommunications standards development body. CISA will partner with trusted
market leaders and other leading standards contributors like the International
Telecommunication Union, Institute of Electrical and Electronics Engineers, and
the Alliance for Telecommunications Industry Solutions to assist with the
development of standards contributions that help eliminate vulnerabilities and the
potential for corruption.
Support international 5G security and resilience policy
framework development efforts
1.3
To ensure interoperable and secure communications between the U.S. and its
allies, it is vital that policies are in place that promote security within 5G systems
and networks. To ensure that security is a primary consideration among policy
development, CISA will continue to engage with international partners and
communicate the potential impacts of using untrusted 5G components and
vendors, illustrating potential risks to national security and critical infrastructure.
SPOTLIGHT: CSRIC Working Groups
A key venue for collaborative work between government and the private sector is the
Federal Communications Commission’s (FCC) CSRIC. CSRIC is a federal advisory
committee made up of members from both the private sector and government. Its mission
is to provide recommendations to the FCC to ensure, among other things, security and
reliability of communications systems, including
telecommunications, media, and public safety.
As an active member of this council, CISA
participates on CSRIC VII’s Working Group 2:
Managing Security Risk in the Transition to 5G
and Working Group 3: Managing Security Risk
in Emerging 5G Implementations to provide
recommendations for mitigating risks and
identifying best practices within the design,
deployment, and operation of 5G networks.
08
STRATEGIC INITIATIVE 1
STRATEGIC INITIATIVE 2
Strategic Initiative 2: Expand situational awareness of 5G supply chain
risks and promote security measures
Between untrusted components, vendors, equipment, and networks, 5G supply chain security is under constant threat. For
example, while certain 5G equipment may be from a trusted vendor, supporting components manufactured or handled by
untrusted partners or malicious actors could negate any security measures in place. These compromised components have
the potential to affect the connectivity and security of transmitted data and information.
DESIRED OUTCOME: Malicious or inadvertent vulnerabilities within the 5G supply chain are successfully prevented
or mitigated.
OBJECTIVES
2.1
Collaborate with Information and Communication Technology (ICT)
supply chain efforts within the Federal Government to unify 5G
supply chain risk management workstreams
The U.S. Government has established several supply chain security initiatives,
including the formation of groups like the ICT Supply Chain Risk Management
(SCRM) Task Force and Federal Acquisition Security Council (FASC). Groups like
these provide complementary insights and recommendations to 5G supply chain
risk management efforts. To foster increased information sharing and support
additional initiatives that assess and manage risks to 5G supply chain, CISA will
identify and partner with various working groups, task forces, and other supply
chain-focused entities to unify efforts and workstreams.
CISA 5G STRATEGY
STRATEGIC INITIATIVE 2
09
CISA 5G STRATEGY
2.2 Develop a common framework to evaluate, prioritize, and
communicate 5G supply chain risks
High-risk vendors and untested components have the potential to increase the
susceptibility of the 5G supply chain to unique and complex risks. Management
of these risks will require timely and actionable 5G supply chain risk management
information sharing. To defend against these vulnerabilities, CISA will work with the
ICT SCRM Task Force, a public-private supply chain risk management partnership,
to develop a framework for assessing and communicating risks. Building upon
initiatives like the Task Force’s development of a framework for vendors to use
to attest to supply chain best practices, CISA will partner with the Task Force to
define processes that prioritize supply chain risks based on their severity and
impact to critical processes and functions. CISA will also work with the Task Force
to disseminate valuable 5G supply chain risk management information that enables
users to secure their systems, networks, and devices.
Create customized outreach materials promoting supply
chain risk management strategies
2.3
To assist stakeholders with managing vulnerabilities specific to their supply chain,
CISA will develop tailored outreach products that focus on risks within each of the
critical infrastructure sectors. Stakeholders can leverage the information and begin
to establish proactive measures and repeatable processes to manage and assess
their supply chain security risks.
SPOTLIGHT: Federal Acquisition Security Council
The FASC serves as a dedicated interagency body to protect the U.S. Government’s
acquisition of ICTs. As a statutory member of the FASC, CISA works with other senior
leaders from across the government to develop criteria and information sharing that assists
departments and agencies with identifying and managing specific ICT supply chain risks,
including those risks posed to 5G technologies. The FASC also reviews DHS’s ICT SCRM
Task Force’s findings and recommendations to assist with its efforts to implement the
Federal Acquisition Supply Chain Security Act. A key component of the FASC is the ability to
recommend exclusion of certain vendors
or removal of certain products, subject
to judicial review, to mitigate security
concerns. This ability will become
increasingly important as development
and deployment of 5G infrastructure
begins to take shape.
10
STRATEGIC INITIATIVE 2
STRATEGIC INITIATIVE 3
Strategic Initiative 3: Partner with stakeholders to strengthen and secure
existing infrastructure to support future 5G deployments
Before moving to a standalone infrastructure, the first iterations of 5G deployment will work alongside existing 4G LTE
infrastructure and core networks. While 5G architecture is designed to be more secure, 5G’s specifications and protocols
stem from previous networks, which contain legacy vulnerabilities. For example, the overlay of 4G and 5G networks has the
potential for a malicious actor to carry out a downgrade attack, where they could force a user on a 5G network to use 4G in
order to exploit known vulnerabilities against them. These inherent vulnerabilities, along with new and unidentified risks, will
require the collaboration of industry and government to develop and communicate security enhancements to support secure
5G deployments.
DESIRED OUTCOME: Secure 5G deployment, void of legacy vulnerabilities and untrusted components.
OBJECTIVES
3.1
Collaborate with national laboratory and technology centers
to evaluate key existing 5G components and identify security
vulnerabilities
5G will use more components than previous generations of networks, and the
proliferation of 5G infrastructure could provide malicious actors with more attack
vectors. To counteract these risks, CISA will collaborate with academia, national
laboratories, and technology centers, like the Idaho National Laboratory, to
establish testing programs that address 5G security and vulnerability challenges
associated with 5G handsets, radio access networks, and other 5G components.
STRATEGIC INITIATIVE 3
CISA 5G STRATEGY
11
CISA 5G STRATEGY
3.2
Direct engagements to promote security and resilience of 5G
deployment across the critical infrastructure sector and SLTT
communities
As 5G networks are deployed among the critical infrastructure sectors and SLTT
communities, CISA will lead engagements to communicate known risks and best
practices that support secure and resilient 5G. These engagements will include
the facilitation and coordination of outreach through meetings, workshops,
conferences, and other events.
Coordinate across the Federal Government to engage with
international partners and promote 5G deployment best
practices
3.3
Sharing information and promoting security best practices among international
partners is critical to establishing secure and interoperable 5G communication
among the United States and its allies. To ensure a consolidated and coordinated
effort when engaging international partners, CISA will leverage its federal
partnerships to develop and promote best practices that help identify standards for
procuring trusted 5G technology and establish information-sharing mechanisms
that educate stakeholders on new and emerging 5G vulnerabilities.
SPOTLIGHT: Rural Engagement Initiative
The Rural Engagement Initiative leverages CISA’s partnerships across the Federal
Government and rural telecommunications carriers in a collaborative effort to discuss 5G
innovation, security, and risk mitigation efforts. This effort brings together DHS, the FCC,
the U.S. Chamber of Commerce, the Competitive Carriers Association, and small owner/
operators from across the Nation. Engagements will provide an interactive forum for round
table sessions and discussions on the future of 5G.
12
STRATEGIC INITIATIVE 3
STRATEGIC INITIATIVE 4
Strategic Initiative 4: Encourage innovation in the 5G marketplace to
foster trusted 5G vendors
As 5G is deployed, there is an emphasis on ensuring that state-influenced entities do not dominate the 5G marketplace. To
address this concern, CISA will work with its partners to support R&D initiatives and prize programs that result in secure and
resilient 5G technologies and capabilities. By supporting these types of efforts, CISA will help drive innovation and establish
a trusted vendor community for the future of 5G.
DESIRED OUTCOME: Increased number of trusted vendors in the 5G marketplace to address risks posed by limited
competition and proprietary solutions.
OBJECTIVES
4.1 Collaborate with federal interagency partners to establish R&D
projects focused on emerging 5G technologies and capabilities
To assist with managing the risks associated with 5G technologies and its new
capabilities, CISA will work with its federal interagency partners to coordinate,
identify, develop, or adapt R&D efforts (e.g., Open RAN, network slicing, and
intrusion detection and prevention systems) to meet 5G strategic needs. These
efforts will result in tools, technologies, and informational products that will
help bridge the gap between industry and its end-user communities, providing
stakeholders with a greater understanding of how to securely deploy 5G
infrastructure and technology and leverage all the benefits its connectivity promises
to bring.
CISA 5G STRATEGY
13
STRATEGIC INITIATIVE 4
CISA 5G STRATEGY
4.2 Analyze and report the long-term risks of untrusted 5G
component vendors
Procurement of 5G components from untrusted vendors poses many economic
and security risks. Often, these technologies are cheaper than trusted alternatives,
but these low, up-front costs have the potential to accumulate into more long-term
expenditures to address security flaws or interoperability issues. To prevent the
United States and its allies from purchasing untrusted equipment, CISA will analyze
components from 5G vendors and report on any long-term risks that affect the
ability to securely communicate and share information.
USG prize competitions serve as programs that stimulate innovation and seek
to identify or develop solutions that have the potential to advance the mission
of a federal agency. As part of CISA’s mission to manage risk to the Nation’s
critical infrastructure, CISA will partner with USG prize competition and innovation
challenge programs (e.g., DHS InnoPrize Program) to encourage the facilitation of
projects that promote the development of secure and resilient 5G technology and
infrastructure.
4.3 Partner with U.S. Government (USG) prize competition
programs to influence and establish 5G innovation challenges
SPOTLIGHT: BAA Issued between CISA and DHS S&T
The Broad Agency Announcement (BAA) solicitation, published in April 2019 between
CISA and the Science and Technology Directorate (S&T), established an R&D project
for a Secure and Resilient Mobile Network Infrastructure (SRMNI). The project seeks
innovative approaches and technologies to protect legacy, current, and 5G mobile network
communications, services, and equipment against all threats and vulnerabilities.
“The deployment of 5G technologies offers opportunities for innovation,
efficiency, and economic growth, but it may also present risks we’re not currently
positioned to manage… This BAA solicitation and SRMNI R&D will help DHS
work with industry to identify threats and vulnerabilities to mobile network
infrastructure and inform the development and adoption of security standards.
Christopher Krebs
Director, Cybersecurity and Infrastructure Security Agency ”
14
STRATEGIC INITIATIVE 4
STRATEGIC INITIATIVE 5
Strategic Initiative 5: Analyze potential 5G use cases and share
information on identified risk management strategies
The enhanced capabilities of 5G technologies will support an array of new functions and devices, introducing a plethora
of potential use cases. With the potential for the connection of billions of devices on a network, also known as massive
Machine-Type Communication (mMTC), applications like smart cities will require increased security to safeguard
connected devices from potential threats and vulnerabilities. To ensure the security and integrity of these devices, CISA will
communicate known vulnerabilities and risk management strategies for use cases associated with securing the Nation’s
critical functions.
CISA 5G STRATEGY
DESIRED OUTCOME: New vulnerabilities introduced by deployments of 5G technology are clearly understood
and managed.
OBJECTIVES
5.1 Identify, prioritize, and evaluate potential 5G use cases in
real and simulated environments
Development of risk management strategies requires the assessment of future
5G use cases. Through real and simulated environments, CISA will identify and
prioritize 5G use cases that are so vital to the United States that their disruption,
corruption, or dysfunction would have a debilitating effect on security, national
economic security, national public health or safety, or any combination thereof.
Results from these assessments will influence the development and dissemination
of risk management strategies.
15
STRATEGIC INITIATIVE 5
16
CISA 5G STRATEGY
5.2 Develop and deliver 5G technical assistance offerings to
address stakeholder specific use cases
Leveraging results from 5G use case evaluations, CISA will develop and deliver
customized 5G technical assistance offerings, consisting of trainings, tools, and
onsite assistance, that cater to a stakeholder’s specific needs. These technical
assistance offerings will help stakeholders prepare and plan for the deployment
of 5G infrastructure, navigate the complexity of 5G technologies, and secure
communications and data transmitted through 5G networks.
Leverage industry expertise and analysis to develop
informational materials promoting security best practices for
5G enabled IoT devices
5.3
STRATEGIC INITIATIVE 5
5G networks will enable the expansion for billions of IoT devices, supporting the
advancement of industrial control systems and industries like smart cities, health
care, transportation, public safety, agriculture, and industrial automation. While
these innovations provide a wealth of new capabilities, they also introduce the
potential for increased attack vectors for malicious actors to expose. Building upon
the initial 5G risk characterization initiative, CISA will leverage industry expertise
and analyses to develop risk management insights that promote secure product
design and inform the end-user of cybersecurity best practices.
SPOTLIGHT: 5G Use Cases
As identified by 3GPP, initial 5G applications will be organized by use case type, which are
defined by their unique characteristics and services they facilitate.
Use Case Type Characteristics Sample Applications
mMTC
Massive Machine-
Type Communication
eMBB
Enhanced Mobile
Broadband
URLLC
Ultra Reliable
Low Latency
Communication
Enhanced mobile broadband uses high-band spectrum
and provides a greater capacity to support high data
rates providing consumers with a faster, more reliable
connection in crowded areas and on the move; but
due to the non-penetrative signal and short range,
increased infrastructure will be required.
Leveraging mid-band spectrum, Ultra Reliable Low
Latency Communication can cover large areas
(several miles) and serves applications that require
high reliability and are extremely sensitive to latency,
often for mission-critical applications.
Massive Machine-Type Communication provides
connectivity to billions of devices that transmit small
amounts of traffic intermittently through low-band
spectrum that can cover very large areas (hundreds
of miles). These applications are not highly dependent
on latency.
Augmented/Virtual Reality
Mobile Ultra High-Definition
(UHD, 4K, 8K)
Work/Play in the Cloud
Smart Home
Autonomous Vehicles
Industry Automation
Remote Medical
Procedures
Public Safety
Smart Cities
Transport and Logistics
Remote Healthcare
Intelligent Agriculture
17
CONCLUSION
The transition to 5G presents a wealth of opportunities and new capabilities, changing the way the world communicates
and shares information. With increased capabilities like faster download speeds and ultra-reliable connectivity, 5G networks
will spark an industrial revolution that will enable the development of many new and enhanced services like autonomous
vehicles, smart cities, augmented reality, and remote surgery. Given the potential for various applications and reliance of the
network for future infrastructure, the stakes for safeguarding the network against these vulnerabilities could not be higher.
The use of established critical infrastructure sector partnerships will be one of the backbones of CISA’s efforts within 5G,
as the nature of the risk environment precludes any single entity from managing risk entirely on its own. As the Nation’s risk
advisor, CISA is committed to working with its partners to defend against today’s threats and collaborating to build more
secure and resilient infrastructure for the future. Moving forward, CISA will leverage its partnerships with SLTT, industry,
association, academia, non-profit, and international allies to implement the five strategic initiatives and 15 objectives defined
in this plan. Only by working together will CISA realize the vision of the CISA 5G Strategy: “5G connectivity that enhances
national security, technological innovation, and economic opportunity.”
CONCLUSION
CISA 5G STRATEGY
U.S. Department of Homeland Security
Cybersecurity and Infrastructure Security Agency

More Related Content

What's hot

Gsma pmp - enhancing data protection and privacy in nigeria through the dat...
Gsma   pmp - enhancing data protection and privacy in nigeria through the dat...Gsma   pmp - enhancing data protection and privacy in nigeria through the dat...
Gsma pmp - enhancing data protection and privacy in nigeria through the dat...Nzeih Chukwuemeka
 
What is next for Telecom (Broadband and Cell) - September 2021
What is next for Telecom (Broadband and Cell) - September 2021What is next for Telecom (Broadband and Cell) - September 2021
What is next for Telecom (Broadband and Cell) - September 2021paul young cpa, cga
 
Challenges & issues in way to 6g wireless communication
Challenges & issues in way to 6g wireless communicationChallenges & issues in way to 6g wireless communication
Challenges & issues in way to 6g wireless communicationNikhil Soni
 
Docomo 6 g_white_paperen_20200124
Docomo 6 g_white_paperen_20200124Docomo 6 g_white_paperen_20200124
Docomo 6 g_white_paperen_20200124Mah Khan
 
5 g enterprise market
5 g enterprise market5 g enterprise market
5 g enterprise marketarchanamohol
 
Performance Analysis and Optimization of Next Generation Wireless Networks
Performance Analysis and Optimization of Next Generation Wireless NetworksPerformance Analysis and Optimization of Next Generation Wireless Networks
Performance Analysis and Optimization of Next Generation Wireless NetworksUniversity of Piraeus
 
WiFi_in right perpectives_2018
WiFi_in right perpectives_2018WiFi_in right perpectives_2018
WiFi_in right perpectives_2018Saurabh Verma
 
5g, creating everything connection architecture - C&T RF Antennas Inc
5g, creating everything connection architecture - C&T RF Antennas Inc5g, creating everything connection architecture - C&T RF Antennas Inc
5g, creating everything connection architecture - C&T RF Antennas IncAntenna Manufacturer Coco
 
IT and Telecom Strategic Business Development New Opportunities In Testing ...
IT and Telecom Strategic Business Development  New  Opportunities In Testing ...IT and Telecom Strategic Business Development  New  Opportunities In Testing ...
IT and Telecom Strategic Business Development New Opportunities In Testing ...Alex G. Lee, Ph.D. Esq. CLP
 
Akraino Ike Alisson 6G Architecture Themes Sensing Netw Core RAN Conv CF Cell...
Akraino Ike Alisson 6G Architecture Themes Sensing Netw Core RAN Conv CF Cell...Akraino Ike Alisson 6G Architecture Themes Sensing Netw Core RAN Conv CF Cell...
Akraino Ike Alisson 6G Architecture Themes Sensing Netw Core RAN Conv CF Cell...Ike Alisson
 
Securing 4G and LTE systems with Deep Learning and Virtualization
Securing 4G and LTE systems with Deep Learning and VirtualizationSecuring 4G and LTE systems with Deep Learning and Virtualization
Securing 4G and LTE systems with Deep Learning and VirtualizationDr. Edwin Hernandez
 
See the driving force and challenge of 6G in 7 major dimensions - C&T RF Ante...
See the driving force and challenge of 6G in 7 major dimensions - C&T RF Ante...See the driving force and challenge of 6G in 7 major dimensions - C&T RF Ante...
See the driving force and challenge of 6G in 7 major dimensions - C&T RF Ante...Antenna Manufacturer Coco
 
Next Generation Mobile Broadband @ M-ICT Era
Next Generation Mobile Broadband @ M-ICT EraNext Generation Mobile Broadband @ M-ICT Era
Next Generation Mobile Broadband @ M-ICT EraMastel Indonesia
 
6G Business Digital Inclusion
6G Business Digital Inclusion6G Business Digital Inclusion
6G Business Digital InclusionSteven Johns
 
Ike al akraino autonomous cars workshop july 27 2021 pa10 akraino
Ike al akraino autonomous cars workshop july 27 2021 pa10 akrainoIke al akraino autonomous cars workshop july 27 2021 pa10 akraino
Ike al akraino autonomous cars workshop july 27 2021 pa10 akrainoIke Alisson
 
Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)journalBEEI
 

What's hot (20)

Gsma pmp - enhancing data protection and privacy in nigeria through the dat...
Gsma   pmp - enhancing data protection and privacy in nigeria through the dat...Gsma   pmp - enhancing data protection and privacy in nigeria through the dat...
Gsma pmp - enhancing data protection and privacy in nigeria through the dat...
 
Ss eb27
Ss eb27Ss eb27
Ss eb27
 
What is next for Telecom (Broadband and Cell) - September 2021
What is next for Telecom (Broadband and Cell) - September 2021What is next for Telecom (Broadband and Cell) - September 2021
What is next for Telecom (Broadband and Cell) - September 2021
 
Challenges & issues in way to 6g wireless communication
Challenges & issues in way to 6g wireless communicationChallenges & issues in way to 6g wireless communication
Challenges & issues in way to 6g wireless communication
 
Docomo 6 g_white_paperen_20200124
Docomo 6 g_white_paperen_20200124Docomo 6 g_white_paperen_20200124
Docomo 6 g_white_paperen_20200124
 
5 g enterprise market
5 g enterprise market5 g enterprise market
5 g enterprise market
 
Performance Analysis and Optimization of Next Generation Wireless Networks
Performance Analysis and Optimization of Next Generation Wireless NetworksPerformance Analysis and Optimization of Next Generation Wireless Networks
Performance Analysis and Optimization of Next Generation Wireless Networks
 
6 g tecnology
6 g tecnology6 g tecnology
6 g tecnology
 
WiFi_in right perpectives_2018
WiFi_in right perpectives_2018WiFi_in right perpectives_2018
WiFi_in right perpectives_2018
 
An analysis of the security needs
An analysis of the security needsAn analysis of the security needs
An analysis of the security needs
 
5g, creating everything connection architecture - C&T RF Antennas Inc
5g, creating everything connection architecture - C&T RF Antennas Inc5g, creating everything connection architecture - C&T RF Antennas Inc
5g, creating everything connection architecture - C&T RF Antennas Inc
 
IT and Telecom Strategic Business Development New Opportunities In Testing ...
IT and Telecom Strategic Business Development  New  Opportunities In Testing ...IT and Telecom Strategic Business Development  New  Opportunities In Testing ...
IT and Telecom Strategic Business Development New Opportunities In Testing ...
 
Akraino Ike Alisson 6G Architecture Themes Sensing Netw Core RAN Conv CF Cell...
Akraino Ike Alisson 6G Architecture Themes Sensing Netw Core RAN Conv CF Cell...Akraino Ike Alisson 6G Architecture Themes Sensing Netw Core RAN Conv CF Cell...
Akraino Ike Alisson 6G Architecture Themes Sensing Netw Core RAN Conv CF Cell...
 
5g and IoT
5g and IoT5g and IoT
5g and IoT
 
Securing 4G and LTE systems with Deep Learning and Virtualization
Securing 4G and LTE systems with Deep Learning and VirtualizationSecuring 4G and LTE systems with Deep Learning and Virtualization
Securing 4G and LTE systems with Deep Learning and Virtualization
 
See the driving force and challenge of 6G in 7 major dimensions - C&T RF Ante...
See the driving force and challenge of 6G in 7 major dimensions - C&T RF Ante...See the driving force and challenge of 6G in 7 major dimensions - C&T RF Ante...
See the driving force and challenge of 6G in 7 major dimensions - C&T RF Ante...
 
Next Generation Mobile Broadband @ M-ICT Era
Next Generation Mobile Broadband @ M-ICT EraNext Generation Mobile Broadband @ M-ICT Era
Next Generation Mobile Broadband @ M-ICT Era
 
6G Business Digital Inclusion
6G Business Digital Inclusion6G Business Digital Inclusion
6G Business Digital Inclusion
 
Ike al akraino autonomous cars workshop july 27 2021 pa10 akraino
Ike al akraino autonomous cars workshop july 27 2021 pa10 akrainoIke al akraino autonomous cars workshop july 27 2021 pa10 akraino
Ike al akraino autonomous cars workshop july 27 2021 pa10 akraino
 
Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)
 

Similar to DHS CISA 5G Strategy 2020

Gemalto Review: 5G Feature
Gemalto Review: 5G FeatureGemalto Review: 5G Feature
Gemalto Review: 5G FeatureNexus Publishing
 
5 g as a service (5gaas)
5 g as a service (5gaas)5 g as a service (5gaas)
5 g as a service (5gaas)Luke Wang
 
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLSECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLIRJET Journal
 
5G Telecom Infrastructure Market Participants Should Consider
5G Telecom Infrastructure Market Participants Should Consider5G Telecom Infrastructure Market Participants Should Consider
5G Telecom Infrastructure Market Participants Should Considershikhasony666
 
Big Data and Next Generation Network Challenges - Phdassistance
Big Data and Next Generation Network Challenges - PhdassistanceBig Data and Next Generation Network Challenges - Phdassistance
Big Data and Next Generation Network Challenges - PhdassistancePhD Assistance
 
What Makes 5G Network Different - Digital Nasional Berhad
What Makes 5G Network Different - Digital Nasional BerhadWhat Makes 5G Network Different - Digital Nasional Berhad
What Makes 5G Network Different - Digital Nasional BerhadDigitalNational
 
How three wireless technologies will soon ignite the edge computing revolution
How three wireless technologies will soon ignite the edge computing revolutionHow three wireless technologies will soon ignite the edge computing revolution
How three wireless technologies will soon ignite the edge computing revolutionAbaram Network Solutions
 
Navigating the Unseen Risks: Exploring 5G Vulnerabilities
Navigating the Unseen Risks: Exploring 5G VulnerabilitiesNavigating the Unseen Risks: Exploring 5G Vulnerabilities
Navigating the Unseen Risks: Exploring 5G VulnerabilitiesSecurityGen1
 
Unveiling SecurityGen's Advanced 5G Security Services
Unveiling SecurityGen's Advanced 5G Security ServicesUnveiling SecurityGen's Advanced 5G Security Services
Unveiling SecurityGen's Advanced 5G Security ServicesSecurityGen1
 
Fifth genration technology
Fifth genration technologyFifth genration technology
Fifth genration technologyDEVESH B J
 
Enabling a Big Vision for 5G with Small Cells - Cyient
Enabling a Big Vision for 5G with Small Cells - CyientEnabling a Big Vision for 5G with Small Cells - Cyient
Enabling a Big Vision for 5G with Small Cells - CyientPercy-Mitchell
 
Enabling a Big Version for 5G with Small Cells
Enabling a Big Version for 5G with Small CellsEnabling a Big Version for 5G with Small Cells
Enabling a Big Version for 5G with Small CellsPercy-Mitchell
 
top Data-usecases-for-telcommunications.pdf
top Data-usecases-for-telcommunications.pdftop Data-usecases-for-telcommunications.pdf
top Data-usecases-for-telcommunications.pdfTarekHassan840678
 
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network SecuritySECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network SecurityIRJET Journal
 
President Donald Trump - Cybersecurity - National Institute of Standards and ...
President Donald Trump - Cybersecurity - National Institute of Standards and ...President Donald Trump - Cybersecurity - National Institute of Standards and ...
President Donald Trump - Cybersecurity - National Institute of Standards and ...Clifton M. Hasegawa & Associates, LLC
 

Similar to DHS CISA 5G Strategy 2020 (20)

Gemalto Review: 5G Feature
Gemalto Review: 5G FeatureGemalto Review: 5G Feature
Gemalto Review: 5G Feature
 
5 g as a service (5gaas)
5 g as a service (5gaas)5 g as a service (5gaas)
5 g as a service (5gaas)
 
Cor review2018-a
Cor review2018-aCor review2018-a
Cor review2018-a
 
Quick Quote App Portfolio
Quick Quote App PortfolioQuick Quote App Portfolio
Quick Quote App Portfolio
 
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLSECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
 
5G Telecom Infrastructure Market Participants Should Consider
5G Telecom Infrastructure Market Participants Should Consider5G Telecom Infrastructure Market Participants Should Consider
5G Telecom Infrastructure Market Participants Should Consider
 
5G_Upload.docx
5G_Upload.docx5G_Upload.docx
5G_Upload.docx
 
Big Data and Next Generation Network Challenges - Phdassistance
Big Data and Next Generation Network Challenges - PhdassistanceBig Data and Next Generation Network Challenges - Phdassistance
Big Data and Next Generation Network Challenges - Phdassistance
 
5G Network
5G Network5G Network
5G Network
 
What Makes 5G Network Different - Digital Nasional Berhad
What Makes 5G Network Different - Digital Nasional BerhadWhat Makes 5G Network Different - Digital Nasional Berhad
What Makes 5G Network Different - Digital Nasional Berhad
 
How three wireless technologies will soon ignite the edge computing revolution
How three wireless technologies will soon ignite the edge computing revolutionHow three wireless technologies will soon ignite the edge computing revolution
How three wireless technologies will soon ignite the edge computing revolution
 
Navigating the Unseen Risks: Exploring 5G Vulnerabilities
Navigating the Unseen Risks: Exploring 5G VulnerabilitiesNavigating the Unseen Risks: Exploring 5G Vulnerabilities
Navigating the Unseen Risks: Exploring 5G Vulnerabilities
 
Unveiling SecurityGen's Advanced 5G Security Services
Unveiling SecurityGen's Advanced 5G Security ServicesUnveiling SecurityGen's Advanced 5G Security Services
Unveiling SecurityGen's Advanced 5G Security Services
 
Fifth genration technology
Fifth genration technologyFifth genration technology
Fifth genration technology
 
Enabling a Big Vision for 5G with Small Cells - Cyient
Enabling a Big Vision for 5G with Small Cells - CyientEnabling a Big Vision for 5G with Small Cells - Cyient
Enabling a Big Vision for 5G with Small Cells - Cyient
 
Enabling a Big Version for 5G with Small Cells
Enabling a Big Version for 5G with Small CellsEnabling a Big Version for 5G with Small Cells
Enabling a Big Version for 5G with Small Cells
 
top Data-usecases-for-telcommunications.pdf
top Data-usecases-for-telcommunications.pdftop Data-usecases-for-telcommunications.pdf
top Data-usecases-for-telcommunications.pdf
 
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network SecuritySECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
 
President Donald Trump - Cybersecurity - National Institute of Standards and ...
President Donald Trump - Cybersecurity - National Institute of Standards and ...President Donald Trump - Cybersecurity - National Institute of Standards and ...
President Donald Trump - Cybersecurity - National Institute of Standards and ...
 
5G Network.pptx
5G Network.pptx5G Network.pptx
5G Network.pptx
 

More from Neil McDonnell

Army Futures Command Concept for Maneuver in Multi Domain Operations 2028
Army Futures Command Concept for Maneuver in Multi Domain Operations 2028Army Futures Command Concept for Maneuver in Multi Domain Operations 2028
Army Futures Command Concept for Maneuver in Multi Domain Operations 2028Neil McDonnell
 
Army in multi domain operations 2028
Army in multi domain operations 2028Army in multi domain operations 2028
Army in multi domain operations 2028Neil McDonnell
 
Army Futures Command Overview Aug 10, 2021
Army Futures Command Overview Aug 10, 2021Army Futures Command Overview Aug 10, 2021
Army Futures Command Overview Aug 10, 2021Neil McDonnell
 
Army Futures Command Concept for Special Operations 2028
Army Futures Command Concept for Special Operations 2028Army Futures Command Concept for Special Operations 2028
Army Futures Command Concept for Special Operations 2028Neil McDonnell
 
Army Futures Command Concept for Intelligence 2028
Army Futures Command Concept for Intelligence 2028Army Futures Command Concept for Intelligence 2028
Army Futures Command Concept for Intelligence 2028Neil McDonnell
 
CIO Council's White Paper: Networks of the Future
CIO Council's White Paper: Networks of the FutureCIO Council's White Paper: Networks of the Future
CIO Council's White Paper: Networks of the FutureNeil McDonnell
 
DOC NTIA ITIF Comments on the National Strategy to Secure 5G Implementation Plan
DOC NTIA ITIF Comments on the National Strategy to Secure 5G Implementation PlanDOC NTIA ITIF Comments on the National Strategy to Secure 5G Implementation Plan
DOC NTIA ITIF Comments on the National Strategy to Secure 5G Implementation PlanNeil McDonnell
 
National Strategy to Secure 5G of the United States of America
National Strategy to Secure 5G of the United States of AmericaNational Strategy to Secure 5G of the United States of America
National Strategy to Secure 5G of the United States of AmericaNeil McDonnell
 

More from Neil McDonnell (8)

Army Futures Command Concept for Maneuver in Multi Domain Operations 2028
Army Futures Command Concept for Maneuver in Multi Domain Operations 2028Army Futures Command Concept for Maneuver in Multi Domain Operations 2028
Army Futures Command Concept for Maneuver in Multi Domain Operations 2028
 
Army in multi domain operations 2028
Army in multi domain operations 2028Army in multi domain operations 2028
Army in multi domain operations 2028
 
Army Futures Command Overview Aug 10, 2021
Army Futures Command Overview Aug 10, 2021Army Futures Command Overview Aug 10, 2021
Army Futures Command Overview Aug 10, 2021
 
Army Futures Command Concept for Special Operations 2028
Army Futures Command Concept for Special Operations 2028Army Futures Command Concept for Special Operations 2028
Army Futures Command Concept for Special Operations 2028
 
Army Futures Command Concept for Intelligence 2028
Army Futures Command Concept for Intelligence 2028Army Futures Command Concept for Intelligence 2028
Army Futures Command Concept for Intelligence 2028
 
CIO Council's White Paper: Networks of the Future
CIO Council's White Paper: Networks of the FutureCIO Council's White Paper: Networks of the Future
CIO Council's White Paper: Networks of the Future
 
DOC NTIA ITIF Comments on the National Strategy to Secure 5G Implementation Plan
DOC NTIA ITIF Comments on the National Strategy to Secure 5G Implementation PlanDOC NTIA ITIF Comments on the National Strategy to Secure 5G Implementation Plan
DOC NTIA ITIF Comments on the National Strategy to Secure 5G Implementation Plan
 
National Strategy to Secure 5G of the United States of America
National Strategy to Secure 5G of the United States of AmericaNational Strategy to Secure 5G of the United States of America
National Strategy to Secure 5G of the United States of America
 

Recently uploaded

VIP Kolkata Call Girl Jatin Das Park 👉 8250192130 Available With Room
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130  Available With RoomVIP Kolkata Call Girl Jatin Das Park 👉 8250192130  Available With Room
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130 Available With Roomishabajaj13
 
Powering Britain: Can we decarbonise electricity without disadvantaging poore...
Powering Britain: Can we decarbonise electricity without disadvantaging poore...Powering Britain: Can we decarbonise electricity without disadvantaging poore...
Powering Britain: Can we decarbonise electricity without disadvantaging poore...ResolutionFoundation
 
VIP Mumbai Call Girls Andheri West Just Call 9920874524 with A/C Room Cash on...
VIP Mumbai Call Girls Andheri West Just Call 9920874524 with A/C Room Cash on...VIP Mumbai Call Girls Andheri West Just Call 9920874524 with A/C Room Cash on...
VIP Mumbai Call Girls Andheri West Just Call 9920874524 with A/C Room Cash on...Garima Khatri
 
Vip Vaishali Escorts Service Call -> 9999965857 Available 24x7 ^ Call Girls G...
Vip Vaishali Escorts Service Call -> 9999965857 Available 24x7 ^ Call Girls G...Vip Vaishali Escorts Service Call -> 9999965857 Available 24x7 ^ Call Girls G...
Vip Vaishali Escorts Service Call -> 9999965857 Available 24x7 ^ Call Girls G...ankitnayak356677
 
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual UrgesCall Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urgesnarwatsonia7
 
VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...
VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...
VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...Suhani Kapoor
 
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls ServiceCall Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Servicenarwatsonia7
 
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...Suhani Kapoor
 
Earth Day 2024 - AMC "COMMON GROUND'' movie night.
Earth Day 2024 - AMC "COMMON GROUND'' movie night.Earth Day 2024 - AMC "COMMON GROUND'' movie night.
Earth Day 2024 - AMC "COMMON GROUND'' movie night.Christina Parmionova
 
Call Girls Service Race Course Road Just Call 7001305949 Enjoy College Girls ...
Call Girls Service Race Course Road Just Call 7001305949 Enjoy College Girls ...Call Girls Service Race Course Road Just Call 7001305949 Enjoy College Girls ...
Call Girls Service Race Course Road Just Call 7001305949 Enjoy College Girls ...narwatsonia7
 
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...CedZabala
 
Club of Rome: Eco-nomics for an Ecological Civilization
Club of Rome: Eco-nomics for an Ecological CivilizationClub of Rome: Eco-nomics for an Ecological Civilization
Club of Rome: Eco-nomics for an Ecological CivilizationEnergy for One World
 
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...Suhani Kapoor
 
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...narwatsonia7
 
Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.Christina Parmionova
 
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas Whats Up Number
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas  Whats Up Number##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas  Whats Up Number
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas Whats Up NumberMs Riya
 

Recently uploaded (20)

VIP Kolkata Call Girl Jatin Das Park 👉 8250192130 Available With Room
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130  Available With RoomVIP Kolkata Call Girl Jatin Das Park 👉 8250192130  Available With Room
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130 Available With Room
 
The Federal Budget and Health Care Policy
The Federal Budget and Health Care PolicyThe Federal Budget and Health Care Policy
The Federal Budget and Health Care Policy
 
Call Girls In Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
Call Girls In  Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCeCall Girls In  Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
Call Girls In Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
 
Powering Britain: Can we decarbonise electricity without disadvantaging poore...
Powering Britain: Can we decarbonise electricity without disadvantaging poore...Powering Britain: Can we decarbonise electricity without disadvantaging poore...
Powering Britain: Can we decarbonise electricity without disadvantaging poore...
 
VIP Mumbai Call Girls Andheri West Just Call 9920874524 with A/C Room Cash on...
VIP Mumbai Call Girls Andheri West Just Call 9920874524 with A/C Room Cash on...VIP Mumbai Call Girls Andheri West Just Call 9920874524 with A/C Room Cash on...
VIP Mumbai Call Girls Andheri West Just Call 9920874524 with A/C Room Cash on...
 
Vip Vaishali Escorts Service Call -> 9999965857 Available 24x7 ^ Call Girls G...
Vip Vaishali Escorts Service Call -> 9999965857 Available 24x7 ^ Call Girls G...Vip Vaishali Escorts Service Call -> 9999965857 Available 24x7 ^ Call Girls G...
Vip Vaishali Escorts Service Call -> 9999965857 Available 24x7 ^ Call Girls G...
 
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual UrgesCall Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
 
VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...
VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...
VIP High Class Call Girls Amravati Anushka 8250192130 Independent Escort Serv...
 
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls ServiceCall Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
 
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
 
Earth Day 2024 - AMC "COMMON GROUND'' movie night.
Earth Day 2024 - AMC "COMMON GROUND'' movie night.Earth Day 2024 - AMC "COMMON GROUND'' movie night.
Earth Day 2024 - AMC "COMMON GROUND'' movie night.
 
9953330565 Low Rate Call Girls In Adarsh Nagar Delhi NCR
9953330565 Low Rate Call Girls In Adarsh Nagar Delhi NCR9953330565 Low Rate Call Girls In Adarsh Nagar Delhi NCR
9953330565 Low Rate Call Girls In Adarsh Nagar Delhi NCR
 
Call Girls Service Race Course Road Just Call 7001305949 Enjoy College Girls ...
Call Girls Service Race Course Road Just Call 7001305949 Enjoy College Girls ...Call Girls Service Race Course Road Just Call 7001305949 Enjoy College Girls ...
Call Girls Service Race Course Road Just Call 7001305949 Enjoy College Girls ...
 
Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance VVIP 🍎 SER...
Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SER...Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SER...
Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance VVIP 🍎 SER...
 
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
 
Club of Rome: Eco-nomics for an Ecological Civilization
Club of Rome: Eco-nomics for an Ecological CivilizationClub of Rome: Eco-nomics for an Ecological Civilization
Club of Rome: Eco-nomics for an Ecological Civilization
 
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
 
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
 
Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.
 
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas Whats Up Number
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas  Whats Up Number##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas  Whats Up Number
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas Whats Up Number
 

DHS CISA 5G Strategy 2020

  • 1. CISA 5G STRATEGY Ensuring the Security and Resilience of 5G Infrastructure In Our Nation 2020 U.S. Department of Homeland Security Cybersecurity and Infrastructure Security Agency
  • 2.
  • 3. CISA 5G STRATEGY Ensuring the Security and Resilience of 5G Infrastructure In Our Nation 2020 U.S. Department of Homeland Security Cybersecurity and Infrastructure Security Agency
  • 4. “From my perspective, 5G is the single biggest critical infrastructure build that the globe has seen in the last 25 years and, coupled with the growth of cloud computing, automation, and future of artificial intelligence, demands focused attention today to secure tomorrow. ” Christopher Krebs Director, CISA
  • 5. CISA 5G STRATEGY CONTENTS Message from the Director .......................................... 01 What is 5G? ................................................................ 02 5G Strategic Context .................................................. 03 Mission, Vision, and Core Competencies .................... 04 Who We Partner With .................................................. 05 5G Strategic Initiatives .............................................. 06 Conclusion ................................................................. 17
  • 6. MESSAGE FROM THE DIRECTOR As we look to implement 5G into our nation’s networks and critical infrastructure, it is important we work to address potential risks that come with 5G deployment. That is where my agency, the Cybersecurity and Infrastructure Security Agency (CISA) within the U.S. Department of Homeland Security (DHS) comes in. CISA leads the national effort to enhance the security, resilience, and reliability of our cyber and physical infrastructure. As the lead federal civilian agency for cybersecurity, I see our role as being out front as the Nation’s risk advisor. And, I use the term “advisor” very deliberately, because it is well known that the private sector owns and operates the majority of critical infrastructure in the United States. Our work with these network defenders takes place on a voluntary basis. Through these partnerships, CISA helps facilitate a collective defense against risks, enabling enhanced capabilities, improved decision making, and increased information sharing that allow the private sector to be more effective in their jobs. The deployment of 5G technologies will enable new innovation, new markets, and economic growth around the world. Tens of billions of new devices will be connected to the Internet in the next few years. Given 5G’s scope, the stakes for safeguarding our networks could not be higher. The vulnerabilities that will come with 5G deployment are broad and range from insider threats to cyber espionage and attacks from sophisticated nation-states. Now more than ever, trust in our services and the underpinning equipment is paramount. We must realize the importance of managing risk associated with 5G deployment because there are certain areas of critical infrastructure – automated health care, telecommunications backbone, sensitive military and government facilities, and mass transit – where the scale of 5G changes the nature of risk to critical functions. At CISA, we are committed to working with our partners and stakeholders to ensure the security and integrity of 5G technology in our nation. As we all know, adversaries are not going to stop looking for ways to attack targets of opportunity, especially those that are criticality paramount to the long-term success of our nation. Working together we will ensure a safer, more secure, and resilient tomorrow. Christopher Krebs, Director, Cybersecurity and Infrastructure Security Agency MESSAGE FROM THE DIRECTOR 01 CISA 5G STRATEGY
  • 7. CISA 5G STRATEGY WHAT IS 5G? Roughly every 10 years, the next generation of mobile communication networks is released, bringing faster speeds and increased capabilities. The first-generation (1G) of wireless networks brought the very first cell phones, 2G brought improved coverage and texting, 3G introduced voice with data/internet, and 4G/4G long-term evolution (LTE) delivered increased speeds to keep up with mobile data demand. The fifth-generation (5G) of wireless technology represents a complete transformation of telecommunication networks, introducing a wealth of benefits such as higher data rates (extremely fast download speeds), ultra-low latency (near real-time interactivity), and increased network capacity (allowing for the connectivity of many more devices at once). These benefits will pave the way for new capabilities and support connectivity for applications like smart cities, autonomous vehicles, remote healthcare, and much more. 100x Faster Download Speeds While a 3-gigabyte movie would take 40 minutes to download on 4G, it would take only 35 seconds on a 5G network. 10x Decrease in Latency Data response times will be as low as 1 millisecond, providing endless possibilities from remote surgery to self driving cars. 100x Network Capacity 5G promises greater traffic capacity, allowing for millions of devices to be connected on the same network within a small area. Initial 5G deployment will operate on a non-standalone (NSA) network, relying on existing telecommunications infrastructure (e.g., 4G-LTE) to provide improved bandwidth, capacity, and reliability of wireless broadband services. The evolution from NSA to standalone (SA) 5G networks, which do not rely on existing infrastructure, will take years. However, the transition to a SA network will allow end-users to realize the full potential of 5G, enabling applications that require connectivity for tens of billions of devices over large areas, ultra-low latency for critical near-real time communications, and faster, more reliable connections in crowded areas. Here’s how it will work: USE CASES RADIO ACCESS NETWORK (RAN) CORE NETWORK Core Network Infrastructure The core network is the backbone of the U.S. communications infrastructure that routes data and connects the different parts of the access network. Baseband Unit (BBU) Pool The centralized BBU Pool implements software-defined networking (SDN) and multi- access edge computing to allocate the network based on need and connects to remote radio units located on macro towers through mobile fronthaul (optical fiber). Mobile End User Devices Autonomous Vehicles Telemedicine Industry Automation Smart Homes/Cities Virtual/Augmented Reality 5G networks will enable the connection for billions of new devices, sensors, and systems that will intelligently connect to the network based on their time sensitivity and computational needs. 5G Small Cell & Macro Towers 5G networks will leverage low-, mid-, and high-band spectrum, requiring the deployment of small cells in addition to macro towers. These small cells will serve as signal repeaters, providing improved speed, greater network capacity, and stronger reliability in high-density areas. Mobile Fronthaul Mobile Backhaul/ Transport Network Connects the RAN to the Core 02 WHAT IS 5G?
  • 8. CISA 5G STRATEGY 5G STRATEGIC CONTEXT 5G networks and future communications technologies (e.g., SDN, network slicing, edge computing) will transform the way we communicate, introducing a vast array of new connections, capabilities, and services. However, these developments introduce significant risks that threaten national security, economic security, and impact other national and global interests. Given these concerns, the United States and other like-minded countries have placed an increased emphasis on ensuring the security and integrity of 5G technology. For example, security officials from over 30 countries, including the United States, met in Prague in May 2019 to discuss guidelines for secure 5G network deployment. The result of the engagement was the development of The Prague Proposals, which identified recommendations in four distinct categories in preparation of 5G roll-out: (1) Policy, (2) Technology, (3) Economy, and (4) Security, Privacy, and Resilience. Building upon the recommendations established by the Prague Proposals, the United States developed the National Strategy to Secure 5G, a strategic document that supports the goals of the National Cyber Strategy and expands on how the U.S. Government will secure 5G infrastructure domestically and abroad. The National Strategy to Secure 5G also identifies four major lines of effort to maximize the security of 5G infrastructure.1 NATIONAL STRATEGY TO SECURE 5G Lines of Effort: 1 Facilitate Domestic 5G Rollout 2 Assess Risks to and Identify Core Security Principles of 5G Infrastructure 3 Address Risks to United States Economic and National Security During Development and Deployment of 5G Infrastructure Worldwide 4 Promote Responsible Global Development and Deployment of 5G 03 The Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) leads 5G risk management efforts so the United States can fully benefit from all the advantages 5G connectivity promises to bring. In support of CISA’s operational priority to secure 5G, as outlined in the CISA Strategic Intent, the CISA 5G Strategy establishes five strategic initiatives that stem from the four lines of effort defined in the National Strategy to Secure 5G. Guided by three core competencies: Risk Management, Stakeholder Engagement, and Technical Assistance, these initiatives include associated objectives to ensure there are policy, legal, security, and safety frameworks in place to fully leverage 5G technology while managing its significant risks. With the support of CISA and its partners, the CISA 5G Strategy seeks to advance the development and deployment of a secure and resilient 5G infrastructure, one that enables enhanced national security, technological innovation, and economic opportunity for the United States and its allied partners. 1. https://www.whitehouse.gov/wp-content/uploads/2020/03/ Nation-al-Strategy-5G-Final.pdf 5G STRATEGIC CONTEXT
  • 9. CISA 5G STRATEGY OUR VISION 5G connectivity that enhances national security, technological innovation, and economic opportunity. OUR MISSION Lead 5G risk management efforts to promote the development and deployment of secure and resilient 5G infrastructure. CORE COMPETENCIES Stakeholder Engagement Risk Management Technical Assistance Promote secure and resilient 5G deployment by leading efforts to identify, analyze, prioritize, and manage risks Actively engage federal, state, local, tribal and territorial, industry, association, academia, non-profit, and international partners to address 5G challenges Update and develop instructional tools and services to support stakeholders with the planning, governance, operational, and technical aspects of secure 5G deployment 04 VISION, MISSION, AND CORE COMPETENCIES
  • 10. CISA 5G STRATEGY WHO WE PARTNER WITH CISA is committed to working with its partners to ensure secure and resilient 5G technology for the nation and its allies. As the Nation’s risk advisor, CISA serves the unique role as a trusted information broker across the public and private sector. In this role, CISA fosters increased information sharing and helps stakeholders make more informed decisions when identifying and addressing future 5G technology priorities. Participation in this effort is based on a clear and shared interest in ensuring the security and resilience of the Nation’s critical infrastructure and a secure and resilient deployment of 5G infrastructure. FEDERAL DEPARTMENTS AND AGENCIES Through information sharing and coordination with federal departments and agencies, CISA helps establish collective risk management strategies that support the development of national policy and strategy frameworks for future 5G deployment. SLTT GOVERNMENT AGENCIES CISA partners with state, local, tribal, and territorial government agencies to understand common vulnerabilities and share assessments of potential risks posed by 5G technology. In addition, CISA works with SLTT stakeholders to discuss the specific policy, technological, and legal implications inhibiting secure 5G deployment. INDUSTRY CISA relies on its partnership with the private sector to understand and manage risks posed to 5G technology. With the promise of connectivity between billions of Internet of Things (IoT) devices, it is critical that CISA and industry collaborate to identify vulnerabilities and ensure that cybersecurity is prioritized within the design and development of 5G technology. NON-GOVERNMENTAL ORGANIZATIONS The research and development (R&D) initiatives carried out by associations, academia, and non- profits is invaluable to the security and resilience of 5G networks. From the analysis, design, testing, and development of new 5G capabilities, partnerships with these entities provide both subject matter insight and expertise that promote secure 5G deployment. INTERNATIONAL ALLIES As 5G connectivity becomes a reality, there is the potential for an increase in untrusted vendors, equipment, and devices. Whether vulnerabilities are malicious or inadvertent, there will remain a need to maintain strong relationships with international partners to communicate risks and safeguard the flow of information. 05 WHO WE PARTNER WITH
  • 11. CISA 5G STRATEGY 5G STRATEGIC INITIATIVES The CISA 5G Strategy aligns to the National Strategy to Secure 5G and establishes five strategic initiatives that seek to advance the deployment of a secure and resilient 5G infrastructure. Each of the strategic initiatives address critical risks to secure 5G deployment, such as physical security concerns, attempts by threat actors to influence the design and architecture of the network, vulnerabilities within the 5G supply chain, and an increased attack surface for malicious actors to exploit weaknesses. Within each strategic initiative are objectives that define specific actions and responsibilities to ensure the security and resilience of 5G technology in our Nation. NATIONAL STRATEGY TO SECURE 5G Strategic Initiative 1 Support 5G policy and standards development by emphasizing security and resilience Strategic Initiative 2 Expand situational awareness of 5G supply chain risks and promote security measures Strategic Initiative 3 Partner with stakeholders to strengthen and secure existing infrastructure to support future 5G deployments Strategic Initiative 4 Encourage innovation in the 5G marketplace to foster trusted 5G vendors Strategic Initiative 5 Analyze potential 5G use cases and share information on risk management strategies 06 5G STRATEGIC INITIATIVES
  • 12. STRATEGIC INITIATIVE 1 Strategic Initiative 1: Support 5G policy and standards development by emphasizing security and resilience The development of 5G policies and standards serve as the foundation for securing 5G’s future communications infrastructure. Those entities that shape the future of these policies and standards position themselves as global leaders and help facilitate secure deployment and commercialization of 5G technologies. To prevent attempts by threat actors to influence the design and architecture of 5G networks, it is critical that these foundational elements be designed and implemented with security and resilience from the start. DESIRED OUTCOME: Threat actors are unable to maliciously influence the design and architecture of 5G networks. OBJECTIVES 1.1 Expand and coordinate participation in government and industry 5G working groups and standards body meetings CISA actively participates across numerous 5G standards bodies and working groups to bolster security and resilience, including groups like the Communications Security Reliability and Interoperability Council (CSRIC). To further their participation, CISA will continue to identify additional opportunities to provide subject matter expertise and risk management support. To ensure the distribution of streamlined and consistent messaging across all support areas, CISA will also develop an internal working group to consolidate and coordinate all efforts. CISA 5G STRATEGY 07 STRATEGIC INITIATIVE 1
  • 13. CISA 5G STRATEGY 1.2 Partner with trusted market leaders to increase 5G standards contributions The development of technical standards contributions from adversarial nations has the potential to allow untrusted technologies and equipment to capitalize on standards that are unique to their systems. The development of standards from adversarial nations is also indicative of strong influence among standards bodies, such as the 3rd Generation Partnership Project (3GPP), the leading global telecommunications standards development body. CISA will partner with trusted market leaders and other leading standards contributors like the International Telecommunication Union, Institute of Electrical and Electronics Engineers, and the Alliance for Telecommunications Industry Solutions to assist with the development of standards contributions that help eliminate vulnerabilities and the potential for corruption. Support international 5G security and resilience policy framework development efforts 1.3 To ensure interoperable and secure communications between the U.S. and its allies, it is vital that policies are in place that promote security within 5G systems and networks. To ensure that security is a primary consideration among policy development, CISA will continue to engage with international partners and communicate the potential impacts of using untrusted 5G components and vendors, illustrating potential risks to national security and critical infrastructure. SPOTLIGHT: CSRIC Working Groups A key venue for collaborative work between government and the private sector is the Federal Communications Commission’s (FCC) CSRIC. CSRIC is a federal advisory committee made up of members from both the private sector and government. Its mission is to provide recommendations to the FCC to ensure, among other things, security and reliability of communications systems, including telecommunications, media, and public safety. As an active member of this council, CISA participates on CSRIC VII’s Working Group 2: Managing Security Risk in the Transition to 5G and Working Group 3: Managing Security Risk in Emerging 5G Implementations to provide recommendations for mitigating risks and identifying best practices within the design, deployment, and operation of 5G networks. 08 STRATEGIC INITIATIVE 1
  • 14. STRATEGIC INITIATIVE 2 Strategic Initiative 2: Expand situational awareness of 5G supply chain risks and promote security measures Between untrusted components, vendors, equipment, and networks, 5G supply chain security is under constant threat. For example, while certain 5G equipment may be from a trusted vendor, supporting components manufactured or handled by untrusted partners or malicious actors could negate any security measures in place. These compromised components have the potential to affect the connectivity and security of transmitted data and information. DESIRED OUTCOME: Malicious or inadvertent vulnerabilities within the 5G supply chain are successfully prevented or mitigated. OBJECTIVES 2.1 Collaborate with Information and Communication Technology (ICT) supply chain efforts within the Federal Government to unify 5G supply chain risk management workstreams The U.S. Government has established several supply chain security initiatives, including the formation of groups like the ICT Supply Chain Risk Management (SCRM) Task Force and Federal Acquisition Security Council (FASC). Groups like these provide complementary insights and recommendations to 5G supply chain risk management efforts. To foster increased information sharing and support additional initiatives that assess and manage risks to 5G supply chain, CISA will identify and partner with various working groups, task forces, and other supply chain-focused entities to unify efforts and workstreams. CISA 5G STRATEGY STRATEGIC INITIATIVE 2 09
  • 15. CISA 5G STRATEGY 2.2 Develop a common framework to evaluate, prioritize, and communicate 5G supply chain risks High-risk vendors and untested components have the potential to increase the susceptibility of the 5G supply chain to unique and complex risks. Management of these risks will require timely and actionable 5G supply chain risk management information sharing. To defend against these vulnerabilities, CISA will work with the ICT SCRM Task Force, a public-private supply chain risk management partnership, to develop a framework for assessing and communicating risks. Building upon initiatives like the Task Force’s development of a framework for vendors to use to attest to supply chain best practices, CISA will partner with the Task Force to define processes that prioritize supply chain risks based on their severity and impact to critical processes and functions. CISA will also work with the Task Force to disseminate valuable 5G supply chain risk management information that enables users to secure their systems, networks, and devices. Create customized outreach materials promoting supply chain risk management strategies 2.3 To assist stakeholders with managing vulnerabilities specific to their supply chain, CISA will develop tailored outreach products that focus on risks within each of the critical infrastructure sectors. Stakeholders can leverage the information and begin to establish proactive measures and repeatable processes to manage and assess their supply chain security risks. SPOTLIGHT: Federal Acquisition Security Council The FASC serves as a dedicated interagency body to protect the U.S. Government’s acquisition of ICTs. As a statutory member of the FASC, CISA works with other senior leaders from across the government to develop criteria and information sharing that assists departments and agencies with identifying and managing specific ICT supply chain risks, including those risks posed to 5G technologies. The FASC also reviews DHS’s ICT SCRM Task Force’s findings and recommendations to assist with its efforts to implement the Federal Acquisition Supply Chain Security Act. A key component of the FASC is the ability to recommend exclusion of certain vendors or removal of certain products, subject to judicial review, to mitigate security concerns. This ability will become increasingly important as development and deployment of 5G infrastructure begins to take shape. 10 STRATEGIC INITIATIVE 2
  • 16. STRATEGIC INITIATIVE 3 Strategic Initiative 3: Partner with stakeholders to strengthen and secure existing infrastructure to support future 5G deployments Before moving to a standalone infrastructure, the first iterations of 5G deployment will work alongside existing 4G LTE infrastructure and core networks. While 5G architecture is designed to be more secure, 5G’s specifications and protocols stem from previous networks, which contain legacy vulnerabilities. For example, the overlay of 4G and 5G networks has the potential for a malicious actor to carry out a downgrade attack, where they could force a user on a 5G network to use 4G in order to exploit known vulnerabilities against them. These inherent vulnerabilities, along with new and unidentified risks, will require the collaboration of industry and government to develop and communicate security enhancements to support secure 5G deployments. DESIRED OUTCOME: Secure 5G deployment, void of legacy vulnerabilities and untrusted components. OBJECTIVES 3.1 Collaborate with national laboratory and technology centers to evaluate key existing 5G components and identify security vulnerabilities 5G will use more components than previous generations of networks, and the proliferation of 5G infrastructure could provide malicious actors with more attack vectors. To counteract these risks, CISA will collaborate with academia, national laboratories, and technology centers, like the Idaho National Laboratory, to establish testing programs that address 5G security and vulnerability challenges associated with 5G handsets, radio access networks, and other 5G components. STRATEGIC INITIATIVE 3 CISA 5G STRATEGY 11
  • 17. CISA 5G STRATEGY 3.2 Direct engagements to promote security and resilience of 5G deployment across the critical infrastructure sector and SLTT communities As 5G networks are deployed among the critical infrastructure sectors and SLTT communities, CISA will lead engagements to communicate known risks and best practices that support secure and resilient 5G. These engagements will include the facilitation and coordination of outreach through meetings, workshops, conferences, and other events. Coordinate across the Federal Government to engage with international partners and promote 5G deployment best practices 3.3 Sharing information and promoting security best practices among international partners is critical to establishing secure and interoperable 5G communication among the United States and its allies. To ensure a consolidated and coordinated effort when engaging international partners, CISA will leverage its federal partnerships to develop and promote best practices that help identify standards for procuring trusted 5G technology and establish information-sharing mechanisms that educate stakeholders on new and emerging 5G vulnerabilities. SPOTLIGHT: Rural Engagement Initiative The Rural Engagement Initiative leverages CISA’s partnerships across the Federal Government and rural telecommunications carriers in a collaborative effort to discuss 5G innovation, security, and risk mitigation efforts. This effort brings together DHS, the FCC, the U.S. Chamber of Commerce, the Competitive Carriers Association, and small owner/ operators from across the Nation. Engagements will provide an interactive forum for round table sessions and discussions on the future of 5G. 12 STRATEGIC INITIATIVE 3
  • 18. STRATEGIC INITIATIVE 4 Strategic Initiative 4: Encourage innovation in the 5G marketplace to foster trusted 5G vendors As 5G is deployed, there is an emphasis on ensuring that state-influenced entities do not dominate the 5G marketplace. To address this concern, CISA will work with its partners to support R&D initiatives and prize programs that result in secure and resilient 5G technologies and capabilities. By supporting these types of efforts, CISA will help drive innovation and establish a trusted vendor community for the future of 5G. DESIRED OUTCOME: Increased number of trusted vendors in the 5G marketplace to address risks posed by limited competition and proprietary solutions. OBJECTIVES 4.1 Collaborate with federal interagency partners to establish R&D projects focused on emerging 5G technologies and capabilities To assist with managing the risks associated with 5G technologies and its new capabilities, CISA will work with its federal interagency partners to coordinate, identify, develop, or adapt R&D efforts (e.g., Open RAN, network slicing, and intrusion detection and prevention systems) to meet 5G strategic needs. These efforts will result in tools, technologies, and informational products that will help bridge the gap between industry and its end-user communities, providing stakeholders with a greater understanding of how to securely deploy 5G infrastructure and technology and leverage all the benefits its connectivity promises to bring. CISA 5G STRATEGY 13 STRATEGIC INITIATIVE 4
  • 19. CISA 5G STRATEGY 4.2 Analyze and report the long-term risks of untrusted 5G component vendors Procurement of 5G components from untrusted vendors poses many economic and security risks. Often, these technologies are cheaper than trusted alternatives, but these low, up-front costs have the potential to accumulate into more long-term expenditures to address security flaws or interoperability issues. To prevent the United States and its allies from purchasing untrusted equipment, CISA will analyze components from 5G vendors and report on any long-term risks that affect the ability to securely communicate and share information. USG prize competitions serve as programs that stimulate innovation and seek to identify or develop solutions that have the potential to advance the mission of a federal agency. As part of CISA’s mission to manage risk to the Nation’s critical infrastructure, CISA will partner with USG prize competition and innovation challenge programs (e.g., DHS InnoPrize Program) to encourage the facilitation of projects that promote the development of secure and resilient 5G technology and infrastructure. 4.3 Partner with U.S. Government (USG) prize competition programs to influence and establish 5G innovation challenges SPOTLIGHT: BAA Issued between CISA and DHS S&T The Broad Agency Announcement (BAA) solicitation, published in April 2019 between CISA and the Science and Technology Directorate (S&T), established an R&D project for a Secure and Resilient Mobile Network Infrastructure (SRMNI). The project seeks innovative approaches and technologies to protect legacy, current, and 5G mobile network communications, services, and equipment against all threats and vulnerabilities. “The deployment of 5G technologies offers opportunities for innovation, efficiency, and economic growth, but it may also present risks we’re not currently positioned to manage… This BAA solicitation and SRMNI R&D will help DHS work with industry to identify threats and vulnerabilities to mobile network infrastructure and inform the development and adoption of security standards. Christopher Krebs Director, Cybersecurity and Infrastructure Security Agency ” 14 STRATEGIC INITIATIVE 4
  • 20. STRATEGIC INITIATIVE 5 Strategic Initiative 5: Analyze potential 5G use cases and share information on identified risk management strategies The enhanced capabilities of 5G technologies will support an array of new functions and devices, introducing a plethora of potential use cases. With the potential for the connection of billions of devices on a network, also known as massive Machine-Type Communication (mMTC), applications like smart cities will require increased security to safeguard connected devices from potential threats and vulnerabilities. To ensure the security and integrity of these devices, CISA will communicate known vulnerabilities and risk management strategies for use cases associated with securing the Nation’s critical functions. CISA 5G STRATEGY DESIRED OUTCOME: New vulnerabilities introduced by deployments of 5G technology are clearly understood and managed. OBJECTIVES 5.1 Identify, prioritize, and evaluate potential 5G use cases in real and simulated environments Development of risk management strategies requires the assessment of future 5G use cases. Through real and simulated environments, CISA will identify and prioritize 5G use cases that are so vital to the United States that their disruption, corruption, or dysfunction would have a debilitating effect on security, national economic security, national public health or safety, or any combination thereof. Results from these assessments will influence the development and dissemination of risk management strategies. 15 STRATEGIC INITIATIVE 5
  • 21. 16 CISA 5G STRATEGY 5.2 Develop and deliver 5G technical assistance offerings to address stakeholder specific use cases Leveraging results from 5G use case evaluations, CISA will develop and deliver customized 5G technical assistance offerings, consisting of trainings, tools, and onsite assistance, that cater to a stakeholder’s specific needs. These technical assistance offerings will help stakeholders prepare and plan for the deployment of 5G infrastructure, navigate the complexity of 5G technologies, and secure communications and data transmitted through 5G networks. Leverage industry expertise and analysis to develop informational materials promoting security best practices for 5G enabled IoT devices 5.3 STRATEGIC INITIATIVE 5 5G networks will enable the expansion for billions of IoT devices, supporting the advancement of industrial control systems and industries like smart cities, health care, transportation, public safety, agriculture, and industrial automation. While these innovations provide a wealth of new capabilities, they also introduce the potential for increased attack vectors for malicious actors to expose. Building upon the initial 5G risk characterization initiative, CISA will leverage industry expertise and analyses to develop risk management insights that promote secure product design and inform the end-user of cybersecurity best practices. SPOTLIGHT: 5G Use Cases As identified by 3GPP, initial 5G applications will be organized by use case type, which are defined by their unique characteristics and services they facilitate. Use Case Type Characteristics Sample Applications mMTC Massive Machine- Type Communication eMBB Enhanced Mobile Broadband URLLC Ultra Reliable Low Latency Communication Enhanced mobile broadband uses high-band spectrum and provides a greater capacity to support high data rates providing consumers with a faster, more reliable connection in crowded areas and on the move; but due to the non-penetrative signal and short range, increased infrastructure will be required. Leveraging mid-band spectrum, Ultra Reliable Low Latency Communication can cover large areas (several miles) and serves applications that require high reliability and are extremely sensitive to latency, often for mission-critical applications. Massive Machine-Type Communication provides connectivity to billions of devices that transmit small amounts of traffic intermittently through low-band spectrum that can cover very large areas (hundreds of miles). These applications are not highly dependent on latency. Augmented/Virtual Reality Mobile Ultra High-Definition (UHD, 4K, 8K) Work/Play in the Cloud Smart Home Autonomous Vehicles Industry Automation Remote Medical Procedures Public Safety Smart Cities Transport and Logistics Remote Healthcare Intelligent Agriculture
  • 22. 17 CONCLUSION The transition to 5G presents a wealth of opportunities and new capabilities, changing the way the world communicates and shares information. With increased capabilities like faster download speeds and ultra-reliable connectivity, 5G networks will spark an industrial revolution that will enable the development of many new and enhanced services like autonomous vehicles, smart cities, augmented reality, and remote surgery. Given the potential for various applications and reliance of the network for future infrastructure, the stakes for safeguarding the network against these vulnerabilities could not be higher. The use of established critical infrastructure sector partnerships will be one of the backbones of CISA’s efforts within 5G, as the nature of the risk environment precludes any single entity from managing risk entirely on its own. As the Nation’s risk advisor, CISA is committed to working with its partners to defend against today’s threats and collaborating to build more secure and resilient infrastructure for the future. Moving forward, CISA will leverage its partnerships with SLTT, industry, association, academia, non-profit, and international allies to implement the five strategic initiatives and 15 objectives defined in this plan. Only by working together will CISA realize the vision of the CISA 5G Strategy: “5G connectivity that enhances national security, technological innovation, and economic opportunity.” CONCLUSION CISA 5G STRATEGY
  • 23.
  • 24. U.S. Department of Homeland Security Cybersecurity and Infrastructure Security Agency